cybersecurity Crossword Puzzles
Literasi Digital 2024-08-20
Across
- aplikasi pengolahan angk
- aplikasi yang menyimpan data dalam jumlah besar
- untuk merekam layar
- perangkat lunak pelindung virus
- proses pengikatan objek dalam gambar berurutan
- penyimpanan dan pengolahan data di server jarak jauh yg diakses melalui internet
- penipuan yang dilakukan melalui internet untuk mendapatkan uang atau informasi pribadi dari korban
- operator komputer
- aplikasi yang memungkinkan pengguna berinteraksi dan berbagi konten dengan orang lain
- pengambilan gambar secara keseluruhan
- sebuah perangkat masukan yang digunakan untuk memasukan data berupa huruf, angka maupun symbol
- mengubah informasi menjadi kode rahasia untuk melindungi dari akses yang tidak sah
- data dan jejak aktivitas yang anda tinggalkan saat menggunakan internet
- karakteristik biologis yang unik bagi individu
- program perangkat lunak yang digunakan untuk mengakses dan menjelajahi halaman web
- mengalirkan konten audio atau video secara langsung dari internet tanpa harus diiunduh online
- aplikasi blender
- video yang menggambarkan peristiwa kehidupan nyata
- nama lain angka
- seminar atau pelatihan yang dilakukan secara online platform
- teks di akhir video
- layanan cloud storage dari microsoft
- informasi atau materi yang tersedia dalam format digital seperti gambar,teks,video dan audio data backup menyimpan salinan data untuk melindungi dari kehilangan atau kerusakan
Down
- informasi palsu yang sengaja disebarkan untuk menipu orang menggunakan teknologi digital untuk mengancam atau mempermalukan seseorang secara online
- upaya untuk melindungi sistem komputer,jaringan, dan data dari serangan siber atau akses yang tidak sah
- layanan untuk menyembunyikan aktivitas online
- perangkat keras komputer untuk menghasilkan suara
- nama lain penautan
- layanan cloud storage dari microsoft
- proses pemindahan informasi ke orang lain
- bukan fungsi komunikasi daring
- platform pembagi gambar
- aplikasi pengolah lembar kerja
- sistem kemanan jaringan
- layanan chatting
- media untuk menyimpan file di komputer
- untuk mengakses halaman web di internet digital
- untuk mempotong vidio atau musik
- ukuran gambar untuk pembuka suatu adegan untuk tempat dan waktu
- aplikasi pengolahan kata
- aplikasi yang membantu diskusi dengan guru
- menggunakan informasi digital secara efektif dan aman
- digital kemampuan menggunakan teknologi informasi untuk mencari dan mengkomunikasikan informasi
- perangkat lunak yang merusak atau mengganggu sistem komputer virtual meeting pertemuan yang dilakukan secara online melalui platform digital
- digunakan untuk pencarian
- mencuri informasi sensitif melalui email palsu
- bukan menu home di office word berisi tool
- perangkat befungsi penghubung perangkat keras
- perangkat digital
- etika atau tata krama yang berlaku saat berkomunikasi melalui internet
- nama lain penyematan
51 Clues: nama lain angka • layanan chatting • aplikasi blender • operator komputer • perangkat digital • nama lain penautan • untuk merekam layar • teks di akhir video • nama lain penyematan • platform pembagi gambar • sistem kemanan jaringan • aplikasi pengolahan angk • aplikasi pengolahan kata • digunakan untuk pencarian • bukan fungsi komunikasi daring • aplikasi pengolah lembar kerja • ...
The Crossword: AP Biology Edition 2024-06-01
Across
- Live music venue in Pennsylvania or the name of Mrs. Vlicky’s favorite bird
- French naturalist whose theories are frowned upon in AP Biology classes
- Popular YA series starring ‘Tris’ and ‘Four’ or a type of evolution where two species shared a common ancestor but became different over time
- “All the good cookies”
- Site where substrates bind to an enzyme, or what you want to stay as you get older
- Fragments formed on the lagging strand of DNA during replication that shares a name with a city in Aichi
- Nickname for a reliable non-human counterpart
- Aptly named effect resulting from a small group from a population colonizing an area
- HBO show about the Roys or ecological process
- Contractile in a hypotonic solution
- Something to be aware of on FRQs
- What Ms. Vlicky will name her future dog, and an essential part of carbon fixation
- What a genotype can be, whose prefix is something celebrated during the month of June
- Widely recognized best AP Bio teacher?
- Generation that shares a name with an international racing organization
- Tiny circular DNA, who’s suffix means “formation,” that can give bacteria antibiotic resistance
Down
- Prefix often confused with “inter” that means “within” or an ___specific interaction between individuals of the same species
- Abbreviation for the organism from whom we are all descended, or the title of a 2021 Disney movie
- Wilder, Hackman, or what you get from your parents?
- Citric acid cycle or journalist covering cybersecurity
- Cycle that shares a name with Harris or Klein
- Inappropriate-sounding DNA sequence that indicates where a genetic sequence can be read and decoded
- Cycle that shares a name with the ingredient that gives Sour Patch Kids their zing
- Type of reaction where large molecules get broken down, with a whiskered animal as its prefix
- Diagram demonstrating consumption relationships in an ecosystem that sounds like a spider would live in it
- The job of Greek god, Hermes, or a type of RNA
- Type of transport protein that's name sounds like what it does?
- Repair center for a damaged cell, or the point of origin for a disaster (abbr.)
- Protein chemical messengers produced by the endocrine system, often thought of as the enemy of teenagers everywhere
- What you can do to jeans or what helicase does to DNA during replication
30 Clues: “All the good cookies” • Something to be aware of on FRQs • Contractile in a hypotonic solution • Widely recognized best AP Bio teacher? • Cycle that shares a name with Harris or Klein • Nickname for a reliable non-human counterpart • HBO show about the Roys or ecological process • The job of Greek god, Hermes, or a type of RNA • ...
Cyber Crossword 2022-09-12
Across
- Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto.
- The act of taking advantage of human trust to gain access to private information. This can be done as easily as calling a number and asking for it.
- An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- A service from Google that works to protect websites from spam and abuse caused by robots. A user is presented with a Turing test to distinguish them from a robot.
- Programs that automatically execute tasks as ordered by the creator of the program that has infected them.
- A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server. This is used to identify the user or track their access to the server. Initially, cookies were used to stay logged in but are now commonly used for tracking.
- Also known as an Internet Protocol address, is the string of numbers used to identify each computer using the internet on a network.
- A simple form of code for software that can be written in word editors.
Down
- Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
- The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
- The programs and other operating systems used by a computer.
- A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
- Text that can be read by the human eye
- Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- The way in which the identity of a user is confirmed.
- A form of malware used to threaten victims by blocking, publishing, or corrupting their data unless the ransom is paid.
- Customizable additions to software for extra functionality.
- A secret word or phrase that is used to access a computer system or service.
21 Clues: Text that can be read by the human eye • The way in which the identity of a user is confirmed. • Customizable additions to software for extra functionality. • The programs and other operating systems used by a computer. • Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto. • ...
CS 2025-02-24
Across
- The act of secretly listening to or monitoring communication between two parties, often to steal sensitive data. (13)
- A decoy system or server designed to lure cybercriminals and detect malicious activities. (7)
- A security technique that isolates applications or processes in a controlled environment to prevent them from affecting the rest of the system. (10)
- An open standard for secure, passwordless authentication which is also available for authenticating into EKAMEV from smartphones. (4)
- A hidden entry point into a system, often used by attackers. (8)
- A policy that allows employees to use personal devices (like smartphones/ laptop) for work, potentially introducing security risks. (4)
- A software update designed to fix vulnerabilities. (5)
- _____________ Detection System is employed for monitoring network traffic for security breaches. (9)
- – The I of the CIA triad of cybersecurity. (9)
- A type of social engineering attack where voice communication (usually over the phone) is used to trick individuals into revealing personal information. (7)
- A physical security measure involving a small, secure space where individuals are authenticated before entering a facility. (6)
- A zone in the network segment that acts as a buffer between an internal network and external networks, often used to host public-facing services (13)
- The ChatGPT equivalent application of the office (6)
- A testing technique used to identify vulnerabilities in software by inputting random, unexpected, or malformed data. (4)
Down
- The individual who controls and directs a botnet to perform malicious activities. (9)
- A type of phishing attack that targets high-level executives to steal sensitive information. (7)
- A wireless communication protocol often used in IoT devices that can be susceptible to security vulnerabilities. (6)
- Malware that records keystrokes on a device to steal sensitive information such as passwords.(9)
- A vulnerability that is exploited by attackers before the software developer can patch it. (4-3)
- The process of substituting sensitive data with a unique identifier or token that retains its meaning but is useless if breached. (12)
- Unauthorized use of a system's resources to mine cryptocurrency. (13)
- The certifying authority that issues digital certificates for accessing CBS in the office (5)
- Redirecting a website’s traffic to a fake version of the site to steal information. (8)
- Malicious software designed to conceal its presence on a compromised system and provide privileged access. (7)
- The process of using a magnetic field to destroy data stored on magnetic media like hard drives or tapes. (10)
25 Clues: – The I of the CIA triad of cybersecurity. (9) • The ChatGPT equivalent application of the office (6) • A software update designed to fix vulnerabilities. (5) • A hidden entry point into a system, often used by attackers. (8) • Unauthorized use of a system's resources to mine cryptocurrency. (13) • ...
Teleworking 2024-12-16
Across
- A system that allows data and applications to be stored and accessed over the internet, essential for remote work.
- The balance between personal life and work responsibilities, which can be challenging to maintain when working remotely.
- The measure of how effectively tasks are completed, often tracked in teleworking setups to ensure work is being done efficiently.
- Another term for remote work or telework, referring to working from a location away from the main office.
- An individual who works for multiple clients or companies on a project basis, often remotely, without a fixed employer.
- To work remotely or from home, usually through the internet or phone, as part of a flexible work arrangement.
- A person who provides administrative support to businesses or entrepreneurs remotely, typically via digital communication tools.
- Physical or emotional exhaustion caused by prolonged stress or overwork, often a risk in remote work if boundaries between work and personal life aren’t maintained.
- The protection of digital systems and information from unauthorized access, especially important for remote workers.
- A work schedule that allows employees to set their own hours, often used in teleworking arrangements.
Down
- The ability to stay focused and driven without external supervision, an essential skill for remote workers.
- The ability to control one’s own behavior and work habits, particularly important when working remotely with minimal supervision.
- The ability to plan and control how much time to spend on specific tasks, crucial for remote workers who manage their own schedules.
- The values, behaviors, and practices that define a company’s environment, which can be more challenging to maintain in remote work setups.
- The study of designing workspaces that promote comfort and efficiency, especially important for home office setups.
- A term referring to the tiredness or exhaustion caused by excessive video conferencing, especially during remote work.
- The feeling of being separated from others, often experienced by remote workers due to the lack of in-person social interactions.
- A work arrangement where employees perform their job from a location outside the traditional office, usually from home.
- External or internal factors that divert attention away from work, which can be more prominent when working from home.
- A meeting held online through platforms such as Zoom, Microsoft Teams, or Google Meet, allowing remote employees to collaborate and communicate.
- A model where employees split their time between working from home and working in a physical office.
21 Clues: A model where employees split their time between working from home and working in a physical office. • A work schedule that allows employees to set their own hours, often used in teleworking arrangements. • Another term for remote work or telework, referring to working from a location away from the main office. • ...
media vocabulary 2025-11-18
Across
- the trail of data left behind from your online activities
- a person who sees injustice or bullying and chooses to take positive action to intervene and help.
- any data that can be used to identify a living individual
- the practice of protecting digital systems
- Intelligence- computer systems that can perform tasks typically requiring human intelligence, such as reasoning, decision-making, and problem-solving
- the process of converting data into a secret code to prevent unauthorized access
- Reality- overlays digital content, such as text, images, and 3D models, onto the real world, enhancing the user's perception of their surroundings
- moral principles that govern a person's behavior or the conducting of an activity
- the ability to understand and share the feelings of another.
- Use- being aware of your actions and their impact, particularly when using technology.
- using someone else's words, ideas, or creations without proper credit, presenting them as your own.
- allow you to control your personal information and data on various apps and devices.
- Commons- a nonprofit organization that provides free copyright licenses and tools to help creators share their work on their own terms
- someone who uses technology
- Addiction- may think obsessively about the behavior and they may experience withdrawal symptoms if access to the technology is cut off
Down
- the social identity a person establishes and presents online through various interactions
- Use a U.S. legal doctrine that allows limited use of copyrighted material without permission for purposes like criticism, commentary, news reporting, teaching, and research.
- false or inaccurate information.
- false information that is intended to mislead; deliberate misinformation.
- the use of electronic devices to bully someone
- a legal right that protects original works of authorship, granting the creator exclusive rights to reproduce, distribute, adapt, and perform their work.
- Balance- a high-precision electronic instrument used for accurately measuring mass, featuring a digital display that shows the weight
- a person who is present at an event but not involved in it
- the ability to access, analyze, evaluate, create, and act using all forms of communication.
- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
- Etiquette the code of conduct for respectful and appropriate behavior
- a type of cyberattack where criminals impersonate legitimate sources to trick people into revealing sensitive information
- the act of robbery on the high seas or the unauthorized use of copyrighted material, such as software, music, or films
- Time- the amount of time spent using electronic devices
29 Clues: someone who uses technology • false or inaccurate information. • the practice of protecting digital systems • the use of electronic devices to bully someone • Time- the amount of time spent using electronic devices • the trail of data left behind from your online activities • any data that can be used to identify a living individual • ...
Social and Professional Issues - MIDTERMS 2023-11-14
Across
- is when a person is treated worse, excluded, disadvantaged, harassed, bullied, humiliated or degraded because of their race or ethnicity
- the purpose of IT laws where it helps establish standards and regulations for protecting critical infrastructure and data
- involves the illegal trade of people
- concerns the law of information technology including computing and the internet
- an example of a social issue that pertains to the problems of people's mentality or psychology
- a violation of the Data Privacy Act where personal data is processed without the data subject's consent or for other purposes other than what was originally disclosed
- Republic Act of 10175, refers to one of the prominent laws of the Philippines that address legal issues concerning online interactions and the internet in the Philippines
- the purpose of IT laws where data ownership is protected
- an example of a social issue that manifest in unbalanced income, gender, racial inequality, disparities in resource access
- an organization called "the international criminal police organization"
- complex issues or global challenges that transcend traditional boundaries, whether they are national, cultural, or geographical
- a violation of the Data Privacy Act where a failure to implement adequate security measures to protect personal data
- an organization whose acronym is WHO. A specialized agency of the UN responsible for international public health
- a key provision of Data Privacy Act that enforces organizations to obtain an explicit permission from data subjects before collecting and processing their personal data
Down
- an organization whose acronym is WTO
- an example of a social issue that refers to a lack of basic needs like food, shelter, and education
- a key provision of the Cybercrime law that criminalizes the act of gaining unauthorized access to computer systems, networks, or data
- an international treaty within the United Nations Framework Convention on Climate Change (UNFCCC)
- an organization whose acronym is UN. It promotes international cooperation and maintain peace and security
- a key provision of Data Privacy Act that grant individuals the rights over their personal data, including the right to access, correct, and object to the processing of their information
- a crime that target victims through online
- a key provision of the Cybercrime law that prohibits the interception of data communication without consent
- the purpose of IT laws where data is kept safe
- _____ change affects all nations, with consequences such as rising temperature, extreme weather events, and sea-level rise
- a violation of the Data Privacy Act where organization fail to register with the National Privacy Commission (NPC)
25 Clues: an organization whose acronym is WTO • involves the illegal trade of people • a crime that target victims through online • the purpose of IT laws where data is kept safe • the purpose of IT laws where data ownership is protected • an organization called "the international criminal police organization" • ...
LT 7 CROSSWORD PUZZLE 2024-04-07
Across
- - Series of steps to achieve a business objective.
- - Description of software feature from user's perspective.
- - Plan describing how a business generates revenue.
- - Plan aligning IT with business objectives.
- - Adherence to laws and regulations.
- - Adoption of digital technologies to transform business processes.
- - Individual responsible for ensuring regulatory compliance.
- - Design and structure of IT systems.
- - one of the system utilization for communication purposes.
- - Relating to a company or corporation.
- - The corporate organization is comprised of _ that are separated by the content of work they are responsible for.
- - Identification and mitigation of potential threats.
- - Sequence of activities adding value to a product or service.
- - Protection of digital systems from threats.
- - System managing customer relationships.
- - Iterative and incremental agile framework.
- - Visual system for managing work.
- - Examination of data to derive insights.
- - Design of user interfaces for optimal user experience.
- - Creations of the mind, such as inventions or artistic works.
- - Management of changes to software code.
- - Secure encoding of information.
- - User-facing part of a software application.
- - Flexible approach to project management.
- - Framework for IT decision-making and accountability.
- - Symbol or sign representing a brand.
- - Integrated software managing business processes.
- Framework for decision-making and accountability.
- - Unique strengths that differentiate a business from competitors.
- - Assessment of strengths, weaknesses, opportunities, and threats.
Down
- - Analysis of business data for decision-making.
- - Processes ensuring product quality.
- - Declaration of organization's purpose and goals.
- - Collaboration between development and operations teams.
- - Legal protection for inventions.
- - Individual or group with interest in a project or organization.
- - Dividing a market into distinct groups based on characteristics.
- - Process of setting long-term goals and determining actions to achieve them.
- - Launching software for use.
- - Delivery of computing services over the internet.
- - Owner of shares in a corporation.
- - A type of maintenance that removes the cause for future failures before they occur.
- - Rules governing internal affairs of an organization.
- - one of the four categories of the products of the corporation handle.
- - Principles guiding agile software development.
- - Hardware, software, and networking components supporting IT services.
- - Server-side of a software application.
- - Process of creating software applications.
- - Framework for analyzing industry competitiveness.
- - Interface allowing interaction between software applications.
- - The work content identified by WBS is used as the basis for estimating the approximate number of days required.
- - Step-by-step procedure for solving problems.
- - Governing body overseeing company operations.
- - Structured collection of data.
54 Clues: - Launching software for use. • - Structured collection of data. • - Secure encoding of information. • - Legal protection for inventions. • - Visual system for managing work. • - Owner of shares in a corporation. • - Adherence to laws and regulations. • - Processes ensuring product quality. • - Design and structure of IT systems. • - Symbol or sign representing a brand. • ...
Internet Safety Crossword Puzzle 2025-03-11
Across
- the rules of conduct for respectful and appropriate communication on the internet.
- small files of information that a web server generates and sends to a web browser.
- when a cybercriminal uses email, direct messaging, or other electronic means to harass, scare, or threaten someone with physical harm.
- the unauthorized duplication of copyrighted content that is then sold at substantially lower prices in the 'grey' market
- the intentional video-recorded assault of individuals which are then posted on the Internet for entertainment purposes.
- a person, group, or business that exploits, victimizes, or preys on others:
- to alter (a digital image) with Photoshop software or other image-editing software especially in a way that distorts reality (as for deliberately deceptive purposes)
- (short for weblog) Blog is an abbreviation of “weblog”.
- a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files.
- Footprint the trail of data you leave when using the internet
Down
- the practice of protecting systems, networks, and programs from digital attacks.
- Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person.
- Settings controls available on many websites and apps to limit who can access your profile and what information visitors can see.
- criminal activity that either targets or uses a computer.
- Theft using found – or in many cases, stolen – pieces of someone's identifying information to impersonate that individual.
- to express strong emotions, such as anger, fear, or excitement, or to express strong opinions, in a loud voice:
- is the posting of a provocative or offensive message, known as flamebait, to a public Internet discussion group, such as a forum, newsgroup, or mailing list, with the intent of provoking an angry response (a "flame") or argument.
- to have a conversation with another person or other people on the internet, when you write down what you want to say, and can see immediately what the other person or other people are writing:
- the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging.
- is when someone uses the technology or the internet to build a relationship with a young person, with the intention of tricking, pressuring or forcing them into doing something sexual, like sending images or videos of themselves.
20 Clues: criminal activity that either targets or uses a computer. • (short for weblog) Blog is an abbreviation of “weblog”. • Footprint the trail of data you leave when using the internet • a person, group, or business that exploits, victimizes, or preys on others: • the practice of protecting systems, networks, and programs from digital attacks. • ...
AP COMPUTER SCI PRINCIPLES TERMS 2018-09-09
Across
- A unit of information equal to 1 million bites
- The publication of a group of ISP addresses known to be sources of spam
- An organized system for the collection and storage of information
- The unit of data that is routed between a network
- Trusted platform module
- A specialized format for organizing and storing data.
- A small chip that responds to and processes the basic instructions that drive a computer.
- Location where data is being stored
- Device that reads and/or writes data to a disk
- Sites and places on the web used for more socialization and a sense of community
- Any process in which information is gathered and expressed in a summary form, for purposes such as statistical analysis.
- Event data recorder
- The process of sorting through large data sets to identify patterns and establish relationships to solve problems through data analysis.
- Refers to the ownership of intangible and non-physical goods
- A collection of documents about a specific items
- Digital rights management
- A namespace that organizes a set of related classes and interfaces
- A central place in which an aggregation of data is kept and maintained in an organized way, usually in computer storage.
Down
- List of e-mail addresses or domain names from which an e-mail blocking program will allow messages to be received.
- A partitioning data, where partitioned data types are stoned together
- The study of visual representation of abstract data to reinforce human recognition
- Repository that houses computing facilities
- Consists of multiple devices that communicate with one another
- A digital telecommunications network which allows nodes to share resources
- A process through which digital data is saved
- A term used to describe the virtual world of computers
- The number transistors per silicon chip doubles every year
- Refers to network connection established for a single session
- The state of being protected against the criminal of on authorized use of electronic data
- The smallest unit of data in a computer.
- Information that has been translated into a form that is efficient for movement or processing.
- A printable symbol having phonetic or pictographic meaning
- electronic technology that generates/Processes data
- Debis That occurs as a result of digital living
- A simple routing technique in computer networks were a source and package through every outgoing link
35 Clues: Event data recorder • Trusted platform module • Digital rights management • Location where data is being stored • The smallest unit of data in a computer. • Repository that houses computing facilities • A process through which digital data is saved • A unit of information equal to 1 million bites • Device that reads and/or writes data to a disk • ...
Literasi Digital 2024-08-20
Across
- karakteristik biologis yang unik bagi individu
- sebuah perangkat masukan yang digunakan untuk memasukan data berupa huruf, angka maupun symbol
- aplikasi blender
- penyimpanan dan pengolahan data di server jarak jauh yg diakses melalui internet
- aplikasi yang memungkinkan pengguna berinteraksi dan berbagi konten dengan orang lain
- menggunakan informasi digital secara efektif dan aman
- teks di akhir video
- teknologi digital untuk mengancam atau mempermalukan seseorang secara online
- untuk mempotong vidio atau musik
- perangkat keras komputer untuk menghasilkan suara
- nama lain penyematan
- layanan untuk menyembunyikan aktivitas online
- aplikasi pengolah lembar kerja
- mencuri informasi sensitif melalui email palsu
- media untuk menyimpan file di komputer
- sistem kemanan jaringan
- penipuan yang dilakukan melalui internet untuk mendapatkan uang atau informasi pribadi dari korban
- etika atau tata krama yang berlaku saat berkomunikasi melalui internet
- operator komputer
- untuk merekam layar
- nama lain penautan
- proses pengikatan objek dalam gambar berurutan
- aplikasi pengolahan kata
- pengambilan gambar secara keseluruhan
- perangkat lunak yang merusak atau mengganggu sistem komputer virtual meeting pertemuan yang dilakukan secara online melalui platform digital
- aplikasi yang membantu diskusi dengan guru
- upaya untuk melindungi sistem komputer,jaringan, dan data dari serangan siber atau akses yang tidak sah
Down
- perangkat lunak pelindung virus
- digunakan untuk pencarian
- program perangkat lunak yang digunakan untuk mengakses dan menjelajahi halaman web
- perangkat befungsi penghubung perangkat keras
- ukuran gambar untuk pembuka suatu adegan untuk tempat dan waktu
- informasi atau materi yang tersedia dalam format digital seperti gambar,teks,video dan audio data backup menyimpan salinan data untuk melindungi dari kehilangan atau kerusakan
- aplikasi yang menyimpan data dalam jumlah besar
- layanan cloud storage dari microsoft
- platform pembagi gambar
- digital kemampuan menggunakan teknologi informasi untuk mencari dan mengkomunikasikan informasi
- mengalirkan konten audio atau video secara langsung dari internet tanpa harus diiunduh online
- data dan jejak aktivitas yang anda tinggalkan saat menggunakan internet
- bukan fungsi komunikasi daring
- mengubah informasi menjadi kode rahasia untuk melindungi dari akses yang tidak sah
- layanan chatting
- aplikasi pengolahan angka
- untuk mengakses halaman web di internet digital
- perangkat digital
- seminar atau pelatihan yang dilakukan secara online platform
- video yang menggambarkan peristiwa kehidupan nyata
- informasi palsu yang sengaja disebarkan untuk menipu orang
- bukan menu home di office word berisi tool
- nama lain angka
- proses pemindahan informasi ke orang lain
- layanan cloud storage dari microsoft
52 Clues: nama lain angka • aplikasi blender • layanan chatting • perangkat digital • operator komputer • nama lain penautan • teks di akhir video • untuk merekam layar • nama lain penyematan • platform pembagi gambar • sistem kemanan jaringan • aplikasi pengolahan kata • digunakan untuk pencarian • aplikasi pengolahan angka • bukan fungsi komunikasi daring • aplikasi pengolah lembar kerja • ...
STS PUZZLE 2024-12-16
Across
- protection to harmful threats in the computer.
- a digital currency that can be used instead of physical cash.
- the application of scientific knowledge to the practical aims of human life.
- Electoral reforms.
- the state of the atmosphere on a daily basis.
- network of physical objects
- Required payment by the state.
- the weather of a place averaged over a period of time.
- a set of rules that govern how data is transmitted between devices on a network.
- Super strong rains.
- Loss of species.
- The things that orbits the sun.
- the unusually rapid increase in Earth's average surface temperature.
- It is a word in the quote “___is key.”
- breakdown of civil discourse.
- different types of Media.
- taxonomic category that ranks above species and below family.
- a system in which a record of transactions.
- a semiconductor device.
- science of protecting people's health.
- a large, slow-moving mass of ice.
- short for biological diversity.
- more powerful greenhouse gas than CO2.
- Encouraging citizens to participate in civic activities.
- an important heat-trapping gas
- is a system that connects two or more devices.
- Unprocessed information.
- natural home of species.
- Divides organisms within a kingdom based on shared body plans or structures.
- a change in condition for a long period of time.
- It is over 70% of the Earth’s Atmosphere.
Down
- Not equal.
- classification of related organisms that share common characteristics.
- An earlier form of keyboard.
- division of major groups in a society.
- state of not moving.
- network that connects computers all over the world.
- It is what DepEd offers.
- a thing made for a particular purpose.
- to move from one country to another.
- Land next to a sea or ocean.
- government dysfunction and a decline in public trust.
- a suspension of tiny particles in the air.
- injustice in the society.
- our phones.
- the rise of extremist groups
- a method of data collection.
- It is the kingdom of Humans in Taxonomy.
