cybersecurity Crossword Puzzles
Entrepreneurship 2026-03-30
Across
- This is the unique factor that sets your business apart from its competitors and allows you to offer superior value to your customers.
- These are the outstanding invoices owed to your business by customers or clients.
- This refers to the strategies and processes your business uses to identify, recruit, and hire the best-fit candidates for your open positions.
- This refers to the specific group of customers your business aims to reach and serve.
- This refers to the network of connected devices, sensors, and systems that can collect and exchange data, enabling businesses to optimize operations, enhance customer experiences, and drive innovation.
- This metric represents the total revenue a business can expect from a single customer over the course of their relationship.
- This term describes the ability of your business to grow and expand without significantly increasing its costs or resources.
- This term refers to the large, complex datasets that businesses can analyze to uncover insights, trends, and patterns that inform decision-making.
- This is a strategic approach to creating and distributing valuable, relevant, and consistent content to attract and retain a clearly defined audience.
- This refers to the level of commitment, motivation, and enthusiasm your employees have towards their work and your business.
Down
- This is the use of technology to streamline and optimize business processes, reducing the need for manual intervention.
- This statement tracks the movement of cash in and out of your business, including operating activities, investing activities, and financing activities.
- your business model is critical for developing a sustainable and scalable enterprise.
- This refers to the way your business generates revenue and creates value for its customers.
- This refers to the process of optimizing your website and online content to improve its visibility and ranking in search engine results.
- This is the process of setting goals, providing feedback, and evaluating the performance of your employees.
- This encompasses the measures and practices your business takes to protect its digital assets, including data, systems, and networks, from unauthorized access, theft, or damage.
- This is the process of integrating new hires into your organization, familiarizing them with your company culture, policies, and procedures.
- This financial statement provides a snapshot of your business’s assets, liabilities, and equity at a specific point in time.
- This is the unique way your business presents itself to your target market, including the values, attributes, and benefits you associate with your brand.
- This refers to the delivery of computing services, such as storage, processing power, and software, over the internet.
- ROI is a metric that measures the profitability of an investment or business activity.
- Also known as a profit and loss statement, this document outlines your business’s revenue, expenses, and net income over a specific period.
- These are the outstanding bills your business owes to suppliers, vendors, or other creditors.
- These are the additional perks and compensation your business offers to employees, beyond their base salary.
25 Clues: These are the outstanding invoices owed to your business by customers or clients. • your business model is critical for developing a sustainable and scalable enterprise. • This refers to the specific group of customers your business aims to reach and serve. • ROI is a metric that measures the profitability of an investment or business activity. • ...
Final Crossword 2024-09-01
Across
- to put too many things in or on something
- the act by newspapers, television, etc. of presenting information in a way that is shocking or exciting
- Wrong information, or the fact that people are misinformed
- a device that is used to record that something is present or that there are changes in something
- A device that is used to recharge a battery
- Not supported by facts
- the fact of something increasing a lot and suddenly in number or amount
- person responsible for examining and deciding whether to prevent parts or the whole of them from being seen or made available to the public because they are considered to be offensive or harmful
- things that are done to protect a person, organization, or country and their computer information against crime or attacks carried out using the internet
- the quality of being honest and having strong moral principles that you refuse to change
- a small plastic or rubber object with two or three metal pins, attached to the end of a wire on a piece of electrical equipment and pushed into a special opening in a wall to connect the equipment to a supply of electricity
- A set of headphones, especially with a microphone attached to it
- the central or main part of something where there is most activity
- changes something such as a document to a digital form
- a camera that records moving pictures and sound and allows these to be broadcast on the internet as they happen
- referring to detailed information about someone's body, such as the patterns of colour in their eyes, that can be used to prove who that person is
Down
- the use of machines and computers that can operate without needing human control
- a situation in which a place is too blocked or crowded, causing difficulties
- Relating to beliefs about what is morally right and wrong
- A new idea or method
- set of mathematical instructions or rules that, especially if given to a computer, will help to calculate an answer to a problem
- the amount used or eaten
- the fact that someone or something can be believed or trusted
- Showing good judgment, especially about style and quality
- enthusiasm for technology and the latest technological devices
- Willingness to believe that something is real or true, especially when this is unlikely
- the fact of being responsible for what you do and able to give a satisfactory reason for it, or the degree to which this happens
- Film especially one showing an event
- A type of plug that makes it possible to connect 2 or more pieces of equipment
- a situation in which you need something or someone and are unable to continue normally without them
- plan to deceive someone, such as telling the police there is a bomb somewhere when there is not one, or a trick
- someone's right to keep their personal matters and relationships secret
32 Clues: A new idea or method • Not supported by facts • the amount used or eaten • Film especially one showing an event • to put too many things in or on something • A device that is used to recharge a battery • changes something such as a document to a digital form • Relating to beliefs about what is morally right and wrong • ...
Cyber CYber 2024-10-07
Across
- KEY INFRASTRUCTURE What framework manages digital certificates and public-key encryption?
- What acronym refers to a security operations center responsible for monitoring and analyzing security incidents?
- VULNERABILITY What do you call a programming flaw that can be exploited by attackers?
- RECOVERY What term describes a strategy for recovering from a cyber incident?
- A security measure that helps prevent unauthorized access to a network?
- WEB What term refers to the part of the internet that is not indexed by traditional search engines?
- What type of software is potentially unwanted and often bundled with legitimate software?
- What type of malware allows remote access to a user's device?
- What term refers to a security incident where sensitive data is accessed without authorization?
- DETECTION A tool or process for detecting unauthorized access to a system?
- A type of cyber attack where the attacker impersonates a legitimate user?
- TESTING A systematic examination of a system for security weaknesses?
- What term describes malicious code that appears legitimate?
- What term is used for a password that is difficult to guess?
- Which type of attack sends a flood of traffic to overwhelm a network?
- THEFT The unauthorized use of someone's personal data is known as?
- FLOOD What type of DDoS attack exploits the TCP handshake process?
- What type of encryption uses two different keys for encryption and decryption?
- The practice of obtaining sensitive information by deception is known as?
- What type of cryptographic attack tries all possible combinations of keys?
Down
- A method used to authenticate users based on physical characteristics?
- What do you call a security measure that uses two or more methods to verify identity?
- A series of steps taken to ensure the security of information systems?
- The information that is collected to assess vulnerabilities?
- SCANNING What is a method for identifying weaknesses in a system’s security?
- What is the process of converting plaintext into ciphertext?
- What type of software is designed to disrupt, damage, or gain unauthorized access to computer systems?
- A malicious user who seeks to exploit system vulnerabilities?
- The act of attempting to steal data through exploiting weak points?
- What refers to the principle of least privilege in cybersecurity?
- What technique uses social interactions to manipulate individuals into giving up confidential information?
- What type of malware can replicate itself and spread to other computers?
- The process of decoding information or data that has been encrypted?
- What is a security resource whose value lies in being probed, attacked, or compromised?
- A collection of related data that may be exposed during a breach is called?
- SCRIPTING What is the type of attack that injects malicious scripts into webpages viewed by users?
- ATTACK A planned attack to capture sensitive information over a network?
- IDS What term refers to a system that captures and stores network traffic?
- TOKEN What is a deceptive marker used to detect unauthorized access or data leaks?
- A malicious email that pretends to be from a trustworthy source?
40 Clues: What term describes malicious code that appears legitimate? • The information that is collected to assess vulnerabilities? • What is the process of converting plaintext into ciphertext? • What term is used for a password that is difficult to guess? • A malicious user who seeks to exploit system vulnerabilities? • ...
Technology 2025-03-10
Across
- Information that is processed or stored by a computer, such as numbers, text, or images.
- A machine that creates three-dimensional objects by layering materials based on a digital model or design.
- Something that exists or is simulated in a digital environment rather than in the physical world.
- A display screen that can detect and respond to touch input, allowing users to interact directly with the content displayed on the screen.
- The physical components of a computer system, such as the monitor, keyboard, hard drive, and motherboard.
- A collection of programs and data that instruct a computer on how to perform specific tasks or operations.
- The practice of protecting computers, networks, and digital data from theft, damage, or unauthorized access.
- The smallest unit of a digital image or display, often described as a tiny square of color that, when combined with others, forms a complete picture.
- A machine that is capable of carrying out complex tasks automatically or with minimal human intervention, often controlled by software or sensors.
- An unmanned aerial vehicle (UAV) that is controlled remotely or autonomously, often used for surveillance, photography, or delivery.
- A collection of related web pages that are identified by a common domain name and are accessible through the internet.
Down
- The simulation of human intelligence in machines, allowing them to perform tasks that typically require human cognition, such as learning, problem-solving, and decision-making.
- Short for "application," an app is a software program designed to perform specific tasks for the user, typically on a mobile device or computer.
- A machine that processes data, performs calculations, and executes instructions to carry out tasks like storing, retrieving, and manipulating data.
- A mobile phone that includes advanced features, such as internet connectivity, apps, and touchscreens, offering computing capabilities similar to a computer.
- Instructions written in a programming language that a computer can understand and execute to perform tasks or functions.
- A set of instructions written in a programming language that a computer can execute to perform specific tasks.
- A specialized electronic device designed for playing video games, typically connected to a television or monitor.
- A global network of interconnected computers and servers that allows communication and the sharing of data through websites, emails, social media, etc.
- A handheld pointing device used to interact with a computer's graphical user interface by moving a cursor on the screen.
- A wireless technology that allows devices to connect to the internet or a local network using radio waves, without physical cables.
- A network of remote servers that store and manage data over the internet, allowing users to access and share files and applications online.
- An input device consisting of keys that allow users to type letters, numbers, and commands into a computer or mobile device.
- Describes information that is represented in the form of binary code (0s and 1s) and processed electronically, as opposed to analog data.
- A system for sending and receiving messages electronically over the internet, typically using an email address.
25 Clues: Information that is processed or stored by a computer, such as numbers, text, or images. • Something that exists or is simulated in a digital environment rather than in the physical world. • The physical components of a computer system, such as the monitor, keyboard, hard drive, and motherboard. • ...
Extra Credit Vocab Crossword 2023-11-06
Across
- A countless or extremely great number
- A large or excessive amount of something
- Present, appearing, or found everywhere
- Go without something desirable
- A very helpful or valuable event, person, or thing
- Officially allow someone to do something
- Clearly show the existence or truth of something by giving proof or evidence
- Showing or characterized by a tendency to commit crime, particularly minor crime
- Existing in thought or as an idea but not having a physical or concrete existence
- Observe and check the progress or quality of something over a period of time; keep under systematic review
- Made or adapted for a particular purpose or person
- One's opponent in a contest, conflict, or dispute
- Moved suddenly and powerfully forward or upward
- Pertaining to monetary receipts and expenditures; or involving fiscal matters
- Evoking interest, attention, or admiration in a powerfully irresistible way
- Favorable or advantageous; resulting in good
- Make something greater by adding to it; increase
- Based on or in accordance with what is generally done or believed
- Measures taken to protect a computer or computer system against unauthorized access or attack
- Break or fail to comply with a rule or formal agreement
- Make something on a large scale using machinery
- Actively break the terms of a law, agreement, etc.
- Likely or liable to be influenced or harmed by a particular thing
- Exceeding the bounds of custom, propriety, or reason, especially in amount or extent; highly excessive
Down
- A consequence of an action or event, especially when complex or unwelcome
- Place or arrange things in a straight line
- Potential, likely or expected
- Causing harm or damage
- Perceptible by touch
- Imprison or confine
- The practice of spying or of using spies, typically by governments to obtain political and military information
- Cost The loss of potential gain from other alternatives when one alternative is chosen
- Use one's authority to reject or cancel a decision, view, etc.
- Pertaining to monetary receipts and expenditures; involving fiscal matters
- Illegally obtain money from someone by deception
- Turn an activity into a criminal offense by making it illegal
- Obtain goods or a service from an outside or foreign supplier, especially in place of an internal source
- Kill, destroy, or remove a large percentage of
- A place, meeting, or medium where ideas and views on a particular issue can be exchanged
- Failed to be noticed or considered
- Relating to relationships or communication between people
- A situation of severe trial, or in which different elements interact, leading to the creation of something new
- Of great importance or necessary
- Pretend to be another person as a means of deception
- A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer
- A person who organizes and operates a business or businesses, taking on greater than normal financial risks in order to do so
- Favorable or advantageous; resulting in good
- Made thinner or weaker by adding water or another solvent to it
- Without being affected by; in spite of
49 Clues: Imprison or confine • Perceptible by touch • Causing harm or damage • Potential, likely or expected • Go without something desirable • Of great importance or necessary • Failed to be noticed or considered • A countless or extremely great number • Without being affected by; in spite of • Present, appearing, or found everywhere • A large or excessive amount of something • ...
The Virtual World 2024-02-28
Across
- A program that searches for and identifies items in a database that correspond to keywords or characters specified by the user.
- Communication in real-time over the internet, typically text-based.
- Controls that allow users to determine how much information they want to share with others on digital platforms.
- A security process in which users provide two different authentication factors to verify themselves.
- A live, visual communication between two or more people via computer or mobile device.
- A security system designed to prevent unauthorized access to or from a private network.
- The network of physical devices embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.
- The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- A collection of web pages accessible via the internet.
- The identification or estimation of the real-world geographic location of an object, such as a mobile device or internet-connected computer.
- A secret word or phrase used for authentication and to gain access to a system.
- Measures taken to protect computer systems and data from unauthorized access or cyber attacks
- A machine that processes data and performs tasks according to a set of instructions.
- The unauthorized access, disclosure, or acquisition of sensitive information.
- A software agent that assists users with tasks or provides information in a virtual environment.
- Connected to or accessible via the internet.
- Transfer data from a remote computer to a local device.
- A unique name used to identify oneself on a computer system or online platform.
- The process of converting information or data into a code to prevent unauthorized access.
Down
- A global network connecting millions of computers worldwide.
- The fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising oneself as a trustworthy entity.
- Software designed to disrupt, damage, or gain unauthorized access to computer systems.
- The trail of data left behind by users when they interact with digital platforms.
- A digital representation of a user in a virtual environment.
- A simulated experience that can be similar to or completely different from the real world.
- An enhanced version of reality where computer-generated information is overlaid on the real world.
- The online representation of an individual's identity, based on data attributes and activities associated with that individual.
- Electronic mail sent and received via the internet.
- The virtual environment created by interconnected computer systems.
- Transfer data from a local device to a remote computer.
- The delivery of computing services—such as servers, storage, databases, networking, software, and analytics—over the internet.
- The act of playing electronic games, often on devices such as computers, consoles, or mobile phones.
- Transmitting or receiving data, typically audio or video, over a computer network in real-time.
- Software used to access and view websites on the internet.
- Websites and applications that enable users to create and share content or participate in social networking.
35 Clues: Connected to or accessible via the internet. • Electronic mail sent and received via the internet. • A collection of web pages accessible via the internet. • Transfer data from a local device to a remote computer. • Transfer data from a remote computer to a local device. • Software used to access and view websites on the internet. • ...
CyberCitizen 2026-03-06
Across
- A security method that uses physical characteristics like fingerprints or facial recognition to secure devices or accounts.
- Making sure information and systems can be used when needed.
- Creating a copy of your digital information (files, folders, databases, applications, etc.) and storing it in a separate location.
- Ensuring information stays correct and unchanged.
- Records that document each visitor's entry and exit, typically capturing essential information such as the visitor's name, the date and time of arrival, the purpose of their visit, who they are visiting, and their departure time.
- Strange actions or performance on a computer that could signal a cyberattack.
- The process of sending data from one device or location to another.
- A long-term cyberattack where hackers secretly gather information.
- A type of phishing attack where malicious links or deceptive content are embedded within an image in an email or on a website, rather than in plain text.
- A digital service or system that enables users to store, access, and distribute electronic files with others.(GDPR) An EU law protecting the personal data and privacy of individuals within the European Union, with global impact.
- A senior-level executive responsible for establishing and maintaining an organization's information security program. They are the ultimate authority and expert on data protection within the company.
Down
- A team of cybersecurity experts who monitor, detect, and respond to threats targeting an organization’s networks, systems, and data.
- The act of adhering to rules, regulations, laws, standards, and ethical guidelines that are applicable to an organization, industry, or individual.
- designed to detect and remove computer viruses.
- The process of deleting stored data from websites in your web browser. This helps remove personal information, login details, and browsing history, enhancing privacy and security.
- Rules that define and control who (users, applications, services) can access specific resources (data, applications, infrastructure) and what actions they are allowed to perform within the cloud environment.
- A security process that requires users to provide two or more verification factors to gain access to an online account, application, network, or other resource.
- A Canadian federal law that governs how private-sector organizations collect, use, and disclose personal information during commercial activities.
- Electronic keys that grant or restrict entry to specific areas or resources.
- A US-based law protecting the privacy and security of individuals' health information.
- A misleading or exaggerated headline, image, or link designed to attract clicks, often by creating curiosity or excitement.
- A computer program that automatically performs tasks, often used to send spam or create fake accounts.
- Errors in computer programs that cause problems or slow performance.
- A feature in cloud storage and file-sharing platforms that allows users to generate a unique web link (URL) to a specific file or folder stored in the cloud. This link can then be shared with others, granting them access to view, download, and sometimes even edit the content, depending on the permissions set by the owner.
- A security tool used by websites to differentiate humans from computer programs or bots.
25 Clues: designed to detect and remove computer viruses. • Ensuring information stays correct and unchanged. • Making sure information and systems can be used when needed. • A long-term cyberattack where hackers secretly gather information. • The process of sending data from one device or location to another. • ...
4. Computer security 2024-06-18
Across
- The process of making data in a computer system unintelligible.
- Any software which has been written with the intent to cause disruption, damage or inconvenience.
- A form of identification and authentication which relies on comparing scans of e.g. your face, fingerprints, eye retina etc with a stored set of information."
- Any system which periodically checks and downloads / updates software to make sure it always has the latest bug fixes and enhancements.
- The amount of access a given user is allowed to a computer. On a network most users will have restricted access. Whereas a systems administer or network technician would be allowed much greater access with fewer restrictions.
- that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- A program that appears harmless, but is, in fact, malicious."
- A computer application used in a network to prevent external users gaining unauthorised access to a computer system.
- A group of software policies and written procedures which together help to enhance and maintain the security of data held on a computer network.
- Sending emails purporting to be from reputable companies to induce people to reveal personal information.
- A cyber attack intended to redirect a website's traffic to another, fake site.
- The act of creating and using an invented scenario to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances.
Down
- Testing designed to check the security and vulnerabilities of a system.
- The processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.
- The process by which a user logging into a system can be checked and verified before being given access.
- Allows devices to access, or be blocked from accessing a network based on their physical address embedded within the device’s network adapter.
- A computer program or system intended to distinguish human from machine input, typically as a way of thwarting spam and automated extraction of data from websites."
- that automatically displays or downloads advertising material such as banners or pop-ups when a user is online.
- Most vulnerabilities are caused by humans. Not locking computers. Using insecure passwords. Not following/poor company network policies. Not installing protection software. Not being vigilant with email/files received. Not encrypting sensitive data.
- A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data."
- A broad terms that covers all software written to cause loss of data, encryption of data, fraud and identity theft.
- Observing a person's private information over their shoulder eg cashpoint machine PIN numbers.
- Any storage media which can easily be removed from a computer thus allowing the transport of data away e.g. Optical Disk, flash / USB pen etc.
- A secret word or phrase that must be used to gain access to a computer / program / interface / system.
24 Clues: A program that appears harmless, but is, in fact, malicious." • The process of making data in a computer system unintelligible. • Testing designed to check the security and vulnerabilities of a system. • A cyber attack intended to redirect a website's traffic to another, fake site. • ...
Jasper's CJR Cyber Security Terms 2024-08-02
Across
- ___ bombards users with endless ads and pop-up windows and causes a nuisance to the user experience.
- ___ is the name commonly given to unsolicited emails.
- ____ is a process of maintaining data confidentiality by converting plain data into secret code with the help of an encryption algorithm.
- ____ is a general term for any type of intrusive computer software with malicious intent against the user.
- ___ ___ is the deliberate theft of sensitive data by nefarious actors.
- Bring Your Own Device (abbreviation)
- A ___ is a malicious computer program that is often sent as an email attachment or a download with the intent of infecting that device.
- ____ is malware that uses scare tactics, often in the form of pop-ups that falsely warn users they have been infected with a virus
- _____ relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked.
- Breach A __ ___ is the event of a hacker successfully exploits a network or device vulnerability and gains access to its files and data.
- _____ is the name given to malicious programs designed to extort money from victims by blocking access to the computer or encrypting stored data.
- A ___ is a program that automates actions on behalf of an agent for some other program or person and is used to carry out routine tasks.
- A ____ is a security system that forms a virtual perimeter around a network of workstations preventing viruses, worms, and hackers from penetrating.
- ____ is a type of internet fraud that seeks to acquire a user’s credentials by deception. It includes the theft of passwords, credit card numbers, bank account details, and other confidential information.
Down
- _____ is the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
- A ____ is a collection of compromised computers running malicious programs that are controlled remotely by a C&C (command & control) server operated by a cyber-criminal.
- ____ is software that is secretly installed on a user’s device to gather sensitive data.
- _____ is the process of verifying the identity of a user or piece of information and the veracity of the information provided.
- Force Attack This is a method for guessing a password (or the key used to encrypt a message) that involves systematically trying a high volume of possible combinations of characters until the correct one is found.
- The __ __ is encrypted parts of the internet that are not indexed by search engines, most notoriously used by all types of criminals
- _____ is the process of decoding cipher text to plain text so that it is readable by humans. It is the reverse of encryption
- A ___ is a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system.
- ___ solutions integrate the latest generation of virus detection technology to protect users from viruses, spyware, trojans, and worms
- ____ ____ are features which may be included in digital television services, computer and video games, mobile devices, and software that allow parents to restrict the access of content to their children.