- worldwide interconnectedness
- The loss of trees.
- Educating people about media bias.
- facts provided or learned about something or someone.
- It is mainly used for calling.
- describes electronic technology.
- an electronic device that can store, process, and manipulate information.
- dedicated to naming, describing, and classifying organisms.
- an example is a dog or a lion.
- a community of living organisms and their physical environment.
- short for cryptocurrency
- ChatGPT.
60 Clues: ChatGPT. • Not equal. • our phones. • Loss of species. • Electoral reforms. • The loss of trees. • Super strong rains. • state of not moving. • a semiconductor device. • It is what DepEd offers. • Unprocessed information. • natural home of species. • short for cryptocurrency • injustice in the society. • different types of Media. • network of physical objects • An earlier form of keyboard. • ...
U11 - Mod 2 Key Terms 2024-09-20
Across
- A method of gaining unauthorised access to a computer system/network.
- (5,3) attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
- (6,6) An individual who uses existing computer scripts or codes to hack into computer systems. They do not have the expertise to write their own code.
- (5,8) Refers to technologies, processes and practices designed to protect computers, networks, software and data from attack, damage or unauthorised access and aims to protect data confidentiality, integrity and availability.
- (4,3) attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
- (6,11) Hackers use this non-technical method to access computer systems/networks without authorisation. It involves fooling people into breaking normal security procedures, such as guarding their passwords and relies on manipulating the good nature of individuals.
- (5,3) attackers that break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
Down
- (5,4,3,6) the practice of allowing the employees of an organization to use their own computers, smartphones, or other devices for work purposes.
- (6,6) a path by which a threat actor can access a server, host, or network.
- (5,8) An individual who commits illegal activities using computers and the Internet.
- (5,9,7) Their targets are foreign governments, terrorist groups, and corporations. Most countries in the world participate to some degree in state-sponsored hacking.
- Is a weakness in a computer system/network that can be exploited by a threat, for example, out of date anti-malware software can result in the threat of a malware attack. If a computer system/network’s vulnerabilities can be found and dealt with, this will help to minimize threats and risks.
- (13,7) Grey hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards.
- An individual who gains unauthorised access to computer system/network for social or political purposes.
14 Clues: A method of gaining unauthorised access to a computer system/network. • (6,6) a path by which a threat actor can access a server, host, or network. • (5,8) An individual who commits illegal activities using computers and the Internet. • An individual who gains unauthorised access to computer system/network for social or political purposes. • ...
FITE: Vocab.rb 2013-05-16
Across
- a symbol used for advertising or representing a company or business
- a printed circuit that allows, the RAM, CPU, and other graphic illustrations to function
- a summary of what you did and accomplished when you were in MS or HS to get in to college
- comcast, xfinity, etc.
- internet
- DSL, cable
- zoomable online presentaion program sort of like Powerpoint
- gaming device plug-in
- disk slot
- one bigger than bit
- everything that you plug into the computer like headphones, flashdrive, etc.
- where you plug in to get internet
- a tool that sort of looks like what you put before you start putting the website title
- speed of the computer
- the home of the first web browser
- an object on a computer that stores data, information, settings, or command that are used with a computer program
- an app
- how you behave online
- something bigger than megabyte
- one bigger than byte
- another name for meta search engine
- any information that is entered like a keyboard
Down
- a word processor that lets you create and format text on a blank sheet.
- enables you to interact with your computer
- where you plug in headphones
- a palm sized, button operated pointing device that can be used to move, select, activate, and change items on your computer
- easy to transport and a portable device that you can call and text on
- a computer's main storage media device that permantly stores all data on the computer
- bigger than kilobyte
- how your document looks like and the format
- gives you different websites from different search engines, like dogpile
- a symbol that you use so no one can copy it
- a really long number on the bottom of your modem
- a credit to the author, book, website, etc.
- a tall modem for a desktop computer (box)
- mac osx is an ______________
- a person who provides internet
- a protection of information on the computer or network
- an upgrade that gives you more slot space
- 3G, 4G
- a video display screen
- a vow that the president says before he/she is president
- a model for others to use
- where the texts are located on the document
- information that comes out from a computer like a printer
- a really tiny storage space
- a storage space bigger than gigabyte
- a catchy saying used for advertising
48 Clues: 3G, 4G • an app • internet • disk slot • DSL, cable • one bigger than bit • bigger than kilobyte • one bigger than byte • gaming device plug-in • speed of the computer • how you behave online • comcast, xfinity, etc. • a video display screen • a model for others to use • a really tiny storage space • where you plug in headphones • mac osx is an ______________ • a person who provides internet • ...
IS1 NetSec Newsletter Crossword Challenge #4 - AWS Certificate Manager 2023-11-09
Across
- Automated process for certificate renewal for DNS Validated ACM Certificates. (7+7)
- Covers all the subdomains with a single certificate for a domain. (8+11)
- A security standard to detect and prevent fraudulent SSL/TLS certificates. (11+12)
- Repository of trusted certificates. (5+5)
- A certificate issued to a specific user, device, or server for authentication. (3+6+11)
- Certificate extension specifying if it's a CA or not. (5+11)
- Encoding format for X.509 certificates. (13+8+5)
- Certificate extension specifying the purposes for which the public key can be used. (8+3+5)
- Top-level Authority in a certificate hierarchy. (4+2)
- A protocol for checking the revocation status of certificates. (4)
- It's a DNS record for aliasing one domain to another, often used for verification of domain in ACM. (9+4)
Down
- Initial step in obtaining a digital certificate. (11+7+7)
- Not the root, not the end, but a link between; in SSL's trust chain, this CA is seen. (12+2)
- An API in AWS to initiate the process of obtaining an ACM Certificate. (7+11)
- Locations where list of revoked certificates can be obtained. (3+12+6)
- Sequence of certificates forming a trust path. (11+5)
- A DNS record specifying which CAs are authorized to issue certificates for a domain. (13+9+13)
- A list of certificates that have been revoked before their expiration date. (11+10+4)
- An extension in a certificate allowing additional identities to be bound to the subject. (7+11+4)
- An entity that issues and manages digital certificates. (11+9)
- A cryptographic protocol for secure communication over a computer network, which falls under Layer-4 of the OSI Model. (9+5+8)
- Certificate with a signature of authenticity, but unlike most, this one vouches for itself. (4+6+11)
- Amazon's service for managing private certificates. (3+7+2)
- AWS-Recommended verification method of a new ACM Certificate. (3+10)
- A format for encoding SSL Certificates. (7+8+4)
- Security mechanism ensuring a specific cryptographic key is associated with a particular certificate; a protective measure against man-in-the-middle attacks in the cybersecurity realm. (3+7)
- A digital certificate that is no longer valid before its expiration date. (7+11)
- Open-source toolkit for SSL/TLS. (4+3)
- Trusted entity in certificate validation. (5+6)
29 Clues: Open-source toolkit for SSL/TLS. (4+3) • Repository of trusted certificates. (5+5) • A format for encoding SSL Certificates. (7+8+4) • Trusted entity in certificate validation. (5+6) • Encoding format for X.509 certificates. (13+8+5) • Sequence of certificates forming a trust path. (11+5) • Top-level Authority in a certificate hierarchy. (4+2) • ...
Spring Firm Meeting 2024 2024-04-09
Across
- BPB was founded in nineteen
- An activity that often uses talents from a variety of departments
- What every company and high net worth family needs
- An area that helps high-net-worth people manage their financial lives
- Where most of the firm’s new business is originated
- A special type of report that reflects a company’s commitment to diversity, labor practices and data security, among other topics
- A type of organization that serves the community, we do their taxes and audits
- Something BayBridge Real Estate Capital helps clients manage, find or refinance
- What we all aspire to do
- An acronym for a special type of insurance that is tax mitigation tool
- How our HR department helps clients
- He is the CEO and grew up in the firm
- A type of advisory service that helps buyers and sellers of companies
- The largest group in the firm and a typical entry point for multiple services
- Something PWA advisors help client protect
- A software platform MST helps implement at companies
- One approach our tax controversy team takes with the IRS
- A specialty area of PWA
- An acronym for solving repetitive tasks with robotics
- How PWA creates a comprehensive approach
Down
- What many of our MST services entail
- A type of entity that provides tax benefits for manufacturers and distributors that expert products
- Where our first office was located
- What assurance and cyber teams often do
- A lifechanging client event we can help with from planning to tax preparation to estate planning
- A governmental agency that scares of our clients but not us
- Part of the name of several affiliates
- A type of tax credit for manufacturing or product improvement
- One of the firm’s key service areas
- A core value brought to life by our participation in the DCC and Bounce Back from Cancer
- Diversity, equity and blank
- A charity event the firm teams have contributed $2 million to since it started 14 years ago
- Present blank analysis
- Investigating, often in fraud or legal situations
- An area of tax that especially impacts clients with operations in multiple states
- The area of tax services BPB is probably most famous for
- A service that several departments have in their names
- A special type of audit for public companies
- Managed blank and Technology
- Firm members speak in practice in more than this many languages
40 Clues: Present blank analysis • A specialty area of PWA • What we all aspire to do • BPB was founded in nineteen • Diversity, equity and blank • Managed blank and Technology • Where our first office was located • One of the firm’s key service areas • How our HR department helps clients • What many of our MST services entail • He is the CEO and grew up in the firm • ...
I.T. Terminology Part 1 2024-04-09
Across
- a series of computers linked together to form a network in a relatively contained location, such as a home or office building.
- a piece of computer hardware that retrieves, stores, processes and executes instructions.
- digitally transmits video and audio data from one source to another.
- the process of creating copies of computing resources such as servers or storage. Multiple copies can be created on a single piece of physical hardware, allowing for more flexibility in operations.
- using computer-simulated three-dimensional environments to provide the user with an immersive and interactive experience.
- a newly discovered software vulnerability or exploit that hackers or malware authors can exploit before the software vendor releases a patch or fix
- the technique of using software or scripting to perform a specific process or task without manual input.
- the process of isolating and maintaining an application. Everything that the application needs to run is placed inside that container. It can then be moved around regardless of the host operating system.
Down
- the practice of protecting digital assets against cybercriminals, including measures such as network security, penetration testing or workforce education.
- any software that is intended to threaten or compromise information or systems.
- the process of concealing private information by converting digital information into something that can only be read with a key related to the type of conversion.
- a technology that allows devices to connect with each other over short distances without wires or cables.
- the practice of hiding a secret message inside of something that is not a secret with the purpose of concealing and deceiving.
- a type of malware that encrypts your data so that attackers can demand a ransom in exchange for giving your access back.
- a cloud computing service that uses virtualization to offer an application-development platform to developers or organizations. This platform includes computing, memory, storage, database and other app development services.
- Software that connects computer hardware to applications and manages all memory and processes. Some examples include Linux, Apple macOS and Microsoft Windows.
- the loss of signal strength in networking cables or connections. It may cause signals to become distorted or indiscernible.
- the process of linking computers together to send and receive information from each other.
- the method of delivering applications or software via the internet so that it can be easily accessed by anyone that is connected to the internet.
- systems of internet-connected devices that provide computing capability. These devices are different from traditional computers and can provide intelligence to everyday objects.
20 Clues: digitally transmits video and audio data from one source to another. • any software that is intended to threaten or compromise information or systems. • a piece of computer hardware that retrieves, stores, processes and executes instructions. • the process of linking computers together to send and receive information from each other. • ...
Technical Marvels of the last 100 years. 2025-05-12
Across
- The type of neural network best suited for image recognition
- Type of attack where a hacker sends more data than a buffer can handle
- What is the term for malicious software that masquerades as legitimate software?
- Famous cryptographic algorithm developed in 1977, still widely used today
- Name of the organization that oversees domain name registrations
- Inventor of the first compiler for a programming language
- Which symmetric encryption algorithm, standardized by NIST in 2001, is widely used today for secure data transmission?
- What does the acronym DNS stand for?
- Moore's Law predicts the doubling of what every two years?
- Language created by Bjarne Stroustrup
- Type of storage used in solid-state drives
- What is the most commonly used plastic filament in consumer 3D printing, known for being easy to print and biodegradable?
- A digital file used to prove ownership of a public key
- The name of the first computer virus to spread “in the wild”
- What does TTL stand for in networking?
- What is the name of the 3D printing technology that uses a laser to cure liquid resin into solid parts, offering high detail and smooth finishes?
- The “handshake” protocol used in secure network connections
Down
- A cybersecurity attack that locks users out until a ransom is paid
- Which command-line utility in Unix-like systems is used to automate software building using Makefiles?
- Type of AI learning where a model improves by interacting with an environment and receiving rewards or penalties
- Popular software versioning system often used with GitHub
- A measure of data transmission speed, typically used in networking
- Famous computer scientist known for inventing lambda calculus
- The process of converting data into a coded form
- The network model with seven layers
- Name of the memory type that loses data when power is off
- What cloud computing service model provides virtualized computing resources over the internet?
- The first widely used web browser
- Name of the smallest unit of data in quantum computing
- Google’s quantum computer announced in 2019
- CPU component responsible for arithmetic and logic operations
- The protocol used to assign IP addresses automatically
- Protocol responsible for sending email
- Type of memory that stores firmware
- The bus that connects the CPU to RAM
- This early operating system was developed at AT&T’s Bell Labs in the 1970s
- Which open-source relational database management system is known for its extensibility and standards compliance, and originated at the University of California, Berkeley?
37 Clues: The first widely used web browser • The network model with seven layers • Type of memory that stores firmware • What does the acronym DNS stand for? • The bus that connects the CPU to RAM • Language created by Bjarne Stroustrup • Protocol responsible for sending email • What does TTL stand for in networking? • Type of storage used in solid-state drives • ...
Technology vocab 2025-10-23
Across
- A professional person who researches, designs, upgrades, and maintains software for computer systems
- When you connect to the internet
- The device stops working properly making it difficult or impossible to use
- Sophisticated technology that enables machines to make decisions, solve problems, and lean from data.
- It is a type of electronic gadget capable of connecting and sending information to other devices via the internet or wireless protocols
- Technology that is at the forefront of development and ahead of it's time
- Simple and uncomplicated to use, little expertise is needed to use them
- A person who is afraid of or distrusts advanced technology or complex devices
- It is the place where all the data from a website is stored, processed and sent to people's devices
- It is the practice of protecting servers, computers, social network accounts, etc. from malicious cyber attacks
- To replace a software or devices with more modern or useful alternatives
- When you add a picture or document to an email or message
- You enter your username and password to access an app or website
- Electronics that can be worn on a person's body
- systems that are out-of-date and usually need updating
Down
- When you send data or files from your device
- When you transfer data or files from the internet or servers to your device
- A person who has an obsessive interest in computers
- A device that is used to perform a specific function or task
- It is a type of game that you play immersed into a 3D world
- You register and create an account for an app or website
- It is an organization that provides services for accessing and using the internet
- Any program, application, or software that can be freely downloaded without payment
- WHen you have a call with one person or more people via the internet where you can see them through a webcam
- When you search for information online
- To change files or software on a device into a more modern version
- To copy a computer file or piece of data as a precaution and save it on a disc or another device in case it crashes
- A type of website that enables you to search for content available
- A program on your phone or computer that does a certain job
- Someone who has a strong interest in technology, especially new or cutting-edge technologies
30 Clues: When you connect to the internet • When you search for information online • When you send data or files from your device • Electronics that can be worn on a person's body • A person who has an obsessive interest in computers • systems that are out-of-date and usually need updating • You register and create an account for an app or website • ...
security 2022-05-05
Across
- is the use of messaging systems to send multiple unsolicited messages to large numbers of recipients for the purpose of commercial advertising, for the purpose of non-commercial proselytizing, for any prohibited purpose (especially the fraudulent purpose of phishing), or simply sending the same message over and over to the same user.
- is a cyberattack intended to redirect a website's traffic to another, fake site by installing a malicious program on the computer.
- is a computer program used to prevent, detect, and remove malware.
Down
- is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware.
- is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
- is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive users access to information or which unknowingly interferes with the user's computer security and privacy.
- is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means.
7 Clues: is a computer program used to prevent, detect, and remove malware. • is a cyberattack intended to redirect a website's traffic to another, fake site by installing a malicious program on the computer. • ...
Transformação Digital na Indústria 2022-02-04
Across
- Tem por objetivo manter o usuário em seu ambiente natural, transportando o ambiente virtual para o espaço físico do usuário, com auxílio de dispositivos tecnológicos.
- Esta tecnologia está relacionada à conexão digital dos objetos com a internet. Os objetos físicos conversam com os usuários através de ferramentas tecnológicas, como software e sensores inteligentes, que transmitem dados por meio de uma rede.
- Trata-se do armazenamento de dados em nuvem, utilizando um servidor remoto para conectar dispositivos de um usuário, e permitindo acesso a dados e arquivos.
- Esta tecnologia pode ser resumida como a aplicação de uma análise avançada e de técnicas baseadas em lógica, incluindo aprendizado de máquina, para interpretar eventos, analisar tendências e comportamentos de sistemas, apoiar e automatizar decisões e realizar ações simples e super complexas.
Down
- são meios usados para transformar negócios e promover novas experiências. Possuem muitos e diferentes usos e, em múltiplas empresas, interagem com um grande número de outras tecnologias.
- Entre as aplicações da internet das coisas estão: smartwatch, smarthomes, carros inteligentes,................. e smart cities.
- Refere-se às boas práticas no uso das tecnologias, visando a segurança e a preservação dos dados, das redes e dos sistemas de hardware e software. A principal funcionalidade desta tecnologia é proteger de ataques cibernéticos os dispositivos físicos, como computadores, softwares e sistemas eletrônicos.
- tem por objetivo manter o usuário em seu ambiente natural, transportando o ambiente virtual para o espaço físico do usuário, com auxílio de dispositivos tecnológicos.
- seu uso permite que a empresa realize previsão de tendências e demandas; elabore estratégias de fidelização de clientes e ampliação do seu engajamento; desenvolva o e-commerce; aumente as vendas; e, principalmente, identifique as melhores oportunidades de mercado.
9 Clues: Entre as aplicações da internet das coisas estão: smartwatch, smarthomes, carros inteligentes,................. e smart cities. • Trata-se do armazenamento de dados em nuvem, utilizando um servidor remoto para conectar dispositivos de um usuário, e permitindo acesso a dados e arquivos. • ...
ENG IV Unit 4 Vocab 2024-01-02
Across
- The CEO's involvement in the fraudulent scheme was deemed highly ____________, leading to widespread condemnation and calls for legal action.
- The caring and ____________ nurse made sure to attend to the patient's needs with great attention, offering both physical and emotional support during their recovery.
- The protesters were ____________ in expressing their discontent, chanting slogans and raising their voices to make their grievances heard.
- The company's ____________ cybersecurity measures ensured the protection of sensitive data against various potential threats and attacks.
- After the announcement of the new product launch, the customer support team was ____________ (ed) with a flood of inquiries and requests from excited customers eager to learn more.
- Lost in her thoughts, she walked through the bustling city streets, completely ____________ to the noise and activity happening around her.
- The manager appointed a skilled professional to serve as the ____________ between different departments, fostering better communication and collaboration within the organization
Down
- The resourceful hacker managed to ____________ the security measures of the computer system, gaining unauthorized access to sensitive information.
- The company experienced a gradual ____________ of employees as morale declined, highlighting the need for strategic measures to improve the work environment.
- The team's ____________ effort was evident as they seamlessly collaborated on the project, each member contributing their skills to create a unified and successful outcome.
- Though skilled and knowledgeable, the usually ____________ expert hesitated to share his insights during the meeting, preferring to observe the discussion unfold.
- Having grown up in a family of musicians, she was ____________ to appreciate and excel in the world of music from a young age.
- In moments of grief, finding ____________ in the support of friends and family can provide comfort and help ease the emotional burden.
- The unexpected discovery of a key piece of evidence proved to be ____________ for the defense, potentially turning the tide in their favor during the trial.
- The international community decided to impose economic ____________(s) on the country in response to its violation of human rights, hoping to encourage a change in behavior.
- The online advertisement promised incredible results with a "miracle" product, but upon arrival, the item turned out to be nothing more than a ____________, failing to deliver on its extravagant claims.
- The community was deeply affected by the ____________ loss of lives in the tragic accident, and mourning enveloped the entire town.
- During the press conference, the politician attempted to ____________ on the controversial issue, providing vague responses that left the audience uncertain about their stance.
- Her presentation was flawless, showcasing an ____________ attention to detail and a commitment to excellence in every aspect.
19 Clues: Her presentation was flawless, showcasing an ____________ attention to detail and a commitment to excellence in every aspect. • Having grown up in a family of musicians, she was ____________ to appreciate and excel in the world of music from a young age. • ...
Cybersecurity Crossword 2023-07-27
Cybersecurity Basics 2019-09-26
2 Clues: Email ______ is the creation of email messages with a forged sender address. • If you receive a suspicious email that you believe to be a phishing attempt, report it to _______@cfpb..gov
technology terms 2023-06-07
Across
- small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser.
- a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography.
- a collection of discrete values that convey information, describing the quantity, quality, fact, statistics, other basic units of meaning, or simply sequences of symbols that may be further interpreted.
- a mapping from some domain (for example, a range of integers) to bits
- a coding format for digital audio developed largely by the Fraunhofer Society in Germany under the lead of Karlheinz Brandenburg,
- a hardware or software component that stores data so that future requests for that data can be served faster;
- a form of computer memory that can be read and changed in any order, typically used to store working data and machine code.
- a mobile operating system based on a modified version of the Linux kernel and other open-source software, designed primarily for touchscreen mobile devices such as smartphones and tablets.
- a method of transmitting and receiving messages using electronic devices.
- represents text, computer processor instructions, or any other data using a two-symbol system. The two-symbol system used is often "0" and "1
Down
- a bitmap image format that was developed by a team at the online services provider CompuServe led by American computer scientist Steve Wilhite
- small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser.
- a mobile operating system exclusively for its hardware.
- a method of representing data in a visual, machine-readable form.
- is a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device, such as a display controller, to a compatible computer monitor, video projector, digital television, or digital audio device.
- any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy.
- a file format developed by Adobe in 1992 to present documents, including text formatting and images, in a manner independent of application software, hardware, and operating systems.
- a digital multimedia container format most commonly used to store video and audio, but it can also be used to store other data such as subtitles and still images.
- a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
19 Clues: a mobile operating system exclusively for its hardware. • a method of representing data in a visual, machine-readable form. • a mapping from some domain (for example, a range of integers) to bits • a method of transmitting and receiving messages using electronic devices. • ...
Cybersecurity Crossword 2023-12-01
2 Clues: A collection of computers compromised by malicious code and controlled across a network • A mechanism for creating a secure connection between a computing device and a computer network
Cybersecurity Crossword 2022-09-22
2 Clues: Used to commit financial crimes. The attack in which a small amount is taken out every day so that attack goes unnoticed. • The device or application with the capabilities of IDS and ability to protect from or stop the incidents from taking place
Cybersecurity Challenfe 2025-06-09
Job vocabulary Part 3 and 4 2023-09-26
Across
- It's crucial to provide feedback constructively to help employees improve without offending them.
- There is a striking similarity between our product and the competitor's in terms of features and pricing.
- Our team members are versatile and can adapt to various tasks, which makes us more efficient.
- The client has particular preferences for the design of the website, and we aim to meet their exact specifications.
- I was pleasantly surprised by the positive response we received from customers after the product launch.
- "Employees should _____ update their skills to stay competitive in the job market."
- Each department operates independently but collaborates when necessary to achieve company goals.
- "Let's _____ the sales figures for this quarter with the previous one."
- "The warehouse has reached its storage _____; we need additional space."
- "The company can't _____ credit for the entire project; the team's effort was crucial."
- "The _____ drop in stock prices surprised investors."
- "The budget deficit is a significant _____ for the finance department."
- "To _____ customer satisfaction, we need to enhance our support services."
- "Late deliveries are the _____ rather than the rule."
- "Many startups _____ in their early years to establish a solid customer base."
- The success of our project is dependent on securing funding from external investors.
- track of It's important to keep track of your expenses to ensure you stay within the budget allocated for the project.
- Implementing strict cybersecurity measures can help prevent data breaches and protect sensitive information.
- We prioritize delivering value to our customers by offering high-quality products at competitive prices.
- "A good work-life balance is a _____ quality for many job seekers."
Down
- "We need to _____ the outdated software with a more efficient solution."
- The feedback from our customers is invaluable as it helps us improve our products and services.
- Our company has strict quality control measures in place to ensure that our products meet industry standards.
- We appreciate your hard work and dedication to the project, which has contributed to its success.
- "To _____ sales, we'll launch a new marketing campaign."
- "Adopting _____ practices not only benefits the environment but also reduces long-term costs."
- Communicating in a polite and professional manner is essential when dealing with clients.
- Unfortunately, due to unforeseen circumstances, we will have to postpone the product launch.
- "In the _____ tech industry, innovation is key to success."
- "The company made a _____ profit last year despite the economic challenges."
- "_____ our market research indicates a growing demand for this product."
- "Her _____ to analyze data and make informed decisions is a valuable asset."
- "This candidate's qualifications make them _____ for the managerial position."
33 Clues: "The _____ drop in stock prices surprised investors." • "Late deliveries are the _____ rather than the rule." • "To _____ sales, we'll launch a new marketing campaign." • "In the _____ tech industry, innovation is key to success." • "A good work-life balance is a _____ quality for many job seekers." • ...
Tech Terms and Acronyms 2023-05-19
Across
- To load and initialise the operating system of a computer or other device
- Short-range wireless communication technology
- A communications technology whereby a single wire can carry more than one type of signal at once
- A microprocessor that performs many functions and calculations that make a computer function
- The method by which users access and save or "pull down" software or other files to their own computer from a remote computer via the Internet
- Measures designed to protect a computer, device, or network from Cybercrime
- A computer that handles requests for data, email, file transfers, and other network services from other computers
- Can't stop laughing
- Hyper-text markup language
- A technology that allows computers and other devices to communicate via a wireless signal
- A device that allows computers to transmit information to each other
- Today I learnt
- A conventional method of transmitting data
- A type of digital subscriber line broadband technology that is used to connect to the Internet
- A barrier that acts as a security system to protect trusted computer systems and networks from outside connections
Down
- The "brains" of a computer, responsible for performing tasks and calculations
- A link to a particular web page that is saved in the browser
- A piece of code or data created by a web server and stored on a user's computer. It is used to keep track of the user's usage patterns and preferences
- Portable document format
- A software programme that allows you to surf the web
- A type of software that allows users to create 2D and 3D design modelling
- A set of interconnected networks that allow computers in different locations to exchange information
- Uniform resource locator
- A document or other file that is sent along with an email
- Any type of illegal activity that is undertaken on a computer
- A webpage that is temporarily stored on a computer so the next time it is requested, the web browser accesses it locally so the page loads quicker
- A type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate source
- To compress and archive files into a (one) smaller size
- Direct message
- Unsolicited email messages sent for marketing purposes
- General term for a software programme that has been designed to harm other computers
- A way of sending messages over the Internet
- Referring to the storing and accessing of data and programmes over the Internet instead of another type of hard drive
- Random access memory
34 Clues: Direct message • Today I learnt • Can't stop laughing • Random access memory • Portable document format • Uniform resource locator • Hyper-text markup language • A conventional method of transmitting data • A way of sending messages over the Internet • Short-range wireless communication technology • A software programme that allows you to surf the web • ...
CIC PI Take 2 2024-01-03
Across
- A way to recognize achievements and skills at a more granular level than a college degree
- Serpentine language taught on college campuses, often as an alternative to JavaScript
- A group of colleges working together
- The New York Times deemed 2012 the Year of the _____ as Coursera and EdX grew quickly
- Educational psychologist who came up with the 2 sigma problem
- Arkansas institution that shares a name with a famous electric guitarist
- What you might do to an electronic device or your tuition
- Ohio college that shares a title with a Thomas Piketty economics book about wealth and income
- Rudy, the Notre Dame football player featured in an eponymous movie, started college here
- LMS owned by Instructure
- Women's college in Allentown, PA that starts with a coniferous tree and ends with a toothpaste brand
- SoCal city where you will find the ASU+GSV conference
- HBCU Tigers located in South Carolina, or the first name of a famous American traitor
- Combination of face-to-face and online
- Paul _____, President of Southern New Hampshire who recently announced he is stepping down
- Acronym often associated with the economic value of a degree
- A major that covers linking manufacturers, distributors, and retailers in product distribution
- Whatever It Is, _______, a new book published in 2023 about change in higher ed
- Common name inclusion for a Methodist institution
- Higher Ed Podcast co-hosted by Michael Horn and Jeff Selingo
Down
- New NCAA President
- Higher Education Act was signed by this president, for short
- A circle in DC where you can find CIC or the name of a famous multinational chemical company
- Airport code for the 2023 Presidents Institute
- Acronym related to college athletes receiving compensation
- _____ Land Grant Acts
- One of the fastest growing majors, CIP Code 11.1003, or a producer of digital protectors
- The "X" in UX Design
- Where the Majors of Millsaps roam in the heart of this state capital
- Secretary of Education
- Michigan college that shares a name with Rocky Balboa's spouse
- Carleton author who predicted an impending cliff, Nathan _____
- AI language model developed by OpenAI, capable of generating human-like text
- CIC Institution formely led by Marjorie Hass that shares a name with a famous scholarship
- Town and _____, a commonly cited higher ed relationship
- Kentucky institution that shares a name with a famous WWII naval battle in the Pacific Theater
- The _____ of Higher Education
- Former HBS Professor known for work on Disruptive Innovation
- ____ Matters, a framework for the design and delivery of online courses
- Former CIC President
40 Clues: New NCAA President • The "X" in UX Design • Former CIC President • _____ Land Grant Acts • Secretary of Education • LMS owned by Instructure • The _____ of Higher Education • A group of colleges working together • Combination of face-to-face and online • Airport code for the 2023 Presidents Institute • Common name inclusion for a Methodist institution • ...
Medical Assistant 2017-06-01
Across
- procedure or set of procedures intended to ensure that a manufactured product or performed service adheres to a defined set of quality criteria or meets the requirements of the client or customer.
- to a specific form of continuing education (CE) that helps those in the medical field maintain competence and learn about new and developing areas of their field.
- approach to quality management that builds upon traditional quality assurance methods by emphasizing the organization and systems: focuses on “process” rather than the individual; recognizes both internal and external “customers”; promotes the need for objective data to analyze and improve processes.
- Occupational Safety and Health Administration, more commonly known by its acronym OSHA, is responsible for protecting worker health and safety in the United States.
- administered to detect the presence of Mycobacterium tuberculosis, the bacterium that causes tuberculosis (TB). The terms Mantoux, TB skin test, tuberculin skin test, and PPDs are often used interchangeably.
- management approach to long–term success through customer satisfaction. In a TQM effort, all members of an organization participate in improving processes, products, services, and the culture in which they work.
Down
- Laboratory Improvement Amendments (CLIA) of 1988 are United States federal regulatory standards that apply to all clinical laboratory testing performed on humans in the United States, except clinical trials and basic research.
- Health Insurance Portability and Accountability Act, a US law designed to provide privacy standards to protect patients' medical records and other health information provided to health plans, doctors, hospitals and other health care providers.
- for cardiopulmonary resuscitation.
- way of preventing mistakes or defects in manufactured products and avoiding problems when delivering solutions or services to customers; which ISO 9000 defines as "part of quality management focused on providing confidence that quality requirements will be fulfilled".
- federal agency designed to protect the United States against threats. Its wide-ranging duties include aviation security, border control, emergency response and cybersecurity.
- circulating life force whose existence and properties are the basis of much Chinese philosophy and medicine.
12 Clues: for cardiopulmonary resuscitation. • circulating life force whose existence and properties are the basis of much Chinese philosophy and medicine. • to a specific form of continuing education (CE) that helps those in the medical field maintain competence and learn about new and developing areas of their field. • ...
Cybersecurity Day - MFA Booth - Set 1 2025-10-13
Across
- An IAM Application that enable secure authentication methods for internal applications such as TOTP and WebAuthn
- One‑time passcode generated using the current time
- MFA method that replaces passwords under the FIDO standard
Down
- Application that generates one‑time passcodes using TOTP
- Physical USB key used for secure login
5 Clues: Physical USB key used for secure login • One‑time passcode generated using the current time • Application that generates one‑time passcodes using TOTP • MFA method that replaces passwords under the FIDO standard • An IAM Application that enable secure authentication methods for internal applications such as TOTP and WebAuthn
Technical design maker 2023-12-11
Across
- Unit of data transmitted over a network.
- Concurrent execution of multiple threads in a program.
- Computing: Simultaneous execution of tasks for faster processing.
- (Development and Operations): Collaboration between development and IT operations.
- Lightweight, portable, and consistent software packaging.
- Code: Representation of data using 0s and 1s.
- Client-side of an application; user interface.
- Overall structure or design of a system.
- Structured collection of data; organized for efficient retrieval.
- Computing: Accessing and storing data and programs over the internet.
- (Structured Query Language): Language for managing and manipulating relational databases.
- Data: Large datasets that require advanced processing technologies.
- (Integrated Development Environment): Software for streamlined code development.
- Development Life Cycle (SDLC): Phases of software development from concept to deployment.
- (Application Programming Interface): Set of rules facilitating interaction between software applications.
- Testing: Verifying unchanged functionality after code modifications.
- Language: Lightweight programming language for automating tasks.
- Distributed ledger technology for secure and transparent transactions.
- Control: System tracking changes to source code over time.
- Creating a virtual version of a device or resource.
- Learning: Subset of AI enabling systems to learn and improve.
- Evaluating software to identify and fix defects.
- Software connecting different software applications.
- Architectural style breaking down applications into small, independent services.
- (Representational State Transfer): Architectural style for networked applications.
Down
- Server-side of an application; handles data processing.
- (User Interface/User Experience): Design principles for user interaction and experience.
- Version control system for tracking changes in code.
- Converting information into a code to secure it.
- Communication between computers and other devices.
- App Development: Creating applications for mobile devices.
- Mining: Extracting patterns and information from large datasets.
- (Graphical User Interface): Visual interface allowing user interaction.
- Set of rules governing data transmission between devices.
- Security measure preventing unauthorized access to a network.
- Protection of computer systems and networks from attacks.
- Ability of a system to handle growing amounts of work.
- (eXtensible Markup Language): Markup language for encoding documents in a format readable by humans and machines.
- Identifying and fixing errors or bugs in software code.
- Iterative and flexible approach to software development.
- (Software as a Service): Software delivery model over the internet.
- Safety: Ensuring proper functioning in a multithreaded environment.
- (Internet of Things): Network of interconnected physical devices.
- Pre-established code structure for building software.
- Development: Creating websites or web applications.
- Translates high-level code into machine code.
- Balancing: Distributing network or application traffic across multiple servers.
- Step-by-step procedure for solving a problem.
- Cloud computing model where cloud providers manage infrastructure.
- Source: Software with freely available source code.
50 Clues: Unit of data transmitted over a network. • Overall structure or design of a system. • Code: Representation of data using 0s and 1s. • Translates high-level code into machine code. • Step-by-step procedure for solving a problem. • Client-side of an application; user interface. • Converting information into a code to secure it. • ...
Technology 2024-03-06
Across
- The address used to access a particular website on the internet
- Stands for www
- To start a computer
- Old-fashioned
- A flat touch screen operated portable computer
- American businessman, inventor, and investor, best known for co-founding the technology giant Apple Inc.
- A flexible removable magnetic disc (typically encased in a hard plastic shell) for storing data
- The measures taken to protect against criminal or unauthorised access to electronic data
- the process of developing something.
- Using radio or microwaves rather than wired to connect to the internet
- A remote-controlled flying device, often equipped with a camera
- A small machine or a piece of electronic equipment that has a particular purpose
- The development of computers or computer-controlled robots to preform tasks that normally require human intelligence
- Websites and computer programs such as Instagram or X (Twitter) allow people to connect and share content online.
- A businessman and investor, the founder of SpaceX, and CEO of Tesla, is known for giving his children weird names, such as X Æ A-Xii
Down
- A person who fears or dislikes new technology, especially computers, and does not want to use it
- Simple to understand and easy to use
- The physical and electronic parts of a computer or other piece of equipment
- To suddenly stop working
- The interaction between users and content on social media, including likes, shares, comments, and more
- To send or receive data, especially video and music, in a steady, ongoing flow over the Internet
- A set of pages of information on the internet about a particular subject, published by a single person or organization
- A computer program that makes it possible for you to read information on the internet
- A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
- A cultural symbol or social idea that spreads virally, often in the form of an image or video with varying captions
- Very modern
- The programs that you put into a computer to make it do particular jobs
- A set of websites on the internet that end with the same letters, for example, .com
- An electronic device for playing video games
- Well informed about or proficient in the use of modern technology, especially computers
- A set of rules to solve a problem in a series of steps
- The extensive global system of connected computers that allows people to share information and communicate with each other
32 Clues: Very modern • Old-fashioned • Stands for www • To start a computer • To suddenly stop working • Simple to understand and easy to use • the process of developing something. • An electronic device for playing video games • A flat touch screen operated portable computer • A set of rules to solve a problem in a series of steps • ...
Tech Terms and Acronyms 2023-05-18
Across
- A computer that handles requests for data, email, file transfers, and other network services from other computers
- Portable document format
- A document or other file that is sent along with an email
- a device that allows computers to transmit information to each other
- The method by which uses access and save or "pull down" software or other files to their own computer from a remote computer via the Internet
- General term for a software programme that has been designed to harm other computers
- Can't stop laughing
- A software program that allows you to surf the web
- Referring to the storing and accessing of date and programmes over the Internet instead of another type of hard drive
- Short-range wireless communication technology
- A way of sending messages over the Internet
- Today I learnt
- A type of software that allows users to create 2D and 3D design modelling
- A technology that allows computers and other devices to communicate via a wireless signal
- A set of interconnected networks that allow computers in different locations to exchange information
Down
- is a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate source
- A barrier that acts as a security system to protect trusted computer systems and networks from outside connections
- Universal resource locator
- Unsolicited email messages sent for marketing purposes
- Random access memory
- Measures designed to protect a computer, device, or network from Cybercrime
- The "brains" of a computer, responsible for performing tasks and calculations
- Hyper-text markup language
- A link to a particular web page that is saved in the browser
- Direct message
- Conventional method of transmitting data
- A type of digital subscriber line broadband technology that is used to connect to the Internet
- To load and initialise the operating system on a computer or other device
- A piece of code or data created by a web server and stored on a user's computer. It is used to keep track of the user's usage patterns and preferences
- Any type of illegal activity that is undertaken on a computer
- A microprocessor that performs many functions and calculations that make a computer function
- Communications technology whereby a single can carry more than one type of signal at once
- A webpage that is temporarily stored on a computer so the next time it is requested, the web browser accesses it locally so the page loads quicker
- To compress and archive files into a smaller size
34 Clues: Direct message • Today I learnt • Can't stop laughing • Random access memory • Portable document format • Universal resource locator • Hyper-text markup language • Conventional method of transmitting data • A way of sending messages over the Internet • Short-range wireless communication technology • To compress and archive files into a smaller size • ...
Past Hypothetical Situations - Technology 2025-06-09
Across
- If _____ cameras had never replaced film photography, photography would have remained more expensive, and social media less visually driven.
- If _____ media platforms had failed to gain widespread adoption, information would have spread slower, and personal connections would been more localized.
- If 3D _____ had remained a niche industrial tool, custom manufacturing would have been less accessible, and the "maker movement" would have been smaller.
- If digital payment systems had never become ubiquitous, _____ and checks would have remained dominant, limiting the speed and convenience of transactions.
- If biometrics had been widely rejected for privacy concerns, device security would have relied more on _____, and convenient access methods would have been less common.
- If advancements in _____ imaging had stalled, diagnoses would have been less precise, leading to more invasive procedures.
- If mainstream adoption of electric vehicles had occurred in the 1990s, _____ pollution in cities would have been significantly reduced earlier.
- If _____ computing had never become the backbone of modern software, software would still have been primarily installed locally, and scaling applications harder.
- If blockchain technology had failed to emerge or gain credibility, decentralized finance and _____ would not have existed.
- If powerful, affordable _____ had been delayed by decades, electric vehicles would have been a distant dream, and portable electronics bulkier.
- If the "Internet of _____" (IoT) had failed to integrate into homes, homes would have been less automated, and remote control of appliances would have been uncommon.
Down
- If ___ technology had remained exclusive to military use, navigation would have relied on paper maps, and logistics would be far less efficient. [abbreviation]
- If _____ threats had remained minimal, never leading to a complex industry, there would have been less investment in security infrastructure, leading to more widespread data breaches.
- If ____ had become truly commonplace by 2010, domestic labor could have been significantly automated, changing family dynamics.
- If _____ had remained a luxury item, people would have carried multiple separate devices for communication, photos, and music.
- If _____ power had become the dominant energy source by 2000, global climate change would have been less severe, and energy prices more stable.
- If video conferencing had remained clunky and unreliable, _____ work would have been far less feasible, and global collaboration would rely more on travel.
- If the development of the _____ had been significantly delayed, global communication would have been slow, and e-commerce would have been non-existent.
- If _____ technology had been widely available for civilian use by the late 1990s, package delivery and aerial surveillance would have evolved much earlier.
- If e-readers had completely replaced physical _____, traditional publishing would have been severely diminished, and bookstores largely obsolete.
20 Clues: If advancements in _____ imaging had stalled, diagnoses would have been less precise, leading to more invasive procedures. • If blockchain technology had failed to emerge or gain credibility, decentralized finance and _____ would not have existed. • ...
TTS SCM & CRM 2025-11-20
Across
- – Penggabungan beberapa pengiriman menjadi satu.
- – Pihak yang menyalurkan produk dari produsen.
- – Keseluruhan biaya dalam rantai pasok.
- – Proses pemenuhan pesanan pelanggan.
- – Persediaan barang di gudang.
- – Gudang penyimpanan barang.
- – Kemampuan maksimum produksi atau penyimpanan.
- – Proses bea cukai dalam ekspor-impor.
- – Administrasi terkait alur barang.
- – Model rantai pasok yang cepat menyesuaikan permintaan.
- – Sistem persediaan tepat waktu.
- – Keamanan data dalam sistem SCM digital.
- – Kegiatan mengirim barang.
- – Electronic Data Interchange.
- – Transportasi jarak pendek, biasanya dari pelabuhan.
- – Sistem end-to-end dari pengadaan bahan hingga produk sampai ke pelanggan.
- – Aktivitas operasional rantai pasok.
- – Tahap akhir pengiriman ke pelanggan.
- – Teknologi identifikasi barang dengan gelombang radio.
- – Jumlah barang yang diproses dalam periode waktu tertentu.
- – Ukuran kinerja rantai pasok.
- – Aliran barang keluar dari perusahaan.
- – Stok yang berada dalam perjalanan.
- – Fasilitas untuk konsolidasi dan penyebaran barang.
- – Rantai pasok suhu rendah.
- – Penjadwalan aktivitas bongkar muat di gudang.
- – Teknologi pencatatan terdesentralisasi dalam SCM.
- – Penjual akhir kepada konsumen.
- – Alur barang dari pelanggan kembali ke produsen.
- – Material Requirement Planning.
- – Perencanaan kapasitas produksi.
- – Layanan logistik oleh pihak ketiga (3PL).
- – Proses pengaturan pesanan pelanggan.
- – Pengelolaan armada pengiriman.
- – Aktivitas pembelian dalam rantai pasok.
- – Penentuan rute terbaik.
- – Pelacakan posisi barang.
- – Perencanaan permintaan.
- – Pengaturan suhu dalam logistik dingin.
Down
- – Pengiriman menggunakan kombinasi moda transportasi.
- – Sistem informasi terintegrasi perusahaan.
- – Stok pengaman jika permintaan melonjak.
- – Proses penyaluran barang ke berbagai titik tujuan.
- – Frekuensi perputaran persediaan.
- – Aktivitas penanganan barang di gudang.
- – Pemasok bahan baku.
- – Pengisian ulang stok saat menipis.
- – Kegiatan produksi barang.
- – Proses prediksi permintaan.
- – Pengendalian mutu produk.
- – Stok reguler yang digunakan untuk memenuhi permintaan normal.
- – Upaya mengatur kebutuhan material, produksi, hingga distribusi.
- – Kejadian kehabisan stok.
- – Sistem manajemen gudang.
- – Singkatan dari Supply Chain Management.
- – Siklus lengkap pengadaan sampai produk dikirim.
- – Waktu yang diperlukan dari pesanan sampai barang diterima.
- – Proses pergerakan barang, informasi, dan penyimpanan.
- – Fokus pada efisiensi dalam rantai pasok.
- – Upaya meningkatkan efisiensi rantai pasok.
- – Pesanan tertunda karena stok habis.
- – Aliran nilai dari bahan mentah hingga produk akhir.
- – Proses mencari pemasok terbaik.
- – Aktivitas muat barang.
- – Aliran barang masuk ke perusahaan.
- – Label digital identifikasi produk.
- – Stok berlebih.
- – Model referensi rantai pasok.
- – Sistem penjadwalan visual ala Toyota.
- – Ruang rak untuk menempatkan barang ritel.
- – Kode satuan penyimpanan barang.
- – Perencanaan produksi.
- – Jumlah produk yang dibutuhkan konsumen.
- – Aktivitas bongkar barang.
- – Distorsi permintaan yang meningkat sepanjang rantai pasok.
- – Pemindahan barang dari satu titik ke titik lain.
- – Ongkos atau biaya angkut.
- – Barang yang mudah rusak.
- – Proses pengadaan bahan atau layanan.
- – Pengemasan produk.
80 Clues: – Stok berlebih. • – Pengemasan produk. • – Pemasok bahan baku. • – Perencanaan produksi. • – Aktivitas muat barang. • – Penentuan rute terbaik. • – Perencanaan permintaan. • – Kejadian kehabisan stok. • – Sistem manajemen gudang. • – Barang yang mudah rusak. • – Pelacakan posisi barang. • – Kegiatan produksi barang. • – Pengendalian mutu produk. • – Kegiatan mengirim barang. • ...
TECHNOLOGY 2023-10-25
Across
- s a hole in the wall or in a machine where you can put a plug (noun)
- AI-powered technology that responds to voice commands, such as Amazon's Alexa or Apple's Siri (2 words)
- a decentralized, digital ledger technology that records transactions across multiple computers, ensuring transparency and security (noun)
- the measurement and statistical analysis of people's unique physical and behavioral characteristics, such as fingerprints, for authentication (noun)
- a thick wire that carries electricity or digital information (noun)
- the practice of protecting systems, networks, and data from digital attacks, theft, or damage (noun)
- science of developing and producing extremely small tools and machines by controlling the arrangement of atoms and molecules (noun)
- the process of converting analog information into digital format, making it easier to store, transmit, and manipulate (noun)
- a technique that creates three-dimensional images by recording light patterns (noun)
- genetic modification of plants (noun)
- a point where wires, pipes, etc join (noun)
- a mobile phone that can be used as a small computer (noun)
- a region in California known for its concentration of technology companies and innovation (2 words)
Down
- the process of converting data into a code to prevent unauthorized access (noun)
- the design and construction of robots, often used in manufacturing and automation (noun)
- something you speak into to record your voice or make it sound louder (noun)
- a system for connecting electronic devices to the internet without using wires (noun)
- the process of discovering patterns or information in large datasets, often used for business and research purposes (2 words)
- digital or virtual currencies that use cryptography for security, such as Bitcoin or Ethereum (noun)
- the application of nanotechnology in the field of medicine for diagnosis, treatment, and drug delivery (noun)
- the protection of personal information and the right to control how it is collected and used (2 words)
- the use of digital communication tools to harass, threaten, or intimidate others (noun)
- a person who gains unauthorized access to computer systems or networks, often with malicious intent (noun)
- a document you add to an email message (noun)
- unmanned aerial vehicles (UAVs) controlled remotely or autonomously for various purposes, including photography and surveillance (noun)
- the provision of medical services and consultations remotely using telecommunications technology (noun)
- a technology that superimposes computer-generated information, such as images or sound, onto the real world (compound noun)
- a set of rules or instructions for solving a problem or accomplishing a task, often used in computer programming (noun)
- introducing new ideas, methods, or products, especially in the field of technology (adj)
- a group of computers,machines or people which are connected (noun)
30 Clues: genetic modification of plants (noun) • a point where wires, pipes, etc join (noun) • a document you add to an email message (noun) • a mobile phone that can be used as a small computer (noun) • a group of computers,machines or people which are connected (noun) • a thick wire that carries electricity or digital information (noun) • ...
Digital Literacy 2024-04-30
Across
- ,information resources
- ,to expose,to harm and to loss
- ,on-scree work area
- ,accessible by a computer
- ,to copy a file, e-mail, or other information from one's personal computer
- ,describes all channels of communication
- ,being groomed, forced or coerced into doing something
- ,a category of cybersecurity risks that may cause an undesirable event or action via the internet
- ,the use of technology to harass, threaten, embarrass, or target another person
- ,knowledge and ability to use computers and related technology efficiently
- ,the transfering of digital photos online
- ,facts provided or learned about
- ,the practice of taking someone else's work or ideas
- ,a worldwide network of computer networks
- ,relating to the present or recent times.
- ,rules governing socially acceptable behavior
- ,representation of a person's real self ,online
- ,main computer on the network
- ,the ability to effectively analyze information
- ,a collection of World Wide Web pages or files
- ,appropriate ,tailor content to the user's age group
- world ,The virtual environment
- ,a group of computers that connected to shares resources
- ,the hard ware and operating system
- ,a mobile phone that performs many of the functions of a personal computer
Down
- ,application of conceptual knowledge
- ,meaning an item for information
- ,to shut down and restart a computer
- ,a person is ethical, responsible, and culturally aware in their interactions with others.
- ,learning facilitated by technology
- ,a powerful computer that can process large amounts of data
- ,the act of sending sexual text messages
- ,a device that accepts information in digital
- ,a single hypertext file or a page that is part of a Web site
- safety ,being aware of the nature of the possible threats online
- ,a globally connected massive computer network system
- ,used by computers to exchange messages and files with other people in a digital format
- ,most commonly deployed via email phishing attacks, where a victim clicks on a link
- ,small image displayed on the screen
- ,the learned ability to act with determined results
- ,programming that controls computer, video, or electronic hardware
- , a web address of a specific web page or file on the Internet.
- ,a new form of culture in which the culture of humanity will digitalize
- ,a small computer designed for use by a single user at a time
- ,to exchange message and files online
- ,being aware of the nature of the possible threats that you could encounter
- ,the ability to access and analyze media messages
- ,the ability to control how much of your information online.
- ,a piece of software
- ,the apps that allow people, creators, and businesses to communicate
50 Clues: ,on-scree work area • ,a piece of software • ,information resources • ,accessible by a computer • ,main computer on the network • ,to expose,to harm and to loss • world ,The virtual environment • ,meaning an item for information • ,facts provided or learned about • ,learning facilitated by technology • ,the hard ware and operating system • ,application of conceptual knowledge • ...
Digital Literacy 2024-04-30
Across
- ,the learned ability to act with determined results
- ,the ability to control how much of your information online.
- ,The virtual environment
- ,small image displayed on the screen
- ,a new form of culture in which the culture of humanity will digitalize
- ,relating to the present or recent times.
- ,appropriate ,tailor content to the user's age group
- ,being groomed, forced or coerced into doing something
- ,main computer on the network
- ,a person is ethical, responsible, and culturally aware in their interactions with others.
- ,being aware of the nature of the possible threats online
- ,to expose,to harm and to loss
- ,being aware of the nature of the possible threats that you could encounter
- ,the practice of taking someone else's work or ideas
- ,a mobile phone that performs many of the functions of a personal computer
- ,the use of technology to harass, threaten, embarrass, or target another person
- ,the act of sending sexual text messages
- ,a collection of World Wide Web pages or files
- ,the ability to effectively analyze information
- ,application of conceptual knowledge
- , a web address of a specific web page or file on the Internet.
- ,the ability to access and analyze media messages
- ,a small computer designed for use by a single user at a time
- ,a worldwide network of computer networks
- ,a device that accepts information in digital
- ,most commonly deployed via email phishing attacks, where a victim clicks on a link
Down
- ,a powerful computer that can process large amounts of data
- ,a category of cybersecurity risks that may cause an undesirable event or action via the internet
- ,information resources
- ,learning facilitated by technology
- ,the transfering of digital photos online
- ,accessible by a computer
- ,the hard ware and operating system
- ,to copy a file, e-mail, or other information from one's personal computer
- ,the apps that allow people, creators, and businesses to communicate
- ,on-scree work area
- ,describes all channels of communication
- ,programming that controls computer, video, or electronic hardware
- ,facts provided or learned about
- ,meaning an item for information
- ,a single hypertext file or a page that is part of a Web site
- ,a piece of software
- ,used by computers to exchange messages and files with other people in a digital format
- ,to shut down and restart a computer
- ,knowledge and ability to use computers and related technology efficiently
- ,representation of a person's real self ,online
- ,a group of computers that connected to shares resources
- ,a globally connected massive computer network system
- ,to exchange message and files online
- ,rules governing socially acceptable behavior
50 Clues: ,on-scree work area • ,a piece of software • ,information resources • ,The virtual environment • ,accessible by a computer • ,main computer on the network • ,to expose,to harm and to loss • ,facts provided or learned about • ,meaning an item for information • ,learning facilitated by technology • ,the hard ware and operating system • ,small image displayed on the screen • ...
LT4 - Crossword Puzzle 2024-04-11
Across
- Assigning available resources in an economic way.
- Management of changes to documents, computer programs, large web sites, and other collections of information.
- Ability to handle growth.
- The extent of what a project will cover.
- Strategy to enter a new market or industry.
- An individual or group interested in any decision or activity of an organization.
- Representation of a chronological sequence of events.
- Architectural style that structures an application as a collection of services.
- Framework for managing work with an emphasis on software development.
- The value a company promises to deliver to customers.
- Iterative approach to project management.
- Process of discovering patterns in large data sets.
- A rule or directive made and maintained by authority.
- The identification and analysis of relevant risks to the achievement of the objectives.
- Combination of two companies into one.
- Software for managing business activities.
- Merging all developers' working copies to a shared mainline several times a day.
- The process of legally declaring a corporate entity separate from its owners.