24 Clues: Bring Your Own Device (abbreviation) • ___ is the name commonly given to unsolicited emails. • ___ ___ is the deliberate theft of sensitive data by nefarious actors. • ____ is software that is secretly installed on a user’s device to gather sensitive data. • ___ bombards users with endless ads and pop-up windows and causes a nuisance to the user experience. • ...
Midterm Vocabulary Review Crossword 2025-12-22
Across
- A function that calculates the midpoint value of a range of data.
- The trail of data left behind by individuals on the internet, including their online activities, interactions, and information.
- The combination of the impact of a negative event with the likelihood of that event happening.
- The use of deception to manipulate individuals into giving away sensitive information or making risky decisions.
- Any program designed to compromise a computer's security.
- A vertical group of cells in a worksheet identified by letters.
- Something of value that needs protection from accidental damage and intentional harm.
- A symbol that tells Google Sheets you are including all cells from the first referenced cell to the last referenced cell.
- A document that may contain multiple worksheets.
- A symbol that lets Google Sheets know you're going to do a calculation.
- A function that calculates the mean of a range of data.
- An individual or group seeking to breach or undermine systems and data security.
- The act of using someone's personal information to access or open accounts in their name.
- A flaw or weakness that may allow harm to an asset.
- An attempt to damage, destroy, or gain access to a computer network or system.
- The use of unique biological traits, such as fingerprints or facial recognition, to authenticate and grant access to systems or devices.
Down
- The process of verifying the identity of a user, device, or system.
- A single page of cells in Google Sheets.
- Formatting that is applied to a cell based on specific criteria.
- A symbol used to multiply cell values together.
- The consequences of assets being compromised or destroyed.
- Deceptive actions intended to result in financial or personal gain.
- A computer application, device, or system that can cause damage.
- A symbol used to subtract cell values from one another.
- A function that allows a range of cell values to be added together.
- An authentication method that requires users to provide two or more forms of identification or verification to access a system or account.
- The probability of an event occurring.
- A single box on a spreadsheet.
- The act of falsifying data or identity information to mimic a legitimate source with the intent to deceive or gain unauthorized access.
- Symbols used to enclose a range of cells in a function.
- A function that identifies the largest value in a group.
- The practice of protecting systems, networks, and programs from digital attacks.
- A function that identifies the smallest value in a group.
- A security process that requires users to provide two distinct methods to confirm their identity.
- Emailing pretending to be from a known source to trick users into revealing their login credentials.
- A group of multiple cells that run across a row or column.
- A function that calculates the most common value in a range of data.
- A horizontal group of cells in a worksheet identified by numbers.
38 Clues: A single box on a spreadsheet. • The probability of an event occurring. • A single page of cells in Google Sheets. • A symbol used to multiply cell values together. • A document that may contain multiple worksheets. • A flaw or weakness that may allow harm to an asset. • A symbol used to subtract cell values from one another. • ...
cybersecurity-day-mfa-booth-dry-run 2025-10-13
4 Clues: - TOTP factor whose codes are protected by a FIDO credential. • - Mobile‑friendly MFA factor that sends a tap‑to‑approve prompt. • - WebAuthn credential stored on the user’s device for passwordless sign‑in. • - Open authentication standard that reduces reliance on passwords/OTPs (abbr.).
Cybersecurity Day - MFA Booth - Set 4 2025-10-13
4 Clues: Login method requiring two or more verification steps • Security protocol enabling strong, password‑free login • Application that generates one‑time passcodes using TOTP • Fraudulent attempt to steal sensitive information by pretending to be a trusted source
Cybersecurity Day - MFA Booth - Set 2 2025-10-13
4 Clues: One‑time passcode generated using a counter • Login method using fingerprint or facial recognition • Login method requiring two or more verification steps • Fraudulent attempt to steal sensitive information by pretending to be a trusted source
Cybersecurity on the Go: Keeping Your Mobile Devices Safe 2024-09-11
7 Clues: Public hotspots are risky • Regularly improve software • The digital stuff hackers want • What you need to keep your device • Wireless short-range connection tech • What you enter to unlock your device • Something you should only download from trusted sources
Cybersecurity awareness puzzle 2023-09-20
GenCyber Cybersecurity Concepts 2022-06-08
Cybersecurity in Tourism 2025-07-06
Cybersecurity Day 1 2022-07-03
A spot-the-threat challenge with 8 hidden cybersecurity risks 2025-04-17
Across
- Software that secretly gathers information about a person or organization without their knowledge.
- A cyberattack where a person or program disitself guises as another by falsifying data to gain an advantage.
- A type of malware disguised as legitimate software that tricks users into installing it.
- Malicious software designed to harm, exploit, or disable computers and networks.
- Synthetic media in which a person in an image or video is replaced with someone else's likeness using AI.
Down
- A type of cyberattack where attackers pretend to be a trustworthy entity to steal sensitive information.
- A type of malware that locks or encrypts data and demands payment for its release.
- A network of private computers infected with malicious software and controlled as a group.
8 Clues: Malicious software designed to harm, exploit, or disable computers and networks. • A type of malware that locks or encrypts data and demands payment for its release. • A type of malware disguised as legitimate software that tricks users into installing it. • A network of private computers infected with malicious software and controlled as a group. • ...
Cyber and Digital literacy 2024-04-30
Across
- Visual representations or pictures, often stored or transmitted electronically.
- Secret code or phrase used to access a secure system or account.
- Global network connecting computers and other devices, enabling communication and information exchange.
- Taking responsibility for one's actions or decisions.
- To create, improve, or advance something, often in the context of software or technology.
- Framework or infrastructure enabling the development and operation of software applications.
- A group of people sharing common interests or characteristics, often interacting online.
- Unauthorized access to computer systems or networks, often for malicious purposes.
- Knowledge or skill gained from direct observation or participation in events or activities.
- Comprehension or grasp of the meaning or significance of something.
- Deceptive schemes or fraud conducted via the internet.
- Organized and interconnected set of components or elements working together to achieve a common purpose.
- Tools and techniques for practical purposes, often involving machinery and equipment.
- Data that provides knowledge or insight about a particular subject.
- Information, facts, or skills acquired through learning or experience.
- Online platforms facilitating social interaction and content sharing.
- Writing and organizing instructions for computers to execute specific tasks or functions.
- The realm of existence shaped by digital technology, encompassing online platforms and interactions.
- Programs and applications used to operate computers and perform tasks.
- Various channels for information dissemination, like TV, radio, and the internet.
- Potential dangers or risks to security, often in the context of cybersecurity.
- Interconnected system or group, particularly in the context of computers and communication.
- Steps or directions for completing a task or operating a system.
- Working together with others to achieve a common goal or objective.
- Exchanges or communications between individuals or entities, often in a digital context.
- Written or printed words, often in electronic form.
- Distinctive characteristics or qualities that distinguish an individual or entity.
- Unsolicited or unwanted email messages, often sent in bulk.
Down
- Verification of the identity or legitimacy of a user or entity accessing a system or service.
- Protection of personal or sensitive information from unauthorized access or use.
- Capacity for understanding, reasoning, and adapting to new situations.
- Tools or instruments, particularly electronic gadgets like smartphones and computers.
- Sets of instructions or code designed to perform specific tasks on a computer.
- Criminal activities carried out using digital technology or the internet.
- Software or applications used to perform tasks or solve problems in the digital domain.
- Having the ability to read, write, and understand information in a particular context.
- The surroundings in which something exists or operates, including the digital landscape.
- Exchange of information or messages between individuals or groups.
- Monitoring or following the movement or behavior of something or someone, often online.
- Capacity to perform or achieve a task or function.
- Process of changing from one state, condition, or activity to another.
- Relating to or involving computer technology and electronic data.
- Shared beliefs and practices within a group.
- Software designed to detect and remove malicious software from computer systems.
- Knowledge or perception of a situation or fact.
- Moral principles guiding behavior and decision-making.
- Mental abilities related to thinking, learning, and problem-solving.
- Position or function assumed by an individual within a group or system.
- Legal regulations governing behavior and activities in the digital realm.
- State of being protected from harm or danger.
50 Clues: Shared beliefs and practices within a group. • State of being protected from harm or danger. • Knowledge or perception of a situation or fact. • Capacity to perform or achieve a task or function. • Written or printed words, often in electronic form. • Taking responsibility for one's actions or decisions. • Deceptive schemes or fraud conducted via the internet. • ...
History of Innovation 2024-07-20
Across
- Device invented by Alexander Graham Bell for voice communication.
- The use of microorganisms to consume and break down environmental pollutants.
- The study of the magnetic properties and behavior of electrically conducting fluids.
- A mobile phone with advanced features, including internet access and apps.
- Invention bringing moving pictures into homes.
- Creating three-dimensional objects from a digital file.
- Thomas Edison's bright idea that lit up the world.
- Manipulation of matter on an atomic or molecular scale.
- The use of living systems and organisms to develop products.
- Vehicle designed for space travel.
- Protection of internet-connected systems from cyberattacks.
- Large and complex data sets analyzed to reveal patterns and trends.
- Machine for processing data, transforming modern life.
- Related to the direct conversion of temperature differences to electric voltage.
- Alexander Fleming's discovery, a life-saving antibiotic.
- Instrument to observe tiny organisms.
- A revolutionary gene-editing technology.
- Edison's device recording and reproducing sound.
- The process of preserving cells, tissues, or organs by cooling to very low temperatures.
- A vehicle powered by both an internal combustion engine and an electric motor.
- The basic mechanism by which certain materials form permanent magnets.
- A single layer of carbon atoms with exceptional strength and conductivity.
- A biological preparation providing immunity against diseases.
- Simulation of human intelligence in machines.
- A device converting sunlight into electricity.
- Gutenberg's innovation spreading knowledge.
- Object orbiting Earth, revolutionizing communication.
- The design and manufacture of devices with dimensions measured in nanometers.
- A simulated experience that can be similar to or completely different from the real world.
Down
- Limitless or endless in space, extent, or size; impossible to measure or calculate
- Internal combustion engine powering vehicles.
- A vehicle capable of sensing its environment and moving safely with little or no human input.
- The use of unmanned aerial vehicles to transport goods.
- Technology for converting light into electricity using semiconducting materials.
- A robot designed to resemble the human body.
- A wearable computer in the form of a watch.
- A device that performs computations using quantum-mechanical phenomena.
- Measuring and analyzing physical and behavioral characteristics for authentication.
- An enhanced version of the real world created using digital elements.
- The study of genomes, the complete set of DNA in an organism.
- Marconi's invention transmitting sound through airwaves.
- The process of transferring power to a device without using a physical connection.
- Vessel navigating underwater.
- An emerging technology that exploits the intrinsic spin of electrons.
- James Watt's invention powering the Industrial Revolution.
- Volta's creation storing electrical energy.
- Securing communication using principles of quantum mechanics.
- A decentralized digital ledger technology.
- Device for observing distant celestial objects.
- A substance composed of antiparticles, having opposite properties to those of normal matter.HOTOLITHOGRAPHY - A process used in microfabrication to pattern parts of a thin film.
- A proposed high-speed transportation system using pods in low-pressure tubes.
- Treating diseases by modifying genes.
- Global network enabling information exchange.
- A high-capacity capacitor with a higher energy density than conventional capacitors.
- Interconnected devices communicating over the internet.
- An electricity supply network that uses digital communications technology.
- Light amplification by stimulated emission of radiation.SEMICONDUCTOR - Material used to control electrical current in electronic devices.
- Wright brothers' invention that took flight.
- Fundamental energy form powering innovation.
59 Clues: Vessel navigating underwater. • Vehicle designed for space travel. • Treating diseases by modifying genes. • Instrument to observe tiny organisms. • A revolutionary gene-editing technology. • A decentralized digital ledger technology. • A wearable computer in the form of a watch. • Volta's creation storing electrical energy. • Gutenberg's innovation spreading knowledge. • ...
krzzowka 2023-03-07
Across
- agriculture the use of technology, such as sensors and drones, to optimize crop production and reduce waste.
- technology technology devices that can be worn on the body, such as smartwatches or fitness trackers.
- computing a type of computing that uses quantummechanical phenomena, such as superposition and entanglement, to perform operations on data.
- media online platforms that allow users to create and share content and interact with others, often used for communication and marketing.
- the use of living organisms or their components to develop products or improve processes, such as genetic engineering or biopharmaceuticals.
- reality the overlaying of digital information, such as images or text, onto the real world through a device such as a smartphone or headset.
- of Things the network of physical objects embedded with sensors, software, and connectivity, enabling them to collect and exchange data.
- technology technology that promotes sustainability and environmental protection, such as renewable energy or energyefficient buildings.
- learning a type of artificial intelligence that allows computer systems to learn and improve from experience without being explicitly programmed.
- printing the process of creating physical objects from digital designs by layering material, often used in manufacturing and prototyping.
- the design, construction, and operation of robots, which can perform tasks that are dangerous, difficult, or repetitive for humans.
- computing a type of computing that mimics human thought processes, such as language processing and decision making.
- transformation the use of digital technology to fundamentally change how organizations operate and deliver value to customers.
- the buying and selling of goods and services over
- vehicles vehicles that can operate without human intervention, such as selfdriving cars or drones.
- engineering the application of engineering principles and techniques to develop medical devices, treatments, and therapies.
- reality the simulation of a threedimensional environment that can be interacted with through a headset or other device, often used for gaming or training.
Down
- energy energy sources that are replenished naturally, such as solar, wind, or hydroelectric power.
- the manipulation of matter on a molecular or atomic scale to create new materials, devices, and systems with unique properties.
- cities cities that use digital technology and data to improve infrastructure, services, and quality of life for residents.
- the practice of protecting computer systems, networks, and sensitive information from theft, damage, or unauthorized access.
- the use of technology to provide remote medical care, such as teleconferencing or remote monitoring.
- intelligence the simulation of human intelligence processes by machines, especially computer systems.
- vehicles vehicles powered by electric motors and batteries rather than internal combustion engines.
- the ability to maintain a certain level of economic and social development without depleting natural resources or harming the environment.
- data extremely large datasets that can be analyzed to reveal patterns, trends, and associations, especially relating to human behavior and interactions.
- computing the use of remote servers hosted on the internet to store, manage, and process data, rather than using a local server or personal computer.
- exploration the discovery and study of outer space, including planets, stars, and galaxies, often done through the use of spacecraft.
- a decentralized, distributed ledger technology that allows for secure and transparent transactions without the need for intermediaries.
29 Clues: the buying and selling of goods and services over • energy energy sources that are replenished naturally, such as solar, wind, or hydroelectric power. • vehicles vehicles that can operate without human intervention, such as selfdriving cars or drones. • the use of technology to provide remote medical care, such as teleconferencing or remote monitoring. • ...
Crossword 2024-09-08
Across
- showing good judgment, especially about style and quality
- a person responsible for examining books, films, works of art, or communications, and deciding whether to prevent parts or the whole of them from being seen or made available to the public because they are considered to be offensive or harmful, or because they contain information that someone wishes to keep secret, often for political reasons.
- referring to detailed information about someone's body, such as the patterns of colour in their eyes, that can be used to prove who that person is
- the central or main part of something where there is most activity.
- someone's right to keep their personal matters and relationships secret
- to change something such as a document to a digital form
- the act by newspapers, television, etc. of presenting information in a way that is shocking or exciting
- the use of machines and computers that can operate without needing human control
- the situation in which information, entertainment, etc. is intended for a particular group of people.
- to put too much electricity through an electrical system
- a small plastic or rubber object with two or three metal pins, attached to the end of a wire on a piece of electrical equipment and pushed into a special opening in a wall to connect the equipment to a supply of electricity.
- a camera that records moving pictures and sound and allows these to be broadcast on the internet as they happen
- a plan to deceive someone, such as telling the police there is a bomb somewhere when there is not one, or a trick
- (a piece of) film especially one showing an event.
- to increase a lot and suddenly in number
- the fact that someone or something can be believed or trusted
Down
- a device that is used to record that something is present or that there are changes in something.
- the quality of being honest and having strong moral principles that you refuse to change
- wrong information, or the fact that people are misinformed.
- a new idea or method
- things that are done to protect a person, organization, or country and their computer information against crime or attacks carried out using the internet
- a set of mathematical instructions or rules that, especially if given to a computer, will help to calculate an answer to a problem
- a person who is interested in modern technology and enjoys using it
- a system of accepted beliefs that control behaviour, especially such a system based on morals
- a situation in which a place is too blocked or crowded, causing difficulties.
- a type of plug that makes it possible to connect two or more pieces of equipment to the same electrical supply
- not supported by facts
- the fact of being responsible for what you do and able to give a satisfactory reason for it, or the degree to which this happens
- a set of headphones, especially one with a microphone attached to it
- a situation in which you need something or someone and are unable to continue normally without them
- a device that is used to recharge a battery
- willingness to believe that something is real or true, especially when this is unlikely
32 Clues: a new idea or method • not supported by facts • to increase a lot and suddenly in number • a device that is used to recharge a battery • (a piece of) film especially one showing an event. • to change something such as a document to a digital form • to put too much electricity through an electrical system • showing good judgment, especially about style and quality • ...
Safe Internet 2025-02-12
Across
- Originally ... was an email message sent to a large number of people without their consent, usually promoting a product or service.
- A global computer network providing a variety of information and communication facilities.
- A social networking website that lets users create their own profiles, share status updates, pictures, videos and chat with other users.
- ... is the activity of playing video games.
- A ... is some data stored on a computer.
- ... is an online service which allows people to put up web pages. The web is made up of many billions of separate web pages each stored on a web server.
- ... is the state or application of technologies, processes and controls to protect networks, programs, data and users from cyber attacks and the risks of using the internet.
- ... means to copy information from your internet-enabled device to the internet.
- A program or piece of software designed to fulfil a particular purpose and is usually downloaded by a user to a mobile device.
- ... are instructions that a computer program follows to perform a certain task.
- In internet slang, a ... is a person who posts inflammatory comments or messages in an online community such as a forum, chat room, blog or on social networking sites.
- A ... is a piece of software that can do different things such as delete files, steal data or even take over computers for hackers to control.
- An ... is where you find a particular web page or website on the internet, also known as a URL.
- ... refers to the username and password you use to sign into an online account.
Down
- ... software is a program that is used to detect, prevent, and remove viruses on your computer or mobile device or that are sent to you in an email, chat message or on a web page.
- A ... is a person who who gains unauthorised access to data, remotely, using a computer or mobile device.
- A ... is a program that allows you to use the World Wide Web to view internet pages.
- A ... is a small file that is sent to a web browser by a server and stored on the user’s computer.
- ...is information, stored on computers and other storage devices.
- A number of computers that are linked together so that they can exchange data.
- These are the buttons on a web page that enable you to move around a site.
- An abbreviation for World Wide Web.
- A ... is a software program or piece of hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet.
- A ... is a place on the internet where you can chat to one or more people.
- Clicking on it will take you to a pre-defined location, such as another web page, or cause a document to open in your browser.
- If you are ... you are connected to the internet and can share data with other computers.
- An attempt to trick people into visiting malicious websites by sending emails or other messages which pretend to come from banks or online shops.
- ... is the machinery, wiring, and other physical components of a computer system.
- ... is a way to exchange messages over the internet.
29 Clues: An abbreviation for World Wide Web. • A ... is some data stored on a computer. • ... is the activity of playing video games. • ... is a way to exchange messages over the internet. • ...is information, stored on computers and other storage devices. • These are the buttons on a web page that enable you to move around a site. • ...
People, Policies, Priorities, and Puzzles: LFL 2025 2024-12-18
Across
- ____ enrollment programs allow high school students to earn college credits while learning job skills
- The term for this legislative leader originated from a hunting phrase for someone who keeps hounds together during a chase
- Chamber-backed policy that ensures consistent regulations across cities and avoids a patchwork of local rules.
- In 2023, Arizona adopted this kind of income tax system, which applies rates equally to alltaxpayers regardless of income
- Rep. _________ was rated the most bipartisan member of Arizona’s Congressional delegation in 2024
- The Chamber promotes expanding access to affordable ___ care to boost workforce productivity.
- Arizona is home to the largest power plant of this type in the U.S
- Arizona leads the nation in producing these critical tech components
- This company’s investment in Arizona represents the largest foreign direct investment for a greenfield project in U.S. history.
- The Chamber celebrated the defeat of Prop. 499, which would have threatened this city’s tourism sector, cost jobs, and raised taxes.
- The Chamber emphasizes this as a top priority to protect businesses from data breaches and digital threats.
- The Chamber strongly advocates to preserve Arizona's status as a ____ __ ____ state, which protects workers from mandatory union membership
- The Chamber strongly supported Prop. 312, a ballot measure that is already forcing cities to take action on __________.
- This type of legislative committee resolves differences between House and Senate bills
- Arizona’s largest electric utility
- The Chamber helps businesses stay competitive by reducing tax _____
Down
- The Chamber supports the expansion of this infrastructure to connect rural communities.
- The Arizona Chamber strongly supports _____ _____ polices that allow families to select the best education options for their kids
- The Chamber advocates for this type of permitting to speed up business growth
- The Chamber defends policies that foster innovation and protect these intellectual assets.
- International trade agreement crucial for Arizona exports
- Happy Anniversary! This year, the Chamber celebrated ________ years as the leading statewide business advocate at the state Capitol.
- The Chamber supports this U.S. Senate procedure for promoting compromise, protecting minority voices, and preventing rushed legislation.
- The Chamber advocates for balanced and reasonable air quality standards to address this pollutant without stifling economic growth.
- The presenting sponsor of LFL 2025, this company has invested more than $10 billion to develop and commercialize smoke-free products
- Federal funding program designed to bolster domestic production of semiconductors
- Voter-approval of Prop. 479 will ensure continued funding for vital _________ projects.
- The Chamber opposes these government-imposed limits that distort markets and stifle competition
- A meeting where legislators of the same party discuss legislative strategy
- The _____ Commission regulates utilities and has jurisdiction over rates and service standards
- Addressing shortages in this area is key to ensuring Arizona’s economic growth and competitiveness
- This type of veto power allows the governor to reject specific items in a budget bill without vetoing the entire bill
- Arizona's constitution requires a ______majority vote on legislation that imposes orincreases a tax
- Process by which citizens can propose or repeal laws through a vote
- The chamber of the legislature where spending must originate
- A session called by the governor outside of the regular calendar
- A massive hotspot for semiconductors and other advanced manufacturers, Phoenix has been dubbed the _____ Desert.
37 Clues: Arizona’s largest electric utility • International trade agreement crucial for Arizona exports • The chamber of the legislature where spending must originate • A session called by the governor outside of the regular calendar • Arizona is home to the largest power plant of this type in the U.S • Process by which citizens can propose or repeal laws through a vote • ...
Niedols Anisimovičs 2025-04-30
Across
- Core part of software that runs all of the code
- Wireless technology standard with a short range, typically used to connect a phone to headphones
- Term used to define a backbone for systems to be built on top of
- Used in mass communication in the form of text, audio, video or graphics
- A set of instructions that a computer follows to reach a specific result, whether it's a simple calculation or something more complex
- Any device which is able to process data, as long as it has a processor and RAM as its backbone
- A place where data is stored, usually organized and structured
- The brains of a computer that performs most operations, filled with many transistors
- An electrical network with a closed loop, which possesses many components that are interconnected within it
- Memory used by BIOS
- Large servers that process an enormous amount of data, typically centralized
- Computers that are set to revolutionize the future using qubits
- Branch of science focusing on atomic-scale technology
- Masking data in a way only authorized people may access it in plain text
- Unit of data containing and converting to exactly 8 bits
- Small, flying robot controlled using a remote, typically has a display as well
- A machine that's designed to carry out complex tasks, eases automation
- Obsolete storage technology within a square plastic enclosure
- Additional devices you connect to a computer to extend its functionality
- Something you visit using a browser
- Any type of application that runs on a computer
- A process of making things operate without human interference, automatically
- The process of resolving problems or faulty code within a program
- Combination of software and hardware working together to act as a unified group
Down
- A type of computer that acts as a service provider, hosting things like pages or files
- Set of rules for handling data
- The component in a computer that acts as a spine, allowing other components to talk to each other
- The core of any operating system, which has total control over how your computer functions
- Any physical part of a computer
- A decentralized network everyone connects to daily
- White hat hackers tend to occupy themselves with protecting systems. What's the word for such practice?
- In simple terms, high-speed internet access, typically a wide-bandwidth transmission
- A network of remote servers, typically for storage, for example, Google Drive
- Introduction of new technologies or products destined to solve many problems
- Blue processor manufacturer which is currently losing its market
- Device responsible for bringing internet to any and all homes
- An operating system used commercially on most phones
- Anything powered by electricity, as well as a study of devices capable of manipulating electron particles
- Microsoft tends to fill up their operating system with all sorts of trash. What's it called?
- A way to communicate far apart using any cellular device
- A way of mimicking existing systems and having the ability to test different scenarios for science
- A program that assists you with displaying information from the web
- Information used and interpreted by computers, always a collection of strings, numbers
- Scientists producing materials at super cold temperatures, also relates to freezing people alive
- Usually a specialized tool that performs specific tasks, similar to gizmo
45 Clues: Memory used by BIOS • Set of rules for handling data • Any physical part of a computer • Something you visit using a browser • Core part of software that runs all of the code • Any type of application that runs on a computer • A decentralized network everyone connects to daily • An operating system used commercially on most phones • ...
Overall Safety Management for ISO 26262 2018-02-12
Across
- During the execution of the safety ________, the organization shall perform the required functional safety activities, including the production and management of the associated documentation in accordance with ISO 26262-8:2018, Clause 10.
- A safety anomaly shall only be considered as managed to the end, if an adequate safety _____ is implemented that resolves the safety anomaly, based on a rationale, or
- The rationale for a safety anomaly managed to closure, in accordance with 5.4.3.3, shall be be ________, for example as part of the functional safety assessment in accordance with 6.4.9.
- The organization shall institute, execute and maintain a ______ improvement process, based on:
- An organization may _____ the safety lifecycle for application across items or elements
- The organization shall institute and maintain effective _______ channels between functional safety, cybersecurity and other disciplines that are related to functional safety, if applicable.
- The organization shall institute, execute and maintain an improve the process, based on ____ from the experiences gained during the execution of the safety lifecycle of other items, including field experience; and
- The organization shall ensure that the persons responsible for achieving or maintaining functional safety, or for performing or supporting the safety activities, are given sufficient _____ to fulfill their responsibilities.
- The organization shall institute, execute and maintain an improve the process, based on _____ improvements for application on subsequent items.
- A safety anomaly shall only be considered as managed to the end, if an adequate safety process is implemented that resolves the safety anomaly, based on a rationale, or the safety anomaly is evaluated as not constituting an ____ risk and is disposed, based on a rationale.
- The organization shall institute, execute and maintain organization-______ rules and processes to achieve and maintain functional safety and to comply with the requirements of ISO 26262.
Down
- The organization shall ensure that the persons involved in the execution of the safety lifecycle have a _________ level of skills, competence and qualification corresponding to their responsibilities.
- The organization shall institute, execute and maintain a safety anomaly resolution process to ensure that the analysis, evaluation, resolution and disposition of safety anomalies are performed in a timely and _______ manner.
- Safety anomalies that are not managed to closure shall be explicitly communicated to the applicable functional safety _______.
- The organization shall provide the ______ required for the achievement of functional safety.
- The organization shall institute, execute and maintain processes to ensure that identified safety anomalies are explicitly communicated to the persons responsible for achieving or maintaining ____ safety during the safety lifecycle.
- The rationale for a safety anomaly managed to closure, in accordance with 5.4.3.3, shall be ______;
- The organizations involved in the execution of the safety lifecycle shall have an operational _____ management system complying with a ______ management standard, such as ISO/TS 16949, ISO 9001, or equivalent.
- Safety anomalies that are not managed to closure shall be _______ to the responsible persons, such as the project manager in the case of a safety anomaly regarding product development;
- The ______ shall create, foster, and sustain a safety culture that supports and encourages the effective achievement of functional safety.
- Safety _____ is enduring values, attitudes, motivations and knowledge of an organization team in which safety is prioritized over competing goal in decisions and behavior
- A safety anomaly shall only be considered as managed to _____ if an adequate safety process is implemented that resolves the safety anomaly
22 Clues: An organization may _____ the safety lifecycle for application across items or elements • The organization shall provide the ______ required for the achievement of functional safety. • The organization shall institute, execute and maintain a ______ improvement process, based on: • ...
digatle lab 2025-11-19
Across
- Addiction Use the built-in screen time features on your devices, or apps like Forest, to set limits and track your usage.
- is false information that is deliberately and intentionally spread to deceive, mislead, and manipulate people.
- the practice of protecting systems, networks, and data from digital attacks to prevent theft
- Commons a nonprofit organization that provides free, easy-to-use legal tools for creators to grant the public permission to use their work under copyright law
- the act of taking another person's words, ideas, or work and presenting them as your own without proper acknowledgment
- the code of conduct for respectful and appropriate online behavior
- a person who witnesses injustice or harm and chooses to intervene to make things right
- the philosophical study of morality, concerned with what people ought to do, what is right and wrong, and how to live a good life
- a type of cyberattack that uses deceptive emails, texts, or websites to trick people into revealing sensitive information like passwords
- the use of digital devices and technology—such as cell phones, computers, and tablets—to harass, threaten, or humiliate another person
- In the context of digital technology, piracy is the illegal act of copying, distributing, or using copyrighted material without the creator's permission.
- An algorithm is a set of precise, step-by-step instructions for solving a problem or performing a task.
- the trail of data left behind from a user's online activity, including their browsing history, social media posts, and online purchases
- a person who sees or knows about bullying or other harmful behavior happening to someone else, but is not directly involved.
- Time the amount of time a person spends using electronic devices with a display screen,
Down
- personal information is any data that can identify a specific person, including both direct identifiers like a name or Social Security number, and indirect identifiers like a unique IP address or location data.
- Intelligence a field of computer science that focuses on creating machines capable of performing tasks that typically require human intelligence
- is false or inaccurate information that is spread without the intent to deceive.
- Use The practice of being intentional and consciously aware of how, when, and why you use digital technology is known as
- someone who makes responsible, safe, and ethical choices when using technology and the internet.
- Reality a technology that overlays digital information—such as computer-generated images, text, and 3D models—onto the real world
- the collection of information that uniquely identifies a person, organization, or device on the internet
- the process of converting data into a secret code to prevent unauthorized access, using algorithms and a "key" to scramble and unscramble it
- access, analyze, evaluate, and create all forms of communication to understand their influence on thoughts, feelings, and behaviorsl
- control how much personal information you share on devices, apps, and websites by managing data collection
- a type of intellectual property law that grants the creator of an original work exclusive rights to its use and distribution for a limited time
- Balance the ability to use digital technology and online platforms in a way that is healthy, intentional, and does not interfere with a person's physical, mental, or emotional well-being
- Use a legal doctrine that allows for the unlicensed use of copyright-protected works in specific circumstances without infringing upon the owner's rights
28 Clues: the code of conduct for respectful and appropriate online behavior • is false or inaccurate information that is spread without the intent to deceive. • a person who witnesses injustice or harm and chooses to intervene to make things right • Time the amount of time a person spends using electronic devices with a display screen, • ...
Digital Citizenship 2026-01-09
Across
- time spent using a device
- the trail of data you leave behind when using the internet, which includes both the information you actively share, like social media posts and emails, and the data passively collected, such as browsing history and cookies
- using someone else's original work, including words, ideas, or creations, and presenting it as your own without proper acknowledgment
- the ability to understand and share the feelings of another
- unauthorized duplication, distribution, or use of copyrighted software
- the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging
- a set of moral principles or rules that guide behavior, helping individuals and societies determine what is right and wrong
- the practice of protecting systems, networks, and programs from digital attacks, which are typically aimed at accessing, changing, or destroying sensitive information, disrupting normal business processes, or extorting money
- a precise electronic scale or the healthy equilibrium between technology and real life
- the virtual representation of an individual or entity in digital spaces, composed of information like usernames, profiles, and online activities
- any data that relates to an identified or reasonably identifiable individual, whether directly or indirectly
- technology that enables machines to perform tasks that typically require human intelligence, such as learning, problem-solving, reasoning, and decision-making
- false information that is intended to mislead; deliberate misinformation
- the process of converting data into a code to prevent unauthorized access, using mathematical algorithms and an encryption key to make information unreadable to anyone without the key
- the exclusive legal right to reproduce, publish, and distribute an original work of authorship that has been fixed in a tangible form
- the compulsive or poorly controlled use of technological products, such as smartphones, the internet, and video games, that leads to problems and distress in a person's life
Down
- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer
- the conscious and intentional engagement with digital tools and devices, focusing on awareness of one's actions and the impact they have
- a set of rules for respectful and appropriate behavior in online interactions
- the ethical and mindful use of technology that considers the impact of online actions on oneself, others, and the planet
- the legal principle that allows you to use a copyrighted work without permission for purposes like criticism, comment, news reporting, teaching, scholarship, or research
- a person who uses technology responsibly and appropriately in social and civic activities
- user-controlled options on digital platforms that determine how personal information is shared, viewed, and used
- the use of digital technologies to harass, threaten, or embarrass someone
- a person who sees or is present during an event but does not take part in it
- Literacy, the ability to use printed and written information to function in society, achieve one's goals, and develop one's knowledge and potential
- taking action to support others when you see someone being bullied, harassed, or discriminated against, instead of being a bystander who does nothing
- an organization that provides free copyright licenses, offering creators a "some rights reserved" option that allows them to grant permissions for others to use their work under specific conditions, such as attribution or noncommercial use
- overlays computer-generated images and digital information onto the user's view of the real world, creating an enhanced, interactive experience
- false or inaccurate information
30 Clues: time spent using a device • false or inaccurate information • the ability to understand and share the feelings of another • unauthorized duplication, distribution, or use of copyrighted software • false information that is intended to mislead; deliberate misinformation • the use of digital technologies to harass, threaten, or embarrass someone • ...
test 2024-01-23
Across
- _________ is the Volvo Group Appointed cloud-based SaaS Solution for managing Privacy Compliance.
- Racial or ethnic origin, Political opinions, Genetic data are examples of ____________ personal data
- ___________ is any automated Processing of Personal Data to evaluate personal aspects or to analyze or predict in particular a Data Subject’s performance at work, economic situation, location, health, personal preferences, interests, reliability, behavior, driving, location, or movements.
- You do not have to accept them unless they are topped with chocolate chips & sea salt.
- By Design ____________is a concept intended to anticipate, build and manage privacy during the entire life cycle of a process/system/project/product/software, right from its concept to execution to retirement (3 words)
- Data _____________ means that a data controller should limit the collection of personal information to what is directly relevant and necessary to accomplish a specified purpose.
- A personal data _________ considered to be a security incident, and can be either accidental or intentional/unlawful. You should immediately alert the IT service desk and VFS privacy office.
- _____________ is an Employee or Consultant appointed by the TD/BA/Group Functions or Chief Compliance Officer with the primary responsibilities of assisting the TD/BA/Group Functions, monitoring the Volvo Group’s compliance with the directives and applicable Personal Data Laws, and advising accordingly. (acronym)
- _______ is China’s first comprehensive legislation on personal information and data privacy. (acronym)
- All personal data breach related incidents must be reported to vfs.________@volvo.com
- ___________ is a cybersecurity attack that can be mistaken for a hobby
Down
- _________ must be freely given and easy to withdraw.
- The privacy ______ provides individuals a clear explanation of our personal data handling practices at the time of collection
- ___________ is a Volvo Group learning management system that makes training opportunities like privacy related trainings easily accessible for all employees both using a computer or mobile device.
- IT ____________ is a set of rules (controls) and part of Volvo Group Internal Control Framework. It gives guidance in defining specific activities that must be developed, implemented and performed in order to provide assurance that financial and privacy information is reliable, timely and in compliance with applicable regulatory requirements. (acronym)
- Within the Volvo Group, we collect 3 categories of personal data, HR related, Business Partner related & ____________ related.
- Transformation of plaintext data into a protected form called a cipher text.
- AI ____________ considers techniques whereby information in data is used to generate new content. The underlying technology relies on recent advancements in deep learning as well as the novelty of generating and filtering content. (2 words)
- Privacy __________ Screening questionnaire (PISQ) is a document to identify and minimize data protection risks within a process/system/project/software
- _____ is requirement laid out in Article 30 of the General Data Protection Regulation . It contains key information on activities processing personal data such as purpose of usage, data categories used, supporting assets, service providers who have access to the data, etc. (acronym)
- Based on the input from the PISQ, a ____ might be required in case there is a High risk for the data subjects.
- The class _______ refers to Information that is such that in case of unauthorized disclosure, compromise or destruction, it may cause significant damage (medium to high impact) to the Volvo Group, our business partners or an individual’s right to privacy.
22 Clues: _________ must be freely given and easy to withdraw. • ___________ is a cybersecurity attack that can be mistaken for a hobby • Transformation of plaintext data into a protected form called a cipher text. • All personal data breach related incidents must be reported to vfs.________@volvo.com • ...
Literasi Digital 2024-08-17
Across
- Membuat dan mengelola data dalam format tabel
- Proses mengumpulkan, mengolah, dan menganalisis data untuk menemukan informasi yang berguna
- File teks kecil yang disimpan oleh situs web di komputer pengguna untuk mengingat preferensi mereka
- Membuat dan menyajikan slide presentasi
- Teknologi yang menggabungkan elemen digital dengan lingkungan dunia nyata secara real-time
- Program untuk menjelajahi dan mengakses informasi di internet
- segala piranti /komponen dari sebuah komputer, yang sifatnya dapat dilihat dengan kasat mata dan dapat diraba secara langsung
- Mengelola dan mengorganisasi pesan email
- Proses menulis instruksi dan program untuk komputer menggunakan bahasa pemrograma
- aplikasi yang digunakan untuk komunikasi melalui pesan teks
- Sebuah perangkat yang melindungi jaringan dari akses yang tidak sah
- data rahasia yang digunakan untuk melindungi akses ke sistem
- Data dalam jumlah besar yang kompleks dan sulit dikelola dengan alat pemrosesan data tradisional
- Menggunakan internet untuk mengganggu atau mengintimidasi orang lain
- Proses menggali dan menganalisis data besar untuk menemukan pola dan informasi bergun
- kebijakan yang mengatur hak cipta konten digital
- Proses mengamankan informasi dengan mengubahnya menjadi kode rahasia
- Menyimpan salinan data di lokasi lain untuk menghindari kehilangan data
- Penggunaan berbagai bentuk media seperti teks, gambar, audio, dan video untuk menyampaikan informasi
- perangkat yang digunakan untuk mengakses informasi secara nirkabel
- Proses menulis instruksi dan program untuk komputer menggunakan bahasa pemrograma
- Penyimpanan data di server jarak jauh yang dapat diakses melalui Databreach Kejadian di mana informasi pribadi atau sensitif terungkap atau dicuri
- tindakan meretas untuk tujuan jahat atau kriminal
- praktik melindungi informasi melalui penggunaan algoritme kode, hash, dan tanda tangan
- Membuat, mengedit, dan memformat dokumen teks
- Sebuah perangkat lunak yang dirancang untuk merusak atau mengganggu sistem komputer
- Teknologi yang menciptakan lingkungan simulasi sepenuhnya yang bisa diinteraksikan oleh pengguna
- identitas unik seseorang di dunia maya
- aktivitas mencari informasi di internet dengan kata kunci
Down
- satu cabang teknologi yang berhubungan dengan desain, konstruksi, operasi, disposisi struktural, pembuatan, dan aplikasi dari robot
- proses pemulihan data yang hilang atau rusak
- Penyimpanan dan pengelolaan data melalui internet
- Email yang tidak diinginkan atau tidak relevan, sering kali berisi iklan atau penipuan
- Subset dari AI yang memungkinkan sistem belajar dari data dan meningkatkan kinerjanya tanpa pemrograman eksplisit
- Program yang digunakan untuk mencari informasi di internet
- Jejak aktivitas online yang ditinggalkan oleh pengguna internet
- sistem operasi yang banyak digunakan pada smartphone
- Alamat situs web yang digunakan untuk mengakses halaman web tertentu
- kegiatan ilegal mengakses sistem komputer tanpa izin
- Mengelola dan mengatur data dalam format tabel
- tempat untuk menyimpan data secara online
- Jaringan perangkat fisik yang terhubung dan dapat berkomunikasi melalui internet
- Kejadian di mana informasi pribadi atau sensitif terungkap atau dicuri
- Situs web atau aplikasi yang memungkinkan pengguna untuk berbagi konten dan berinteraksi secara online
- Tindakan dan praktik untuk melindungi sistem komputer dan jaringan dari serangan digital
- Alamat unik yang diberikan kepada setiap perangkat yang terhubung ke jaringan internet
- tindakan mengambil data penting tanpa izin dari pengguna internet
- Pengalaman pengguna saat berinteraksi dengan perangkat lunak atau situs web
- sistem jaringan komputer yang saling terhubung secara global dengan menggunakan paket protokol internet (TCP/IP) untuk menghubungkan perangkat di seluruh dunia
- mesin pencari yang paling populer di dunia
- Teknologi yang memungkinkan penyimpanan data secara terdesentralisasi dan aman melalui rantai blok
- perangkat lunak yang melindungi komputer dari virus
- Teknologi yang memungkinkan mesin untuk meniru kecerdasan manusia dan melakukan tugas-tugas secara otomatis
- sistem untuk mengelola informasi dalam bentuk basis data di internet
- Sebuah jaringan yang menyediakan koneksi internet aman
55 Clues: identitas unik seseorang di dunia maya • Membuat dan menyajikan slide presentasi • Mengelola dan mengorganisasi pesan email • tempat untuk menyimpan data secara online • mesin pencari yang paling populer di dunia • proses pemulihan data yang hilang atau rusak • Membuat dan mengelola data dalam format tabel • Membuat, mengedit, dan memformat dokumen teks • ...