- A visual system for managing work as it moves through a process.
- Legal status of a person or entity that cannot repay debts.
- Automatically building a software application.
- Avoidance of resource depletion.
- A type of bar chart that illustrates a project schedule.
- Technologies for data analysis.
- Large or complex data sets.
- Internet-based computing that provides shared resources.
Down
- The composite hardware, software, network resources.
- Obtaining goods or services from an outside supplier.
- Using borrowed capital for investment.
- The state of being responsible for something.
- A significant point or event in a project, program, or portfolio.
- Systematic examination of computer source code.
- Identifying internal strengths, weaknesses, opportunities, and threats.
- Software development discipline where you build software in such a way that the software can be released to production at any time.
- Legal proceedings.
- Comparing business processes to industry bests.
- Investigation before signing a contract.
- Practices that combine software development and IT operations.
- Adherence to laws and regulations.
- Creating a virtual version of something.
- Technology for managing company interactions with customers.
- Strategy to increase market share.
- Protection of computer systems from theft or damage.
- Buying of one company by another.
- A government license conferring a right for a set period.
- The sequence of stages determining the minimum time needed for an operation.
- Testing individual units or components of a software.
- Software distribution model.
- The act of introducing something new.
- An estimate of costs, revenues, and resources over a specified period.
50 Clues: Legal proceedings. • Ability to handle growth. • Large or complex data sets. • Software distribution model. • Technologies for data analysis. • Avoidance of resource depletion. • Buying of one company by another. • Adherence to laws and regulations. • Strategy to increase market share. • The act of introducing something new. • Using borrowed capital for investment. • ...
Chapter 3 Activity 2024-09-11
Across
- Phishing in which the victims receive a voice-mail message telling them to call a phone number or access a website
- A harmful program that resides in the active memory of the computer and duplicates itself
- The deployment of malware that steals data from government agencies, military contractors, political organizations, or manufacturing firms
- What organization is mentioned as a resource for cybersecurity guidance?
- An attack on an information system that takes advantage of a particular system vulnerability
- Software that generates and grades tests that humans can pass but computer programs cannot
- The process of scrambling messages or data in such a way that only authorized parties can read it
- What federal agency is responsible for protecting U.S. cyber infrastructure?
- Defines an organization’s security requirements, as well as the controls and sanctions needed to meet those requirements.
- Perpetrators: Launches computer-based attacks against other computers or networks in an attempt to intimidate or coerce an organization in order to advance certain political or social objectives.
- The process of assessing security-related risks to an organization’s computers and networks from both internal and external threats.
- A set of programs that enables its user to gain administrator-level access to a computer without the end user’s consent or knowledge
- An attack that occurs before the security community is aware of a vulnerability
- Perpetrators: Someone who violates computer or Internet security maliciously or for illegal personal gain
- Federal Laws: Addresses fraud and related activities in association with computers
Down
- Software and/or hardware that monitors system resources and activities and issues an alert when it detects network traffic attempting to circumvent security measures
- A specific sequence of bytes that indicates the presence of a previously identified virus
- What type of phishing specifically targets an organization's employees?
- Malware that encrypts data and demands a ransom
- What does BYOD mean?
- A system of software and/or hardware that stands guard between an organization’s internal network and the Internet
- What type of attack floods a target with data requests to make a site unavailable?
- Many organizations use this to monitor, manage, and maintain their computer and network security
- Enables remote users to securely access an organization’s computing resources and share data by transmitting and receiving encrypted data over public networks, such as the Internet
- Perpetrators: An individual whose goal is to promote a political ideology
- Confidentiality, Integrity, Availability
- Federal Laws: Defines cyberterrorism and associated penalties
- Phishing using SMS
- A networking device that connects multiple networks and transmits data packets between networks
- What type of malware disguises itself as legitimate software?
30 Clues: Phishing using SMS • What does BYOD mean? • Confidentiality, Integrity, Availability • Malware that encrypts data and demands a ransom • Federal Laws: Defines cyberterrorism and associated penalties • What type of malware disguises itself as legitimate software? • What type of phishing specifically targets an organization's employees? • ...
IZB FINANCIAL LITERACY WEEK LEVEL 2 2025-03-12
Across
- A seamless Indo Zambia Bank platform for making ASYCUDA, WORKERS COMPENSATION, NHIMA, NAPSA and ZRA IPS payments
- An IZB digital account that makes banking as smooth as its name suggests
- IZB Online banking platform for secure and convenient transactions
- Banking Exclusive banking services for high-net-worth individuals
- A facility that lets you withdraw beyond your account balance (but not without the bank’s permission!)
- Our core values include Integrity , Responsibility, Commitment,_______ ,Professionalism & Service Commitment
- Represents the residual interest in the assets of an entity after liabilities are subtracted, often a key indicator of financial health.
- A type of scam that often promises high returns with little risk, relying on new investors to pay the old ones.
- A numerical representation of an individual's creditworthiness
- A set of measures designed to protect financial data and transactions from online threats.
- Short-term debt instruments issued by the government.
Down
- A long-term savings arrangement, typically funded during employment
- A detailed schedule of periodic loan payments, breaking down principal and interest
- The highest denomination of the Zambian currency, to be introduced on March 31st, 2025.
- The percentage of deposits banks must hold at the central bank
- Efforts to make financial services accessible and affordable to all individuals and businesses, regardless of their personal net worth or company size.
- When your money doesn’t want to wait in line—this system transfer your money instantly, like a first-class passenger in the world of transfers
- A time-bound investment option.
- A unique identifier assigned to a taxpayer by the Zambia Revenue Authority (ZRA) for tax purposes
- The practice of exploiting price discrepancies between markets by simultaneously buying low in one and selling high in another.
- Rental Discounting Provides immediate funds against future lease rentals
- Policy The process by which a central bank controls the supply of money, often targeting an inflation rate to ensure stability
- A measure of how easily assets can be converted to cash or cash equivalents without significant loss of value, critical in risk assessment.
- Discounting Quick cash flow solutions using unpaid invoices as collateral.
- A numeric code used to verify identity and authorize access to financial services, designed to safeguard account security
- The foreign financial vault holding funds beyond Zambian borders
- Securities that grant ownership rights and entitle holders to a proportionate share of a company's profits or losses.
- Fund A financial safety net established to cover unexpected expenses, providing a cushion against unforeseen financial challenges and protecting savings from potential loss.
- Our mission is "To act as a ______ for the economic development of Zambia"
29 Clues: A time-bound investment option. • Short-term debt instruments issued by the government. • The percentage of deposits banks must hold at the central bank • A numerical representation of an individual's creditworthiness • The foreign financial vault holding funds beyond Zambian borders • IZB Online banking platform for secure and convenient transactions • ...
Tech Terms and Acronyms 2023-05-19
Across
- To load and initialise the operating system of a computer or other device
- Short-range wireless communication technology
- A communications technology whereby a single wire can carry more than one type of signal at once
- A microprocessor that performs many functions and calculations that make a computer function
- The method by which users access and save or "pull down" software or other files to their own computer from a remote computer via the Internet
- Measures designed to protect a computer, device, or network from Cybercrime
- A computer that handles requests for data, email, file transfers, and other network services from other computers
- Can't stop laughing
- Hyper-text markup language
- A technology that allows computers and other devices to communicate via a wireless signal
- A device that allows computers to transmit information to each other
- Today I learnt
- A conventional method of transmitting data
- A type of digital subscriber line broadband technology that is used to connect to the Internet
- A barrier that acts as a security system to protect trusted computer systems and networks from outside connections
Down
- The "brains" of a computer, responsible for performing tasks and calculations
- A link to a particular web page that is saved in the browser
- A piece of code or data created by a web server and stored on a user's computer. It is used to keep track of the user's usage patterns and preferences
- Portable document format
- A software programme that allows you to surf the web
- A type of software that allows users to create 2D and 3D design modelling
- A set of interconnected networks that allow computers in different locations to exchange information
- Uniform resource locator
- A document or other file that is sent along with an email
- Any type of illegal activity that is undertaken on a computer
- A webpage that is temporarily stored on a computer so the next time it is requested, the web browser accesses it locally so the page loads quicker
- A type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate source
- To compress and archive files into a (one) smaller size
- Direct message
- Unsolicited email messages sent for marketing purposes
- General term for a software programme that has been designed to harm other computers
- A way of sending messages over the Internet
- Referring to the storing and accessing of data and programmes over the Internet instead of another type of hard drive
- Random access memory
34 Clues: Direct message • Today I learnt • Can't stop laughing • Random access memory • Portable document format • Uniform resource locator • Hyper-text markup language • A conventional method of transmitting data • A way of sending messages over the Internet • Short-range wireless communication technology • A software programme that allows you to surf the web • ...
Database security 2024-10-16
Across
- The most common form of authentication, where users must provide a secret word or phrase to gain access, though it is often vulnerable to attacks if not used alongside other security measures.
- What are the 3 Principles of Information Security? (third one)
- A data type that is simply a sequence of characters hash character for comments
- An authentication method that relies on unique physical characteristics, such as fingerprints or facial recognition, to verify the identity of users.
- Malicious software that can corrupt or steal data stored in a database.
- Software used to protect against malicious software
- Logical Operator that evaluates to false If condition evaluates to true.
- The process of controlling who has access to specific data in a database.
- What are the 3 Principles of Information Security? (first one) (This cybersecurity principle ensures that information is only accessible to those who are authorized to access it.)
- if its boolean expression is true, then executes a block of code
- The act of scrambling data to prevent unauthorized access. A cryptographic technique that protects data by transforming it into an unreadable format, which can only be decoded with a special key.
- A _______ statement allows us to execute a statement or group of statements multiple times
Down
- The term used to describe unauthorized access to a computer network with the intent to cause damage or theft
- Logical Operator that evaluates to true If any of the operands are true then condition becomes true in Python
- Merges the string representations of elements in sequence seq into a string, with separator string
- This process is critical for verifying that the user requesting database access is who they claim to be, typically involving methods like passwords or biometrics.
- A type of cyberattack where malicious code is inserted into SQL queries to access data.
- A function that returns the smallest item in an iterable
- A security measure that requires users to verify their identity using two or more distinct methods, such as a password, a code sent to a phone, or a fingerprint scan.
- keeps executing as long as True
- What are the 3 Principles of Information Security? (second one)
- The primary language used to create web pages
- Malicious software designed to harm or exploit any programmable device
- Logical Operator that evaluates to true If both the operands are true then condition becomes true. Modulus Divides left hand operand by right hand operand and returns remainder
- How many times will the following while loop run? x = 5 while x > 0: x -= 1
25 Clues: keeps executing as long as True • The primary language used to create web pages • Software used to protect against malicious software • A function that returns the smallest item in an iterable • What are the 3 Principles of Information Security? (third one) • What are the 3 Principles of Information Security? (second one) • ...
RICS High School 103 Academics & Post-Secondary Review 2025-10-20
Across
- Semester grades are posted on this document in December and May.
- Rigorous international high school program offering college-level coursework and global recognition.
- Graduation requirements Algebra, Geometry, Advanced Algebra, and one additional course
- After school academic support with teachers on Monday, Wednesday, and Thursday
- Fulton County’s grading scale based on 100 points.
- Graduation Coach who leads Extended Learning and Raider Depot.
- Georgia’s specialized training centers prepare students for these fast-growing, skilled professions in fields like cybersecurity, aviation, manufacturing, bioscience, fintech, and film.
- Platform for exploring colleges, careers, and post-secondary planning.
- The lowest passing grade in Fulton County Schools.
- A break between high school and college, often used for travel, work, or volunteering
- Distributed every 4.5 weeks
- An official record of your high school courses, grades, and GPA used for college admissions.
- Platform to check daily emails from teachers and staff.
- Jump straight into a job after high school
- Counselor for all 9th grade students.
- Earn while you learn a skilled trade like plumbing or electrical work.
- Serve your country while gaining education and career training.
- Where to find your unofficial transcript in Infinite Campus.
- Counselor and administrator for students with last names Def–Ji.
Down
- Counselor and administrator for last names Jo-Mei
- Counselor and administrator for students with last names San–Z.
- College-level courses offered in high school through the College Board that may earn you college credit
- A traditional path to a bachelor’s degree, often includes dorm life and football games
- Offers associate degrees (2-year) and a great way to transfer to a 4-year school.
- Program where students take college classes while still in high school for high school and college credit
- Graduation requirements Biology, Physics, Environmental/Chemistry, Forensics, Human Anatomy
- A-Day lunch tutoring spot for help in ELA, Humanities, and World Languages.
- Counselor and administrator for students with last names A–Dee.
- Graduation requirement that includes Lit Comp I & II, American, and Multicultural courses.
- Real-time performance updates found in Canvas or Infinite Campus.
- A & B-Day lunch tutoring location for STEM support.
- One-stop portal for Microsoft Office, Schoolinks, Canvas, and more.
- Number of credits needed to move from 10th to 11th grade (11) and from 11th to 12th grade (17).
- Counselor and administrator for students with last names Mej–Sam.
- Where you go to learn hands-on skills like welding, coding, or cosmetology, etc.
- Graduation requirements American Government, World History, US History, Economics
- Total number of credits needed to graduate in Georgia.
- Extra points earned for taking and passing AP, IB, honors, or dual enrollment classes.
38 Clues: Distributed every 4.5 weeks • Counselor for all 9th grade students. • Jump straight into a job after high school • Counselor and administrator for last names Jo-Mei • Fulton County’s grading scale based on 100 points. • The lowest passing grade in Fulton County Schools. • A & B-Day lunch tutoring location for STEM support. • ...
Group 1 2023-01-03
Across
- Overtime, allowance and commission can be counted as income for income computation.
- All outstanding debt repayment divided by Income after statutory obligation is called .
- John as a banker discloses information to the son of the account holder without consent. What Act did John violate?
- CCRIS is owned and managed by ______________. On the other hand, CTOS/Credit Bureau Malaysia/Experian are credit reporting agencies registered by the Ministry of Finance under the Credit Reporting Agencies Act 2010.
- Data _________principle in PDPA states that a data user shall take reasonable steps to ensure that the personal data is accurate, complete, not misleading and kept up-to-date by having regard to the purpose, including any directly related purpose, for which the personal data was collected and further processed.
- Which guideline serves to protect individuals' interests so that they can borrow within their capacity ?
- For financing, the tenure of financing shall not exceed 9 years
- __________ risk is the potential loss arising from a bank borrower or counterparty failing to meet its obligations in accordance with the agreed terms.
- Customer X's Savings Account has many suspicious transactions with debits and credits and the account is zerorized at day end. What is the stage of the potential illegal activity committed by customer?
- What is the process of identifying and addresses verification of all customer and clients by the bank.
- _________ is an organisation that establish international standards on the risk of a country base on AML/CFT Framework
Down
- What type of malicious software designed to block access to a computer system until a sum of money is paid ?
- For any offer or provision of gift(s) and/or entertainment of an estimated value more than RM350 in aggregate per person/item, written approval has to be obtained from __________.
- CCRIS only includes specified financing and __________ information from participating financial institutions. Financial institutions and credit reporting agencies may collect more information about borrowers from sources other than CCRIS.
- Hacker sends URL links via email in hope the staff would click on it. If the staff click it, it will bring the staff to an online portal which look similar to the actual website to trick the staff login and enter password.This is call __________ email.
- __________ is the practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from malicious cyber attacks.
- The final stage of money laundering, making illegal fund appears legal is called _____________.
- For financing, the tenure of financing shall not exceed 35 years
- Customer debt obligation and repayment history can be obtained via .
- ___________is required from data subject to disclose their personal data
20 Clues: ___________is required from data subject to disclose their personal data • For financing, the tenure of financing shall not exceed 35 years • For financing, the tenure of financing shall not exceed 9 years • Customer debt obligation and repayment history can be obtained via . • ...
AP Lang 2023-03-22
Across
- Using a mild or indirect word or expression in place of a more direct or blunt one that might be considered unpleasant or offensive.
- Comparing two things without using "like" or "as."
- when the 2nd clause is the inverted version of the 1st clause
- establishes the credibility of the author/speaker
- - refers to digital or virtual currencies that use cryptography for security and are typically decentralized, meaning they operate independently of a central authority.
- parallel grammatical structures and opposite ideas
- Polarization - refers to the growing divide between political groups or individuals who hold opposing beliefs and values, leading to increased hostility and mistrust.
- emotional appeal
- the repetition of the initial word or phrase in a series of successive clauses or phrases
- Intelligence (AI) - refers to the simulation of human intelligence in machines that are programmed to learn and perform tasks such as problem solving, decision making, and natural language processing.
- Justice - refers to the idea that all individuals should have equal access to rights, opportunities, and resources regardless of their background or identity.
- reference in a literary work to any other literary character, or work or any historical person, place, or fact
- Health - refers to the emotional, psychological, and social well-being of an individual and the ability to cope with everyday stresses and challenges.
- Repeating a word, phrase, or sentence for emphasis.
- The central claim and overall purpose of a work
Down
- Exaggerating a statement for effect.
- Comparing two things using "like" or "as."
- comparing two objects to see the differences
- - refers to the protection of computer systems and networks from theft, damage, or unauthorized acce
- Presenting something as less significant or serious than it actually is.
- john likes cookies, cookies like john
- the art of effective or persuasive speaking or writing, especially the use of figures of speech and other compositional techniques.
- Contrasting ideas by placing them side by side in a sentence.
- Equity, and Inclusion (DEI) - refers to the effort to create a workplace or society that is welcoming and inclusive to people of different backgrounds and identities.
- Using informal language or slang that is commonly used in a particular region or group.
- structure refers to grammatical framing of words to give structural similarity
- questions: Asking a question to make a point rather than to elicit an answer.
- The emotional or cultural associations that a word or phrase carries beyond its literal definition.
- Change - refers to the long-term changes in the Earth's climate, including global warming, sea level rise, and extreme weather events.
- Appeal to logic, reasoning, fact
30 Clues: emotional appeal • Appeal to logic, reasoning, fact • Exaggerating a statement for effect. • john likes cookies, cookies like john • Comparing two things using "like" or "as." • comparing two objects to see the differences • The central claim and overall purpose of a work • establishes the credibility of the author/speaker • ...
it 2023-10-30
Across
- Converting data into a secret code to prevent unauthorized access.
- A step-by-step procedure for solving a problem.
- Instructions written in a programming language.
- Local Area Network, a network that connects computers within a limited area.
- Storing and accessing data and programs over the internet instead of a local computer.
- Software that translates high-level programming code into machine-readable code.
- A person who gains unauthorized access to computer systems or networks.
- An operating system developed by Microsoft.
- A secret combination of characters used to authenticate a user's identity.
- Measures taken to protect computer systems and data from unauthorized access or attacks.
- A networking device that forwards data packets between computer networks.
- A software tool used for organizing and analyzing data in rows and columns.
- Malicious software disguised as legitimate software.
- A type of malicious software that can replicate itself and spread to other computers.
- Uniform Resource Locator, the address used to access resources on the internet.
- Wireless Fidelity, a technology that allows devices to connect to the internet wirelessly.
- The process of creating computer programs using programming languages.
- Universal Serial Bus, a common interface for connecting devices to a computer.
Down
- A display device used to view output from a computer.
- An input device used to enter data and commands into a computer.
- A global network of interconnected computers and devices.
- A popular programming language used for developing a wide range of applications.
- Programs and applications that run on a computer system.
- Hypertext Markup Language, the standard language for creating web pages.
- Structured Query Language, a programming language used for managing and manipulating databases.
- Software used to access and view websites on the internet.
- Transmission Control Protocol/Internet Protocol, the basic communication protocol of the internet.
- Malicious software designed to harm or exploit computer systems.
- Creating a copy of data to protect against loss or damage.
- The capacity to hold and retain data or information.
- A network security system that monitors and controls incoming and outgoing network traffic
- development: The process of creating websites and web applications.
- A computer or system that provides resources or services to other computers or clients.
- Virtual Private Network, a secure connection between a user and a private network over the internet.
- system: Software that manages computer hardware and software resources.
- A structured collection of data stored and organized for easy retrieval.
- The process of identifying and fixing errors or bugs in software code.
- A network security system that monitors and controls incoming and outgoing network traffic.
- Extensible Markup Language, a markup language used for storing and transporting data.
- A group of interconnected computers and devices.
40 Clues: An operating system developed by Microsoft. • A step-by-step procedure for solving a problem. • Instructions written in a programming language. • A group of interconnected computers and devices. • The capacity to hold and retain data or information. • Malicious software disguised as legitimate software. • A display device used to view output from a computer. • ...
Digital Literacy 2024-04-30
Across
- ,facts provided or learned about
- ,the transfering of digital photos online
- ,The virtual environment
- ,programming that controls computer, video, or electronic hardware
- ,appropriate ,tailor content to the user's age group
- ,the ability to effectively analyze information
- ,a worldwide network of computer networks
- ,information resources
- ,the learned ability to act with determined results
- ,main computer on the network
- ,on-scree work area
- ,to shut down and restart a computer
- ,accessible by a computer
- ,to expose,to harm and to loss
- ,representation of a person's real self ,online
- ,to exchange message and files online
- ,the practice of taking someone else's work or ideas
- ,a device that accepts information in digital
- ,application of conceptual knowledge
- ,being aware of the nature of the possible threats that you could encounter
- bullying ,the use of technology to harass, threaten, embarrass, or target another person
- ,meaning an item for information
- ,a small computer designed for use by a single user at a time
- ,the ability to access and analyze media messages
Down
- ,the hard ware and operating system
- ,a person is ethical, responsible, and culturally aware in their interactions with others.
- ,a group of computers that connected to shares resources
- ,a new form of culture in which the culture of humanity will digitalize
- ,a piece of software
- ,small image displayed on the screen
- ,most commonly deployed via email phishing attacks, where a victim clicks on a link
- ,being aware of the nature of the possible threats online
- ,learning facilitated by technology
- ,a mobile phone that performs many of the functions of a personal computer
- ,knowledge and ability to use computers and related technology efficiently
- ,a collection of World Wide Web pages or files
- , a web address of a specific web page or file on the Internet.
- ,the act of sending sexual text messages
- ,a powerful computer that can process large amounts of data
- ,to copy a file, e-mail, or other information from one's personal computer
- ,being groomed, forced or coerced into doing something
- ,describes all channels of communication
- ,relating to the present or recent times.
- ,used by computers to exchange messages and files with other people in a digital format
- ,a globally connected massive computer network system
- ,the ability to control how much of your information online.
- ,a single hypertext file or a page that is part of a Web site
- ,a category of cybersecurity risks that may cause an undesirable event or action via the internet
- ,the apps that allow people, creators, and businesses to communicate
- ,rules governing socially acceptable behavior
50 Clues: ,on-scree work area • ,a piece of software • ,information resources • ,The virtual environment • ,accessible by a computer • ,main computer on the network • ,to expose,to harm and to loss • ,facts provided or learned about • ,meaning an item for information • ,the hard ware and operating system • ,learning facilitated by technology • ,small image displayed on the screen • ...
Spring Gathering 2024 2024-05-02
Across
- What we all aspire to do
- A special type of report that reflects a company’s commitment to diversity, labor practices and data security, among other topics
- What many of our MST services entail
- A software platform MST helps implement at companies
- Man's best friend
- The largest group in the firm and a typical entry point for multiple services
- A specialty area of PWA
- One of the firm’s key service areas
- Part of the name of several affiliates
- What every company and high net worth family needs
- Likes to chase mice
- A type of advisory service that helps buyers and sellers of companies
- Firm members speak and practice in more than this many languages
- Managed blank and Technology
- Something PWA advisors help client protect
- How PWA creates a comprehensive approach
- What assurance and cyber teams often do
- Has a trunk
- A governmental agency that scares of our clients but not us
- One approach our tax controversy team takes with the IRS
Down
- Large marsupial
- Present blank analysis
- A type of organization that serves the community, we do their taxes and audits
- An activity that often uses talents from a variety of departments
- Where our first office was located
- A service that several departments have in their names
- A type of tax credit for manufacturing or product improvement
- A special type of audit for public companies
- BPB was founded in nineteen
- An acronym for a special type of insurance that is tax mitigation tool
- He is the CEO and grew up in the firm
- How our HR department helps clients
- An area that helps high-net-worth people manage their financial lives
- An acronym for solving repetitive tasks with robotics
- Something BayBridge Real Estate Capital helps clients manage, find or refinance
- A charity event the firm teams have contributed $2 million to since it started 14 years ago
- Diversity, equity and blank
- Investigating, often in fraud or legal situations
- An area of tax that especially impacts clients with operations in multiple states
- A core value brought to life by our participation in the DCC and Bounce Back from Cancer
- The area of tax services BPB is probably most famous for
- A lifechanging client event we can help with from planning to tax preparation to estate planning
- Flying mammal
- Where most of the firm’s new business is originated
- A type of entity that provides tax benefits for manufacturers and distributors that export products
45 Clues: Has a trunk • Flying mammal • Large marsupial • Man's best friend • Likes to chase mice • Present blank analysis • A specialty area of PWA • What we all aspire to do • BPB was founded in nineteen • Diversity, equity and blank • Managed blank and Technology • Where our first office was located • One of the firm’s key service areas • How our HR department helps clients • ...
Technology 2024-10-21
Across
- - A collection of computers and devices connected to share resources and information.
- Design - A web design approach that ensures websites function well on various devices and screen sizes.
- Reality - A simulated environment created by computer technology, immersing users in a 3D space.
- - A small mechanical or electronic device designed for a particular purpose or function.
- - An unmanned aerial vehicle (UAV) used for various purposes, including photography and delivery.
- - An organized collection of data that can be easily accessed, managed, and updated.
- - A mobile device that combines cellular capabilities with computer features, including internet access.
- - The measurement and statistical analysis of people's unique physical and behavioral characteristics for identification.
- - The design and use of robots for various applications, often involving automation and programming.
- - The point of interaction between a user and a computer system, including hardware and software.
- - The physical components of a computer or device, such as the CPU, memory, and peripherals.
- - A decentralized digital ledger used to record transactions across many computers securely.
- - The remote diagnosis and treatment of patients using telecommunications technology.
- Experience (UX) - The overall experience a person has when interacting with a product or service, especially in technology.
- - Programs and applications that run on computers and devices, enabling them to perform specific tasks.
- - The real-time transmission of audio or video content over the internet without downloading.
Down
- - The process of converting data into a coded format to prevent unauthorized access.
- Intelligence - The simulation of human intelligence in machines programmed to think and learn.
- - A software application designed to perform a specific function on a computer or mobile device.
- - A set of rules or steps used to solve a problem or perform a task, especially in computing.
- Printing - The process of creating three-dimensional objects from a digital file through additive manufacturing.
- Neural Network - A computational model inspired by the human brain that is used in machine learning and AI.
- Data - Extremely large data sets that can be analyzed to reveal patterns, trends, and associations.
- of Things (IoT) - A network of interconnected devices that can collect and exchange data over the internet.
- Technology - Electronic devices worn on the body that track health, fitness, or provide notifications.
- Reality - A technology that overlays digital information onto the real world, enhancing the user’s perception.
- Computing - The delivery of computing services over the internet, allowing for storage and processing on remote servers.
- - Working remotely from a location outside the traditional office, often using technology to stay connected.
- - The practice of protecting systems, networks, and programs from digital attacks and unauthorized access.
- - The manipulation of matter on an atomic or molecular scale, often used in materials science and medicine.
30 Clues: - The process of converting data into a coded format to prevent unauthorized access. • - An organized collection of data that can be easily accessed, managed, and updated. • - A collection of computers and devices connected to share resources and information. • - The remote diagnosis and treatment of patients using telecommunications technology. • ...
Cyber and Digital Literacy 2024-04-30
Across
- The use of electronic communication to harass, intimidate, or threaten individuals, typically through social media, messaging apps, or online forums.
- The main screen area on a computer where icons, windows, and other graphical elements are displayed.
- a concept that refers to the ability to ascertain who the author of a text is, what their biases are, how authoritative the information may be, and so on.
- Being able to solve problems in digital environment
- Building resilience to digital threats and challenges, including cyberbullying, online scams, and misinformation, through education, awareness, and support networks.
- A display screen used to visually output information from a computer.
- A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by posing as a trustworthy entity in an electronic communication.
- With video games becoming increasingly interactive and connected, familiarizing oneself with the norms and practices of these virtual landscapes are crucial.
- the standard language used to create and design web pages.
- Knowing how to access and navigate the internet effectively, including using web browsers, conducting searches, evaluating website credibility, and understanding basic internet safety and security practices.
- An electronic device that processes data and performs tasks according to instructions.
- The process of transferring data from a remote computer or server to a local device.
- Wireless networking technology that allows devices to connect to the internet without the need for physical cables.
- A live online seminar or presentation conducted over the internet, typically featuring audio, video, and interactive elements.
- the ability to understand and use information in multiple formats from a wide range of sources when it is presented via computers
- a unit of digital information comprising eight bits
- A satellite-based navigation system that provides location and time information anywhere on or near the Earth.
- a programming language that a computer can execute
- To gain unauthorized access to a computer system
- Understanding the importance of protecting personal information online and implementing strategies to safeguard digital identity and data.
- A collection of data stored in a computer under a specific name.
- Understanding and interpreting data and statistics, including those presented in digital formats, to make informed decisions and conclusions.
- The maximum rate of data transfer across a network connection, typically measured in bits per second (bps) or megabits per second (Mbps).
- Recognizing the potential of digital technologies to empower individuals and communities, including access to information, education, and economic opportunities.
- Understanding the principles of cybersecurity and learning to identify vulnerabilities and potential threats in digital systems, often used for defensive purposes.
- Being aware of common cybersecurity threats, such as malware, phishing, and social engineering, and implementing best practices to protect oneself and others online.
- a method of exchanging digital messages over the internet.
- Ethical principles and considerations related to the use of digital technologies, including privacy, transparency, accountability, and the ethical implications of cyber operations and capabilities.
- Knowledge and practices to protect oneself and others from online threats, scams, and harmful content.
Down
- Accessing and participating in digital educational resources, courses, and programs, often facilitated through learning management systems and online platforms.
- A networking device that forwards data packets between computer networks, typically using IP addresses.
- Knowing how to safely and effectively shop online represents digital literacy.
- Possessing the ability to write, post, and maintain a blog is an essential facet of digital literacy.
- Criminal activities carried out by means of computers or the internet, such as hacking, identity theft, fraud, and cyber espionage.
- the ability to locate, identify, retrieve, process and use digital information optimally
- Acknowledging the disparities in access to digital technologies and resources based on factors such as socioeconomic status, geographic location, age, and disability, and working to bridge these gaps.
- Strategies and measures employed to protect computer systems, networks, and data from cyber threats, including preventive, detective, and corrective actions.
- A device that enables computers to transmit data over telephone or cable lines.
- A software application used to access and view information on the World Wide Web.
- Online platforms and websites that enable users to create and share content, connect with others, and interact in virtual communities.
- The ability to objectively analyze and evaluate information, arguments, and evidence, crucial for navigating the vast amount of digital content.
- A program that searches for and identifies items in a database matching keywords or specified criteria.
- Relating to or characteristic of the culture of computers, information technology, and virtual reality.
- Understanding one's rights, responsibilities, and ethical behavior in digital environments, including issues related to online privacy, security, copyright, and appropriate online conduct.
- Understanding different modes of online communication, including email, instant messaging, social media, and video conferencing, and being able to communicate effectively and respectfully in digital environments.
- The process of transferring data from a local device to a remote computer or server.
- Understanding how to use a computer, including tasks such as turning it on/off, navigating the operating system, using a keyboard and mouse, managing files and folders, and connecting to the internet.
- organized and processed for analysis or storage.
- A global network of interconnected computers that allows communication and information sharing.
- Relating to or using signals or information represented by discrete values (digits) of a physical quantity.
- Physical components of a computer system, such as the monitor, keyboard, and motherboard.
51 Clues: To gain unauthorized access to a computer system • organized and processed for analysis or storage. • a programming language that a computer can execute • Being able to solve problems in digital environment • a unit of digital information comprising eight bits • the standard language used to create and design web pages. • ...
Technology in Banking 2025-09-20
Across
- – I answer your questions day or night. No human needed, yet I type it right. Who am I?
- Intelligence – I learn from data, I don’t need rest. I mimic humans, but I’m not flesh. I think in patterns, not in skin. Who am I that learns from within?
- – I’m money, but I’m not coins you hold. I live online, encrypted and bold. No bank controls me, peer-to-peer. What am I that many cheer?
- – Startups love me, banks agree. I help them test with the RBI. With limited users and risks so small, what am I that supports them all?
- – I lend small amounts to those in need, helping them start businesses and succeed. Not big banks, but I make a way. What am I that brightens lives each day?
- – A chain with no metal, no physical link, yet stores all records so none can shrink. Immutable, shared, transparent in view. What am I that powers Bitcoin too?
Down
- Reality – I blend the real with the virtual too. On screens or glasses, I change your view. What am I that augments your design?
- Banking – I let you transfer, pay bills, or invest, all from one screen, no branch request. Safe and secure, at your command. What am I that fits in your hand?
- Detection – I scan each swipe, each transfer, each pay, spotting patterns that go astray. Before the thief can run away, I block the fraud without delay. What am I?
- – I guard your data, keep hackers away, shielding networks night and day. What am I that protects digital life?
- Process Automation – A technology that uses software robots or “bots” to automate repetitive, rule-based tasks in business processes.
- – I’m where finance shakes hands with code. From banks to apps, I lighten the load. I make money smart and transactions fast. What am I in this modern world?
- Banking – I keep your info safe in the sky, even if your device says goodbye. Backups, encryption, I do it all. What am I that banks install?
- – I ask for names, I check your face. I verify your address and place. Without me, banks can't onboard. Who am I that rules the onboarding board?
14 Clues: – I answer your questions day or night. No human needed, yet I type it right. Who am I? • – I guard your data, keep hackers away, shielding networks night and day. What am I that protects digital life? • Reality – I blend the real with the virtual too. On screens or glasses, I change your view. What am I that augments your design? • ...
Cybercrime Crossword Puzzle 2021-07-13
Across
- Hardware and/or software designed to prevent unauthorized users from accessing a computer system.
- interception Interception made by technical means without right.
- is a type of malware from cryptovirology that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.
- Attempting to mimic an official email from a trusted organization to lure individuals into revealing login information or other personal information.
- is an ethical computer hacker or a computer security expert who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems.
- is basically the practice of preventing unauthorized access use disclosure disruption modification inspection recording or destruction of information.
- is an electronic data storage device used for storing digital information typically using flash memory.
- includes the vast network of highways connecting bridges and tunnels railways utilities and buildings necessary to maintain normalcy in daily life.
- is digital service infrastructure has to be designed built integrated operated and audited in accordance with evaluated risks and technical security measures described by R.A. 10175.
- when individual handling personal information knowingly or negligently disposed discard or abandon in an area accessible to the public or has otherwise placed the
- a string of characters that allows access to a computer system or service.
- Intentional alteration or reckless interference with the functioning of a computer or computer network.
- It is offense against the confidentiality integrity and availability of computer data and systems.
- It is when an individual handling personal information or intentional knowingly and unlawfully or violating data confidentiality breach and security.
- Breach It is when an individual or entity who has knowledge of a security breach and of the obligation.
- A program used to access the Internet. Commonly used browsers include Internet Explorer, Google Chrome, and Mozilla Firefox
- is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
- is a data storage device that includes flash memory with an integrated USB interface.
- the process of converting encrypted information back into normal, understandable text.
- what comes after terabyte
- Intentional or reckless alteration damaging deletion of computer data.
- is a concept describing a widespread interconnected digital technology.
- refers to activities that seek to compromise digital devices such as computers smartphones tablets and even entire networks.
Down
- It is when an individual or entity discloses to third party personal information.
- is a hacker who violates computer security for their own personal profit or out of malice.
- is a suspected attempted successful or imminent threat of unauthorized access use disclosure breach modification or destruction of information interference with information technology operations or significant violation of responsible use policy.
- is data that describes other data.
- protection of computer systems and networks from information disclosure theft of or damage to their hardware software or electronic data as well as from the disruption or misdirection of the services they provide.
- what comes after zettabyte.
- is a form of phishing that uses mobile phones as the attack platform to gather personal details like SSN or credit card number.
- protecting information or hiding its meaning by converting it into a secret code before sending it out over a public network
- Acquisition of a domain name over the internet in bad faith to profit mislead destroy reputation and deprive others from registering.
- It is when an individual or entity with malice or in bad faith.
- sexual arousal using computer technology especially by wearing virtual reality equipment or by exchanging messages with another person via the internet.
- is basically the practice of preventing unauthorized access use disclosure disruption modification inspection recording or destruction of information.
- is a form of bullying or harassment using electronic means.
- is a specific aspect of broader concepts such as cybersecurity and computer security being focused on the specific threats and vulnerabilities of online access and use of the internet.
- measures promoting the safe usage of the internet especially in order to protect against viruses fraud or other forms of attack.
- information of an individual in any container for trash collection.
- is the World Wide Web content that exists on darkness overlay networks that use the Internet but require specific software configurations or authorization to access.
- 10175 An act defining cybercrime providing for the prevention.
- is a shortfall that comes from fragmented thinking reactive acquisition and unmanaged vulnerability against the known threats that violate confidentiality, integrity availability and privacy of information in the infrastructure, process data application and agreements of service delivery.
- is pornography that exploits children for sexual stimulation
- a programmable electronic device designed to accept data perform prescribed mathematical and logical operations at high speed and display the results of these operations.
- global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
- Generally used to refer to someone who gains access to a system, software, or hardware without permission
- Access to the whole or any part of a computer system without right.
- Malicious software, such as a virus or a worm, that attacks a target computer.
- is a type of malicious software or malware that is installed on a computing device without the end user's knowledge. It invades the device steals sensitive information and internet usage data and relays it to advertiser’s data firms or external users.
- an application that allows the sending of messages between computer users via a network.
50 Clues: what comes after terabyte • what comes after zettabyte. • is data that describes other data. • is a form of bullying or harassment using electronic means. • is pornography that exploits children for sexual stimulation • 10175 An act defining cybercrime providing for the prevention. • It is when an individual or entity with malice or in bad faith. • ...
Cyber Crossword 2022-09-12
Across
- A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server. This is used to identify the user or track their access to the server. Initially, cookies were used to stay logged in but are now commonly used for tracking.
- The programs and other operating systems used by a computer.
- Programs that automatically execute tasks as ordered by the creator of the program that has infected them.
- Also known as an Internet Protocol address, is the string of numbers used to identify each computer using the internet on a network.
- The act of taking advantage of human trust to gain access to private information. This can be done as easily as calling a number and asking for it.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto.
- A secret word or phrase that is used to access a computer system or service.
- A strategy that is in place to manage upgrades for software applications.
- Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
- A form of malware used to threaten victims by blocking, publishing, or corrupting their data unless the ransom is paid.
- Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
Down
- A service from Google that works to protect websites from spam and abuse caused by robots. A user is presented with a Turing test to distinguish them from a robot.
- A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
- A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- The way in which the identity of a user is confirmed.
- Customizable additions to software for extra functionality.
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
- An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- Text that can be read by the human eye
- A simple form of code for software that can be written in word editors.
22 Clues: Text that can be read by the human eye • The way in which the identity of a user is confirmed. • Customizable additions to software for extra functionality. • The programs and other operating systems used by a computer. • Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto. • ...
Digital Literacy 2024-04-30
Across
- ,a piece of software
- ,a small computer designed for use by a single user at a time
- ,knowledge and ability to use computers and related technology efficiently
- ,a single hypertext file or a page that is part of a Web site
- ,a group of computers that connected to shares resources
- ,The virtual environment
- ,programming that controls computer, video, or electronic hardware
- ,main computer on the network
- ,being groomed, forced or coerced into doing something
- ,most commonly deployed via email phishing attacks, where a victim clicks on a link
- ,used by computers to exchange messages and files with other people in a digital format
- ,meaning an item for information
- ,the use of technology to harass, threaten, embarrass, or target another person
- ,to shut down and restart a computer
- ,a device that accepts information in digital
- ,a category of cybersecurity risks that may cause an undesirable event or action via the internet
- ,to copy a file, e-mail, or other information from one's personal computer
- ,the ability to control how much of your information online.
- ,being aware of the nature of the possible threats that you could encounter
- ,describes all channels of communication
- ,the ability to access and analyze media messages
- ,the apps that allow people, creators, and businesses to communicate
- ,a globally connected massive computer network system
Down
- ,information resources
- ,a powerful computer that can process large amounts of data
- ,learning facilitated by technology
- ,the act of sending sexual text messages
- ,the transfering of digital photos online
- ,a mobile phone that performs many of the functions of a personal computer
- ,rules governing socially acceptable behavior
- ,being aware of the nature of the possible threats online
- ,the learned ability to act with determined results
- ,a person is ethical, responsible, and culturally aware in their interactions with others.
- ,relating to the present or recent times.
- ,accessible by a computer
- ,appropriate ,tailor content to the user's age group
- ,the hard ware and operating system
- ,facts provided or learned about
- ,on-scree work area
- ,application of conceptual knowledge
- ,a collection of World Wide Web pages or files
- ,a new form of culture in which the culture of humanity will digitalize
- ,to expose,to harm and to loss
- ,small image displayed on the screen
- ,representation of a person's real self ,online
- ,the ability to effectively analyze information
- , a web address of a specific web page or file on the Internet.
- ,to exchange message and files online
- ,the practice of taking someone else's work or ideas
- ,a worldwide network of computer networks
50 Clues: ,on-scree work area • ,a piece of software • ,information resources • ,The virtual environment • ,accessible by a computer • ,main computer on the network • ,to expose,to harm and to loss • ,facts provided or learned about • ,meaning an item for information • ,learning facilitated by technology • ,the hard ware and operating system • ,application of conceptual knowledge • ...
RESPONSIBLE USE OF TECHNOLOGY 2025-04-01
Across
- – A neurotransmitter linked to pleasure and motivation. (Neurotransmissor associado ao prazer e motivação.)
- – A person who gains unauthorized access to systems. (Pessoa que acessa sistemas sem autorização.)
- – A security system that protects networks from hackers. (Sistema de segurança que protege redes contra hackers.)
- time – The amount of time spent using a device. (Tempo de tela: tempo gasto em dispositivos eletrônicos.)
- – The practice of staying present and aware. (Atenção plena: prática de permanecer presente e consciente.)
- – A feeling of worry or nervousness. (Ansiedade: sensação de preocupação ou nervosismo.)
- hacking – Using hacking skills for cybersecurity protection. (Hacking ético: uso de habilidades de hacker para proteger sistemas.)
- – Difficulty falling or staying asleep. (Insônia: dificuldade para dormir ou manter o sono.)
- – Verifying information before sharing it. (Verificação de fatos: checar informações antes de compartilhá-las.)
- – A method of protecting data by converting it into a secret code. (Criptografia: método de proteger dados convertendo-os em código secreto.)
- – Extreme physical and emotional exhaustion due to stress. (Esgotamento: exaustão física e emocional extrema causada pelo estresse.)
- of service – Rules that users must agree to before using a platform. (Termos de serviço: regras que usuários aceitam para usar plataformas.)
- literacy – The ability to use and understand technology responsibly. (Alfabetização digital: habilidade de usar e entender tecnologia de forma responsável.)
Down
- comparison – Evaluating oneself based on others’ lives. (Comparação social: avaliar a própria vida com base nos outros.)
- – Activities that help maintain mental and physical well-being. (Autocuidado: atividades que ajudam a manter o bem-estar mental e físico.)
- footprint – The traces of online activity left behind by users. (Pegada digital: rastros deixados pelas atividades online.)
- – Unwanted or unsolicited messages, often advertisements. (Mensagens indesejadas ou não solicitadas, geralmente anúncios.)
- – Keeping personal information safe and secure. (Privacidade: manter informações pessoais seguras.)
- detox – Taking a break from technology to improve well-being. (Desintoxicação digital: pausa da tecnologia para melhorar o bem-estar.)
- – A mental health disorder causing persistent sadness. (Depressão: transtorno mental que causa tristeza persistente.)
- – Software designed to damage or disrupt a system. (Programa criado para danificar ou interromper um sistema.)
- & Responsible Online Behavior
- – Legal protection for original content. (Direitos autorais: proteção legal para conteúdo original.)
- – Copying someone else’s work without credit. (Plágio: copiar o trabalho de outra pessoa sem dar crédito.)
- – Sensationalized headlines designed to attract clicks. (Chamadas sensacionalistas para atrair cliques.)
- authentication – A security process requiring two forms of verification. (Autenticação em duas etapas: exige duas formas de verificação para segurança.)
- – Harassment or bullying through digital platforms. (Cyberbullying: assédio ou bullying por meio de plataformas digitais.)
- – Protecting devices and personal data from online threats. (Segurança cibernética: proteger dispositivos e dados pessoais de ameaças online.)
- – A scam used to trick people into giving personal information. (Golpe para enganar pessoas e obter informações pessoais.)
- reputation – How a person is perceived on the internet. (Reputação online: como alguém é visto na internet.)
30 Clues: & Responsible Online Behavior • – A feeling of worry or nervousness. (Ansiedade: sensação de preocupação ou nervosismo.) • – Difficulty falling or staying asleep. (Insônia: dificuldade para dormir ou manter o sono.) • – A person who gains unauthorized access to systems. (Pessoa que acessa sistemas sem autorização.) • ...
diddy citizens 2025-12-01
Across
- The healthy relationship between online activities and offline life.
- The compulsive use of technology to the extent that it interferes with daily life.
- False information that is spread, regardless of intent to deceive.
- A person who is present when cyberbullying occurs but does not participate or intervene.
- and Clues for Your Crossword Puzzle
- The data trail you leave behind while surfing the internet.
- The amount of time spent using a device with a screen, such as a smartphone or television.
- The duty to use technology in a thoughtful and ethical manner.
- A technology that superimposes a computer-generated image on a user's view of the real world, thus providing a composite view (abbreviated as AR).
- Moral principles that govern a person's behavior or the conducting of an activity.
- Someone who actively supports the victim of cyberbullying or intervenes to stop the behavior.
- The practice of taking someone else's work or ideas and passing them off as one's own.
- Intentionally focusing on how you use technology and the impact it has on your well-being.
- The process of converting information into a secret code to prevent unauthorized access.
Down
- False information that is deliberately spread in order to deceive and manipulate.
- Your personal brand or presence in the virtual world.
- Data that can be used to identify you, like your name, address, or age.
- The simulation of human intelligence processes by computer systems (abbreviated as AI).
- The exclusive legal right to reproduce, publish, sell, or distribute original creative works.
- Using electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- A set of rules or instructions that a computer follows to solve a particular problem or complete a task.
- A public copyright license that enables the free distribution of an otherwise copyrighted work.
- Tools to control who sees your personal information on social media and other platforms.
- The ability to access, analyze, evaluate, and create media messages.
- The unauthorized use or reproduction of another's work (e.g., software, music, movies).
- Understanding and sharing the feelings of others, especially important in online interactions.
- Labs: Free, Online Crossword Puzzle Maker
- Someone who knows right from wrong and makes good choices when using technology.
- Measures taken to protect computer systems and data from theft or damage.
- The rules and norms for appropriate, respectful behavior when using technology.
- A legal doctrine that permits limited use of copyrighted material without acquiring permission from the rights holders.
- A scam to trick you into revealing personal information, often via fake emails or websites.
32 Clues: and Clues for Your Crossword Puzzle • Labs: Free, Online Crossword Puzzle Maker • Your personal brand or presence in the virtual world. • The data trail you leave behind while surfing the internet. • The duty to use technology in a thoughtful and ethical manner. • False information that is spread, regardless of intent to deceive. • ...
Cybersecurity Day - MFA Booth - Set 3 2025-10-13
Across
- Physical device used as a USB security key for authentication
- MFA method that replaces passwords under the FIDO standard
- One‑time passcode generated using the current time
Down
- An IAM Application that enables secure authentication methods for internal applications such as TOTP and WebAuthn
- Authentication method designed to improve user convenience by avoiding repeated logins across multiple applications
5 Clues: One‑time passcode generated using the current time • MFA method that replaces passwords under the FIDO standard • Physical device used as a USB security key for authentication • An IAM Application that enables secure authentication methods for internal applications such as TOTP and WebAuthn • ...
Cybercrime Crossword Puzzle 2021-07-13
Across
- is basically the practice of preventing unauthorized access use disclosure disruption modification inspection recording or destruction of information.
- is a type of malware from cryptovirology that threatens to publish the victim's personal data or perpetually block access to it unless a ransom is paid.
- is an ethical computer hacker or a computer security expert who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems.
- is basically the practice of preventing unauthorized access use disclosure disruption modification inspection recording or destruction of information.
- is an electronic data storage device used for storing digital information typically using flash memory.
- includes the vast network of highways connecting bridges and tunnels railways utilities and buildings necessary to maintain normalcy in daily life.
- a programmable electronic device designed to accept data perform prescribed mathematical and logical operations at high speed and display the results of these operations.
- is digital service infrastructure has to be designed built integrated operated and audited in accordance with evaluated risks and technical security measures described by R.A. 10175.
- when individual handling personal information knowingly or negligently disposed discard or abandon in an area accessible to the public or has otherwise placed the
- Attempting to mimic an official email from a trusted organization to lure individuals into revealing login information or other personal information.
- a string of characters that allows access to a computer system or service.
- Intentional alteration or reckless interference with the functioning of a computer or computer network.
- It is offense against the confidentiality integrity and availability of computer data and systems.
- It is when an individual handling personal information or intentional knowingly and unlawfully or violating data confidentiality breach and security.
- Breach It is when an individual or entity who has knowledge of a security breach and of the obligation.
- is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
- is a data storage device that includes flash memory with an integrated USB interface.
- Intentional or reckless alteration damaging deletion of computer data.
- what comes after terabyte
- is a concept describing a widespread interconnected digital technology.
- A program used to access the Internet. Commonly used browsers include Internet Explorer, Google Chrome, and Mozilla Firefox
- Interception made by technical means without right.
Down
- It is when an individual or entity discloses to third party personal information.
- is a hacker who violates computer security for their own personal profit or out of malice.
- is a suspected attempted successful or imminent threat of unauthorized access use disclosure breach modification or destruction of information interference with information technology operations or significant violation of responsible use policy.
- is data that describes other data.
- protection of computer systems and networks from information disclosure theft of or damage to their hardware software or electronic data as well as from the disruption or misdirection of the services they provide.
- what comes after zettabyte.
- is a form of phishing that uses mobile phones as the attack platform to gather personal details like SSN or credit card number.
- protecting information or hiding its meaning by converting it into a secret code before sending it out over a public network
- the process of converting encrypted information back into normal, understandable text.
- sexual arousal using computer technology especially by wearing virtual reality equipment or by exchanging messages with another person via the internet.
- Acquisition of a domain name over the internet in bad faith to profit mislead destroy reputation and deprive others from registering.
- It is when an individual or entity with malice or in bad faith.
- Generally used to refer to someone who gains access to a system, software, or hardware without permission
- is a type of malicious software or malware that is installed on a computing device without the end user's knowledge. It invades the device steals sensitive information and internet usage data and relays it to advertiser’s data firms or external users.
- is pornography that exploits children for sexual stimulation
- is a form of bullying or harassment using electronic means.
- is a specific aspect of broader concepts such as cybersecurity and computer security being focused on the specific threats and vulnerabilities of online access and use of the internet.
- measures promoting the safe usage of the internet especially in order to protect against viruses fraud or other forms of attack.
- information of an individual in any container for trash collection.
- is the World Wide Web content that exists on darkness overlay networks that use the Internet but require specific software configurations or authorization to access.
- 10175 An act defining cybercrime providing for the prevention.
- is a shortfall that comes from fragmented thinking reactive acquisition and unmanaged vulnerability against the known threats that violate confidentiality, integrity availability and privacy of information in the infrastructure, process data application and agreements of service delivery.
- Hardware and/or software designed to prevent unauthorized users from accessing a computer system.
- refers to activities that seek to compromise digital devices such as computers smartphones tablets and even entire networks.
- global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
- Access to the whole or any part of a computer system without right.
- Malicious software, such as a virus or a worm, that attacks a target computer.
- an application that allows the sending of messages between computer users via a network.
50 Clues: what comes after terabyte • what comes after zettabyte. • is data that describes other data. • Interception made by technical means without right. • is a form of bullying or harassment using electronic means. • is pornography that exploits children for sexual stimulation • 10175 An act defining cybercrime providing for the prevention. • ...
Technical specialties 2023-10-10
Across
- It is a technical area which is an academic discipline and applied art whose activity consists in projecting visual communications intended to transmit specific messages to social groups, with specific objectives. Graphic design is an interdisciplinary branch of design and of the fine arts.
- This specialty provides the knowledge, skills and abilities to execute the installation, configuration, monitoring and diagnosis, with the purpose of protecting the assets stored and transported by information systems, through the treatment of threats that put them at risk, applying solutions defense and response to incidents with the purpose of protecting the organization's computer assets, according to national and international legislation and current security policies.
- Its purpose is to train mid-level technicians in the commercial and services area to support the administrative, communication and logistics tasks of companies, organizations and public or private institutions, whether national or international.
Down
- It is responsible for the study, analysis and orientation of the economic resources of an institution, with the objective of evaluating the financial implications of certain business activities.
- It is a part of the technology that is responsible for the development and administration of computer projects, relevant to the organization of systems, finances and resources in a company, which allows optimizing access and systematization of information.
5 Clues: It is responsible for the study, analysis and orientation of the economic resources of an institution, with the objective of evaluating the financial implications of certain business activities. • ...
Practice Cybersecurity Terminology Puzzle 2024-08-30
Techology Crossword Puzzle 2016-08-09
Across
- Bluetooth is a wireless communications technology intended to replace cables. It allows short-range connections between two or more Bluetooth-compatible devices such as mobile phones, tablets, headsets or medical equipment.
- symmetric digital subscriber line (ADSL) is a type of digital subscriber line (DSL) broadband technology that is used to connect to the Internet. It uses standard telephone lines to deliver high-speed data communications (up to 24 megabytes per second).
- any type of illegal activity that is undertaken (or relies heavily) on a computer.
- a set of symbols inserted into files intended for display on the world wide web. The symbols tell web browsers how to display words and images - e.g. which colour, font and type size to use - and they direct it to link to other pages on the world wide web via hyperlinks.