Literasi Digital 2024-08-17
Across
- Mengelola dan mengorganisasi pesan email
- Proses menulis instruksi dan program untuk komputer menggunakan bahasa pemrograma
- Jejak aktivitas online yang ditinggalkan oleh pengguna internet
- Alamat unik yang diberikan kepada setiap perangkat yang terhubung ke jaringan internet
- perangkat yang digunakan untuk mengakses informasi secara nirkabel
- Penyimpanan dan pengelolaan data melalui internet
- Teknologi yang menciptakan lingkungan simulasi sepenuhnya yang bisa diinteraksikan oleh pengguna
- Penggunaan berbagai bentuk media seperti teks, gambar, audio, dan video untuk menyampaikan informasi
- kegiatan ilegal mengakses sistem komputer tanpa izin
- perangkat lunak yang melindungi komputer dari virus
- Alamat situs web yang digunakan untuk mengakses halaman web tertentu
- tindakan mengambil data penting tanpa izin dari pengguna internet
- identitas unik seseorang di dunia maya
- Kejadian di mana informasi pribadi atau sensitif terungkap atau dicuri
- Membuat dan menyajikan slide presentasi
- Pengalaman pengguna saat berinteraksi dengan perangkat lunak atau situs web
- Subset dari AI yang memungkinkan sistem belajar dari data dan meningkatkan kinerjanya tanpa pemrograman eksplisit
- Penyimpanan data di server jarak jauh yang dapat diakses melalui Databreach Kejadian di mana informasi pribadi atau sensitif terungkap atau dicuri
- Sebuah perangkat lunak yang dirancang untuk merusak atau mengganggu sistem komputer
- Email yang tidak diinginkan atau tidak relevan, sering kali berisi iklan atau penipuan
- Teknologi yang menggabungkan elemen digital dengan lingkungan dunia nyata secara real-time
- Membuat, mengedit, dan memformat dokumen teks
- aplikasi yang digunakan untuk komunikasi melalui pesan teks
- tindakan meretas untuk tujuan jahat atau kriminal
- tempat untuk menyimpan data secara online
- Jaringan perangkat fisik yang terhubung dan dapat berkomunikasi melalui internet
Down
- Program yang digunakan untuk mencari informasi di internet
- Teknologi yang memungkinkan penyimpanan data secara terdesentralisasi dan aman melalui rantai blok
- Data dalam jumlah besar yang kompleks dan sulit dikelola dengan alat pemrosesan data tradisional
- File teks kecil yang disimpan oleh situs web di komputer pengguna untuk mengingat preferensi mereka
- Tindakan dan praktik untuk melindungi sistem komputer dan jaringan dari serangan digital
- Sebuah perangkat yang melindungi jaringan dari akses yang tidak sah
- praktik melindungi informasi melalui penggunaan algoritme kode, hash, dan tanda tangan
- Situs web atau aplikasi yang memungkinkan pengguna untuk berbagi konten dan berinteraksi secara online
- Sebuah jaringan yang menyediakan koneksi internet aman
- sistem jaringan komputer yang saling terhubung secara global dengan menggunakan paket protokol internet (TCP/IP) untuk menghubungkan perangkat di seluruh dunia
- Proses menulis instruksi dan program untuk komputer menggunakan bahasa pemrograma
- Menggunakan internet untuk mengganggu atau mengintimidasi orang lain
- Proses menggali dan menganalisis data besar untuk menemukan pola dan informasi bergun
- Proses mengamankan informasi dengan mengubahnya menjadi kode rahasia
- Program untuk menjelajahi dan mengakses informasi di internet
- mesin pencari yang paling populer di dunia
- Teknologi yang memungkinkan mesin untuk meniru kecerdasan manusia dan melakukan tugas-tugas secara otomatis
- segala piranti /komponen dari sebuah komputer, yang sifatnya dapat dilihat dengan kasat mata dan dapat diraba secara langsung
- Proses mengumpulkan, mengolah, dan menganalisis data untuk menemukan informasi yang berguna
- Membuat dan mengelola data dalam format tabel
- data rahasia yang digunakan untuk melindungi akses ke sistem
- sistem untuk mengelola informasi dalam bentuk basis data di internet
- Mengelola dan mengatur data dalam format tabel
- kebijakan yang mengatur hak cipta konten digital
- Menyimpan salinan data di lokasi lain untuk menghindari kehilangan data
- sistem operasi yang banyak digunakan pada smartphone
- satu cabang teknologi yang berhubungan dengan desain, konstruksi, operasi, disposisi struktural, pembuatan, dan aplikasi dari robot
53 Clues: identitas unik seseorang di dunia maya • Membuat dan menyajikan slide presentasi • Mengelola dan mengorganisasi pesan email • tempat untuk menyimpan data secara online • mesin pencari yang paling populer di dunia • Membuat dan mengelola data dalam format tabel • Membuat, mengedit, dan memformat dokumen teks • Mengelola dan mengatur data dalam format tabel • ...
Literasi Digital 2024-08-17
Across
- Mengelola dan mengorganisasi pesan email
- Alamat situs web yang digunakan untuk mengakses halaman web tertentu
- Membuat dan menyajikan slide presentasi
- identitas unik seseorang di dunia maya
- Proses mengamankan informasi dengan mengubahnya menjadi kode rahasia
- sistem untuk mengelola informasi dalam bentuk basis data di internet
- Program yang digunakan untuk mencari informasi di internet
- Jejak aktivitas online yang ditinggalkan oleh pengguna internet
- Proses menggali dan menganalisis data besar untuk menemukan pola dan informasi bergun
- Teknologi yang menciptakan lingkungan simulasi sepenuhnya yang bisa diinteraksikan oleh pengguna
- Email yang tidak diinginkan atau tidak relevan, sering kali berisi iklan atau penipuan
- Mengelola dan mengatur data dalam format tabel
- Proses menulis instruksi dan program untuk komputer menggunakan bahasa pemrograma
- Membuat dan mengelola data dalam format tabel
- sistem operasi yang banyak digunakan pada smartphone
- tempat untuk menyimpan data secara online
- Menyimpan salinan data di lokasi lain untuk menghindari kehilangan data
- tindakan mengambil data penting tanpa izin dari pengguna internet
- perangkat lunak yang melindungi komputer dari virus
- Subset dari AI yang memungkinkan sistem belajar dari data dan meningkatkan kinerjanya tanpa pemrograman eksplisit
- sistem jaringan komputer yang saling terhubung secara global dengan menggunakan paket protokol internet (TCP/IP) untuk menghubungkan perangkat di seluruh dunia
- perangkat yang digunakan untuk mengakses informasi secara nirkabel
- Menggunakan internet untuk mengganggu atau mengintimidasi orang lain
- Teknologi yang memungkinkan penyimpanan data secara terdesentralisasi dan aman melalui rantai blok
Down
- kegiatan ilegal mengakses sistem komputer tanpa izin
- Penyimpanan data di server jarak jauh yang dapat diakses melalui Databreach Kejadian di mana informasi pribadi atau sensitif terungkap atau dicuri
- Tindakan dan praktik untuk melindungi sistem komputer dan jaringan dari serangan digital
- Proses menulis instruksi dan program untuk komputer menggunakan bahasa pemrograma
- Penggunaan berbagai bentuk media seperti teks, gambar, audio, dan video untuk menyampaikan informasi
- praktik melindungi informasi melalui penggunaan algoritme kode, hash, dan tanda tangan
- Sebuah perangkat lunak yang dirancang untuk merusak atau mengganggu sistem komputer
- Kejadian di mana informasi pribadi atau sensitif terungkap atau dicuri
- satu cabang teknologi yang berhubungan dengan desain, konstruksi, operasi, disposisi struktural, pembuatan, dan aplikasi dari robot
- data rahasia yang digunakan untuk melindungi akses ke sistem
- Sebuah perangkat yang melindungi jaringan dari akses yang tidak sah
- Membuat, mengedit, dan memformat dokumen teks
- Alamat unik yang diberikan kepada setiap perangkat yang terhubung ke jaringan internet
- Teknologi yang menggabungkan elemen digital dengan lingkungan dunia nyata secara real-time
- Program untuk menjelajahi dan mengakses informasi di internet
- kebijakan yang mengatur hak cipta konten digital
- aplikasi yang digunakan untuk komunikasi melalui pesan teks
- Situs web atau aplikasi yang memungkinkan pengguna untuk berbagi konten dan berinteraksi secara online
- segala piranti /komponen dari sebuah komputer, yang sifatnya dapat dilihat dengan kasat mata dan dapat diraba secara langsung
- Teknologi yang memungkinkan mesin untuk meniru kecerdasan manusia dan melakukan tugas-tugas secara otomatis
- Penyimpanan dan pengelolaan data melalui internet
- File teks kecil yang disimpan oleh situs web di komputer pengguna untuk mengingat preferensi mereka
- tindakan meretas untuk tujuan jahat atau kriminal
- Sebuah jaringan yang menyediakan koneksi internet aman
- Jaringan perangkat fisik yang terhubung dan dapat berkomunikasi melalui internet
- mesin pencari yang paling populer di dunia
- Pengalaman pengguna saat berinteraksi dengan perangkat lunak atau situs web
- Data dalam jumlah besar yang kompleks dan sulit dikelola dengan alat pemrosesan data tradisional
- Proses mengumpulkan, mengolah, dan menganalisis data untuk menemukan informasi yang berguna
53 Clues: identitas unik seseorang di dunia maya • Membuat dan menyajikan slide presentasi • Mengelola dan mengorganisasi pesan email • tempat untuk menyimpan data secara online • mesin pencari yang paling populer di dunia • Membuat, mengedit, dan memformat dokumen teks • Membuat dan mengelola data dalam format tabel • Mengelola dan mengatur data dalam format tabel • ...
Technology CW 2023-06-07
Across
- Is small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser.
- Is a collection of discrete values that convey information, describing the quantity, quality, fact, statistics, other basic units of meaning, or simply sequences of symbols that may be further interpreted.
- Is a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography.
- Is a hardware or software component that stores data so that future requests for that data can be served faster.
- Is a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data from an HDMI-compliant source device, such as a display controller, to a compatible computer monitor, video projector, digital television, or digital audio device.
- Is a mobile operating system based on a modified version of the Linux kernel and other open-source software.
- An American multinational technology company headquartered in Cupertino, California. It is the world's largest technology company by revenue.
- Is a digital multimedia container format most commonly used to store video and audio, but it can also be used to store other data such as subtitles and still images.
- Is the most important processor in a given computer. Its electronic circuitry executes instructions of a computer program, such as arithmetic, logic, controlling, and input/output (I/O) operations.
- Is a bitmap image format that was developed by a team at the online services provider CompuServe led by American computer scientist Steve Wilhite and released on June 15, 1987.
- Is a mapping from some domain (for example, a range of integers) to bits.
Down
- Is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy.
- Is a method of representing data in a visual, machine-readable form. Initially, its represented data by varying the widths, spacings and sizes of parallel lines
- Is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.
- Is a method of transmitting and receiving messages using electronic devices. It was conceived in the late–20th century as the digital version of, or counterpart to, mail
- Is a number expressed in the base-2 numeral system
- Is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
- Is the hardware in a computing device where the operating system (OS), application programs and data in current use are kept so they can be quickly reached by the device's processor.
- Is a file format developed by Adobe in 1992 to present documents, including text formatting and images, in a manner independent of application software, hardware, and operating systems.
- Is a coding format for digital audio developed largely by the Fraunhofer Society in Germany under the lead of Karlheinz Brandenburg.
20 Clues: Is a number expressed in the base-2 numeral system • Is a mapping from some domain (for example, a range of integers) to bits. • Is a mobile operating system based on a modified version of the Linux kernel and other open-source software. • Is a hardware or software component that stores data so that future requests for that data can be served faster. • ...
Glossary Crossword 2025-05-13
Across
- A company that provides networking and cybersecurity solutions, including routers, switches, firewalls, and cloud services, designed to help businesses build secure, high-performance networks.
- Protective tube or duct used to house and route communication cables such as fiber optics or copper wires to prevent damage and ensure efficient data transmission.
- A device that allows computers, smartphones, tablets, and other devices to connect to the internet. It does this by converting digital signals from these devices into analog signals that can be transmitted over telephone lines or cable networks.
- Software that is permanently stored on a device, typically responsible for its basic operations, such as on a router or modem.
- A list or line of tasks, requests, or calls waiting to be processed, often used in customer service or technical support.
- A type of signal or technology that transmits data in continuous waves typically used for older phone systems and TV signals.
- A system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and provides rules that allow network-connected devices to talk to one another without talking over each other.
- The delay in network communication. It shows the time that data takes to transfer across the network. Networks with a longer delay or lag have high latency, while those with fast response times have low latency.
- A short-range beam of light that carries a command and requires a clear line of sight to the device, commonly used in remote controls.
- Networking hardware or software that helps different networks or systems talk to each other and share information.
- Cloud-based network management platform that service providers use to monitor, configure, and optimize GigaSpire devices remotely. It allows for real-time diagnostics, troubleshooting, and performance improvements.
Down
- Malicious software (malware) that encrypts a victim's data or locks their system, demanding payment (a ransom) to restore access.
- The amount of time a system, service, or device is operational and available, usually measured as a percentage of time over a certain period.
- A service that connects all emergency responders the instant a call is received.
- A longer, more secure version of a password, typically made up of multiple words or a sentence. Passphrases are often used for added security in systems like encryption and authentication.
- Point at which the public switched telephone network ends and connects with the customer's personal network or the private network of an organization or business.
- The physical cable that connects the main broadband network to an individual building.
- Occurs when a customer’s long distance service is switched from one long distance company to another without the customer’s permission.
- A high speed internet connection that's always on allowing for faster data transmission than dial-up connections.
- A tool that shows the path that data takes to travel from your computer to a website.
- A system of interconnected devices or systems that communicate with each other, such as the internet, local area network (LAN), or a company’s internal network.
- A company that makes networking equipment like routers, modems, and switches. Their products are often used for home and small business internet setups, especially for Wi-Fi and broadband connections.
- A state in which a device or system is not connected to the internet or a network, meaning it is not able to send or receive data.
23 Clues: A service that connects all emergency responders the instant a call is received. • A tool that shows the path that data takes to travel from your computer to a website. • The physical cable that connects the main broadband network to an individual building. • ...
internet basics 2024-01-18
Across
- The buying and selling of goods and services over the internet.
- Software used to access and view websites on the internet, such as Google Chrome or Mozilla Firefox.
- Voice over Internet Protocol, a technology that allows voice communication over the internet instead of traditional telephone lines.
- Engineering: Manipulating individuals to disclose sensitive information or perform actions that may harm them or their organization.
- Measures taken to protect computers, servers, networks, and data from unauthorized access, attacks, and damage.
- Engine: A program that allows users to search for information on the internet by entering keywords or phrases.
- To transfer data from a remote server to a local device over the internet.
- Digital or virtual currency that uses cryptography for security and operates independently of a central bank.
- Unsolicited and often unwanted email or messages sent in bulk, typically for advertising purposes.
- Computing: The practice of using remote servers hosted on the internet to store, manage, and process data instead of using local servers or personal computers.
- Small digital icons or characters used to express emotions or ideas in electronic communication.
- Hypertext Markup Language, the standard language used for creating web pages and applications on the internet.
- Domain Name System, a system that translates domain names (e.g., www.example.com) into IP addresses to locate resources on the internet.
- A live or pre-recorded seminar, workshop, or presentation conducted over the internet.
- A security system that monitors and controls incoming and outgoing network traffic, protecting against unauthorized access and threats.
Down
- Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems and networks.
- To transfer data from a local device to a remote server over the internet.
- A collection of web pages accessible through the internet, typically containing information about a particular topic or organization.
- A form of cyber attack where attackers impersonate trustworthy entities to deceive individuals into revealing sensitive information.
- Media: Online platforms that enable users to create and share content, communicate, and connect with others.
- Internet of Things, the network of physical devices embedded with sensors, software, and connectivity, enabling them to exchange data and interact with the internet and other devices.
- Storage: Storing and accessing data over the internet on remote servers rather than on local devices.
- Address: A unique numerical identifier assigned to each device connected to a computer network, enabling communication between devices.
- The transmission of audio or video content in real-time over the internet, allowing users to watch or listen without downloading the files.
- A website or web page where individuals or groups share their opinions, experiences, and information on various topics.
- Virtual Private Network, a secure connection that allows users to access the internet privately and securely by encrypting their data.
- Electronic mail that allows users to send and receive messages and files over the internet.
- Secure Sockets Layer, a protocol that provides secure communication over the internet by encrypting data transmitted between a web server and a browser.
- A networking device that forwards data packets between computer networks, allowing devices to connect to the internet.
- A global network of interconnected computers that enables the sharing of information and resources.
- Uniform Resource Locator, the address used to access a web page or resource on the internet.
- A wireless networking technology that allows devices to connect to the internet without the need for physical cables.
32 Clues: The buying and selling of goods and services over the internet. • To transfer data from a local device to a remote server over the internet. • To transfer data from a remote server to a local device over the internet. • A live or pre-recorded seminar, workshop, or presentation conducted over the internet. • ...
Literasi Digital 2024-08-17
Across
- Mengelola dan mengorganisasi pesan email
- Proses menulis instruksi dan program untuk komputer menggunakan bahasa pemrograma
- Jejak aktivitas online yang ditinggalkan oleh pengguna internet
- Alamat unik yang diberikan kepada setiap perangkat yang terhubung ke jaringan internet
- perangkat yang digunakan untuk mengakses informasi secara nirkabel
- Penyimpanan dan pengelolaan data melalui internet
- Teknologi yang menciptakan lingkungan simulasi sepenuhnya yang bisa diinteraksikan oleh pengguna
- Penggunaan berbagai bentuk media seperti teks, gambar, audio, dan video untuk menyampaikan informasi
- kegiatan ilegal mengakses sistem komputer tanpa izin
- perangkat lunak yang melindungi komputer dari virus
- Alamat situs web yang digunakan untuk mengakses halaman web tertentu
- tindakan mengambil data penting tanpa izin dari pengguna internet
- identitas unik seseorang di dunia maya
- Kejadian di mana informasi pribadi atau sensitif terungkap atau dicuri
- Membuat dan menyajikan slide presentasi
- Pengalaman pengguna saat berinteraksi dengan perangkat lunak atau situs web
- Subset dari AI yang memungkinkan sistem belajar dari data dan meningkatkan kinerjanya tanpa pemrograman eksplisit
- Penyimpanan data di server jarak jauh yang dapat diakses melalui Databreach Kejadian di mana informasi pribadi atau sensitif terungkap atau dicuri
- Sebuah perangkat lunak yang dirancang untuk merusak atau mengganggu sistem komputer
- Email yang tidak diinginkan atau tidak relevan, sering kali berisi iklan atau penipuan
- Teknologi yang menggabungkan elemen digital dengan lingkungan dunia nyata secara real-time
- Membuat, mengedit, dan memformat dokumen teks
- aplikasi yang digunakan untuk komunikasi melalui pesan teks
- tindakan meretas untuk tujuan jahat atau kriminal
- tempat untuk menyimpan data secara online
- Jaringan perangkat fisik yang terhubung dan dapat berkomunikasi melalui internet
Down
- Program yang digunakan untuk mencari informasi di internet
- Teknologi yang memungkinkan penyimpanan data secara terdesentralisasi dan aman melalui rantai blok
- Data dalam jumlah besar yang kompleks dan sulit dikelola dengan alat pemrosesan data tradisional
- File teks kecil yang disimpan oleh situs web di komputer pengguna untuk mengingat preferensi mereka
- Tindakan dan praktik untuk melindungi sistem komputer dan jaringan dari serangan digital
- Sebuah perangkat yang melindungi jaringan dari akses yang tidak sah
- praktik melindungi informasi melalui penggunaan algoritme kode, hash, dan tanda tangan
- Situs web atau aplikasi yang memungkinkan pengguna untuk berbagi konten dan berinteraksi secara online
- Sebuah jaringan yang menyediakan koneksi internet aman
- sistem jaringan komputer yang saling terhubung secara global dengan menggunakan paket protokol internet (TCP/IP) untuk menghubungkan perangkat di seluruh dunia
- Proses menulis instruksi dan program untuk komputer menggunakan bahasa pemrograma
- Menggunakan internet untuk mengganggu atau mengintimidasi orang lain
- Proses menggali dan menganalisis data besar untuk menemukan pola dan informasi bergun
- Proses mengamankan informasi dengan mengubahnya menjadi kode rahasia
- Program untuk menjelajahi dan mengakses informasi di internet
- mesin pencari yang paling populer di dunia
- Teknologi yang memungkinkan mesin untuk meniru kecerdasan manusia dan melakukan tugas-tugas secara otomatis
- segala piranti /komponen dari sebuah komputer, yang sifatnya dapat dilihat dengan kasat mata dan dapat diraba secara langsung
- Proses mengumpulkan, mengolah, dan menganalisis data untuk menemukan informasi yang berguna
- Membuat dan mengelola data dalam format tabel
- data rahasia yang digunakan untuk melindungi akses ke sistem
- sistem untuk mengelola informasi dalam bentuk basis data di internet
- Mengelola dan mengatur data dalam format tabel
- kebijakan yang mengatur hak cipta konten digital
- Menyimpan salinan data di lokasi lain untuk menghindari kehilangan data
- sistem operasi yang banyak digunakan pada smartphone
- satu cabang teknologi yang berhubungan dengan desain, konstruksi, operasi, disposisi struktural, pembuatan, dan aplikasi dari robot
53 Clues: identitas unik seseorang di dunia maya • Membuat dan menyajikan slide presentasi • Mengelola dan mengorganisasi pesan email • tempat untuk menyimpan data secara online • mesin pencari yang paling populer di dunia • Membuat dan mengelola data dalam format tabel • Membuat, mengedit, dan memformat dokumen teks • Mengelola dan mengatur data dalam format tabel • ...
Intro to Business Semester 1 Exam Review 2025-01-06
Across
- Identifying, understanding and predicting circumstances or events that might have negative consequences, and taking proactive measures to avoid these risks and effectively combat them if/when they occur.
- When products or services are not the same, but they could satisfy the same need, i.e. bicycles are indirect competition to automobiles.
- An organizational structure that shows who each person reports to.
- A market where one company controls the supply of a good or service, where other options for consumers aren't readily available, and where the barriers to entry for other companies are highly restrictive.
- A business model used by companies who provide their services for free, and sell advertising space to fund their businesses.
- The liability that extends beyond an individual’s financial investment in a company.
- A route or plan of action designed to achieve certain goals and objectives.
- Information that you collect directly from first-hand experience.
- A for-profit or non-profit organization involved in commercial, industrial, or professional commerce.
- A hybrid business structure, where it combines the operational characteristics of a sole proprietorship or partnership while limiting the liability of the investors to the amount they invested.
- Refers to the people who work in an organization, and the group that staffs the organization, maintains personnel records, and administers benefits like medical insurance.
- A business model that charges a regularly scheduled fee, usually monthly or annually, for their products or services.
Down
- When companies offer essentially the same product or service, i.e. Coke and Pepsi, Ford and GM.
- A corporation that meets specific Internal Revenue Code requirements and passes corporate income (or loss) through to its shareholders for federal tax purposes.
- Crowdfunding collects small amounts of capital from a large number of individuals to finance a new business venture or various other needs or projects.
- Refers to planning, organizing, staffing, controlling and leading people, processes, and assets in order to achieve a goal or task in the best way possible.
- The making of products from raw materials and other inputs like labor, machinery, and tools.
- The daily functioning of an organization, managing the inputs and outputs, and includes manufacturing, purchasing, and logistics.
- A market where a small number of companies control the supply of a good or service, and where the barriers to entry for other companies are highly restrictive.
- A business owned by one person, and where the owner has unlimited liability.
- A business model provides low price points for the cost-sensitive consumer, also often called Low Cost Providers.
- The protection of networks, devices, and data from unauthorized access or criminal use, and the practice of ensuring the confidentiality, integrity, and availability of information.
- A legal entity that is separate from its owners and controlled by a board of directors; the entity has most of the same rights and responsibilities that individuals possess but offers limited liability.
- A business model where a company offers some basic services for free, and then charges money for certain additional features.
- A company's purpose; its reason for being; the problem it is solving.
- An aspirational view of the future, that if the company is successful in accomplishing its mission, the company and/or world might look a certain way.
- A business owned by two or more people.
27 Clues: A business owned by two or more people. • Information that you collect directly from first-hand experience. • An organizational structure that shows who each person reports to. • A company's purpose; its reason for being; the problem it is solving. • A route or plan of action designed to achieve certain goals and objectives. • ...
People, Policies, Priorities, and Puzzles: LFL 2025 2024-12-18
Across
- ____ enrollment programs allow high school students to earn college credits while learning job skills
- The term for this legislative leader originated from a hunting phrase for someone who keeps hounds together during a chase
- Chamber-backed policy that ensures consistent regulations across cities and avoids a patchwork of local rules.
- In 2023, Arizona adopted this kind of income tax system, which applies rates equally to alltaxpayers regardless of income
- Rep. _________ was rated the most bipartisan member of Arizona’s Congressional delegation in 2024
- The Chamber promotes expanding access to affordable ___ care to boost workforce productivity.
- Arizona is home to the largest power plant of this type in the U.S
- Arizona leads the nation in producing these critical tech components
- This company’s investment in Arizona represents the largest foreign direct investment for a greenfield project in U.S. history.
- The Chamber celebrated the defeat of Prop. 499, which would have threatened this city’s tourism sector, cost jobs, and raised taxes.
- The Chamber emphasizes this as a top priority to protect businesses from data breaches and digital threats.
- The Chamber strongly advocates to preserve Arizona's status as a ____ __ ____ state, which protects workers from mandatory union membership
- The Chamber strongly supported Prop. 312, a ballot measure that is already forcing cities to take action on __________.
- This type of legislative committee resolves differences between House and Senate bills
- Arizona’s largest electric utility
- The Chamber helps businesses stay competitive by reducing tax _____
Down
- The Chamber supports the expansion of this infrastructure to connect rural communities.
- The Arizona Chamber strongly supports _____ _____ polices that allow families to select the best education options for their kids
- The Chamber advocates for this type of permitting to speed up business growth
- The Chamber defends policies that foster innovation and protect these intellectual assets.
- International trade agreement crucial for Arizona exports
- Happy Anniversary! This year, the Chamber celebrated ________ years as the leading statewide business advocate at the state Capitol.
- The Chamber supports this U.S. Senate procedure for promoting compromise, protecting minority voices, and preventing rushed legislation.
- The Chamber advocates for balanced and reasonable air quality standards to address this pollutant without stifling economic growth.
- The presenting sponsor of LFL 2025, this company has invested more than $10 billion to develop and commercialize smoke-free products
- Federal funding program designed to bolster domestic production of semiconductors
- Voter-approval of Prop. 479 will ensure continued funding for vital _________ projects.
- The Chamber opposes these government-imposed limits that distort markets and stifle competition
- A meeting where legislators of the same party discuss legislative strategy
- The _____ Commission regulates utilities and has jurisdiction over rates and service standards
- Addressing shortages in this area is key to ensuring Arizona’s economic growth and competitiveness
- This type of veto power allows the governor to reject specific items in a budget bill without vetoing the entire bill
- Arizona's constitution requires a ______majority vote on legislation that imposes orincreases a tax
- Process by which citizens can propose or repeal laws through a vote
- The chamber of the legislature where spending must originate
- A session called by the governor outside of the regular calendar
- A massive hotspot for semiconductors and other advanced manufacturers, Phoenix has been dubbed the _____ Desert.
37 Clues: Arizona’s largest electric utility • International trade agreement crucial for Arizona exports • The chamber of the legislature where spending must originate • A session called by the governor outside of the regular calendar • Arizona is home to the largest power plant of this type in the U.S • Process by which citizens can propose or repeal laws through a vote • ...
Digital Citizenship Vocabulary 2025-11-19
Across
- False information that is intended to mislead; deliberate misinformation.
- A technology that enables machines to perform complex tasks that require human-like cognitive functions such as reasoning, learning, and problem-solving.
- False or inaccurate information.
- A person who speaks or acts in support of an individual or cause, particularly someone who intervenes on behalf of a person being attacked or bullied.
- A technology that overlays computer-generated images, sounds, or other information onto the real world, enhancing your perception of your surroundings.
- The process of converting data into a secret code to prevent unauthorized access, using algorithms and a "key" to scramble and unscramble it.
- Control how much personal information you share on devices, apps, and websites by managing data collection and access, allowing you to control who sees your information.
- A legal doctrine in the U.S. that allows limited use of copyrighted material without permission for purposes like criticism, comment, news reporting, teaching, scholarship, and research.
- Someone who makes responsible, safe, and ethical choices when using technology and the internet.
- The amount of time spent using electronic devices, such as smartphones, computers, and TVs.
- The code of conduct for respectful and appropriate online behavior.
- A type of cyberattack that uses deceptive emails, texts, or websites to trick people into revealing sensitive information like passwords, credit card numbers, or bank account details.
- An international nonprofit that provides free legal tools, including standardized licenses, that allow creators to grant permissions to their work while retaining copyright.
- The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
Down
- A behavioral pattern characterized by excessive and uncontrollable use of technology that leads to significant impairment or distress in various aspects of life.
- The use of digital devices to harass, threaten, or embarrass another person through platforms like social media, text messages, and online games.
- The trail of data left behind from a user's online activity, including their browsing history, social media posts, and online purchases.
- The ability to access, analyze, evaluate, and create all forms of communication to understand their influence on thoughts, feelings, and behaviors.
- Using another person's language, thoughts, ideas, or work and presenting them as your own without proper attribution.
- A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
- The practice of protecting computer systems, networks, devices, and data from digital attacks.
- Any data that can identify a specific person, including both direct identifiers like a name or Social Security number, and indirect identifiers like a unique IP address or location data.
- A precision instrument for measuring the mass of an object with a high degree of accuracy.
- Moral principles that govern a person's behavior or the conducting of an activity.
- The collection of information that uniquely identifies a person, organization, or device on the internet.
- The ethical and safe use of technology, which involves being accountable for your actions online by using appropriate language, respecting others' privacy, protecting personal information, and understanding the consequences of your digital footprint.
- Being aware of your actions and their purpose, whether applied to daily activities or technology.
- The unauthorized reproduction or distribution of copyrighted material.
- A person who is near and watches an event without getting involved.
- The ability to understand and share the feelings of another.
30 Clues: False or inaccurate information. • The ability to understand and share the feelings of another. • A person who is near and watches an event without getting involved. • The code of conduct for respectful and appropriate online behavior. • The unauthorized reproduction or distribution of copyrighted material. • ...
Digital Citizenship Vocabulary 2026-03-19
Across
- a person who speaks or acts in support of an individual or cause, particularly someone who intervenes on behalf of a person being attacked or bullied.
- false or inaccurate information
- the ability to critically analyze stories presented in the mass media and to determine their accuracy or credibility
- user-controlled options in software, apps, and social networks that manage how personal data is shared, stored, and accessed
- a branch of computer science that develops systems capable of performing tasks requiring human-like intelligence, such as learning, reasoning, problem-solving, perception, and decision-making
- a U.S. legal doctrine permitting limited, unlicensed use of copyrighted material for purposes such as criticism, comment, news reporting, teaching, scholarship, or research
- the unique, often permanent, trail of data you leave behind while using the internet
- the moral principles that govern how individuals and organizations operate
- the ability to understand and share the feelings of another.
- the unauthorized use or reproduction of another's work.
- time spent using a device such as a computer, television, or games console.
- a technology that overlays digital information—such as 3D models, images, or data—onto the real world in real-time, typically using smartphone cameras, tablets, or smart glasses
- any data that can identify, contact, or locate an individual, either on its own or when combined with other data.
- a behavioral disorder characterized by compulsive, excessive use of digital devices (smartphones, social media, gaming) that interferes with daily life, relationships, and responsibilities.
- the practice of taking someone else's work or ideas and passing them off as one's own.
- false, inaccurate, or misleading information deliberately created and spread to deceive, manipulate, or harm, rather than to inform
Down
- the practice of protecting systems, networks, programs, and data from digital attacks, unauthorized access, or damage
- the process of converting readable information (plaintext) into an unreadable, scrambled format (ciphertext) using an algorithm and a cryptographic key
- a form of social engineering cyberattack where criminals impersonate reputable organizations or individuals via email, text, or phone to steal sensitive information like passwords, credit card numbers, or login credentials
- a person who is present at an event or incident but does not take part.
- the sum of all information, behaviors, and attributes—such as usernames, profiles, search history, and financial data—that represent an individual or entity on the internet
- the established standards of respectful, polite, and responsible behavior in online environments
- a precise, step-by-step set of instructions or rules followed to solve a specific problem or accomplish a task
- the ethical, safe, and accountable use of technology, focusing on managing one's digital footprint, respecting others' privacy, and ensuring secure online interactions
- the responsible, ethical, and safe use of technology, the internet, and digital devices
- a non-profit organization providing free, standardized, legal licenses that allow creators to share their work while retaining copyright
- a form of intellectual property law that protects original works of authorship—such as books, music, art, and software—the moment they are fixed in a tangible medium
- the use of digital devices (phones, computers, social media, gaming) to intentionally and repeatedly harass, threaten, humiliate, or target someone
- maintaining a healthy, intentional, and responsible relationship with technology, ensuring screen time does not negatively impact physical, mental, or social well-being
- the practice of engaging with technology, resources, or daily activities with conscious intention, awareness, and purpose, rather than acting on autopilot
30 Clues: false or inaccurate information • the unauthorized use or reproduction of another's work. • the ability to understand and share the feelings of another. • a person who is present at an event or incident but does not take part. • the moral principles that govern how individuals and organizations operate • ...
Cyber Defense Terms 2023-11-20
Across
- a program that uses virus detection technology to protect users from viruses, spyware, trojans, and worms that can infect equipment through email or internet browsing
- the process of verifying the identity of a user or piece of information and the veracity of information provided, e.g. with a password or other credential
- a bit of code that provides additional, revised, or updated data for an operating system or application
- cybersecurity services that operate from within a network and not at the endpoint and can therefore protect any connected device regardless of model or operating system
- features which may be included in digital television services, computer and video games, mobile devices, and software that allow parents to restrict the access of content to their children
- the concept of continuing to operate without interruption despite an emergency situation
- Secure __________ Layer is the standard security technology for establishing an encrypted link between a web server and a browser
- Indicators of ___________ are bits of forensic data from system log entries or files that identify potentially malicious activity on a system or network
- An Intrusion ____________ System is a network security system designed to prevent network penetration by malicious actors
- __________ Assessment is a structured process used to identify and evaluate various risks that an organization might be exposed to
- the concept of ensuring that data and systems have not been accessed or modified and are therefore accurate and trustworthy
Down
- a control list that allows and denies elements such as email addresses, users, passwords, URLs, IP addresses, domain names, file hashes, etc. through the system
- Completely Automated Public Turing test to tell Computers and Humans Apart - a challenge-response test commonly used by websites to verify the user is a real human and not a bot
- a program designed to protect computers and networks against any threats or attacks from viruses such as adware, spyware, and any such other malicious programs
- a process of maintaining data confidentiality by converting plain data into secret code with the help of an algorithm
- ____________ Authentication combines a static password with an external authentication device such as a phone or email for added security
- Security __________ Response is a planned approach to addressing and managing the reaction after a cyber attack or network security breach
- a list of permitted items that are automatically let through whatever gate is being used, e.g. allowed sites, users, email addresses
- creating an isolated environment on a network that mimics a regular computer in order to safely execute suspicious code without risking harm
- a digital boundary that is defined for a system or domain and within which a specified security policy is applied
- extends a private network across a public network - essentially a virtual, secure corridor
- a facility where information systems (websites, applications, databases, data centers and servers, networks, desktops, and other endpoints) are monitored, assessed, and defended by analysts
- a security system that forms a virtual perimeter around a network of workstations preventing viruses, worms, and hackers from penetrating
- the practice of intentionally challenging the security of a computer system, network, or web application to discover vulnerabilities that an attacker or hacker could exploit
24 Clues: the concept of continuing to operate without interruption despite an emergency situation • extends a private network across a public network - essentially a virtual, secure corridor • a bit of code that provides additional, revised, or updated data for an operating system or application • ...
Software 2024-02-14
Across
- SERVICE Un servicio proporcionado a través de Internet que permite a los usuarios acceder y utilizar recursos informáticos, como almacenamiento, servidores y software, según demanda.
- Un conjunto estructurado de directrices, bibliotecas y herramientas utilizadas para desarrollar y organizar aplicaciones de software de manera más eficiente.
- Una persona o equipo responsable de evaluar productos de software para asegurarse de que cumplan con los estándares de calidad y funcionen según lo esperado.
- Una persona que escribe y mantiene el código de aplicaciones de software, sitios web u otros productos digitales.
- Una interfaz gráfica de usuario que proporciona una visión general de información importante, datos o controles en un lugar centralizado.
- SOCKETS LAYERS Un protocolo criptográfico que proporciona comunicación segura a través de una red informática, comúnmente utilizado para asegurar conexiones a Internet.
- Lenguaje de Programación de Cuarta Generación; un lenguaje de programación de alto nivel diseñado para simplificar el desarrollo de aplicaciones de software.
- Un protocolo utilizado para intercambiar información estructurada en la implementación de servicios web.
- Una herramienta de software utilizada por los desarrolladores para identificar y solucionar errores, fallos y otros problemas en programas informáticos.
- El punto de interacción entre diferentes componentes de software, dispositivos o usuarios, que les permite comunicarse o intercambiar información.
- Una colección estructurada de datos organizada de manera que permite el almacenamiento, recuperación y manipulación eficientes de información.
- Una pequeña aplicación o elemento de interfaz independiente que realiza una función específica o proporciona información en un sitio web o plataforma de software.
- El servicio de proporcionar y mantener espacio y recursos del servidor para hacer que un sitio web o aplicación web sea accesible a través de Internet.
Down
- Una persona responsable de crear los elementos visuales e interactivos de un producto, como interfaces y experiencias de usuario.
- Pequeños fragmentos de datos almacenados en el dispositivo de un usuario por un sitio web, utilizados para rastrear la actividad del usuario, recordar preferencias y mejorar la experiencia de navegación.
- La práctica de proteger sistemas informáticos, redes y datos de ataques digitales, acceso no autorizado y otras amenazas de seguridad.
- Una computadora o sistema que proporciona recursos, servicios o datos a otras computadoras, dispositivos o usuarios a través de una red.
- CONTROL PROTOCOL Un protocolo central de la suite de protocolos de Internet responsable de establecer y mantener conexiones entre dispositivos en red.
- CODE Instrucciones escritas en un lenguaje de programación específico que definen el comportamiento y la funcionalidad de una aplicación de software.
- Un error o fallo en un programa o sistema de software que causa que produzca resultados incorrectos o inesperados.
- Un componente de software que agrega características o funcionalidades específicas a una aplicación de software o sistema más grande.
- La dirección o nombre único utilizado para identificar un sitio web en Internet, a menudo asociado con una dirección IP.
- PAGE Una única página web diseñada específicamente para una campaña de marketing o publicidad, generalmente centrada en una llamada a la acción específica.
- LAN Una Red de Área Local (LAN) que es físicamente segura y está aislada de las redes externas o de Internet para una mayor seguridad.
- Interfaz de Programación de Aplicaciones; un conjunto de reglas y protocolos que permite que diferentes aplicaciones de software se comuniquen e interactúen entre sí.
25 Clues: Un protocolo utilizado para intercambiar información estructurada en la implementación de servicios web. • Una persona que escribe y mantiene el código de aplicaciones de software, sitios web u otros productos digitales. • Un error o fallo en un programa o sistema de software que causa que produzca resultados incorrectos o inesperados. • ...
Ben's 38th Birthday Crossword Extravaganza 2023-10-31
Across
- up close and personal type of ben
- our buddha
- magician
- what Gomez says
- you sank mine
- gotta get these filled
- what we cooked together first
- the type of girl to hate you at Lucky
- neither of us owned one
- Of Joe
- what I've been since we met
- "i dont have to learn no more"
- what I am relative to blueberries
- crucial boy dinner component
- early cedar point feelings
- you make me this young
- sports betting concept I will never understand
- Mr. Steal Ya Girl
- special time zone just for me
- what baby gronk is doing to taylor swift
- type of hangers you deserve
- her hips don't lie
- type of chair and bub
- the first language that always tells the truth
- can't have too many of these
- what you tap (not that a**)
- we were both champions of this
- old people nuggets
- you leave them all over my house
- your fav cheese
- the stuntman chip
- some like it humble
- "be a ____ and fetch us some rubbahz"
- no cheese
- Michael who ate too much
- monitor of heart and magic
- crack eggs on me
- what you think you aren't, but you are
- not Facebook _______
- the type of woman a silver fox attracts
- "do you want to play _____"
- making up for lost zzz's
- war I'll never win against you
- where you keep me locked up
- joel who likes you as-is
- the wizard with the biggest jugs
- these five letters i swear to you
- not Pryor
- what the joker asks
- it's extra
- first date pasta
- where you get crumby with ur boys
- reeses that taste extra good cold
- to kiss, in Ben
Down
- "well actually..."
- Red Reddington's
- s*cking me, f*cking you
- Buckaroo's fav pasttime
- secret political faction
- most quotable baseball star
- Ben's ____ Chair
- actress Rebecca who stalked herself
- swedish pop sensations
- your favorite movie
- you only eat this at night
- this falls to the floor
- our jokes'll make you
- not to be confused with bind torture kill or a sandwich
- what I am to you
- early screen name, for one
- "women be talking"
- the color of smokes
- he coulda been a contender
- when you're feeling randy via txt
- game changing new bagel on the block
- what you call "s
- your fave opening, me 11%
- remote fun for two
- two of these after each period, please
- McDonald's love to see you do this
- your other true love
- aquatic animal you resemble in slumber
- a table I will never have a seat at
- the past 48
- this times two + f*cky
- street where we held hands
- clothes as impediments
- what baby needs
- the type of work you have to do every night
- small offenses or mistakes
- two of these taped to my chest
- Happy National Cybersecurity Awareness ____
- wayne who takes every shot
- favorite chicken spot
- you'd like to meet just one
- The Langford ______
- sleep inducing lovin
- Jimmy who died the day we met
- a useful conversation ender
- the store they burned down
- our favorite tv sidekick
- sweet chicken topping
- trapped
103 Clues: Of Joe • trapped • magician • no cheese • not Pryor • our buddha • it's extra • the past 48 • you sank mine • what Gomez says • your fav cheese • what baby needs • to kiss, in Ben • Red Reddington's • Ben's ____ Chair • what I am to you • what you call "s • crack eggs on me • first date pasta • Mr. Steal Ya Girl • the stuntman chip • "well actually..." • "women be talking" • remote fun for two • her hips don't lie • ...
crossword 2024-12-08
Across
- It refers to regular patterns of division in society that are associated with membership of particular social groupings.
- State of humid.
- A social unit.
- It can store and process data.
- A group of inhabitants that has the same characteristics and adaptations.
- A division into two sharply contrasting groups or sets of opinions or beliefs.
- It is species morphed similarly but does not have the same genetics.
- A form of computing uses phenomena like superposition.
- Is a hydrocarbon of natural gas.
- One hundred years.
- It is the diversity of the biological traits inside a species.
- Physical work.
- To direct the course of a ship, aircraft, or other form of transportation
- It helps identify species depending on the particular region.
- Facts learned from something or someone.
- The human race.
- A colorless liquid from rivers, seas, lakes, and rain.
- It is the diversity of different inhabitants on our planet.
- A condition of a human owned by another.
- The degree of the internal heat.
- Treating a person or a particular group of people differently.
- A system of recorded transactions maintained across computers.
- Is a structure for plants for better temperature and humidity.
- Water vapor frozen into ice crystals.
- It is a mobile device.
- Relates to the entire world.
- The holding of extreme political or religious views.
- The well-being of an organism.
- An arrangement of ranks.
- Cause of great damage and suffering.
- Organisms are assigned with a scientific name.
Down
- It is an individual and collective effort made to identify and address issues of public concern.
- A process of something that hasn’t been made before.
- A land full of trees.
- It protects systems, networks, programs, devices, and data from cyberattacks.
- Movement of air.
- Spreading harmfully and intruding.
- Used for communication.
- An accumulation of ice and snow that flows over land.
- The ability to criticize stories that are shown in mass media and determine whether it is accurate or credible.
- Semiconductor that regulates voltage flow.
- Nature of robots.
- It is the different kinds of life you find in an area, like animals, fungi, plants, and microorganisms.
- It is the protection and restoration for plants.
- Free from public attention.
- It is the diversity of the variety of inhabitants found in a geographic location.
- A social program that has unemployment benefits, social security, affordable housing, and helping poverty.
- The effect of something bad, severe, serious, or painful more or less.
- A global computer network.
- Refers to the number of times the alternating current switches between positive and negative in 1 second.