- a computer that handles requests for data, email, file transfers, and other network services from other computers.
- the process of converting electronic data to an unrecognisable or encrypted form, one that cannot be easily understood by unauthorised parties.
- unsolicited email messages sent for marketing purposes.
- A bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte.
Down
- a barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
- A software program that allows you to surf the web. Popular web browsers include Google Chrome, Mozilla Firefox, Microsoft Edge and Internet Explorer.
- Bandwidth refers to the maximum amount of data that can travel a communications path in a given time, usually measured in seconds.
- refers to measures designed to protect your computer, device or network from cybercrime. This involves preventing unintended and unauthorised access, change and damage.
- usually referred to as a computer's "memory" - it stores information used by programs. Generally, the larger your computer's RAM, the more programs it can run at once without slowing down.
- is a device that allows computers to transmit information to each other via ordinary telephone lines.
- a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company, such as a bank or an email service provider. These emails aim to lure recipients to reveal confidential information that the perpetrator can use for their financial advantage - for example, online banking log-in details and passwords.
15 Clues: unsolicited email messages sent for marketing purposes. • any type of illegal activity that is undertaken (or relies heavily) on a computer. • is a device that allows computers to transmit information to each other via ordinary telephone lines. • A bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte. • ...
Techology Crossword Puzzle 2016-08-09
Across
- unsolicited email messages sent for marketing purposes.
- a barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet.
- a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company, such as a bank or an email service provider. These emails aim to lure recipients to reveal confidential information that the perpetrator can use for their financial advantage - for example, online banking log-in details and passwords.
- A software program that allows you to surf the web. Popular web browsers include Google Chrome, Mozilla Firefox, Microsoft Edge and Internet Explorer.
- refers to measures designed to protect your computer, device or network from cybercrime. This involves preventing unintended and unauthorised access, change and damage.
- is a device that allows computers to transmit information to each other via ordinary telephone lines.
- the process of converting electronic data to an unrecognisable or encrypted form, one that cannot be easily understood by unauthorised parties.
Down
- a computer that handles requests for data, email, file transfers, and other network services from other computers.
- a set of symbols inserted into files intended for display on the world wide web. The symbols tell web browsers how to display words and images - e.g. which colour, font and type size to use - and they direct it to link to other pages on the world wide web via hyperlinks.
- A bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte.
- Bandwidth refers to the maximum amount of data that can travel a communications path in a given time, usually measured in seconds.
- any type of illegal activity that is undertaken (or relies heavily) on a computer.
- symmetric digital subscriber line (ADSL) is a type of digital subscriber line (DSL) broadband technology that is used to connect to the Internet. It uses standard telephone lines to deliver high-speed data communications (up to 24 megabytes per second).
- Bluetooth is a wireless communications technology intended to replace cables. It allows short-range connections between two or more Bluetooth-compatible devices such as mobile phones, tablets, headsets or medical equipment.
- usually referred to as a computer's "memory" - it stores information used by programs. Generally, the larger your computer's RAM, the more programs it can run at once without slowing down.
15 Clues: unsolicited email messages sent for marketing purposes. • any type of illegal activity that is undertaken (or relies heavily) on a computer. • is a device that allows computers to transmit information to each other via ordinary telephone lines. • A bit (short for binary digit) is the smallest unit of measurement in computing. 8 bits make up 1 byte. • ...
Literasi Digital 2024-08-19
Across
- Tindakan penipuan yang mencoba mencuri informasi pribadi secara online.
- Lapisan keamanan tambahan untuk mengakses akun digital.
- Komputer portabel yang sering digunakan di sekolah dan universitas.
- Proses mengunduh file dari internet ke perangkat komputer.
- Program yang menjalankan fungsi tertentu di komputer.
- Mesin pencari yang paling populer untuk mencari informasi di internet.
- Teknologi yang memungkinkan komunikasi visual secara real-time melalui internet.
- Kode yang dapat dipindai oleh perangkat mobile untuk mengakses informasi.
- Proses membuat salinan data untuk melindungi dari kehilangan.
- Teknologi yang memungkinkan perangkat terhubung ke internet tanpa kabel.
- Aplikasi yang digunakan untuk menjelajahi internet.
- Aplikasi yang diunduh dan digunakan pada perangkat mobile atau komputer.
- Platform online yang digunakan untuk menulis dan membagikan artikel.
- Kejahatan yang dilakukan melalui atau terhadap sistem komputer.
- Praktik melindungi komputer dan jaringan dari serangan digital.
- Media yang digunakan untuk mengakses informasi digital.
- Teknik pengamanan data dengan cara mengubahnya menjadi kode.
- Menonton atau mendengarkan konten media langsung dari internet tanpa mengunduhnya.
- Sistem keamanan yang melindungi jaringan komputer dari akses tidak sah.
- Perangkat mobile yang digunakan untuk berbagai aktivitas digital.
- Konten audio digital yang tersedia untuk diunduh atau streaming.
- Tindakan menyalin karya orang lain dan mengklaimnya sebagai karya sendiri di dunia digital.
- Layanan penyimpanan data secara online.
- Tanda tangan elektronik yang digunakan untuk memverifikasi identitas.
- Orang yang mencoba meretas atau mengakses sistem komputer tanpa izin.
- Perangkat lunak yang melindungi komputer dari virus.
- Perpustakaan online yang menyediakan akses ke buku dan sumber daya digital.
Down
- Kombinasi tombol yang digunakan untuk menjalankan perintah di komputer.
- Jejak informasi yang ditinggalkan pengguna di internet.
- Proses mengirimkan file dari komputer ke server di internet.
- Ruang kelas digital yang digunakan untuk pembelajaran online.
- Metode pembelajaran yang dilakukan melalui platform digital.
- Kemampuan menggunakan teknologi digital secara efektif dan etis.
- Buku dalam format digital yang dapat dibaca di perangkat elektronik.
- Kemampuan untuk menggunakan teknologi digital dengan efektif dan etis.
- Teknologi yang membuat mesin dapat melakukan tugas yang memerlukan kecerdasan manusia.
- Kode keamanan yang digunakan untuk melindungi akun digital.
- Proses menulis program komputer dalam bahasa pemrograman.
- Alat yang digunakan untuk mencari informasi di internet.
- Singkatan dari Internet Service Provider, penyedia layanan internet.
- Tes yang dilakukan secara digital untuk menguji pengetahuan.
- Tindakan intimidasi atau pelecehan melalui media digital.
- Alat input utama yang digunakan untuk mengetik di komputer.
- Kesenjangan akses terhadap teknologi digital di antara berbagai kelompok masyarakat.
- Singkatan dari Internet of Things, teknologi yang menghubungkan perangkat fisik ke internet.
- Etika yang mengatur perilaku pengguna di dunia digital.
- Platform online untuk berinteraksi dan berbagi informasi dengan orang lain.
- Informasi yang disimpan atau diproses oleh komputer.
- Nama pengguna yang digunakan untuk mengakses akun digital.
- Halaman digital yang menyediakan informasi di internet.
- Sarana komunikasi digital yang menggunakan surat elektronik.
51 Clues: Layanan penyimpanan data secara online. • Aplikasi yang digunakan untuk menjelajahi internet. • Informasi yang disimpan atau diproses oleh komputer. • Perangkat lunak yang melindungi komputer dari virus. • Program yang menjalankan fungsi tertentu di komputer. • Jejak informasi yang ditinggalkan pengguna di internet. • ...
Technology Terms 2023-08-16
Across
- A point within a network that interconnects with other networks
- currently connected to a network or to the Internet.
- A set of interconnected networks that allow computers in different locations to exchange information. The Internet includes services such as the world wide web, electronic mail, file transfer protocol (FTP), chat and remote access to networks and computers
- refers to unsolicited email messages sent for marketing purposes
- A piece of code or data created by a web server and stored on a user's computer.
- a standard or set of rules that computers and other devices use when communicating with one another.
- A measure of computer processor storage and real and virtual memory
- a microprocessor that performs many functions and calculations that make your computer run
- refers to a software program that has been developed to do harm to other computers.
- the most common way of connecting computers on a network with a wired connection.
- a way of sending messages over the internet.
- a saved link to a particular Web page
- the method by which users access and save or "pull down" software or other files to their own computers from a remote computer via the Internet
- o load and initialize the operating system on a computer
- A software program that allows you to surf the web
- a type of email fraud in which the perpetrator sends out emails that appear to come from a legitimate service or reputable company, such as a bank or an email service provider
Down
- the number of distinct pixels that make up the display on a computer monitor. It is denoted in DPI (dots per inch)
- a website's text and information, as opposed to its design and structure
- measures designed to protect your computer, device or network from cybercrime
- the smallest unit of measurement in computing
- a device that allows computers to transmit information to each other via ordinary telephone lines
- the maximum amount of data that can travel a communications path in a given time
- the brains of your computer. It is responsible for performing calculations and tasks that make programs work
- he reduction of the size of a file
- a barrier that acts as a security system to protect trusted computer systems and networks from outside connections and untrusted networks, such as the Internet
- to archive and compress them into one file of smaller size using a program
- a piece of programming code inserted into other programming to cause damage
- the process of converting electronic data to an unrecognizable or encrypted form, one that cannot be easily understood by unauthorized parties
- a set of computers on a network that are managed as a unit
- a computer that handles requests for data, email, file transfers, and other network services from other computers.
- a technology that allows computers and other devices to communicate via a wireless signal
31 Clues: he reduction of the size of a file • a saved link to a particular Web page • a way of sending messages over the internet. • the smallest unit of measurement in computing • A software program that allows you to surf the web • currently connected to a network or to the Internet. • o load and initialize the operating system on a computer • ...
ARIZONA 2024-12-13
Across
- Where Baba and Steve may have dealt with acne and proms
- Baba's term for an "easy" run
- Name said after "there she goes..."
- A nepotistic job opportunity, or place for some caffeine
- Name of a boyfriend, alarmingly similar to a sister
- Something Asy kissed, which may have become overly attached
- Global phenomenon experienced in AZ last time we were here
- Recent obsession of Scout and Maia
- A familiar home, or a source of bad cybersecurity
- Something Asy, Chloe, and Maia used to terrorize Laurelhurst boys with
- A GENErational skill, that could be used to find our DNA
- Word that sounds like the beginning of our surname
- Fatherly Doppelganger
- What flew across the car in a dramatic sister feud
- Something all the sisters do at the same time, which may wreak havoc
- Maia's old timey obsession, which used to be an ancient profession
- Bad habit manicure for two Weisenhaus'
- Maia's color choice to embarrass Steve at a mall circa 2016
- Scout's arm-candy, of late
- Baba's newest isolated household experiment
- Where Baba spent his days in College, and developed his morbid sense of humor
- What Chloe can’t help but do during a cordial vball game
- What Steve may be the only Weisenhaus to do...
- A term coined for not our finest moments
- The sisters ye old debut
- A familiar pet, or something a dangerous outlet may be.
- Saavedra blush perpetrator?
- Last name of Baba's Halloween costume, two years in a row
Down
- What Baba calls the older sisters
- The most infamous man Maia has mansplained to
- What Baba may say while enjoying his morning coffee, perhaps
- Word that sounds like the end of our surname
- Scout's favorite youtube channel
- Name of a literary mouse that inspired Scout
- Surname of the longest-standing honorary family member
- Baba, to the deli workers
- Steve and Baba's favorite place when living luxuriously
- A type of soup that had all the right ingredients for us.
- Something tiny with a menacing name that Scout and Baba were on the hunt for.
- Diana, or someone Steve spoils rotten
- A happy discovery for a science-minded Scout, embarrassing in all other ways
- Something used as a hair mask during a lice infestation, in short
- The only thing Chloe ever wants to watch, starring the answer to 22 across
- Potentially immortal segment of DNA
- Something smelly in a can, or a joke about boys on Hinge
- Something Asy kissed with fantastical aspirations (and an unfortunate reality)
- Thing that may be found in Baba's pockets on a ridge walk
- A place to think, completed by one
- What three of the four have
49 Clues: Fatherly Doppelganger • The sisters ye old debut • Baba, to the deli workers • Scout's arm-candy, of late • What three of the four have • Saavedra blush perpetrator? • Baba's term for an "easy" run • Scout's favorite youtube channel • What Baba calls the older sisters • Recent obsession of Scout and Maia • A place to think, completed by one • Name said after "there she goes..." • ...
CONSUMER,PRODUCER AND MARKET EFFICIENCY 2024-09-22
Across
- - individual or organization that purchases goods or services from a business.
- - consumer categorized on bying habits and preferences
- - someone who actively seeks out deals, discounts, and lower prices on goods and services.
- - describes the limited availability of resources in relation to unlimited wants.
- - something that induces a person to act
- - refers to how often a customer makes a purchase from a particular business or for a specific product or service.
- - difference between the maximum price a consumer is willing to pay for a good and the actual price they pay.
- - system where the prices of goods and services are determined by supply and demand, with minimal government intervention.
- - is an individual who demands goods and services for personal use and not for resale.
- the rise of online shopping and digital transactions,consumers are increasingly at risk of identity theft and data breaches.
- -Inflation and economic uncertainties can make it difficult for
- - refers to the optimal use of resources to produce the maximum output with the least amount of waste.
- - elve into the psychological aspects of a population, offering insights into their motivations, values, beliefs, and lifestyles.
- - people wants easy access on the internet rather than the traditional shopping.
- increase in the genral level of prices
Down
- - It reflects the value a consumer places on that product or service, considering factors like perceived benefits, affordability, and availability of alternatives.
- - refers to the fair and just treatment of all individuals, regardless of their differences.
- - a group of buyers and sellers
- - statistical characteristics of a population, used to understand and describe its composition.
- - is a strong preference for a particular brand over its competitors, leading to repeat purchases and advocacy for the brand.
- - customers who make purchasing decisions primarily based on their essential needs rather than wants or desires.
- - a curve that shows the short- run tradeoff between inflation and unemployment.
- - allocates resources through the decentralized decisions of many households and firms as they interact in markets.
- - branch of economics that studies how the allocation of resources affects the well-being of individuals in a society.
- -Shoppers browsing products and services with no specific purchasing goal in place.
- to afford basic necessities and maintain their desired lifestyle.
- - refer to fairness, ownership, or financial value.
- - the impact of one person's actions on the well-being of a bystander
- whatever must be given up to obtain some item
- - refers to a company's ability to influence the price of a good or service in the marketplace by manipulating supply, demand, or both.
30 Clues: - a group of buyers and sellers • increase in the genral level of prices • - something that induces a person to act • whatever must be given up to obtain some item • - refer to fairness, ownership, or financial value. • - consumer categorized on bying habits and preferences • -Inflation and economic uncertainties can make it difficult for • ...
Cyber Crossword 2022-09-12
Across
- Customizable additions to software for extra functionality.
- The act of taking advantage of human trust to gain access to private information. This can be done as easily as calling a number and asking for it.
- A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
- A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- A form of malware used to threaten victims by blocking, publishing, or corrupting their data unless the ransom is paid.
- The way in which the identity of a user is confirmed.
- Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior. Often used to disable firewall or anti-malware software while consuming CPU activity to increase an endpoint’s vulnerability to attack.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
Down
- A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server. This is used to identify the user or track their access to the server. Initially, cookies were used to stay logged in but are now commonly used for tracking.
- Text that can be read by the human eye
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto.
- Programs that automatically execute tasks as ordered by the creator of the program that has infected them.
- An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
- A strategy that is in place to manage upgrades for software applications.
- A simple form of code for software that can be written in word editors.
- The programs and other operating systems used by a computer.
- A secret word or phrase that is used to access a computer system or service.
- Also known as an Internet Protocol address, is the string of numbers used to identify each computer using the internet on a network.
- A service from Google that works to protect websites from spam and abuse caused by robots. A user is presented with a Turing test to distinguish them from a robot.
23 Clues: Text that can be read by the human eye • The way in which the identity of a user is confirmed. • Customizable additions to software for extra functionality. • The programs and other operating systems used by a computer. • Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto. • ...
Cyber Crossword 2022-09-12
Across
- Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto.
- Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
- A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server. This is used to identify the user or track their access to the server. Initially, cookies were used to stay logged in but are now commonly used for tracking.
- Customizable additions to software for extra functionality.
- A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
- A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior. Often used to disable firewall or anti-malware software while consuming CPU activity to increase an endpoint’s vulnerability to attack.
- A service from Google that works to protect websites from spam and abuse caused by robots. A user is presented with a Turing test to distinguish them from a robot.
- Text that can be read by the human eye
- A form of malware used to threaten victims by blocking, publishing, or corrupting their data unless the ransom is paid.
- The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
Down
- The programs and other operating systems used by a computer.
- A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- Programs that automatically execute tasks as ordered by the creator of the program that has infected them.
- Also known as an Internet Protocol address, is the string of numbers used to identify each computer using the internet on a network.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- The act of taking advantage of human trust to gain access to private information. This can be done as easily as calling a number and asking for it.
- The way in which the identity of a user is confirmed.
- A simple form of code for software that can be written in word editors.
- An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- A strategy that is in place to manage upgrades for software applications.
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- A secret word or phrase that is used to access a computer system or service.
23 Clues: Text that can be read by the human eye • The way in which the identity of a user is confirmed. • Customizable additions to software for extra functionality. • The programs and other operating systems used by a computer. • Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto. • ...
The World of Technology 2026-02-28
Across
- Transfer of data from a remote system to a local device.
- Security system that monitors and controls incoming and outgoing network traffic.
- Protection of systems and data from digital attacks and unauthorized access.
- Identification method based on unique physical characteristics.
- Process of identifying and correcting errors in code.
- Organized collection of structured information stored electronically.
- Set of rules governing data transmission between devices.
- Powerful computer that provides resources or services to other devices.
- Electronic machine that processes data according to programmed instructions.
- Decentralized ledger that records transactions across many computers.
- Malicious software designed to damage or disrupt systems.
- Programs and digital instructions that control operations of electronic devices.
- Program that translates high-level instructions into machine language.
- Continuous transmission of audio or video content over a network.
- Remote servers used for storing and processing information via the internet.
- Maximum data transfer capacity of a network connection.
- Orbiting device used for communication and data transmission.
- Engineering at an extremely small molecular scale.
- Portable multifunctional device combining communication and computing features.
- Digital representation of a user in virtual environments.
- Main circuit board that connects internal components.
- Device that detects changes in the environment.
- Science of securing information through complex mathematical techniques.
Down
- Physical components of electronic equipment that can be touched.
- Step-by-step procedure designed to solve a problem or perform a task.
- Term describing technology that imitates human intelligence.
- Transfer of data from a local device to a remote system.
- Method of converting information into coded form to prevent unauthorized access.
- Point of interaction between a user and a system.
- Self-replicating malicious program that spreads between devices.
- Wireless technology for short-range communication between devices.
- Add-on component that extends software functionality.
- Central unit that executes instructions in a computer.
- Field focused on design and operation of programmable machines.
- Pre-built structure that supports development of applications.
- Digital environment where applications or services operate.
- Display that detects and responds to finger contact.
- Ability of a system to learn, reason, and make decisions.
- Device that stores electrical energy for portable use.
- Digital imitation of real-world processes or systems.
- Describing something simulated by digital systems rather than physically existing.
- Application used to access and navigate websites.
- Wireless networking technology allowing devices to connect without cables.
- Use of technology to perform tasks without human involvement.
- Field of computing based on principles of subatomic physics.
- Connected system of devices that share resources and information.
- Shared immersive digital space combining virtual worlds and social interaction.
- Permanent software programmed into hardware components.
- Global system of interconnected networks enabling communication and information exchange.
- State of existing physically or being simulated in immersive digital environments.
50 Clues: Device that detects changes in the environment. • Point of interaction between a user and a system. • Application used to access and navigate websites. • Engineering at an extremely small molecular scale. • Display that detects and responds to finger contact. • Process of identifying and correcting errors in code. • ...
FITDVocab.AGE 2013-05-15
Across
- A single unit of information
- Equal to 1,048,576 bytes
- Rules and behaviors to keep you and your computer safe
- Services over a network by a collection of servers
- A hardware input controller
- A device, connected to a computer
- CPU
- The organization according to present specifications
- VDU
- PDF, A file format developed by Adobe Systems to allow for display and printing of formatted documents across platforms and systems
- Encoding computer instructions
- An affirmation a person takes before undertaking the duties of an office
- LED
- Something fed into a process of affecting the outputs
- A set of structured activities
- A dedicated computer set up for one or more purposes and links electronics together
- A file extension used for Microsoft Word 97-2003 documents-identifying the type of a program used to create it
- A tool that sends user request to other search engines
- A place where you can edit with color, font, and size
- An internet service that allows individuals to make their own website
- A brief written account of personal, educational, and professional qualifications and experience, as that prepared by an applicant for a job
Down
- Data equal to either 7/8 bits
- An object on a computer that stores data
- A printed circuit that's the foundation of the computer
- The way a computer reads text
- Something you download on a computer to perform functions
- The ability to work with another program or hardware device
- A program for the retrieval of data
- Equal to 1,073,741,824 bytes
- Slots that allows additional boards to be connected to the motherboard
- A port connection that allows a computer to connect to a network using a weird connection
- LCD
- The graphic of the size, shape, and arrangement of parts of a product
- The way you behave online
- A device that's easily portable
- RAM, short term memory
- Protection of your information and networks
- A cloud based presentation software that opens up a new world between whiteboards and slides
- A software program that enables the computer hardware to communicate
- A device that encodes digital computer signals into analogue (aka a tool that sends and receives data)
- Any storage media that holds content in digital format
- Data sent out of the computer
- A formal beginning or introduction into office
- The computer's main storage media device
- A standardized performated layout
- A means for users to control or operate the computer
- A combining form meaning computer used in the formation of compound words and by extension meaning very modern
- Equal to 1,024 bytes
- A quotation from or reference to a book
- a hands free communicating device
50 Clues: LCD • CPU • VDU • LED • Equal to 1,024 bytes • RAM, short term memory • Equal to 1,048,576 bytes • The way you behave online • A hardware input controller • A single unit of information • Equal to 1,073,741,824 bytes • Data equal to either 7/8 bits • The way a computer reads text • Data sent out of the computer • Encoding computer instructions • A set of structured activities • ...
technological terms 2023-06-09
Across
- it is a collection of discrete values that convey information, describing the quantity, quality, fact, statistics, other basic units of meaning, or simply sequences of symbols that may be further interpreted.
- it is a hardware or software component that stores data so that future requests for that data can be served faster
- it is a file format developed by Adobe in 1992 to present documents, including text formatting and images, in a manner independent of application software, hardware, and operating systems.
- it is a method of transmitting and receiving messages using electronic devices.
- a American multinational technology company headquartered in Cupertino, California.
- it is a form of computer memory that can be read and changed in any order, typically used to store working data and machine code.
- they are small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser.
- a mapping from some domain (for example, a range of integers) to bits.
- it is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.
Down
- a mobile operating system based on a modified version of the Linux kernel and other open-source software
- a method of representing data in a visual, machine-readable form. Initially, barcodes represented data by varying the widths, spacings and sizes of parallel lines
- it is a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data
- it is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy.
- it is a digital multimedia container format most commonly used to store video and audio
- it is the most important processor in a given computer. Its electronic circuitry executes instructions of a computer program, such as arithmetic, logic, controlling, and input/output (I/O) operations.
- it represents text, computer processor instructions, or any other data using a two-symbol system.
- it is a coding format for digital audio developed largely by the Fraunhofer Society in Germany
- it is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs
- it is a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography
- it is a bitmap image format that was developed by a team at the online services provider CompuServe led by American computer scientist Steve Wilhite and released on June 15, 1987
20 Clues: a mapping from some domain (for example, a range of integers) to bits. • it is a method of transmitting and receiving messages using electronic devices. • a American multinational technology company headquartered in Cupertino, California. • it is a digital multimedia container format most commonly used to store video and audio • ...
choice board column b 2022-12-12
Across
- (Internet of Things)things”—that are embedded with sensors, software, and other technologies for the ...
- video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.
- the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- a type of intellectual property that protects original works of authorship as soon as an author fixes the work in a tangible form of expression.
- theft the fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
- the act of stealing software that is legally protected. This stealing includes copying, distributing, modifying or selling ...
- or digital citizenship Digital citizenship refers to the ability to think critically, behave safely, and participate responsibly in our digital world.
- websites and applications that enable users to create and share content or to participate in social networking.
- a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system
- a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants
- Use the right to use a copyrighted work under certain conditions without permission of the copyright owner. Firewall a fire-resistant barrier used to prevent the spread of fire. Firewalls are built between or through buildings, structures, or electrical ...
- footprint refers to the trail of data you leave when using the internet.
- Trafficking Traffickers increasingly use internet technologies to advertise the services resulting from their victims' ex- ploitation
- is a type of malware that attaches to another program (like a document), which can replicate and spread after a person first runs it on their ...
Down
- Hat Hacker: is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks.
- the correct or acceptable way of communicating on the internet
- an internationally active non-profit organisation that provides free licences for creators to use when making their work available to the public.
- the pratice of deploying people
- Intelligence is intelligence—perceiving, synthesizing, and inferring information—demonstrated by machines, as opposed to intelligence .
- the practice of attacking and robbing ships at sea.
- wide web s an information system enabling documents and other web resources to be accessed over the Internet.
- technologies that are currently developing, or that are expected to be available within the next five to ten years,
- a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
- presenting someone else's work or ideas as your own, with or without their consent, by incorporating it into your work without full acknowledgement
- . The application of science to the identification, collection, examination, and analysis, of data
25 Clues: the pratice of deploying people • the practice of attacking and robbing ships at sea. • the correct or acceptable way of communicating on the internet • footprint refers to the trail of data you leave when using the internet. • . The application of science to the identification, collection, examination, and analysis, of data • ...
Cyber Crossword 2022-09-12
Across
- Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto.
- Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
- A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server. This is used to identify the user or track their access to the server. Initially, cookies were used to stay logged in but are now commonly used for tracking.
- Customizable additions to software for extra functionality.
- A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
- A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior. Often used to disable firewall or anti-malware software while consuming CPU activity to increase an endpoint’s vulnerability to attack.
- A service from Google that works to protect websites from spam and abuse caused by robots. A user is presented with a Turing test to distinguish them from a robot.
- Text that can be read by the human eye
- A form of malware used to threaten victims by blocking, publishing, or corrupting their data unless the ransom is paid.
- The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
Down
- The programs and other operating systems used by a computer.
- A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- Programs that automatically execute tasks as ordered by the creator of the program that has infected them.
- Also known as an Internet Protocol address, is the string of numbers used to identify each computer using the internet on a network.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- The act of taking advantage of human trust to gain access to private information. This can be done as easily as calling a number and asking for it.
- The way in which the identity of a user is confirmed.
- A simple form of code for software that can be written in word editors.
- An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- A strategy that is in place to manage upgrades for software applications.
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- A secret word or phrase that is used to access a computer system or service.
23 Clues: Text that can be read by the human eye • The way in which the identity of a user is confirmed. • Customizable additions to software for extra functionality. • The programs and other operating systems used by a computer. • Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto. • ...
FITDVocab.NRL 2013-05-14
Across
- the act of giving credit to an author(etc.)