- The state of the atmosphere.
- A gap in various forms, education, rich and more, or social injustice.
- It is an identification of species that are on the brink of extinction.
- A suspension of liquid particles in gas.
- Use of technology.
- It is a practice of science in dealing with classifications for living organisms.
- Refers to long-term shifts in temperatures and weather patterns.
- Is related closely.
- An organized body of people with a specific purpose, especially in business.
- The practice of collecting taxes.
- It is a field of computer science that uses math, statistics, and machine learning.
61 Clues: A social unit. • Physical work. • State of humid. • The human race. • Movement of air. • Nature of robots. • One hundred years. • Use of technology. • Is related closely. • A land full of trees. • It is a mobile device. • Used for communication. • An arrangement of ranks. • A global computer network. • Free from public attention. • The state of the atmosphere. • Relates to the entire world. • ...
AP US History Period 9 2024-04-29
Across
- The simulation of human intelligence by computer systems, enabling tasks such as problem-solving, learning, and decision-making, with applications ranging from robotics to data analysis.
- A landmark healthcare reform law signed by President Barack Obama in 2010, aimed at expanding access to healthcare coverage, reducing healthcare costs, and improving the quality of care in the United States.
- A grassroots movement advocating for racial justice and equality, particularly in response to police brutality and systemic racism against Black communities, sparked by the acquittal of Trayvon Martin's killer in 2013.
- A social movement that emerged in the wake of sexual harassment and assault allegations against high-profile individuals, aiming to raise awareness about sexual violence, support survivors, and advocate for institutional change.
- The process of increasing interconnectedness and interdependence among countries, economies, and cultures, facilitated by advances in technology, transportation, and communication.
- Digital or virtual currencies that use cryptography for security and operate independently of central banks or governments
- The use of violence, intimidation, or coercion for political, religious, or ideological purposes, often targeting civilians or non-combatants
- The process of urban redevelopment or revitalization, often resulting in the displacement of lower-income residents and the transformation of neighborhoods into higher-income, more affluent areas.
- a political ideology characterized by its advocacy for assertive foreign policy, promotion of democracy, and belief in the use of military force to spread American values and interests abroad.
- Online platforms and technologies that enable users to create, share, and exchange information and content
Down
- The economic policies implemented during the presidency of Ronald Reagan, characterized by tax cuts, deregulation, and a focus on supply-side economics to stimulate economic growth.
- The disproportionate imprisonment of individuals, particularly from marginalized communities such as Black and Hispanic populations, resulting from harsh sentencing laws, racial bias, and socioeconomic factors.
- The manipulation of an organism's genetic material using biotechnology techniques
- A military campaign initiated by President George W. Bush in response to the 9/11 attacks, aimed at combating terrorism, eliminating terrorist networks, and promoting democracy and stability in the Middle East and beyond.
- A federal agency established in 2002 in response to the 9/11 attacks, tasked with protecting the United States from terrorist threats, securing borders, and coordinating emergency response efforts.
- Measures and practices aimed at protecting computer systems, networks, and data from cyber threats such as hacking, malware, and data breaches
- A conservative political movement that emerged in the early 21st century, characterized by opposition to government spending, taxation, and regulation, and advocating for limited government and fiscal responsibility.
- known for being the first African American president, his healthcare reform initiative (Affordable Care Act), and efforts to address economic recovery and climate change.
- A public health crisis involving the misuse, addiction, and overdose deaths related to prescription opioids, heroin, and synthetic opioids such as fentanyl, leading to widespread social and economic consequences.
- The eighth and final leader of the Soviet Union, serving as General Secretary of the Communist Party from 1985 until 1991 and is widely known for his policies of glasnost (openness) and perestroika (restructuring), which aimed to reform the Soviet political and economic systems, but ultimately led to the dissolution of the Soviet Union and the end of the Cold War.
20 Clues: The manipulation of an organism's genetic material using biotechnology techniques • Online platforms and technologies that enable users to create, share, and exchange information and content • Digital or virtual currencies that use cryptography for security and operate independently of central banks or governments • ...
Literasi Digital 2024-08-17
Across
- Subset dari AI yang memungkinkan sistem belajar dari data dan meningkatkan kinerjanya tanpa pemrograman eksplisit
- Situs web atau aplikasi yang memungkinkan pengguna untuk berbagi konten dan berinteraksi secara online
- sistem operasi yang banyak digunakan pada smartphone
- segala piranti /komponen dari sebuah komputer, yang sifatnya dapat dilihat dengan kasat mata dan dapat diraba secara langsung
- Menyimpan salinan data di lokasi lain untuk menghindari kehilangan data
- Proses mengumpulkan, mengolah, dan menganalisis data untuk menemukan informasi yang berguna
- satu cabang teknologi yang berhubungan dengan desain, konstruksi, operasi, disposisi struktural, pembuatan, dan aplikasi dari robot
- Pengalaman pengguna saat berinteraksi dengan perangkat lunak atau situs web
- Teknologi yang menciptakan lingkungan simulasi sepenuhnya yang bisa diinteraksikan oleh pengguna
- Penyimpanan data di server jarak jauh yang dapat diakses melalui Databreach Kejadian di mana informasi pribadi atau sensitif terungkap atau dicuri
- kebijakan yang mengatur hak cipta konten digital
- Sebuah jaringan yang menyediakan koneksi internet aman
- Jejak aktivitas online yang ditinggalkan oleh pengguna internet
- Teknologi yang menggabungkan elemen digital dengan lingkungan dunia nyata secara real-time
- Alamat unik yang diberikan kepada setiap perangkat yang terhubung ke jaringan internet
- Membuat dan mengelola data dalam format tabel
- Email yang tidak diinginkan atau tidak relevan, sering kali berisi iklan atau penipuan
- Teknologi yang memungkinkan mesin untuk meniru kecerdasan manusia dan melakukan tugas-tugas secara otomatis
- Sebuah perangkat yang melindungi jaringan dari akses yang tidak sah
- Tindakan dan praktik untuk melindungi sistem komputer dan jaringan dari serangan digital
- sistem jaringan komputer yang saling terhubung secara global dengan menggunakan paket protokol internet (TCP/IP) untuk menghubungkan perangkat di seluruh dunia
- Proses mengamankan informasi dengan mengubahnya menjadi kode rahasia
Down
- Proses menggali dan menganalisis data besar untuk menemukan pola dan informasi bergun
- Membuat, mengedit, dan memformat dokumen teks
- Teknologi yang memungkinkan penyimpanan data secara terdesentralisasi dan aman melalui rantai blok
- Menggunakan internet untuk mengganggu atau mengintimidasi orang lain
- Penyimpanan dan pengelolaan data melalui internet
- Mengelola dan mengorganisasi pesan email
- Data dalam jumlah besar yang kompleks dan sulit dikelola dengan alat pemrosesan data tradisional
- Penggunaan berbagai bentuk media seperti teks, gambar, audio, dan video untuk menyampaikan informasi
- Sebuah perangkat lunak yang dirancang untuk merusak atau mengganggu sistem komputer
- Program untuk menjelajahi dan mengakses informasi di internet
- perangkat yang digunakan untuk mengakses informasi secara nirkabel
- Alamat situs web yang digunakan untuk mengakses halaman web tertentu
- praktik melindungi informasi melalui penggunaan algoritme kode, hash, dan tanda tangan
- tempat untuk menyimpan data secara online
- File teks kecil yang disimpan oleh situs web di komputer pengguna untuk mengingat preferensi mereka
- Proses menulis instruksi dan program untuk komputer menggunakan bahasa pemrograma
- aplikasi yang digunakan untuk komunikasi melalui pesan teks
- tindakan mengambil data penting tanpa izin dari pengguna internet
- perangkat lunak yang melindungi komputer dari virus
- Membuat dan menyajikan slide presentasi
- Program yang digunakan untuk mencari informasi di internet
- sistem untuk mengelola informasi dalam bentuk basis data di internet
- Kejadian di mana informasi pribadi atau sensitif terungkap atau dicuri
- Mengelola dan mengatur data dalam format tabel
- kegiatan ilegal mengakses sistem komputer tanpa izin
- identitas unik seseorang di dunia maya
- Jaringan perangkat fisik yang terhubung dan dapat berkomunikasi melalui internet
- Proses menulis instruksi dan program untuk komputer menggunakan bahasa pemrograma
50 Clues: identitas unik seseorang di dunia maya • Membuat dan menyajikan slide presentasi • Mengelola dan mengorganisasi pesan email • tempat untuk menyimpan data secara online • Membuat, mengedit, dan memformat dokumen teks • Membuat dan mengelola data dalam format tabel • Mengelola dan mengatur data dalam format tabel • kebijakan yang mengatur hak cipta konten digital • ...
digital citizenship vocab 2025-11-17
Across
- the capability of a machine-based system to imitate intelligent human behavior by analyzing information, learning, and acting to achieve specific goals
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
- The process of converting information or data into a code, especially to prevent unauthorized access
- the practice of taking someone else's work or ideas and passing them off as one's own
- the social and digital persona an individual creates through online interactions, including profiles, usernames, and content they share on platforms like social media and forums
- false information that is intended to mislead; deliberate misinformation
- the ability to understand and share the feelings of another.
- the practice of bullying a person by sending messages or posting social media content of an intimidating, mocking, or threatening nature.
- the information about a particular person that exists on the internet as a result of their online activity
- the time allotted to or occupied by a particular subject, actor, etc., on film or television
- a technology that superimposes a computer-generated image on a user's view of the real world, thus providing a composite view
- the set of electronic standards for polite and appropriate behavior when using digital devices and communicating online
- an international nonprofit that provides free legal tools, including standardized licenses, that allow creators to grant permissions to their work while retaining copyright
Down
- the ethical and safe use of technology, which involves being accountable for your actions online, respecting others' privacy, and understanding the impact of your digital footprint
- is any data that can be used to identify a specific individual, directly or indirectly
- the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same
- a person who uses technology responsibly and ethically to participate in online communities
- controls on digital platforms, like social media, websites, and apps, that let you manage who can see your information and how your data is used
- a type of cyberattack where criminals impersonate legitimate organizations to trick people into giving up sensitive information like passwords or credit card numbers
- a person who is present at an event or incident but does not take part
- false or inaccurate information.
- is the ability to access, analyze, evaluate, create, and act using all forms of communication
- a data-tracking system in which an individual's internet search history and browsing habits are used to present them with similar or related material on social media or other platforms
- person who speaks or acts in support of an individual or cause, particularly someone who intervenes on behalf of a person being attacked or bullied.
- the unauthorized use or reproduction of another's work
- interacting with technology in a conscious, deliberate, and intentional way that prioritizes well-being and aligns with your goals
- an excessive and compulsive use of digital devices and online activities that leads to significant problems in daily life
- The ability to use digital technology in a way that does not negatively impact your daily life, health, or productivity
- a legal doctrine in U.S. copyright law that permits the unlicensed use of copyrighted materials for purposes such as criticism, comment, news reporting, teaching, scholarship, or research
- moral principles that govern a person's behavior or the conducting of an activity
30 Clues: false or inaccurate information. • the unauthorized use or reproduction of another's work • the ability to understand and share the feelings of another. • a person who is present at an event or incident but does not take part • false information that is intended to mislead; deliberate misinformation • ...
Digital Citizenship 2025-12-01
Across
- time spent using a device
- the trail of data you leave behind when using the internet, which includes both the information you actively share, like social media posts and emails, and the data passively collected, such as browsing history and cookies
- using someone else's original work, including words, ideas, or creations, and presenting it as your own without proper acknowledgment
- the ability to understand and share the feelings of another
- unauthorized duplication, distribution, or use of copyrighted software
- the practice of sending fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging
- a set of moral principles or rules that guide behavior, helping individuals and societies determine what is right and wrong
- the practice of protecting systems, networks, and programs from digital attacks, which are typically aimed at accessing, changing, or destroying sensitive information, disrupting normal business processes, or extorting money
- a precise electronic scale or the healthy equilibrium between technology and real life
- the virtual representation of an individual or entity in digital spaces, composed of information like usernames, profiles, and online activities
- any data that relates to an identified or reasonably identifiable individual, whether directly or indirectly
- technology that enables machines to perform tasks that typically require human intelligence, such as learning, problem-solving, reasoning, and decision-making
- false information that is intended to mislead; deliberate misinformation
- the process of converting data into a code to prevent unauthorized access, using mathematical algorithms and an encryption key to make information unreadable to anyone without the key
- the exclusive legal right to reproduce, publish, and distribute an original work of authorship that has been fixed in a tangible form
- the compulsive or poorly controlled use of technological products, such as smartphones, the internet, and video games, that leads to problems and distress in a person's life
Down
- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer
- the conscious and intentional engagement with digital tools and devices, focusing on awareness of one's actions and the impact they have
- a set of rules for respectful and appropriate behavior in online interactions
- the ethical and mindful use of technology that considers the impact of online actions on oneself, others, and the planet
- the legal principle that allows you to use a copyrighted work without permission for purposes like criticism, comment, news reporting, teaching, scholarship, or research
- a person who uses technology responsibly and appropriately in social and civic activities
- user-controlled options on digital platforms that determine how personal information is shared, viewed, and used
- the use of digital technologies to harass, threaten, or embarrass someone
- a person who sees or is present during an event but does not take part in it
- Literacy, the ability to use printed and written information to function in society, achieve one's goals, and develop one's knowledge and potential
- taking action to support others when you see someone being bullied, harassed, or discriminated against, instead of being a bystander who does nothing
- an organization that provides free copyright licenses, offering creators a "some rights reserved" option that allows them to grant permissions for others to use their work under specific conditions, such as attribution or noncommercial use
- overlays computer-generated images and digital information onto the user's view of the real world, creating an enhanced, interactive experience
- false or inaccurate information
30 Clues: time spent using a device • false or inaccurate information • the ability to understand and share the feelings of another • unauthorized duplication, distribution, or use of copyrighted software • false information that is intended to mislead; deliberate misinformation • the use of digital technologies to harass, threaten, or embarrass someone • ...
digital citizenship 2025-12-01
Across
- controls on digital platforms that allow users to manage how their personal information is collected, used, and shared with others
- the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information,
- the practice of consciously and intentionally engaging with technology or other activities, rather than doing them on autopilot
- presenting someone else's work or ideas as your own without proper attribution
- the ability to understand and share the feelings of another person by imagining what it's like to be in their situation
- Responsibility: the practice of using technology and information in an ethical, safe, and accountable way
- the virtual representation of a person created through digital interactions and the information they share on the internet
- Intelligence: the ability of computer systems to perform tasks that typically require human intelligence, such as problem-solving, learning, and decision-making
- non-profit organization that provides free, public licenses that allow creators to grant certain permissions for using their work
- the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
- : the code of conduct for respectful and appropriate behavior in online environments.
- Reality:a technology that superimposes a computer-generated image on a user's view of the real world, thus providing a composite view
- a person who speaks or acts in support of an individual or cause, particularly someone who intervenes on behalf of a person being attacked or bullied.
- the use of digital technology to harass, threaten, or embarrass someone
Down
- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
- Literacy : the ability to critically analyze stories presented in the mass media and to determine their accuracy or credibility.
- use a legal doctrine in U.S. copyright law that allows for the limited use of copyrighted material without permission for purposes
- a person who uses technology responsibly, safely, and respectfully to participate in online communities
- Addiction: a behavioral addiction characterized by excessive and compulsive use of technology, such as smartphones, the internet, and video games, despite negative consequences
- false or inaccurate information that is spread without an intent to deceive
- any data that can be used to identify a living person, either directly or indirectly
- false information deliberately and often covertly spread (as by the planting of rumors) in order to influence public opinion or obscure the truth
- Time: the amount of time spent using electronic devices that have a screen, such as smartphones, computers, televisions, and tablets
- moral principles that govern a person's behavior or the conducting of an activity.
- the illegal copying, distribution, or use of copyrighted digital content such as software, music, movies, and video games without authorization or payment
- the information about a particular person that exists on the internet as a result of their online activity.
- a feature that helps you manage and monitor your screen time to prevent overuse
- the practice of protecting internet-connected systems, such as hardware, software, and data, from malicious attacks and unauthorized access
28 Clues: the use of digital technology to harass, threaten, or embarrass someone • false or inaccurate information that is spread without an intent to deceive • presenting someone else's work or ideas as your own without proper attribution • a feature that helps you manage and monitor your screen time to prevent overuse • ...
Imp. of Misuse and Cybersecurity 2020-12-03
3 Clues: internally produced software • an unauthorized attempt to access a system, device and/or network via the Internet • damage can occur when there is a planned attempt to bypass all legitimate access restrictions
claudio 2025-06-23
Across
- A method of threat detection that monitors and scrutinizes processes, file system, registry, and network activities on an endpoint for suspicious patterns, often leveraging machine learning models.
- An advanced policy setting in Nebula that tightens the threshold for flagging suspicious processes, increasing vigilance against unknown threats at the risk of more false positives.
- A type of malware disguised as legitimate software, tricking users into installing it, after which it can gain unauthorized access or perform malicious actions.
- Regular downloads containing the latest threat definitions, behavioral rules, and detection heuristics, essential for keeping endpoint agents up-to-date against emerging threats.
- Configurable alerts within the Nebula console that inform administrators via email or other channels about critical security events or system status changes.
- Acronym for Potentially Unwanted Program, software that may include adware, spyware, or other intrusive features, often bundled with legitimate downloads, as categorized by ThreatDown.
- Logical collections of endpoints within Nebula that allow administrators to apply policies, schedules, and exclusions uniformly to a subset of devices.
- A feature within Nebula that allows administrators to prevent the execution of specific unauthorized or unwanted applications on managed endpoints.
- Network settings on an endpoint or within Nebula that direct outbound communications through an intermediary server, often requiring specific allowances for agent connectivity.
- A latent weakness or flaw within a software application, operating system, or network configuration that could be leveraged by an attacker to compromise system integrity or confidentiality.
- Software that, while not inherently malicious, may pose a security risk due to its functionality, such as remote administration tools that could be misused.
- Specific numerical addresses used in network communication, which must often be explicitly opened or configured in firewalls to allow ThreatDown agents to communicate with the cloud console.
- A statistically significant deviation from established baseline behavior patterns on an endpoint, frequently signaling potential stealthy compromise or advanced persistent threat activity.
- A protection feature within Nebula that defends against repeated, systematic attempts to guess login credentials, often associated with Remote Desktop Protocol attacks.
- A ThreatDown service or component primarily responsible for validating product licensing and subscription entitlements for deployed endpoint agents.
- A ThreatDown backend server component or service responsible for checking and distributing updates for both product versions and protection databases to endpoint agents.
- A specific rule configured within Nebula to bypass security scrutiny for a particular file, folder, process, or website, often used to prevent false positives or accommodate legitimate applications.
- A module that intercepts and evaluates domain name system queries to block access to malicious websites, enforce content policies, and prevent communication with command-and-control servers.
- The systematic process of orchestrating the installation and configuration of endpoint protection agents across a diverse organizational digital infrastructure.
- An advanced endpoint security technology that provides continuous monitoring, deep visibility, and proactive response capabilities to detect and contain sophisticated threats that evade traditional prevention.
- A specialized cybersecurity service providing 24/7 human-led threat hunting, monitoring, and incident response, extending an organization's security capabilities without requiring in-house staffing.
- The proprietary cloud-native platform serving as the centralized command and control for ThreatDown's comprehensive suite of endpoint security solutions.
- A module that systematically scans endpoints to identify software weaknesses and misconfigurations, often using CVSS scoring to prioritize discovered flaws.
- An erroneous detection where legitimate activity or software is incorrectly identified as malicious, requiring administrative intervention or the creation of an exclusion.
- An enhanced security measure that requires users to provide two different forms of verification to log into the Nebula console, beyond just a password.
- Acronym for Content Delivery Network, a distributed network of servers used by ThreatDown to efficiently deliver product updates and protection definitions to global endpoints.
- A type of malicious software that encrypts a victim's files and demands payment, typically cryptocurrency, in exchange for the decryption key, often with a time limit.
- A sophisticated threat detection methodology employed by endpoint protection, which identifies unknown malicious activity by analyzing behavior patterns rather than relying solely on known signatures.
- A stealthy type of malware designed to conceal its presence and activities on a compromised system, often by modifying operating system processes or kernel functions.
- The lightweight client software component deployed on an endpoint, facilitating continuous telemetry and policy enforcement from the Nebula console.
Down
- A category of potentially unwanted software that aggressively displays advertisements, often collecting user data without explicit consent.
- A chronological sequence of records in the Detection Log, providing an unalterable history of security events, administrative actions, and system changes within the Nebula platform.
- A core security feature of the endpoint agent that creates a "safe zone" to prevent unauthorized termination or manipulation of the ThreatDown application itself by other processes.
- A Nebula user role with full view and edit access restricted to specific assigned customer locations or organizational units.
- A security policy setting that requires a password or specific credentials to prevent unauthorized removal of the ThreatDown agent from an endpoint.
- A specific piece of code or a meticulously crafted sequence of commands designed to capitalize on a known software vulnerability, often leading to privilege escalation or remote code execution.
- A specific action taken on a compromised endpoint to prevent it from communicating with other devices on the internal network, containing the spread of threats.
- A discrete cybersecurity event, potentially signifying a breach or compromise, requiring immediate investigation, containment, and root cause analysis.
- A module that enables centralized control over endpoint firewall rules, augmenting network security by regulating incoming and outgoing traffic.
- A broad category encompassing any software intentionally designed to cause disruption, damage, or unauthorized access to a computer system, including viruses, worms, and Trojans.
- An alphanumeric string or digital credential required to activate and validate the legitimate use of ThreatDown products and services, defining features and expiration.
- A comprehensive cybersecurity service that integrates and correlates security telemetry across multiple domains—including endpoints, networks, cloud, and email—with human expertise for proactive threat hunting and rapid incident response.