- a giant "flash drive" that allows you save lots of things
- Selection of drawing and editing tools
- central printed circuit board
- a program that allows you to search the web for information
- led
- a web-based presentation application and storytelling tool that uses a single canvas instead of traditional slides
- a search engine that searches all the best search engines at once
- a promise a person says before going into office
- indication that a product meets a specific standard
- a pocket sized device that can go on the internet
- a website that educates the public to use the web safely
- a person you call to fix your internet,also known as ISP
- lcd
- a computer data file
- a place to put CDs in your computer
- encoded computer instructions usually modifiable.
- port a place where you can plug in your mouse and keyboard
- WIFI
- ten bits
- formal beginning/introduction to office
- 1000 megabytes
- A single character in a numbering system
- to set up a program and allow it to run on a particular computer or application
- to steal someone else's work and claim it as your own
- measures taken to protect a computer against unauthorized access or attack
- to turn your computer on, and get it going
- form all about your experiences that you turn in when applying for a job
Down
- a tool that sends and receives to create a network
- rules and behaviors to keep you and you computer safe
- eternal wiring of the computer
- the smallest size of storage on a computer
- file extension that is associated with word pad and or other word processors
- extra slots to have lots of things plugged into the computer
- things on your computer such as games
- RTF
- things you download onto the computer, such as firefox
- 1000 bytes
- a computer that can work without wires
- the overal layout of a document
- a company's picture or image you think of when you think of that company
- CPU
- VDU
- 100 gigabytes
- RAM
- a device that you plug into the computer
- a place where you plug in hearing tools
- port a place where you plug in a cord to make you have internet
- the way you behave online
- the overall appearance of a document, image, text, or other medium
- port a place where you plug in peripherals
- a program that allows a user to interact with the computer or another computer over a network
- data sent from a computer
- 1000 kilobytes
- "just do it"
- something that goes into a computer
57 Clues: RTF • PDF • led • CPU • VDU • RAM • lcd • WIFI • ten bits • 1000 bytes • "just do it" • 100 gigabytes • 1000 megabytes • 1000 kilobytes • a computer data file • the way you behave online • data sent from a computer • central printed circuit board • eternal wiring of the computer • the overal layout of a document • a place to put CDs in your computer • something that goes into a computer • ...
CIC Presidents Institute 2024 2023-12-18
Across
- Springfield Ohio institution that is also a large university town in Germany
- Educational psychologist who came up with the 2 sigma problem
- HBCU Tigers located in South Carolina
- The New York Times deemed 2012 the Year of the _____
- Whatever It Is, _______
- Rudy, the Notre Dame football player featured in an eponymous movie, started college here
- Secretary of Education
- Higher Education Act was signed by this president, for short
- A circle in DC where you can find CIC
- Kentucky institution that shares a name with a famous WWII naval battle in the Pacific Theater
- 100th anniversay celebration, or the start of 2 CIC institutions
- Two colleges in WV & KS share this name...and another in MN starts with it
- Combination of face-to-face and online
- Airport code for the 2023 Presidents Institute
- CIC Institution formely led by Marjorie Hass
- A way to recognize achievements and skills at a more granular level than a college degree
- What you might do to an electronic device or your tuition
- Network linking manufacturers, distributors, and retailers in product distribution
- Ohio college that shares a title with a Thomas Piketty economics book
- Credential management platform acquired by Instructure
- Educational model where seat-time is variable & learning is fixed, for short
- SoCal city where you will find the ASU+GSV conference
- Higher Ed Podcast co-hosted by Michael Horn and Jeff Selingo
- Student loan forgiveness act shut down by the Supreme Court
- Women's college in Allentown, PA
- Western PA institution with 2 presidents in its name, for short
Down
- Arkansas institution that shares a name with a famous guitarist
- Former CIC President
- Religious university system has 6 siblings, including one within a twin city
- A CIC Inclusive Learning Community with over 60 members
- Where the Majors of Millsaps roam in the heart of this state capital
- PA college's name means "Heart of Mercy" in Latin
- _____ Land Grant Acts
- Acronym often associated with the economic value of a degree
- ____ Matters, a framework for the design and delivery of online courses
- Carleton author who predicted an impending cliff
- So. Florida university that hosted a 2012 presidential debate
- Serpentine language taught on college campuses
- CIP Code 11.1003 or a producer of digital protectors
- Common name inclusion for a Methodist institution
- New NCAA President
- Michigan college that shares a name with Rocky Balboa's spouse
- The Great ______, a book published in 2021
- The X in UX Design
- A group of colleges working together
- HBS Professor known for work on Disruptive Innovation
- Most common college mascot name
- AI language model developed by OpenAI, capable of generating human-like text
48 Clues: New NCAA President • The X in UX Design • Former CIC President • _____ Land Grant Acts • Secretary of Education • Whatever It Is, _______ • Most common college mascot name • Women's college in Allentown, PA • A group of colleges working together • HBCU Tigers located in South Carolina • A circle in DC where you can find CIC • Combination of face-to-face and online • ...
WRS 15 & 16 - DA Puzzle 2023-12-01
Across
- data converted into a meaningful and useful context
- malware disguised as a trusted source that convinces the user to open a link or an attachment and install itself.
- using the Internet for anything other than work tasks
- includes viruses and ransomware running on your device which can take over the operation of your device or quietly watch your operations and keystrokes and steal confidential information from your network; usually requires the user to initiate by unwittingly installing the malicious software
- the level one exposes one's self or professional network to unethical intentions (e.g., end-user attacks, server-side attacks)
- pretending to be someone you trust or a system you work with, to get you to visit a fictitious site and enter your login or other private info
- to support with evidence or authority; to make more certain
- a particular preference or point of view that is personal, rather than scientific.
- malware that accesses or controls a device without being detected
- a type of virus that does not rely on users to copy and spread but can replicate itself, once inside a network/system
- something that furnishes proof
- the protection of information systems against unauthorized access (e.g., hacking, identity theft)
- believable; reliable
- a flaw or weakness that allows a threat agent to bypass security
- a formal document with which many organizations require employees to comply, addressing the separation of personal and workplace use of the Internet, email etiquette, and security measures and safeguards that employees must obey.
- using online services and social networking ethically, by being a good online citizen, by adhering to privacy and safety guidelines, and by facilitating thoughtful and considerate communication with others
- a website that allows people of similar interests to interact and exchange information that is typically personal
Down
- the ability to figure out the type of information you need, find that information, evaluate it, and properly use it
- connected with or related to the matter at hand
- unbiased; neutral
- using the Internet, ethically, for work-related tasks
- a server-side attack that allows hackers to be able to target vulnerabilities on any site you use to login, then they apply that same login information to other major consumer sites to see if you reused your login and password
- unethical and often unnoticed attacks by others in the public sphere when operating online (e.g., malware, phishing, Trojan horse, virus, worm, spam, rootkit)
- the unethical distribution of mass digital messages. This is the main way that malware is opened and spread
- cyber attack that targets the server side to get customer information from the database, such as credit card numbers
- book, article, person, or other resource consulted for information.
- examine and judge carefully
- attacks focused on the workplace Network workers access.
- malware that spreads by users from an infected device to the rest of the devices on a network/system
29 Clues: unbiased; neutral • believable; reliable • examine and judge carefully • something that furnishes proof • connected with or related to the matter at hand • data converted into a meaningful and useful context • using the Internet, ethically, for work-related tasks • using the Internet for anything other than work tasks • ...
Human Dignity in the Age of AI: Crossword 2025-02-21
Across
- Founder of the AZ Institute for Education and the Economy, studying AI in schools
- The demand for AI systems to clarify their decision-making process
- The Jesuit practice of thoughtful reflection applied to AI ethics
- Microsoft AI Ambassador and Summit keynote speaker on AI regulation
- The core theme of the 2025 Brophy Summit, exploring how AI affects our inherent worth
- A key principle in AI ethics ensuring that AI decisions can be understood by humans
- AI-powered monitoring that raises concerns about security and human rights
- The push for responsible and fair AI development to prevent harm
- The Jesuit approach to faith and discernment, guiding ethical engagement with AI
- The final day of the Summit, where Brophy reflects on human dignity in the age of AI
- AI-driven technology that overlays digital information onto the real world
- AI that creates new content, such as images, text, or videos
- The fundamental concern about AI collecting and using personal data without consent
- A test developed by Alan Turing to determine if AI can exhibit human-like intelligence
- The AI tool that asks, "How can I help you?" and sparks discussions on AI and human dignity
- The effect of emergent technologies replacing jobs and restructuring workplaces
- Step-by-step procedures or rules guiding AI decision-making
- AI technique involving artificial neural networks for complex pattern recognition
- Sessions where students engage with AI experts, industry leaders, and ethicists
- Jesuit priest overseeing digital spirituality formation for novices in India
- A day dedicated to watching and analyzing AI-related films
Down
- AI-powered technology used to identify people by facial features
- The use of AI to detect and remove harmful or misleading online content
- AI-generated content that manipulates reality and spreads misinformation
- The importance of educating people about AI to ensure responsible use
- A type of AI inspired by the structure of the human brain for deep learning
- The gap between those who have access to AI and emerging technology and those who don’t
- The debate about whether AI systems should be held accountable for their actions
- AI-based system designed to interact with users, such as Siri or Alexa
- The field of study addressing the moral implications of artificial intelligence
- The AI learning platform Brophy students and teachers use for education and exploration
- The ethical concern where AI algorithms may unfairly favor certain groups
- AI systems capable of making decisions without direct human input
- Mathematical rules defining AI's ability to mimic human-like intelligence
- AI technique that enables systems to learn patterns and improve from experience
- Jesuit scholar directing the Seminar on Religion and Technology at Gonzaga University
- ASU researcher studying AI's impact on governance, community, and culture
- The practice of protecting systems and data from AI-driven threats and hacking
38 Clues: A day dedicated to watching and analyzing AI-related films • Step-by-step procedures or rules guiding AI decision-making • AI that creates new content, such as images, text, or videos • AI-powered technology used to identify people by facial features • The push for responsible and fair AI development to prevent harm • ...
Computer Glossary 2025-08-28
Across
- A saved link to a specific webpage for easy access later.
- Storage: Online storage services that allow users to save and access files from the internet, such as Google Drive or Dropbox.
- The standard or preset setting or option that is automatically used if no alternative is chosen.
- (Central Processing Unit): The brain of the computer responsible for executing instructions and calculations.
- Environment: The visual and functional elements of a computer's desktop, including icons, wallpaper, and menus.
- The process of verifying the identity of a user or system, often with a username and password.
- The process of converting data into a code to prevent unauthorized access.
- A step-by-step set of instructions for solving a specific problem or task, often used in programming.
- The main screen where icons, folders, and files are displayed on a computer.
- A temporary storage location that stores frequently used data for quicker access.
- Creating copies of important data to prevent data loss in case of hardware failure.
- Electronic mail used for sending and receiving messages over the internet.
- A record of websites a user has visited on their web browser.
- The part of a domain name that follows the "dot," indicating the type of organization or country, e.g., .com, .org, .in.
- A website where individuals or groups post regular updates, articles, or personal reflections.
- Measures and practices to protect computers, networks, and data from unauthorized access or attacks.
Down
- The background image on the computer desktop.
- The human-readable address that corresponds to a specific IP address on the internet, e.g., "www.example.com."
- Making copies of important data to prevent data loss in case of hardware failure or accidents.
- Storing and accessing data and applications over the internet rather than on local devices
- Software used to access and navigate the internet, e.g., Google Chrome, Mozilla Firefox.
- file sent along with an email message.
- The process of copying a file from the internet or another computer to your own device.
- (Cascading Style Sheets): A stylesheet language used for controlling the presentation and formatting of web content.
- Real-time communication with others over the internet, often using text-based messages.
- The responsible and ethical use of technology and the internet.
- A visual indicator on the screen, typically in the shape of an arrow or a hand, used to select or interact with items.
- A toolbar in a web browser where users can save and access frequently visited websites.
- An electronic device that can process data and perform tasks according to instructions.
- A standard for wired network connections commonly used for high-speed internet access.
- Software: Programs designed to detect and remove viruses and malware from a computer.
- The use of digital technology to harass, threaten, or harm others.
- The main part of a web address that identifies a specific website or resource, such as "example.com."
33 Clues: file sent along with an email message. • The background image on the computer desktop. • A saved link to a specific webpage for easy access later. • A record of websites a user has visited on their web browser. • The responsible and ethical use of technology and the internet. • The use of digital technology to harass, threaten, or harm others. • ...
Cyber Crossword 2022-09-12
Across
- Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto.
- Seemingly harmless impersonal data, like how many times a user clicked or refreshed the page when visiting a website.
- A segment of data sent by an Internet server to the browser that is returned to the browser every time it accesses the server. This is used to identify the user or track their access to the server. Initially, cookies were used to stay logged in but are now commonly used for tracking.
- Customizable additions to software for extra functionality.
- A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
- A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior. Often used to disable firewall or anti-malware software while consuming CPU activity to increase an endpoint’s vulnerability to attack.
- A service from Google that works to protect websites from spam and abuse caused by robots. A user is presented with a Turing test to distinguish them from a robot.
- Text that can be read by the human eye
- A form of malware used to threaten victims by blocking, publishing, or corrupting their data unless the ransom is paid.
- The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
Down
- The programs and other operating systems used by a computer.
- A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- Programs that automatically execute tasks as ordered by the creator of the program that has infected them.
- Also known as an Internet Protocol address, is the string of numbers used to identify each computer using the internet on a network.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- The act of taking advantage of human trust to gain access to private information. This can be done as easily as calling a number and asking for it.
- The way in which the identity of a user is confirmed.
- A simple form of code for software that can be written in word editors.
- An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- A strategy that is in place to manage upgrades for software applications.
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- A secret word or phrase that is used to access a computer system or service.
23 Clues: Text that can be read by the human eye • The way in which the identity of a user is confirmed. • Customizable additions to software for extra functionality. • The programs and other operating systems used by a computer. • Cryptocurrency, a form of electronic cash created by Satoshi Nakamoto. • ...
STS 2024-12-07
Across
- Defensive measures against online threats
- of the nature of a hierarchy; arranged in order of rank.
- Diversity of plant and animal life
- Disparity between societal groups
- System of naming things in a particular field
- Large volumes of data processed for insights
- network of physical objects
- Volunteer-driven research and data gathering
- The availability of food for a population
- Simulation software for training ship navigators
- Technology for storing and processing data on remote servers
- Environmental phenomenon driven by greenhouse gases
- Gases that contain fluorine, contributing to global warming
- Massive ice formations slowly moving over land
- The broadest category, grouping organisms based on fundamental characteristics
- Crypto, Bitcoin
- Method of tagging items with unique codes
- White-hat hacker who helps secure networks
- CH4, a potent contributor to global warming
- Light, powdery precipitation commonly seen in winter
- Excessive use of natural resources
- Interactive, 3D simulated environments in real time
- Fine particles or droplets suspended in the air
- Biotic and abiotic components of a habitat
- Overall physical and mental condition
- Classifying organisms
- Expert who designs and enforces protection for computer systems
- Group of organisms capable of interbreeding
- Radio Frequency ID
- Computer systems designed to perform tasks requiring human-like intelligence
- Large areas covered chiefly with trees
Down
- Involving hidden meanings and tricky wordplay
- Automated device that can perform human tasks
- Freedom from unwanted intrusion
- Inability of bacteria to be killed by drugs
- Tax structure where higher earners pay more
- Stalemate in traffic or negotiations
- Technology that reduces latency by processing data locally
- Smog, Waste
- Computing Type of computing harnessing the laws of quantum physics
- Slow-moving ice formations found in cold regions
- Long-term heating of Earth’s climate system
- Divides organisms within a kingdom based on shared body plans or structures
- Small electronic circuits that perform computations
- Process of making or enacting laws
- Amount of data that can be transmitted in a given time
- Odorless gas that contributes to global warming
- Brings together closely related genera.
- Expert who studies and identifies harmful software
- Immersive environments that blend the real and virtual worlds
- Home of a species in nature
- A group of closely related species.
- Groups organisms with similar characteristics and adaptations.
- Technology that overlays digital elements on the real world
- Gases that trap heat in Earth's atmosphere
- Ability to analyze and evaluate media content
- Extreme political or religious views
- Colorless gas contributing to greenhouse effect
- When a species is native to and found only in one location
- Mobile gadgets with internet access and apps
- The gases that protect and sustain life on Earth
- Conditions outside, such as rain or sunshine
62 Clues: Smog, Waste • Crypto, Bitcoin • Radio Frequency ID • Classifying organisms • network of physical objects • Home of a species in nature • Freedom from unwanted intrusion • Disparity between societal groups • Diversity of plant and animal life • Process of making or enacting laws • Excessive use of natural resources • A group of closely related species. • ...
Types of Engineers 2025-01-08
Across
- Concerns dealing with different manufacturing practices and the research and development of systems, processes, machines, tools and equipment.
- Terrestrial and marine nuclear power plants.
- Logistical and resource management systems.
- Studies the physical and chemical behavior of metallic elements, their inter-metallic compounds, and their mixtures, which are known as alloys.
- The use of engineering to ensure the safe and efficient transportation of people and goods.
- Identify threats and vulnerabilities in computer systems and software.
- The design, study, and manufacture of various electrical and electronic systems.
- A field of engineering concerned with the activities related to the production of Hydrocarbons, which can be either crude oil or natural gas.
- The engineering of biological systems for a useful purpose.
- Farm power and machinery, biological material processes, bioenergy, farm structures, and agricultural natural resources.
- Concerns heating or cooling of processes, equipment, or enclosed environments.
- Focuses on the application of biological systems at the molecular level.
- The application of engineering principles to the improvement and protection of the environment.
- An engineering discipline that involves the science, technology, and practice of extracting and processing minerals from a naturally occurring environment.
- Associated with anything constructed on or within the Earth.
- Covers the design, development, manufacture and operational behaviour of aircraft, satellites and rockets.
Down
- The design and manufacture of physical or mechanical systems.
- The application of quantum theory to the design of materials and devices.
- Includes all parts of the design of manufacturing or processing facilities, either new or modifications to and expansions of existing facilities.
- The engineering of structures that support or resist structural loads.
- Studies of the small-scale properties and engineering of materials
- An interdisciplinary field of engineering that focuses on how to design and manage complex engineering projects over their life cycles.
- A branch of engineering that integrates several fields of computer science and electronic engineering required to develop computer hardware and software.
- A field of engineering that involves the design, development, and testing of sports equipment.
- Mechanical and electrical engineering hybrid.
- Medicine and healthcare biology, biocompatible prostheses, diagnostic and therapeutic devices ranging from clinical equipment to micro-implants, imaging equipment, tissue regeneration, and pharmaceuticals
- The design, development, and operation of systems for collecting and analyzing spatial information about the land, the oceans, natural resources, and manmade features.
- The application of physics, chemistry, biology, and engineering principles in order to carry out chemical processes on a commercial scale.
- Covers the design, development, manufacture and operational behaviour of watercraft and stationary structures like oil platforms and ports.
- The design and construction of public and private works.
- The application of a systematic, disciplined, quantifiable approach to the development, operation, and maintenance of software and the study of these approaches.
- The design of instruments and systems that utilize the properties of electromagnetic radiation.
32 Clues: Logistical and resource management systems. • Terrestrial and marine nuclear power plants. • Mechanical and electrical engineering hybrid. • The design and construction of public and private works. • The engineering of biological systems for a useful purpose. • Associated with anything constructed on or within the Earth. • ...
Engineering Tech Crossword 2025-04-30
Across
- The core part of an operating system that manages system resources.
- Measures taken to protect computers and networks from unauthorized access.
- The server-side logic and database layer of a software application.
- A set of rules for data communication over a network.
- The standard language for creating web pages.
- Network of physical objects embedded with sensors and software.
- A device that converts digital signals for internet transmission over telephone lines.
- Temporary storage that speeds up access to frequently used data.
- A set of practices combining development and IT operations.
- A tiny semiconductor used to perform specific functions in electronics.
- The main circuit board that connects all components in a computer.
- Permanent software programmed into hardware devices.
- Information that can be processed or analyzed by a computer.
- The data transfer capacity of a network connection.
- Number system consisting only of 0s and 1s.
- Technology that creates virtual versions of hardware, servers, or operating systems.
- A complete path through which electric current flows.
- The physical components of a computer or electronic system.
- A version control system for tracking code changes in software development.
- A device that detects and responds to physical inputs like heat or motion.
- A professional who designs, builds, and tests technological systems.
- The process of converting data into a secure, unreadable format.
- Technology that performs tasks with minimal human input.
Down
- A processor designed to accelerate graphics rendering.
- A collection of connected computers or devices that share resources.
- A command-line interface used to interact with a computer system.
- A wired network protocol commonly used in local area networks (LANs).
- A set of integrated circuits that manage data flow between components.
- A secure, distributed ledger system used for tracking digital transactions.
- A program that translates code from high-level to machine language.
- The arrangement of components or settings within a system.
- A remote-controlled or autonomous flying device.
- A lightweight, portable unit that packages software and its dependencies.
- A storage location for code and project files, often managed by version control.
- The number of bits processed per unit of time, often in streaming.
- A device or software that distributes network traffic across multiple servers.
- A versatile, object-oriented programming language used in many applications.
- The point of interaction between hardware, software, or users.
- Internet-based services for data storage, computing, and software delivery.
- To identify and fix bugs or errors in a program.
- Interface allowing different software applications to communicate with each other.
- A precise set of rules or instructions for solving a computational problem.
- A beginner-friendly, high-level programming language with readable syntax.
- A file containing code written to automate tasks.
- Central Processing Unit; executes instructions in a computer.
45 Clues: Number system consisting only of 0s and 1s. • The standard language for creating web pages. • A remote-controlled or autonomous flying device. • To identify and fix bugs or errors in a program. • A file containing code written to automate tasks. • The data transfer capacity of a network connection. • Permanent software programmed into hardware devices. • ...
AP CSP--Unit 9 (Data) and Unit 10 (Cybersecurity and Global Impact)--A+CR 2023-04-07
Across
- practice of obtaining information by enlisting a number of people, either paid or unpaid, typically via the internet
- software intended to damage a computing system or to take partial control over its operation
- idea that some data should be freely available to everyone to use and republish as they wish without restrictions
- use of a program to record every keystrike made by a user in order to gain fraudulent access to confidential information
- large, more complex data sets, especially from new data sources
- simulation in machine that are programmed to think like humans and mimic their actions; term may also be applied to any machine that exhibits traits associated with a human mind
- uses ONE key for both encryption and decryption
- an application of artificial intelligence that provides systems the ability to automatically learn and improve from experience without being explicitly programmed
- attempting to decode a secret message without knowing the specifics of the cipher
- data that does not accurately reflect the full population or phenomenon being studied
- relationship between two pieces of data, typically referring to the amount that one influences the other
Down
- protects a computing system against infection
- process of encoding messages to keep them secret, so only "authorized" parties can read it
- research conducted in whole or part by distributed individuals, many of whom may not be professionals, who contribut relevant data to research by using their own computers; a special type of crowdsourcing
- technique for encryption that shifts the alphabet by some number of characters
- wireless access point that gives unauthorized access to secure networks
- process that makes the data uniform without changing its meaning
- details about an individual that identifies, links, relates, or describes him/her
- includes a program as an integral part of its function; can be physical, non-physical computing software, or non-physical computing concepts
- method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something he knows), possession (something he has), and inherence (something he is); each step provides a new layer of security
- choosing a smaller subset of a data set to use for analysis
- process that reverses encryption; takes a secret message and reproduces the original plain text
- the collection of facts and patterns extracted from data
- uses TWO keys, one for encryption and another for decryption; sender does not need receiver's private key to encrypt message, but receiver's private key is required to decrypt the message
- technique that attempts to trick a user into providing personal information that can then be used to access sensitive online resources
- the tendency of a statistic to overestimate or underestimate a parameter
- generic term for a technique (algorithm) that performs encryption
- data about data
- reason why something happens
29 Clues: data about data • reason why something happens • protects a computing system against infection • uses ONE key for both encryption and decryption • the collection of facts and patterns extracted from data • choosing a smaller subset of a data set to use for analysis • large, more complex data sets, especially from new data sources • ...
Compliance Week 2025 2025-08-12
Across
- A type of cyberattack where malicious actors deceive individuals into revealing sensitive information or performing actions that compromise their security. This is usually achieved by impersonating trusted entities, such as banks, social media platforms, or online retailers, through emails, text messages, or websites. The goal is to trick victims into divulging personal information like passwords, credit card numbers, or bank details, or to install malware on their devices.
- Moral principles that govern a person's behavior or the conducting of an activity.
- A team member who discloses information about illegal or unethical activities, wrongdoing, or violations of laws or regulations within their organization. This disclosure can be made to various parties, including supervisors, designated authorities, or even outside agencies, and the individual is typically protected by law from retaliation by their employer for making such disclosures.
- A program available to all team members as a way to report unethical behavior, wrongdoing, or misconduct. You can access via online form or telephone at any time.
- The practice of protecting computer systems, networks, and data from digital attacks. It involves various measures and controls to ensure the confidentiality, integrity, and availability of information, safeguarding against unauthorized access and criminal use. Essentially, it's about keeping your digital world safe.
- The quality of being honest and having strong moral principles; moral uprightness.
- Laws that prohibit actions designed to influence the individual in the performance of their duties and to incentivize them to act dishonestly.
Down
- Outlines the moral principles and values that guide team member behavior and decision-making within an organization. It serves as a guide for ethical conduct, ensuring employees act in accordance with the company's values and standards.
- Laws that prohibit efforts to limit competition between companies that otherwise would be competing for business in the marketplace. Prohibited efforts and actions include price fixing, bid rigging, and market division arrangements that unreasonably restrain trade.
- A program designed to assess, identify, mitigate, monitor, and report on third party risks.
- The ability to guide, influence, and motivate individuals or teams toward achieving common goals. It involves setting a vision, fostering collaboration, and creating an environment where team members can thrive and contribute their best.
- Any individually identifiable health information that is created, maintained, or transmitted by a healthcare provider or other covered entity under the Health Insurance Portability and Accountability Act (HIPAA).
- The shared values, beliefs, attitudes, and practices that characterize an organization and shape how its team members interact and work together. It's essentially the "personality" of a company, influencing everything from communication styles to decision-making processes.
13 Clues: Moral principles that govern a person's behavior or the conducting of an activity. • The quality of being honest and having strong moral principles; moral uprightness. • A program designed to assess, identify, mitigate, monitor, and report on third party risks. • ...
Good Growth Strategy Puzzle 2020-12-08
Across
- Strengthen and propagate our brand with employees and elevate our strategic outreach with customers and partners and in the communities in which we separate, ensuring others understand our value proposition that we are consistently delivering on our brand promise.
- Strengthen our leadership, and the future pipeline of diverse talent, to model and consistently demonstrate the culture and behaviors we value.
- Our strategy for growing our organization will develop the powerful intangibles of our brand and our culture, as well as the tangible benefits of growth in our business to propel our strategy.
- Retain and expand our world-class talents that includes a diverse population across disciplines, projects, and teams, with enhanced career and growth opportunities and competitive pay and performance progress.
Down
- Establish the business models and robust supporting capabilities to work directly for state, local, and foreign governments, as well as private for-profit and non-profit companies.
- Propagate our knowledge and share information more broadly, to make others smarter and enable greater contribution across our domains.
- Our strategy for growing out work is focused on shifts in both content and business models, seeking to enable us to pursue a more diverse set of problems more comprehensively.
- Guide the organization through a significant transformation to shift our culture toward speed, risk-taking, and adaptability, while demonstrating grace and respect and collaboration in our actions.
- Our strategy for growing our Team will build stronger internal capabilities, in technical and leadership disciplines. But it also recognizes that we can’t do it all and will augment our organic capabilities with a well-integrated set of partners.
- Deliver Focused, deliberate growth in identifies new areas, sponsors, or customers that drives MITRE’s impact and brings additional value to our partners and FFRDC sponsors.
- Expand our network of partners with whom we go to market, attracting them with our exceptional team and work challenges, and also becoming a better partner ourselves.
- Deliberately shift name of our portfolio of work from smaller independent projects to larger interrelated sets of projects that scale to deliver solutions to a wide range of big problems. We will set special focus on problems including transportation, critical infrastructure, healthcare, cybersecurity, and space.
- Drive Change in the work we do across the separation of FFRDC’s and through private-public partnerships spanning private sector and academia to address problems that either government not a single institution can address alone.
13 Clues: Propagate our knowledge and share information more broadly, to make others smarter and enable greater contribution across our domains. • Strengthen our leadership, and the future pipeline of diverse talent, to model and consistently demonstrate the culture and behaviors we value. • ...
IT CORE Safety Crossword 2017-06-23
Across
- Not only do we need to protect ourselves, we need to protect our data. Ransomware is the fastest growing threat to your cybersecurity. Google this word to find out more information on your risk (hint: look by IT security).
- Heading over to the 2nd floor Marathon coffee bar for your mid-morning coffee? Make sure you clean up any spills, ___, or leaks immediately to prevent slips!
- Stumped with a TeamView question, and have a moment of ____ about what to do? Head up to the IT information management team. You’ll find the answer along the way.
- Oh no! You fell when walking from the HUB to the Marketing building, make sure you report your injury _______.
- In order to qualify for the CORE award, each organization has to reach certain metrics. Check out the following standard, Gen1026AppC. What can be requested if a new employee starts late in the quarter and doesn’t have time to fill out their BBS observation?
- Walking into work from the South garage, just a reminder, this can wait!
- While looking for clue #8, head up the stairs by the IT security team, but please don’t do this while texting.
- Locate your floor’s emergency evacuation map. What symbol indicates the emergency exits? Be sure to memorize those locations!
Down
- Ever wondered whether that candle you want to bring into the office is permitted or whether or not that mini fridge that you had from college would be allowed and fit under your desk? Check out the STEP team’s website and look for the Findlay Campus Safety Manual. The General Safety Rules will help you answer all your questions related to Electrical Safety, Slips, Trips, & Falls, Fire Prevention, Aisles, halls, & passageways, cuts, pinch-points, & equipment safety, filing cabinets, ladder safety, and ________.
- After your meeting in 290-M, it’s finally lunchtime! Head up the stairs nearby, and find the penultimate word in black lettering on the safety poster.
- Finally done for the day, and heading out to the North garage via the admin building… make sure to pay attention to your surroundings, especially to these (hint: green circle)
- This medical device is programmed to analyze a person’s heart rhythm and deliver a shock if the rhythm requires defibrillation. Find one of these devices and name the manufacturer (hint: look near the HUB elevators)
- Nothing beats the sights and smells of the parking garage in the morning. Make sure to use all your senses though and do this as well.
13 Clues: Walking into work from the South garage, just a reminder, this can wait! • While looking for clue #8, head up the stairs by the IT security team, but please don’t do this while texting. • Oh no! You fell when walking from the HUB to the Marketing building, make sure you report your injury _______. • ...
krzzowka 2023-03-07
Across
- online platforms that allow users to create and share content and interact with others, often used for communication and marketing.
- the use of technology, such as sensors and drones, to optimize crop production and reduce waste.
- the use of digital technology to fundamentally change how organizations operate and deliver value to customers.
- technology devices that can be worn on the body, such as smartwatches or fitness trackers.
- the use of remote servers hosted on the internet to store, manage, and process data, rather than using a local server or personal computer.
- cities that use digital technology and data to improve infrastructure, services, and quality of life for residents.
- the practice of protecting computer systems, networks, and sensitive information from theft, damage, or unauthorized access.
- the design, construction, and operation of robots, which can perform tasks that are dangerous, difficult, or repetitive for humans.
- the network of physical objects embedded with sensors, software, and connectivity, enabling them to collect and exchange data.
- a type of computing that uses quantummechanical phenomena, such as superposition and entanglement, to perform operations on data.
- vehicles powered by electric motors and batteries rather than internal combustion engines.
- the manipulation of matter on a molecular or atomic scale to create new materials, devices, and systems with unique properties.
- technology that promotes sustainability and environmental protection, such as renewable energy or energyefficient buildings.
- reality the overlaying of digital information, such as images or text, onto the real world through a device such as a smartphone or headset.
- the process of creating physical objects from digital designs by layering material, often used in manufacturing and prototyping.
Down
- vehicles that can operate without human intervention, such as selfdriving cars or drones.
- the application of engineering principles and techniques to develop medical devices, treatments, and therapies.
- the use of technology to provide remote medical care, such as teleconferencing or remote monitoring.
- the simulation of human intelligence processes by machines, especially computer systems.
- a decentralized, distributed ledger technology that allows for secure and transparent transactions without the need for intermediaries.
- the discovery and study of outer space, including planets, stars, and galaxies, often done through the use of spacecraft.
- energy sources that are replenished naturally, such as solar, wind, or hydroelectric power.
- the ability to maintain a certain level of economic and social development without depleting natural resources or harming the environment.
- extremely large datasets that can be analyzed to reveal patterns, trends, and associations, especially relating to human behavior and interactions.
- a type of computing that mimics human thought processes, such as language processing and decision making.
- the simulation of a threedimensional environment that can be interacted with through a headset or other device, often used for gaming or training.
- a type of artificial intelligence that allows computer systems to learn and improve from experience without being explicitly programmed.
- the use of living organisms or their components to develop products or improve processes, such as genetic engineering or biopharmaceuticals.
- the buying and selling of goods and services over
29 Clues: the buying and selling of goods and services over • the simulation of human intelligence processes by machines, especially computer systems. • vehicles that can operate without human intervention, such as selfdriving cars or drones. • technology devices that can be worn on the body, such as smartwatches or fitness trackers. • ...
Deleting the Digital Divide 2024-09-20
Across
- Mobile operating system based on the Linux kernel and other open-source software, developed by Google
- Portable computer, like a Chromebook
- A social media app and platform that allows users to share photos and videos
- A social media app that allows users to send and receive photos and videos that are usually only available for a short time
- Non-tangible computer programs
- Apple's desktop OS
- Apple's mobile OS, runs on iPhones and iPads
- A set of web pages accessible through the internet, conveniently linked and with a specific purpose
- Company that created Chromebook, also a popular search engine
- Malware in disguise
- A social media platform for creating and sharing short videos
- A unique identifier used to distinguish one user from another, essential for user authentication and authorization
- Cybersecurity barrier
- Messages distributed by electronic means from one computer user to another
- Input device for typing
- Attempting to acquire sensitive data through a fraudulent solicitation in email or on a web site
- Small text files that websites send to your browser to store information about your online activity
- A digital container within a computer's file system that allows users to organize and store files by grouping them together
Down
- A social networking site that allows users to connect with friends and family, share information, and engage with others online
- Microsoft's desktop OS, runs on many PCs
- Physical components of computers
- Malicious software, or malware, that can infect a computer's files or systems and cause damage
- An online video sharing platform owned by Google
- A social media platform that allows users to discover, save, and share ideas through visual pins (recipes, home and style inspiration, and more)
- To store data changes permanently
- A program that allows users to access and navigate the internet by viewing websites on a computer or mobile device
- Unauthorized access to a computer, smartphone, or other electronic device
- Interconnected computing devices that can exchange data and share resources with each other
- A software or hardware used to temporarily store information, often data, in a computer system
- Global communication network
- Software that scans files or your computer's memory for certain patterns that may indicate the presence of malicious software
- A flat, touch-sensitive device that replaces the mouse on laptops and netbooks, allowing you to control the cursor and perform other actions
- A social media platform that allows users to post short messages in limited characters
- A professional networking platform
- A string of characters used to verify the identity of a user during the authentication process, to be kept private/secret
- Allows users to access their data from any device with an internet connection, instead of being tied to a specific computer or server
- Malicious software used to gather info and send it to another entity, done to harm the user by violating their privacy, or endangering device security
- A wireless networking technology that allows devices such as computers, mobile devices , and other equipment to interface with the Internet
38 Clues: Apple's desktop OS • Malware in disguise • Cybersecurity barrier • Input device for typing • Global communication network • Non-tangible computer programs • Physical components of computers • To store data changes permanently • A professional networking platform • Portable computer, like a Chromebook • Microsoft's desktop OS, runs on many PCs • ...
Cyber Security Awareness Month 2025-08-07
Across
- A software that is designed to cause damage to a computer, server, or network.
- A program that secretly tracks your online activity and collects personal information.
- The act of stealing and using another person's personal information without their permission.
- A type of malware that encrypts a victim's files and demands a ransom payment to restore access.
- Using social media to gather personal information about a target to gain their trust.
- A type of denial-of-service attack that floods a server with a massive amount of traffic, making it unavailable to users.
- A digital signature that verifies the identity of a website or user.
- A code that restricts access to your phone or computer.
- The "lock" icon you see in your browser when a website is secure, ensuring a private connection.
- A person who breaks into computer systems, often for illegal purposes.
- A person who uses hacking to promote a political or social cause.
- course! Here are the clues and answers in the format you requested, with the answer first, followed by a space, and then the clue.
- The use of a fake email address to trick a recipient into believing the email is from a different sender.
- Clues
- A service that encrypts your internet traffic and hides your IP address, protecting your online privacy.
- me know if you would like me to create more clues or if you need the puzzle in a different format!
- A type of malicious software that tricks users into downloading or buying fake antivirus software by displaying fake warnings.
- A set of rules and procedures for communicating data between computer systems.
Down
- A type of malware that secretly records your keystrokes to steal your login credentials and other sensitive information.
- Clues
- The practice of protecting your data and systems from digital attacks.
- A secret word or phrase used to prove your identity to gain access to a computer or other account.
- A network that is not secure and can be accessed by anyone, making it a target for hackers.
- The process of converting plain text into an unreadable code to prevent unauthorized access.
- A type of malicious software that can replicate itself and spread to other computers.
- A deceptive link that tricks you into clicking it, often leading to a malicious website or download.
- Clues
- A fake website designed to deceive you and steal your information.
- A type of scam where a criminal pretends to be a legitimate person or organization to steal personal information.
- A security vulnerability that is exploited by attackers before a patch or fix is available.
- What you should do with your password on a regular basis.
- An intrusion prevention system that monitors a network for malicious activity and takes action to block it.
- An authentication method that requires two or more forms of verification to gain access to a resource.
- A network security system that monitors and controls incoming and outgoing network traffic.
- A type of malware that gives an attacker full administrative control over a system, often without the user's knowledge.
35 Clues: Clues • Clues • Clues • A code that restricts access to your phone or computer. • What you should do with your password on a regular basis. • A person who uses hacking to promote a political or social cause. • A fake website designed to deceive you and steal your information. • A digital signature that verifies the identity of a website or user. • ...
Sharepoint Exploration 2022-10-24
Across
- Our Strategic theme is to be the center of ______________for the specialized function roles
- This learning course will help you to understand what the cyber threats you may face are and what action you should take to protect our self from the risks. It will explain your responsibilities as a Schneider Electric employee and as a user of our company's Information Systems, as well as inform you of what to do if a security incident occurs. This course is mandatory compliance training for all Schneider Electric employees.
- This team focused in two main roles. Invoice Administration and Redemption Management
- Makes suppliers offer visible on the market and ensures products availability, credit and support to Edgar, Carlos, Peter, Simon, Mike, etc.
- Responsible for the administration of Coordinating activities with onboarding to SAP MGD and administration of the whole process through to receipt confirmation while interacting closely with all the Key Stakeholders in Projects, Purchasing and MDG Finance teams.
- This team aims to accelerate digital transformation of their customers and to help them adopt a culture of innovation, thus, ensuring social license to operate, maximizing stakeholders return and building a long-term sustainable and resilient business. (in abbreviation)
- A group of diverse teams of experts responsible in providing different support to our partners & currently we have 8 groups
- This team primary role’s responsibility is to achieve annual sales targets for Schneider’s support renewals & support reinstatements from End Users both directly and indirectly via the Alliance Partner Program
Down
- Specialized function Team vision is to set benchmark for _______________ service for Specialized function & accellerate growth by putting our customers in the heart of everything we do.
- Customer & partner Engagement Operation Senior Manager (Last Name)
- One of the Residential Builder Manager (RBM) of Clipspec Team (Last Name)
- is an automated list of all employees under PH Hub built in-house using Power Platform for the purpose of integrating to different applications within PH Hub like Tableau Dashboards, other Power App Tools, and BCP Communication system.
- This team offer professional selection and design service to homeowners and home builders for their electrical, lighting and smart home needs for renovation or new build project.
- This team is an open, flexible and scalable software solution for remote operations SCADA applications, designed to transform field data into business-relevant information and optimize the operation and management of remote assets across critical infrastructures.
- This team works closely with Sales Managers and Sales Directors in order to achieve their specific goals and targets by means of creating Reports and Dashboards via Bridge front office, Tableau and Excel.
- This team is a Schneider Electric partner company whose individual staff members are trained and certified on EcoStruxure™, our open, interoperable, IoT-enabled system architecture and platform, as well as on Wiser, our connected technology for homes.
- A specialist in engineering & selling solutions, connecting together devices & software in plants, building and/or infrastructure. The system integrator
- The Strategy, Marketing and Technology team is led by ______________?
- A website used by industry & Geoscada team. It is also a global leader in industrial software
- Schneider Electric PH Application Navigator
20 Clues: Schneider Electric PH Application Navigator • Customer & partner Engagement Operation Senior Manager (Last Name) • The Strategy, Marketing and Technology team is led by ______________? • One of the Residential Builder Manager (RBM) of Clipspec Team (Last Name) • This team focused in two main roles. Invoice Administration and Redemption Management • ...
CSP Summer 2018-09-10
Across
- moving enterprise data from one system to another
- online resources developed by a community
- a unit of information that corresponds to a symbol
- a list of items that are denied access to a system
- examining large databases to generate new information
- access control technologies for works
- process of decoding data
- 2^30 bytes
- network which allows nodes to share resources
- law that states that the # of transistors in integrated circuits doubles every two years
- memory used for program code
- interprets information
- part of a computer that controls/executes operations
- unwanted commercial messages
- data that tells about other devices
- request of information
- using representations of data for human recognition
- encryption standard
- converting data to a more convenient form
- packet which is encrypted
- collection of tables with unknown relationships
- destination designated for data storage
- waste or debris of any kind
- the use of websites to find people with similar interests
- operating on computer data
- entity that manages certificated
- allows data to be perfectly reconstructed
- management that provides efficient access
- system that is located centrally
- 1 million pixels
- loses some data in compression
- collection of documents on a subject
- components/media used to retain data
Down
- 2^20 bytes
- image for the desktop
- when source packets are transmitted to all nodes
- the process of making representations
- the smallest unit of data in a computer
- the online world of connected technology
- a set of rules to be followed
- source of data
- unit of data processed betwen two locations
- module that can be added to a program to add features
- quantities on which operations are performed on a computer
- list of approved entities for a service
- using remove servers for data
- protection of computers from theft
- stores data for future reference
- generating a model
- protocol for Internet addressed
- pattern of scanning lines
- creations by a human to which one has protection for
- encrypted test
- encryption standard adopted in 1976
- numeric system using only 0 or 1
- character encoding standard
- data conversion to make it secure
- organized system for information collection
- using physical quantity
- uses radio waved to identify an object
- process by which information is gathered/compiled for analysis
- copying data to another system
- central location in which data is stored and managed
- small dots that form a picture
- used to represent data as a value
- opposite of background
- expressed in digits
- address for a device on the Internet
- writing/solving codes
- system used to prevent unauthorized access
- formal system used to display text and graphics
- drive device that reads/writes data to a d sik
- group of servers used for storage of data
- recognition of printed/written characters
- multiple devices communicating with each other
- program that runs over the Internet
76 Clues: 2^20 bytes • 2^30 bytes • source of data • encrypted test • 1 million pixels • generating a model • encryption standard • expressed in digits • image for the desktop • writing/solving codes • interprets information • request of information • opposite of background • using physical quantity • process of decoding data • pattern of scanning lines • packet which is encrypted • ...
Sprint 3A vocabulary 2024-03-27
Across
- The company implemented __________ changes to improve workflow efficiency.
- The organization is dedicated to promoting the __________ of human rights and social justice.
- The accident victim underwent extensive __________ to regain physical function and mobility.
- The company fosters an environment of __________ where diversity is celebrated and everyone feels valued.
- The material was __________ and could be easily shaped into various forms.
- The cost of the project was __________, exceeding initial estimates by a significant margin.
- The city was __________ by a severe rat infestation, causing health concerns for residents.
- The implementation of efficient processes increased the company's __________ and profitability.
- The government implemented policies to make healthcare more __________ for low-income families.
- The company ensured that all employees received __________ training to perform their job responsibilities effectively.
- Volunteering at the local shelter is a __________ experience, knowing you're making a positive impact.
- The organization actively __________ for stricter environmental regulations.
- The flu is an __________ disease that spreads easily among individuals.
- The parties reached a mutual __________ to resolve the legal dispute outside of court.
- The organization recognized her __________ efforts and awarded her for her contributions.
- The __________ issue of climate change requires immediate action and global cooperation.
- The doctor __________ medication to manage the patient's chronic condition.
Down
- The medical __________ was successful, and the patient is now in stable condition.
- The prolonged drought led to widespread __________ and food shortages in the region.
- The school organized a __________ event to raise money for new sports equipment.
- Many individuals __________ their time and skills to support local community projects.
- Some bacteria have become __________ to antibiotics, making treatment more challenging.
- The agricultural sector experienced a __________ of crops, leading to lower prices.
- Early __________ in speech therapy can greatly improve a child's language development.
- The __________ socks he wore showed his lack of attention to detail.
- The research project received substantial __________ from government grants and private investors.
- The __________ countries have advanced infrastructure and robust economies.
- Understanding the __________ of the law is crucial for accurate interpretation and application.
- The company made a __________ donation to support local schools and educational programs.
- The organization strives for __________ in education by providing equal opportunities to all students.
- The high taxes imposed on small businesses are becoming an increasing __________ for entrepreneurs.
- The accident resulted in a permanent __________, affecting the person's ability to walk.
- The wealthy businessman became a __________, generously donating to various charitable causes.
- The organization's __________ programs aim to provide support and resources to marginalized communities.
- The heavy rainfall caused flooding, and __________, many roads were closed.
- The generous __________ from the community helped provide essential supplies to those in need.
- The environmental conservation __________ gained widespread support and raised awareness about deforestation.
- The car was recalled due to a manufacturing __________ that posed a safety risk.
- The company's __________ cybersecurity measures ensure the protection of sensitive data.
- The elderly woman required a __________ to assist her with daily activities and medical needs.
- The __________ organization relies on donations to support its charitable activities.
41 Clues: The __________ socks he wore showed his lack of attention to detail. • The flu is an __________ disease that spreads easily among individuals. • The company implemented __________ changes to improve workflow efficiency. • The material was __________ and could be easily shaped into various forms. • ...
July 2024 GK -3 2024-07-20
Across
- Which path separates India from Sri Lanka
- Recently NITI Aayog has been reorganized, who is its chairman
- Capital of New Zealand
- How many Indian languages have been accorded the status of Classical Language
- Which state government has recently demanded a Minimum Support Price for makhana, the popped kernel of the foxnut. This is cultivated in tropical and subtropical aquatic environments, thriving in stagnant water bodies. India is the largest global producer, with this as the leading state
- Kalamkari Art form originated from which state
- Which is the state with highest population
- Winner of Wimbledon Men's Championship for 2nd consecutive year
- The Government of India recently mandated that stainless steel and aluminum utensils must adhere to which specifications(Use abbreviation)
- Winner of EURO 2024 Football Championship
- Paul Kagame has recently won the presidential election of which country
- NIKKEI is the Index of which country's stock exchange
- Which state government found itself mired in controversy over the job reservation bill for locals. The proposal to enforce 50% reservation for administrative posts and 75% for non-administrative posts in private sector organizations, industries and enterprises has faced backlash from several quarters
- Which company's Operating systems faced world wide outage on July 18 resulting in operations getting impacted in airports, banks, hospitals etc
- Originating from the Pahunri Glacier in the Sikkim Himalayas, which River flows through Sikkim, West Bengal, and into Bangladesh, joining the Brahmaputra
- Recently, which state government has created a world record of planting 11 lakh saplings in a single day
- Computer systems across the world were crippled on July 19 due to a faulty software update to Windows system from which cybersecurity company
Down
- Which State has more 3 major ports
- The longest National Highway NH-44 passed through how many states/ UTs?
- Pochampally which is part of Iconic Weaving Clusters of India is located in which state
- A new Android malware called _____ targets users to steal banking credentials by bypassing anti-tamper mechanisms using the ‘seccomp’ security feature. This malware repacks apps to avoid detection and utilizes accessibility services to remotely view screens, disabling biometric and two-factor authentication
- Union Minister for Agriculture & Farmers Welfare
- Recently, which state has announced to give 10% reservation to Agniveers in police recruitment?
- Capital of Mauritius
- Which country is the largest producer of Milk in the world
- KOSPI is the Index of which country's stock exchange
- Currency of Brazil
- Capital of Manipur
- Which River originates from the Gangotri Glacier and becomes the Ganga at Devprayag
- Winner of COPA AMERICA 2024 Football Championship
- Wheeler Island, which is used by India for its missile tests is located in which state?
- Which country's currency is the Rand
- Recently NITI Aayog has been reorganized, who is its Vice-Chairman
- _______is the intentional mass export of goods to other countries where those goods are sold below the importing country's market price
- Indian companies have been allowed to list on foreign exchanges through which institution?(Use abbreviation)
35 Clues: Currency of Brazil • Capital of Manipur • Capital of Mauritius • Capital of New Zealand • Which State has more 3 major ports • Which country's currency is the Rand • Which path separates India from Sri Lanka • Winner of EURO 2024 Football Championship • Which is the state with highest population • Kalamkari Art form originated from which state • ...
Technology Terms A-C 2022-11-02
Across
- A coding error in a computer program.
- When there’s a need to study data, information or even a technical problem closely
- Programing on a computer using a set of directions.
- The small blinking line that shows where the next number or letter you type will go
- mean making a copy of data and files to protect them against accidental loss.
- Any number, letter, symbol, or space created by the keyboard.
- Represents eight bits. It is the amount of information stored within a computer’s memory. The term is a specific set of eight bits which operate as a unit within a computer system.
- A key on the keyboard that erases the information before the cursor.
- To remove text or graphics and be able to paste it in another place.
- A backup and storage service on the Internet.
- means to turn on a computer and have it ready for use
- Pictures or symbols that can be added to a document.
- A small amount of your personal information created by a website and saved by your browser for the next time you visit that site.
- to look over information casually without being too detailed.
- Intelligence demonstrated by machines, as opposed to the natural intelligence displayed by animals and humans.
- Stealing, corrupting, or viewing of other people’s personal or private information or data.
- A user interface element designed to make navigation easy and intuitive.
Down
- A button at the top of the web browser that allows you to ""go back"" to the previous web page that you were on.
- A web site on which an individual or group of users record opinions, information, etc. on regular basis
- The space provided on a web browser that shows the addresses of website
- The smallest measure of data in a computer. A bit has a single binary value, meaning it has a value of zero, or one.
- Arrow or blinking line that tells you where you are working.
- To recreate a copy of text or graphics, and be able to paste it in another place while keeping the original.
- Computer software designed to help users perform specific tasks
- A key on the keyboard that sets an input mode which types the letters in uppercase.
- The brain of the computer that controls programs.
- The law that protects the exclusive legal right to reproduce, publish, sell, or distribute the matter and form of a piece of writing, music, video, or other product.
- Compact disc that contains a variety of types of computer data.
- To exit a program or file and close the window.
- Practice of protecting systems, networks, and programs from digital attacks.
- An image or character that represents a person online.
- To press the mouse once.
- used to describe the action of establishing (making) communication with the Internet or with another device (computer equipment) such as a monitor, modem, etc.
33 Clues: To press the mouse once. • A coding error in a computer program. • A backup and storage service on the Internet. • To exit a program or file and close the window. • The brain of the computer that controls programs. • Programing on a computer using a set of directions. • Pictures or symbols that can be added to a document. • ...
Lesson 1.1.1 2024-09-17
Across
- A set of rules and guidelines that outline the acceptable behaviors and responsibilities for users in a specific environment, often in workplaces or online platforms.
- Script A file containing Python code that can be executed to perform a series of tasks or automate processes.
- An individual or group that carries out phishing attacks by sending deceptive emails or messages to steal personal information.
- A software-based emulation of a computer that runs programs and applications just like a physical computer, but in a controlled, isolated environment.
- Online platforms that enable users to create, share content, and interact with others (e.g., Facebook, Twitter, Instagram).
- The last segment of a domain name, such as .com, .org, or .edu, used to classify domain names into categories based on purpose or geographical location.
- A task automation and configuration management framework from Microsoft, consisting of a command-line shell and scripting language built on the .NET framework.
- A command used in operating systems to change the current directory in the command-line interface.
- A type of challenge-response test used to determine whether the user is human and to prevent bots from accessing websites or services.
- Lifecycle The continuous process of protecting systems, networks, and data through identifying risks, implementing protective measures, detecting incidents, responding to threats, and recovering from attacks.
Down
- The process of converting data into a code to protect it from unauthorized access, requiring a decryption key to read the information.
- A step-by-step procedure or formula for solving a problem, often used in computing and data processing.
- Attack A type of attack where a hacker tries a list of commonly used passwords or words from a dictionary to gain access to a system.
- Footprint The trail of data you leave behind when you use the internet, including websites you visit, emails you send, and social media activity.
- Unsolicited and irrelevant messages sent over the internet, typically in bulk, usually for advertising purposes.
- A fraudulent attempt to obtain sensitive information such as passwords and credit card details by posing as a trustworthy entity via email or other online communication.
- Extension The suffix at the end of a filename that indicates what type of file it is (e.g., .txt for text files, .doc for Word documents).
- The process of giving someone permission to access resources or perform certain actions on a system.
- a Password The process of using various techniques, such as brute force or dictionary attacks, to guess or break the password protecting a system or account.
- Source The origin of an email, which includes information such as the sender's IP address and server details, often found in the email header.
- A command in Windows that displays a list of files and directories in the current directory.
- A method used to crack passwords by trying every possible combination of characters until the correct one is found.
- The process of verifying the identity of a user, device, or system to ensure they are who they claim to be.
23 Clues: A command in Windows that displays a list of files and directories in the current directory. • A command used in operating systems to change the current directory in the command-line interface. • The process of giving someone permission to access resources or perform certain actions on a system. • ...