- The strategic linking of the Nebula platform with external security orchestration, automation, and response (SOAR) or Security Information and Event Management (SIEM) systems for a unified security posture.
- A report within Nebula providing a consolidated view of all initiated actions, such as scans or remediations, along with their current status and completion details.
- The lowest access level within the Nebula console, allowing users to view data and generate reports but without the ability to make any system changes.
- A configuration option for forwarding Nebula's event and detection data to an external security information and event management (SIEM) system for centralized logging and analysis.
- A security feature focusing on preventing threats like phishing, malware, and spam that are delivered via electronic messages, often through attachment scanning and link analysis.
- The highest-level user role in the Nebula console, possessing unrestricted access to platform configurations, user management, and sensitive policy data.
- A granular set of configurable rules within Nebula, dictating the precise operational parameters and security responses of endpoint agents across various organizational groups.
- Malicious software designed to secretly gather information about a user's activities and transmit it to an external entity, often without their knowledge.
- A forensic capability within Nebula that collects and stores extensive endpoint event data, enabling administrators to investigate past activities and reconstruct attack sequences. (Abbr. FRS)
- A historical name for a previous generation of ThreatDown's cloud-based management console, now largely superseded by Nebula but still referenced in documentation for network access.
- Specialized data files generated by the endpoint agent or console, essential for technical support to troubleshoot complex issues like connectivity problems or unexpected behaviors.
- A self-replicating standalone malware that spreads via network connections to infect other computers, often without human interaction.
- A security feature of the endpoint agent designed to prevent unauthorized modification, disablement, or uninstallation of the ThreatDown software by malicious actors or unprivileged users.
- An isolated, virtualized environment utilized for detonating and meticulously observing suspicious files or code in a controlled manner, preventing any impact on the live operating system.
- A powerful command-line interface feature within Nebula that allows administrators to remotely execute commands on isolated endpoints for forensic investigation and advanced remediation.
- Granular system data continuously streamed from protected endpoints, crucial for advanced threat hunting and behavioral anomaly detection within the platform.
- An isolation protocol for detected malicious executables or processes, designed to neutralize immediate threat by preventing further interaction with the host system.
- A Nebula user role providing view access and limited editing capabilities, typically restricted to managing specific sites or entities within a larger organizational structure.
- An action where malicious software or an attacker gains unauthorized control over a system, browser, or network session.
- A feature, often browser-based, specifically designed to identify and block access to fraudulent websites that attempt to steal sensitive user information through deceptive means.
- The precise sequence of automated or manual actions executed to eradicate or neutralize a detected threat, often involving deletion, isolation, or rollback of malicious changes.
- An indicator, often monitored during troubleshooting, reflecting the operational state of the MBEndpointAgent or other core ThreatDown processes on a managed device.
- A module designed to automate the deployment of software updates and security fixes across operating systems and third-party applications, thereby addressing identified vulnerabilities.
- A critical remediation capability in ThreatDown EDR that reverses malicious changes caused by ransomware, restoring affected files to their pre-infection state.
- A deceptive application or program designed to trick users into believing their system has problems, often for financial gain or to install further malicious software.
- A product module extending ThreatDown protection to mobile devices, safeguarding them against malware, risky apps, and network threats.
- A policy-driven feature that regulates the use of removable media and peripheral devices on endpoints to prevent data exfiltration and malware introduction.
- A security directive comprising a pre-approved inventory of applications, executables, or network connections permitted to operate, thereby bypassing standard security checks.
70 Clues: An action where malicious software or an attacker gains unauthorized control over a system, browser, or network session. • A Nebula user role with full view and edit access restricted to specific assigned customer locations or organizational units. • ...
Lesson 2.11 Glossary 2022-12-05
Across
- Risk specific to a company's product, for example, poor quality, bad customer reviews, and/or out of supply.
- This type of attack “kidnaps” a person’s or organization’s databases and holds all of their information hostage.
- Market risk is a broad macroeconomic risk that isn't specific to one industry, for example, inflation and recessions are market risks.
- The protection of networks, devices, and data from unauthorized access or criminal use, and the practice of ensuring the confidentiality, integrity, and availability of information.
- The risk of a negative outcome in one's career due to action or inaction, for example, loss of income and lack of certain types of experiences.
- These attacks use carefully targeted digital messages to fool people into clicking on links that will expose sensitive data.
- An economic system where companies are privately-owned, versus being owned by the government, and that assumes companies are built with a purpose of creating economic value through innovation, driven by a profit-motive, and where prices are set by the market via the ebb and flow of supply and demand.
- A formal proceeding in the court system that helps individuals and businesses eliminate their debts and repay their creditors.
- An event occurring in nature, like a tornado, earthquake, hurricane and/or flood, that can cause great harm to people, property and businesses.
- Money spent to pay for borrowed money - interest payable on loans, bonds, lines of credit; it is calculated as the interest rate times the outstanding principal amount of the debt.
- When three possibilities exist – gain, loss, or no change.
- Risk mitigation is a process that identifies and tracks risks, and creates a strategy to prepare for, and either lessens the impact of certain risks and threats, or enhances opportunities associated with risks and threats.
Down
- The risk associated with poor decisions made by managers of the company.
- Predicting outcomes of a decision by creating and changing a certain range of variables and calculating how changes in one variable affect the outcome of the whole.
- The chance that a set of factors within an industry drags down the industry’s overall performance, for example, increased taxes or tariffs on the automobile industry may adversely affect the sales and profits of the automobile producers.
- Software that is specifically designed to gain unauthorized access to a computer or digital system or network for the purpose of disrupting, damaging, or destroying it.
- Also known as absolute risk, is when two possibilities exist – loss or no change.
- A contractual agreement whereby the insurer collects a premium from the insured in exchange for the reimbursement, or a predetermined payment, for future loss by the insured.
- An estimate/projection of future revenues, expenses, net income, and capital needed to fund the company’s operations.
- Occurs when a country experiences temporary economic decline, usually measured as two consecutive quarters of decline in GDP.
- Someone who identifies an opportunity by creating a solution to a problem, starts a business, assumes the personal and financial risk (and rewards) of the venture, and strives for constant improvement in an effort to grow the business and improve society.
- The increase in the general level of prices in an economy.
- The risk that financial stakeholders will lose money.
23 Clues: The risk that financial stakeholders will lose money. • The increase in the general level of prices in an economy. • When three possibilities exist – gain, loss, or no change. • The risk associated with poor decisions made by managers of the company. • Also known as absolute risk, is when two possibilities exist – loss or no change. • ...
Cross and Queer 2023-01-02
Across
- Video-sharing social networking service.
- Berlin-based company that offers cybersecurity and data protection solutions.
- University, Berlin-based private university focused on computer science and entrepreneurship.
- Startup that helps you book dance classes and workshops.
- Total number of Berlin Vereine that are better than Startup League?
- Who was the biggest sponsor (and had their own pitch) for the summer '22 season?
- Neobank for freelancers and self-employed individuals.
- Financial technology company that offers mobile banking and credit products.
- Which day are Startup League matches held?
- Berlin-based company that develops mobile and social games.
- What is the name of the Startup League groundskeeper?
- Berlin-based mobile marketing and analytics company.
- EO, Company that offers a platform for booking and managing events.
- What "sense of" will you require to enjoy this magazine?
- Startup delivering meal kits.
- Where is TiB (Startup League Winter '22 Season) located?
- What comes free with this magazine?
- Operating online platform for booking hearing aids and hearing tests.
- What is our favourite social media platform to post on?
- Where was Ollie born?
- How many players on the pitch at any given time?
- When was playground founded?
- Firstname of the Startup League Vorstand?
- What surface do Startup League Enthusiasts play Volleyball on?
- Berlin-based music and audio streaming platform.
- Platform for booking and managing home cleaning services.
- Who does Startup League use as nominated jersey supplier?
- Same-day delivery service for groceries.
- Is Ollie worth the money?
- When does Ollie sleep late during the week?
- What is the leagues least favourite social media platform to post on?
- One of Ollie's favourite actors?
Down
- On which street is Startup League HQ?
- Berlin-based company that operates a platform for booking and managing coworking spaces.
- Which bar/restaurant did Ollie work at before joining Startup League?
- Official drink of the Startup League?
- Payment solutions for small businesses.
- Platform for booking and purchasing travel experiences and activities.
- Company that operates a platform for temporary staffing and recruitment services.
- What is the name of the new Startup League bar?
- What temperature is this magazine?
- Campus, Berlin-based campus for education and training in artificial intelligence.
- Cloud computing service offered by Amazon.
- What is Faris' nickname at Startup League?
- Platform for booking and managing customized manufacturing services.
- Platform for booking and managing urban farming services.
- Company that connects freelance consultants with businesses.
- Ollie favourite vegan recipe?
- What is Ollie's birth sign?
- Medical knowledge platform for doctors.
- Which sport was added to Startup League roster in '22?
- Sound and audio visualization software based in Berlin.
- Winner of the '22 Summer season of Startup League?
- Who knows best?
- Job search and recruitment platform.
- What messaging platform on Ollie's phone, has received more than 25000 messages?
- Is it football or soccer?
- Colour of Startup League training jerseys?
- App for sharing anonymous messages within a 5km radius.
- Engineering, Engineering and consulting firm for renewable energy projects.
- Company offering private tutors for school subjects.
- Last name of Lukas (Vorstand)?
- Platform for tax return preparation and filing.
- Ollie's middle name?
- What is Startup Leagues favourite colour?
- Is it football or soccer?
- Who can join Startup League? playground, Where is Startup League's home in Berlin?
- Travel search and booking website.
68 Clues: Who knows best? • Ollie's middle name? • Where was Ollie born? • Is it football or soccer? • Is it football or soccer? • Is Ollie worth the money? • What is Ollie's birth sign? • When was playground founded? • Ollie favourite vegan recipe? • Startup delivering meal kits. • Last name of Lukas (Vorstand)? • One of Ollie's favourite actors? • What temperature is this magazine? • ...
Literasi Digital 2024-08-17
Across
- Mengelola dan mengorganisasi pesan email
- Proses menulis instruksi dan program untuk komputer menggunakan bahasa pemrograma
- Jejak aktivitas online yang ditinggalkan oleh pengguna internet
- Alamat unik yang diberikan kepada setiap perangkat yang terhubung ke jaringan internet
- perangkat yang digunakan untuk mengakses informasi secara nirkabel
- Penyimpanan dan pengelolaan data melalui internet
- Teknologi yang menciptakan lingkungan simulasi sepenuhnya yang bisa diinteraksikan oleh pengguna
- Penggunaan berbagai bentuk media seperti teks, gambar, audio, dan video untuk menyampaikan informasi
- kegiatan ilegal mengakses sistem komputer tanpa izin
- perangkat lunak yang melindungi komputer dari virus
- Alamat situs web yang digunakan untuk mengakses halaman web tertentu
- tindakan mengambil data penting tanpa izin dari pengguna internet
- identitas unik seseorang di dunia maya
- Kejadian di mana informasi pribadi atau sensitif terungkap atau dicuri
- Membuat dan menyajikan slide presentasi
- Pengalaman pengguna saat berinteraksi dengan perangkat lunak atau situs web
- Subset dari AI yang memungkinkan sistem belajar dari data dan meningkatkan kinerjanya tanpa pemrograman eksplisit
- Penyimpanan data di server jarak jauh yang dapat diakses melalui Databreach Kejadian di mana informasi pribadi atau sensitif terungkap atau dicuri
- Sebuah perangkat lunak yang dirancang untuk merusak atau mengganggu sistem komputer
- Email yang tidak diinginkan atau tidak relevan, sering kali berisi iklan atau penipuan
- Teknologi yang menggabungkan elemen digital dengan lingkungan dunia nyata secara real-time
- Membuat, mengedit, dan memformat dokumen teks
- aplikasi yang digunakan untuk komunikasi melalui pesan teks
- tindakan meretas untuk tujuan jahat atau kriminal
- tempat untuk menyimpan data secara online
- Jaringan perangkat fisik yang terhubung dan dapat berkomunikasi melalui internet
Down
- Program yang digunakan untuk mencari informasi di internet
- Teknologi yang memungkinkan penyimpanan data secara terdesentralisasi dan aman melalui rantai blok
- Data dalam jumlah besar yang kompleks dan sulit dikelola dengan alat pemrosesan data tradisional
- File teks kecil yang disimpan oleh situs web di komputer pengguna untuk mengingat preferensi mereka
- Tindakan dan praktik untuk melindungi sistem komputer dan jaringan dari serangan digital
- Sebuah perangkat yang melindungi jaringan dari akses yang tidak sah
- praktik melindungi informasi melalui penggunaan algoritme kode, hash, dan tanda tangan
- Situs web atau aplikasi yang memungkinkan pengguna untuk berbagi konten dan berinteraksi secara online
- Sebuah jaringan yang menyediakan koneksi internet aman
- sistem jaringan komputer yang saling terhubung secara global dengan menggunakan paket protokol internet (TCP/IP) untuk menghubungkan perangkat di seluruh dunia
- Proses menulis instruksi dan program untuk komputer menggunakan bahasa pemrograma
- Menggunakan internet untuk mengganggu atau mengintimidasi orang lain
- Proses menggali dan menganalisis data besar untuk menemukan pola dan informasi bergun
- Proses mengamankan informasi dengan mengubahnya menjadi kode rahasia
- Program untuk menjelajahi dan mengakses informasi di internet
- mesin pencari yang paling populer di dunia
- Teknologi yang memungkinkan mesin untuk meniru kecerdasan manusia dan melakukan tugas-tugas secara otomatis
- segala piranti /komponen dari sebuah komputer, yang sifatnya dapat dilihat dengan kasat mata dan dapat diraba secara langsung
- Proses mengumpulkan, mengolah, dan menganalisis data untuk menemukan informasi yang berguna
- Membuat dan mengelola data dalam format tabel
- data rahasia yang digunakan untuk melindungi akses ke sistem
- sistem untuk mengelola informasi dalam bentuk basis data di internet
- Mengelola dan mengatur data dalam format tabel
- kebijakan yang mengatur hak cipta konten digital
- Menyimpan salinan data di lokasi lain untuk menghindari kehilangan data
- sistem operasi yang banyak digunakan pada smartphone
- satu cabang teknologi yang berhubungan dengan desain, konstruksi, operasi, disposisi struktural, pembuatan, dan aplikasi dari robot
53 Clues: identitas unik seseorang di dunia maya • Membuat dan menyajikan slide presentasi • Mengelola dan mengorganisasi pesan email • tempat untuk menyimpan data secara online • mesin pencari yang paling populer di dunia • Membuat dan mengelola data dalam format tabel • Membuat, mengedit, dan memformat dokumen teks • Mengelola dan mengatur data dalam format tabel • ...
Crossword Puzzle 2024-04-30
Across
- An electronic tool or machine used for specific tasks.
- Installing new or improved software to fix issues or add features.
- Tricking people into giving away their personal information.
- A group of interconnected computers or devices.
- Bullying someone using digital devices or platforms.
- A secret word or phrase used to access something.
- An electronic device that manipulates information or data.
- The main means of mass communication.
- An example of a computer platform is a desktop computer with Microsoft Windows installed on it
- Related to computers or technology.
- Protecting digital systems and data from attacks or breaches.
- Free from harm or danger.
- The device that allows your computers, smartphones,etc. to connect to the internet.
- Linking to the internet or another device.
- Any criminal activity that involves a computer, network/ed device.
- Being accountable for one's actions online.
- Software designed to harm or disrupt computer systems.
- A person or thing that provides a service or commodity.
- Keeping personal information safe and confidential.
- Physical and electronic parts of a computer, or metal tools and equipment, or military equipment.
- Belief in the reliability or truth of someone or something online.
- The process of assigning a code to something for classification or identification.
- To determine or set the value or amount of something, or to judge or assess its significance, worth, or quality.
- controlled by or connected to another computer or to a network.
- A thing that is hidden or stored.
- Understanding and recognizing potential risks online.
- The ability to acquire and apply knowledge and skills.
- Protection from harm, damage, or unauthorized access.
- A communication method that uses electronic devices to deliver messages across computer networks.
- Being a member of a digital community and acting responsibly.
Down
- Relating to society or interaction with others.
- Who you are, especially online or in digital form.
- A set of related web pages located under a single domain name, typically produced by a single person or organization.
- Moral principles that guide behavior.
- The programs and other operating information used by a computer
- Relating to electronic communication networks and virtual reality.
- A computer program with a graphical user interface for displaying and navigating between web pages.
- The ability to read, write, and understand information.
- Random-access memory.
- An electronic communications network that connects computer networks and organizational computer facilities around the world
- A person or thing that brings something into existence.
- A barrier that blocks unauthorized access to a network.
- Converting information into a secret code to prevent unauthorized access.
- Facts or data used for communication or knowledge.
- A harmful program that can damage computer systems.
- Traces or records of online activity.
- A user’s access to a digital service or platform.
- Unsolicited or unwanted emails or messages.
- A set of rules for formatting and processing data.
- On the internet include identity theft, cyberbullying, and online harassment.
- Permission for something to happen or agreement to do something.
- Information stored or transmitted electronically.
- Verify the identity of a user or device.
- People who gain unauthorized access to computer systems.
54 Clues: Random-access memory. • Free from harm or danger. • A thing that is hidden or stored. • Related to computers or technology. • Moral principles that guide behavior. • The main means of mass communication. • Traces or records of online activity. • Verify the identity of a user or device. • Linking to the internet or another device. • ...
Internet 2025-03-26
Across
- The process of transferring data from a local device to the Internet.
- A person who posts provocative or offensive content online.
- A basic networking device that connects multiple computers or devices in a network and transmits data to all connected devices, without filtering or directing traffic.
- A storage location for frequently used internet data.
- The process of transferring data from the Internet to a local device.
- A network of remote servers used to store data online.
- Software designed to harm or exploit computers.
- The practice of protecting computers and networks from attacks.
- A software application used to access the internet.
- A type of online scam used to steal personal information.
- A software add-on that extends the functionality of a program or browser.
- A global network that connects millions of private, public, academic, business, and government networks.
- A collaborative website that allows users to edit and share content.
- Small digital icons used to express emotions in messages.
- The delay between a user's action and the response from a network or server.
- A facility that houses computer systems and related components, such as servers and storage, used to process, store, and distribute data.
- A collection of web pages under a single domain name.
- A small file stored on a computer that tracks online activity.
- A clickable link that directs users to another web page.
Down
- A set of rules and conventions that determine how data is transmitted and received over a network, ensuring that devices can communicate effectively and understand each other.
- A word or phrase preceded by "#" used to categorize content on social media.
- A security system that protects a network from unauthorized access.
- The main or introductory page of a website.
- A digital audio file available for streaming or download.
- Sensationalist headlines designed to attract clicks.
- A networking device that forwards data packets between computer networks, directing traffic and enabling communication between different networks, such as connecting a home network to the internet.
- A networking device that connects multiple devices within a local area network (LAN) and directs data to its intended destination based on MAC addresses.
- A process of looking for information online.
- A humorous image, video, or text spread online.
- The process of converting data into a secure format.
- A service that provides space to store websites online.
- The amount of data that can be transmitted over an internet connection.
- A test to prove a user is human.
- Unwanted or unsolicited email messages.
- A device or point in a network that can send, receive, or forward data. Examples of nodes include computers, printers, routers, and servers.
- The rate at which data is transferred or processed, typically measured in bits per second (bps) or megabits per second (Mbps), reflecting how fast information can travel across a network or be processed by a device.
- An automated program that performs repetitive tasks on the Internet.
- An online discussion board.
- A hidden part of the internet used for anonymous activities.
- A computer or system that provides resources and services to other devices on a network.
40 Clues: An online discussion board. • A test to prove a user is human. • Unwanted or unsolicited email messages. • The main or introductory page of a website. • A process of looking for information online. • Software designed to harm or exploit computers. • A humorous image, video, or text spread online. • A software application used to access the internet. • ...
Digital Citizenship Vocabulary 2025-11-19
Across
- or inaccurate information.
- Commons-a non-profit organization and a set of public copyright licenses that allow creators to share their work with the public under specific conditions, while retaining their copyright.
- Responsibility-the ethical and safe use of technology, involving accountability for one's actions online, respecting others' privacy, and being mindful of the impact of one's digital footprint.
- Use-(in US copyright law) the doctrine that brief excerpts of copyright material may, under certain circumstances, be quoted verbatim for purposes such as criticism, news reporting, teaching, and research, without the need for permission from or payment to the copyright holder.
- Personal information is any data that can be used to identify a specific individual, either directly or indirectly.
- the process of converting data into a coded format, called ciphertext, to prevent unauthorized access.
- Intelligence-the application of computer systems able to perform tasks or produce output normally requiring human intelligence, especially by applying machine learning techniques to large collections of data.
- Reality-a technology that superimposes a computer-generated image on a user's view of the real world, thus providing a composite view.
- the ability to understand and share the feelings of another.
- -The ability to critically analyze stories presented in the mass media and to determine their accuracy or credibility
- the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- practice of attacking and robbing ships at sea.
- Etiquette the set of standards for how to behave politely and respectfully when using technology, particularly the internet.
- the practice of bullying a person by sending messages or posting social media content of an intimidating, mocking, or threatening nature.
- information that is intended to mislead; deliberate misinformation.
- Balance-a digital scale for measuring weight or a state of equilibrium with technology use.
- principles that govern a person's behavior or the conducting of an activity.
Down
- a person who speaks or acts in support of an individual or cause, particularly someone who intervenes on behalf of a person being attacked or bullied.
- A person who uses digital technology responsibly
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- the trail of data a person leaves behind
- The virtual self a person or entity creates to interact
- the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
- Use-the practice of being aware and intentional when interacting with technology and daily activities.
- process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
- Time-the amount of time spent using electronic devices with a display screen.
- the practice of taking someone else's work or ideas and passing them off as one's own.
- Addiction-a behavioral addiction characterized by compulsive and excessive use of technology, such as smartphones, the internet, or video games, despite negative consequences.
- user-controlled options on digital platforms like websites and apps that allow you to manage and control who sees your personal information and how it is shared
- a person who is present at an event or incident but does not take part.
30 Clues: or inaccurate information. • the trail of data a person leaves behind • practice of attacking and robbing ships at sea. • A person who uses digital technology responsibly • The virtual self a person or entity creates to interact • the ability to understand and share the feelings of another. • information that is intended to mislead; deliberate misinformation. • ...
Week 6 AND 7 2026-03-16
Across
- A skilled worker who practices a trade or handicraft, creating items by hand.
- Systematic investigation into a subject to establish facts and reach new conclusions.
- Types of cloth or woven fabric, often featuring traditional patterns and techniques.
- A work of outstanding artistry, skill, or workmanship that defines a creator's career.
- The art of decorating fabric using a needle and thread to create intricate patterns.
- A point where two systems, subjects, or organizations meet and interact (e.g., user-to-screen).
- A long-established custom or belief that has been passed on from one generation to another.
- The traditional beliefs, customs, and stories of a community, passed through generations by word of mouth.
- The available body of facts or information indicating whether a belief or proposition is true.
- The programs and other operating information used by a computer.
- A symbolic representation (like the Calavera) used in rituals to honor the deceased and the cycle of life.
- The practice of protecting systems, networks, and programs from digital attacks.
- A group of interconnected systems or people that share information and resources.
- Originating or occurring naturally in a particular place; native to a region or culture.
- The visual images and symbols used in a work of art or the interpretation of their meaning.
- Objects made of baked clay, such as vessels and decorative figures, rooted in ancient techniques.
- The physical components of a computer or electronic system.
- A proposed explanation made on the basis of limited evidence as a starting point for further investigation.
- A process or set of rules to be followed in calculations or problem-solving operations by a computer.
- Decorative or functional objects made by hand using traditional methods.
Down
- Detailed examination of the elements or structure of something to understand its function.
- A room or building equipped for scientific experiments, research, or teaching.
- Something handed down from an ancestor or predecessor; the heritage left behind for the future.
- It refers to the traditions, culture, history, customs, or assets that a person, family, or country receives from the past.
- The use of symbols to represent ideas, qualities, or cultural concepts.
- Relating to the period of history where a region was under the political control of another country.
- A system of parts working together in a machine or a process to achieve a result.
- The process of translating an idea or invention into a tool or service that creates value.
- A sudden and significant development or success in a specific field of study.
- The act of finding or learning something for the first time.
- A celebration or ritual event marked by joy, music, and community gathering.
- A structured set of data held in a computer, especially one that is accessible in various ways.
- The quality of design and work shown in something made by hand; expertise.
- Full of energy, brightness, and intense color, characteristic of many traditional celebrations.
- Large-scale artworks painted or applied directly onto walls or permanent surfaces.
- The basic cause, source, or origin of a person's heritage and cultural identity.
- A scientific procedure undertaken to make a discovery or test a hypothesis.
- The activity of using computer technology to process data and solve complex problems.
- The use of technology to perform tasks without human intervention.
- The process of converting a new idea into a working product or improved system.
40 Clues: The physical components of a computer or electronic system. • The act of finding or learning something for the first time. • The programs and other operating information used by a computer. • The use of technology to perform tasks without human intervention. • The use of symbols to represent ideas, qualities, or cultural concepts. • ...
Cybersecurity Puzzle 2023-10-06
Crossword 08 2023-10-25
Across
- refers to the willful engagement, maintenance, control or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration;
- refers to listening to, recording, monitoring or surveillance of the content of communications, including procurement of the content of data, either directly through access and use of a computer system, or indirectly through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring;
- Pornography refers to the unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the “Anti-Child Pornography Act of 2009”, committed through a computer system: Provided, that the penalty to be imposed shall be one (1) degree higher than that provided for in Republic Act No. 9775;
- refers to gathering and receiving information;
- Authority refers to the DOJ – Office of Cybercrime;
- Authority refers to either the Cybercrime Investigation and Coordinating Center or the DOJ – Office of Cybercrime, as the case may be;
- data refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system, including a program suitable to cause a computer system to perform a function, and includes electronic documents and/or electronic data messages whether stored in local computer systems or online;
- Data refers to the communication content of the communication, the meaning or purport of the communication, or the message or information being conveyed by the communication, other than traffic data.
- refers to a computer or a computer network, the electronic medium in which online communication takes place;
- refers to a representation of information, knowledge, facts, concepts or instructions which are being prepared, processed or stored, or have been prepared, processed or stored in a formalized manner, and which are intended for use in a computer system;
- refers to the collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment, and organization and user’s assets;
- value refers to the mathematical algorithm produced against digital information (a file, a physical disk or a logical disk) thereby creating a “digital fingerprint” or “digital DNA” for that information. It is a one-way algorithm and thus it is not possible to change digital evidence without changing the corresponding hash values;
Down
- refers to the application of investigative and analytical techniques that conform to evidentiary standards, and are used in, or appropriate for, a court of law or other legal context;
- system refers to any device or group of interconnected or related devices, one or more of which, pursuant to a program, performs automated processing of data. It covers any type of device with data processing capabilities, including, but not limited to, computers and mobile phones. The device consisting of hardware and software may include input, output and storage components, which may stand alone or be connected to a network or other similar devices. It also includes computer data storage devices or media
- infrastructure refers to the computer systems, and/or networks, whether physical or virtual, and/or the computer programs, computer data and/or traffic data that are so vital to this country that the incapacity or destruction of or interference with such system and assets would have a debilitating impact on security, national or economic security, national public health and safety, or any combination of those matters;
- refers to the modification or change, in form or substance, of an existing computer data or program;
- program refers to a set of instructions executed by the computer to achieve intended results;
- refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing or storage functions, and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device, including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet;
- refers to the transmission of information through information and communication technology (ICT) media, including voice, video and other forms of data;
- refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network;
20 Clues: refers to gathering and receiving information; • Authority refers to the DOJ – Office of Cybercrime; • program refers to a set of instructions executed by the computer to achieve intended results; • refers to the modification or change, in form or substance, of an existing computer data or program; • ...
ETWET 2025-02-04
xxs 2024-02-27
Inceptum Crossword 2022-08-18
Across
- You see many unicorn startups in India nowadays. But I am the torchbearer of this march. My CEO shares his name with the 'beer' from TVF Pitchers. Identify who am I?
- This company having on one of the biggest market capitalization has seen various logo changes in its history with the first logo been dedicated to Father of Physics. The company launched a clothing line in 1986. Its competitor manufactures a display of one of the products. Identify the company.
- It is a thing that stands out about your product or service over that of another company.
- My name is too stretchable, and you could relate to me with Milkha Singh. I am a unicorn backed by Japanese bank of software that could help your shop to fly to deep rural areas of India through the network of possibilities.
- The idea of the startup is to create customized logistics services ranging from collection and storage of goods to transportation and door-step delivery. The idea is to deliver happiness. It has been backed by one of the largest e-commerce firms in the world. It has started its services in 2015 and is based in the city also known as "Queen of the Deccan".
- I am a global unicorn startups that have recently come under scrutiny regarding private data being leaked which hinted towards a kill switch and many other controversies. I don't understand why in India does people say hello in Spanish, it irritates me. Do you recognize me?
- Originally started in Bangalore, X is now present in over 27 cities, covering over 40 thousand restaurants in total. Bundl Technologies is the parent holding company for X. Identify X.
- I may look like Spotify link, but I can't play song for you, in spite of that I can provide cybersecurity to you. I am one of the most valuable company in the world too. To find my name, you have to go through San Francisco. Guess me.
- A program to assist the newest startup businesses take ideas and create viable business models, strategies, and profit plans for them.
- With over 2,000 stores in 88 countries, is a leader in its sector. The company's name translates to radiance. Its parent company is the world's largest apparel retailer. Identify the company.
Down
- When someone displays the traits and characteristics of entrepreneurship while within and being part of a larger company.
- It might sound like a food joint, but instead it allows you to "spice up" the interiors of your house. The company was started by ex executives of a California originated e-commerce company earlier known as Auction web. The company is headquartered in Mumbai and has 4 sourcing centers across the country.
- Term for a person that adopts early products or services for their entrepreneurial journey.
- I'm a social selling platform based in the science city of India. I provide earning opportunities for Indian women and small businesses. My founder introduces me as "LinkedIn for female entrepreneurs".
- The first 4 letters of my name is a name of the paper which will help you to get into one of the most prestigious MBA institutes of India. The last 4 letters of my name is what you do in every social media platform. Identify me.
- "X" is a set of statistics and data analysis based management tools and techniques used to eliminate and reduce defects, and improve profits in six steps. The first company to use the "X" method of improvement is
16 Clues: It is a thing that stands out about your product or service over that of another company. • Term for a person that adopts early products or services for their entrepreneurial journey. • When someone displays the traits and characteristics of entrepreneurship while within and being part of a larger company. • ...
Risk Management Exercise 2022-08-11
Across
- Our products are most frequently used in the __________ industry, in cooling, in fuel and in water supply and drain systems. They are critical to the proper functioning of those systems. Shipping faulty product could have detrimental results, since it will most likely eventually be installed on an aircraft.
- When Hydraflow delivers late to a customer, our scorecards take a hit. Depending on the customer’s rating system, it could be a single hit, or a hit for each day we are late. When it comes to __________, we typically end up getting a double hit. How? Well, ultimately, if we ship a bad part, not only is this a quality issue, but the delivery is not received in, and now Hydraflow is also late.
Down
- The ___________ Maturity Model Certification (CMMC) model consists of 17 domains, similar to the NIST SP 800-171 control families. It is designed to certify that contractors and suppliers have the controls in place to protect sensitive data.
- Hydraflow’s Production Control team manages ___________ risk through the use of Tableau. The dashboard has allowed the team to create a live dashboard regarding the machine shop vendors. The information that is on the dashboard assists Production Control when sending out jobs to our machine shop vendors making sure the planners are level loading the workload by purchase order due dates and by vendor’s machines. Using the information that is shown on the dashboard will help reduce the risk of late deliveries from the machine shop vendors based on the machine shop’s capacity and capabilities.
- Risk management and quality improvement systems are both directed to providing a structured framework for identification, analysis, treatment / corrective action, monitoring and review of risks, problems and/or opportunities. ___________ boards are amongst the tools that Hydraflow utilizes as a means of process improvement as well as Risk Management.
5 Clues: The ___________ Maturity Model Certification (CMMC) model consists of 17 domains, similar to the NIST SP 800-171 control families. It is designed to certify that contractors and suppliers have the controls in place to protect sensitive data. • ...
Risk Management Exercise 2022-08-11
Across
- Our products are most frequently used in the __________ industry, in cooling, in fuel and in water supply and drain systems. They are critical to the proper functioning of those systems. Shipping faulty product could have detrimental results, since it will most likely eventually be installed on an aircraft.
- Hydraflow’s Production Control team manages ___________ risk through the use of Tableau. The dashboard has allowed the team to create a live dashboard regarding the machine shop vendors. The information that is on the dashboard assists Production Control when sending out jobs to our machine shop vendors making sure the planners are level loading the workload by purchase order due dates and by vendor’s machines. Using the information that is shown on the dashboard will help reduce the risk of late deliveries from the machine shop vendors based on the machine shop’s capacity and capabilities.
Down
- The ___________ Maturity Model Certification (CMMC) model consists of 17 domains, similar to the NIST SP 800-171 control families. It is designed to certify that contractors and suppliers have the controls in place to protect sensitive data.
- When Hydraflow delivers late to a customer, our scorecards take a hit. Depending on the customer’s rating system, it could be a single hit, or a hit for each day we are late. When it comes to __________, we typically end up getting a double hit. How? Well, ultimately, if we ship a bad part, not only is this a quality issue, but the delivery is not received in, and now Hydraflow is also late.
- Risk management and quality improvement systems are both directed to providing a structured framework for identification, analysis, treatment / corrective action, monitoring and review of risks, problems and/or opportunities. ___________ boards are amongst the tools that Hydraflow utilizes as a means of process improvement as well as Risk Management.
5 Clues: The ___________ Maturity Model Certification (CMMC) model consists of 17 domains, similar to the NIST SP 800-171 control families. It is designed to certify that contractors and suppliers have the controls in place to protect sensitive data. • ...
Risk Management Exercise 2022-08-11
Across
- Risk management and quality improvement systems are both directed to providing a structured framework for identification, analysis, treatment / corrective action, monitoring and review of risks, problems and/or opportunities. ___________ boards are amongst the tools that Hydraflow utilizes as a means of process improvement as well as Risk Management.
- The ___________ Maturity Model Certification (CMMC) model consists of 17 domains, similar to the NIST SP 800-171 control families. It is designed to certify that contractors and suppliers have the controls in place to protect sensitive data.
Down
- When Hydraflow delivers late to a customer, our scorecards take a hit. Depending on the customer’s rating system, it could be a single hit, or a hit for each day we are late. When it comes to __________, we typically end up getting a double hit. How? Well, ultimately, if we ship a bad part, not only is this a quality issue, but the delivery is not received in, and now Hydraflow is also late.
- Our products are most frequently used in the __________ industry, in cooling, in fuel and in water supply and drain systems. They are critical to the proper functioning of those systems. Shipping faulty product could have detrimental results, since it will most likely eventually be installed on an aircraft.
- Hydraflow’s Production Control team manages ___________ risk through the use of Tableau. The dashboard has allowed the team to create a live dashboard regarding the machine shop vendors. The information that is on the dashboard assists Production Control when sending out jobs to our machine shop vendors making sure the planners are level loading the workload by purchase order due dates and by vendor’s machines. Using the information that is shown on the dashboard will help reduce the risk of late deliveries from the machine shop vendors based on the machine shop’s capacity and capabilities.
5 Clues: The ___________ Maturity Model Certification (CMMC) model consists of 17 domains, similar to the NIST SP 800-171 control families. It is designed to certify that contractors and suppliers have the controls in place to protect sensitive data. • ...
Chapter 02 Evolution of IS in Digital World 2025-01-15
Across
- Technology for managing all your company's relationships and interactions with customers and potential customers.
- The use of technologies and services across an enterprise to enable the integration of software applications and hardware systems.
- Set of rules that allows different software entities to communicate with each other.
- Process of examining datasets to draw conclusions about the information they contain.
- Network of interconnected devices that communicate and exchange data over the internet.
- Buying and selling of goods or services using the internet.
- A system that stores, organizes, and retrieves rich media and manages digital rights and permissions.
- A system designed to capture, store, manipulate, analyze, manage, and present spatial or geographic data.
- Overall experience of a person using a product, especially in terms of how easy or pleasing it is to use.
- The management of the flow of goods and services, including all processes that transform raw materials into final products.
- Digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time.
- Security process that relies on the unique biological characteristics of an individual to verify their identity.
- Branch of AI that helps computers understand, interpret, and manipulate human language.
- Practices and technologies designed to protect systems, networks, and data from cyber threats.
- A software system that centralizes customer data from various sources to provide a unified view of each customer.
- Software with source code that anyone can inspect, modify, and enhance.
- Integrated management of main business processes, often in real-time and mediated by software and technology.
- The management of information at an organization to support its regulatory, legal, risk, environmental, and operational requirements.
Down
- A system that facilitates the collection, organization, sharing, and analysis of an organization's knowledge in terms of resources, documents, and people skills.
- Integration of digital technology into all areas of business, fundamentally changing operations.
- Means by which a user interacts with a computer, software, or application.
- Fifth-generation technology standard for broadband cellular networks, offering faster speeds and more reliable connections.
- Service that encrypts your internet connection and hides your online identity.
- Simulated experience that can be similar to or completely different from the real world.
- A centralized repository that stores large volumes of structured data from multiple sources, optimized for analysis and reporting.
- Technology that allows anyone today to configure computer software, or a “robot” to emulate and integrate the actions of a human interacting within digital systems to execute a business process.
- Technologies and strategies used by enterprises for data analysis and management of business information.
- Process of discovering patterns and knowledge from large amounts of data.
- Software application used to create, edit, manage, and publish digital content.
- Virtual representation that serves as the real-time digital counterpart of a physical object or process.
- Extremely large datasets analyzed computationally to reveal patterns, trends, and associations.
- Software distribution model in which applications are hosted by a service provider and made available over the internet.
- Area of computing focused on developing computer technology based on the principles of quantum theory.
- Distributed computing paradigm that brings computation and data storage closer to the sources of data.
- Delivery of computing services over the internet, including storage, processing, and software.
- Technology that overlays digital information onto the real-world environment.
- Cloud computing model that provides platforms allowing customers to develop, run, and manage applications.
- Online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure.
- Subset of AI involving algorithms that enable computers to learn from data and make decisions.
- An information system that supports business or organizational decision-making activities by analyzing large volumes of data.
40 Clues: Buying and selling of goods or services using the internet. • Software with source code that anyone can inspect, modify, and enhance. • Process of discovering patterns and knowledge from large amounts of data. • Means by which a user interacts with a computer, software, or application. • ...
Digital Citizenship Vocabulary 2025-12-01
Across
- the doctrine that brief excerpts of copyright material may, under certain circumstances, be quoted verbatim for purposes such as criticism, news reporting, teaching, and research, without the need for permission from or payment to the copyright holder
- the ability to understand and share the feelings of another
- the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same
- the process of converting information or data into a code, especially to prevent unauthorized access
- false or inaccurate information
- the part of a social networking website, internet browser, piece of software, etc. that allows you to control who sees information about you
- a person who uses technology and the internet responsibly and appropriately, demonstrating skills like digital literacy, online safety, and respect for others
- a high-precision electronic weighing instrument or the practice of mindful management of digital technology
- a person who is present at an event or incident but does not take par
- Creative Commons is a nonprofit organization that provides free copyright licenses allowing creators to share their work under specific conditions, while still retaining copyright
- a social identity that an Internet user establishes in online communities and websites
- the unauthorized use of another's production, invention, or conception especially in infringement of a copyright
- Digital footprint or digital shadow refers to one's unique set of traceable digital activities, actions, contributions, and communications manifested on the Internet or digital devices
- interacting with something (like technology or an activity) in a conscious, present, and intentional way, rather than being on autopilot
- Digital etiquette, or netiquette as it is sometimes called, is a basic set of rules you should follow to make the Internet a better place for yourself and for others
- a set of moral principles : a theory or system of moral values
- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer
Down
- Digital responsibility refers to the obligation of people to use and share technology in a responsible, ethical and safe way
- the practice of taking someone else's work or ideas and passing them off as one's own
- false information that is intended to mislead; deliberate misinformation
- overlays digital information like text, images, and graphics onto the real world in real-time
- the practice of bullying a person by sending messages or posting social media content of an intimidating, mocking, or threatening nature
- the capability of computer systems or algorithms to imitate intelligent human behavior
- personal information includes any data that identifies, relates to, or could reasonably be linked to you or your household, directly or indirectly
- the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
- time spent using a device such as a computer, television, or games console
- excessive and compulsive use of digital devices and online activities that interferes with daily life and causes significant distress
- a person who speaks or acts in support of an individual or cause, particularly someone who intervenes on behalf of a person being attacked or bullied
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- the ability to critically analyze stories presented in the mass media and to determine their accuracy or credibility
30 Clues: false or inaccurate information • the ability to understand and share the feelings of another • a set of moral principles : a theory or system of moral values • a person who is present at an event or incident but does not take par • false information that is intended to mislead; deliberate misinformation • ...
Digital Citizenship Vocab Crossword 2025-11-18
Across
- the information about a particular person that exists on the internet as a result of their online activity.
- the ability to critically analyze stories presented in the mass media and to determine their accuracy or credibility.
- a person who speaks or acts in support of an individual or cause, particularly someone who intervenes on behalf of a person being attacked or bullied
- the unauthorized use or reproduction of another's work.
- a person who is present at an event or incident but does not take part.
- the persona or image an individual presents online, which is built from a combination of personal data, online behavior, and self-representation across the internet
- the practice of being conscious and intentional about how you engage in an activity, especially when interacting with technology or other daily routines
- controls on digital platforms, like social media, websites, and apps, that let you manage who can see your personal information and how it is shared
- a non-profit organization that provides free, legal tools for creators to share their work with the public, while retaining some rights
- the application of computer systems able to perform tasks or produce output normally requiring human intelligence, especially by applying machine learning techniques to large collections of data
- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
- time spent using a device such as a computer, television, or games console
- a technology that superimposes a computer-generated image on a user's view of the real world, thus providing a composite view.
- the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- false information that is intended to mislead; deliberate misinformation
Down
- the practice of taking someone else's work or ideas and passing them off as one's own
- (in US copyright law) the doctrine that brief excerpts of copyright material may, under certain circumstances, be quoted verbatim for purposes such as criticism, news reporting, teaching, and research, without the need for permission from or payment to the copyright holder.
- a set of rules for polite and respectful behavior in online environments, including email, social media, and online forums
- Personal information is data that identifies, relates to, or can reasonably be linked to a specific person or household, directly or indirectly
- the practice of bullying a person by sending messages or posting social media content of an intimidating, mocking, or threatening nature.
- false or inaccurate information
- using technology ethically and accountably, recognizing that online actions have real-world consequences
- the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
- someone who uses technology and the internet in a safe, responsible, and respectful way
- the process of converting information or data into a code, especially to prevent unauthorized access
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- a behavioral pattern characterized by excessive and compulsive use of technology that leads to significant problems in various aspects of life.
- a high-precision electronic instrument for weighing, or the state of managing digital technology use in a way that supports overall well-being
- the ability to understand and share the feelings of another.
- moral principles that govern a person's behavior or the conducting of an activity
30 Clues: false or inaccurate information • the unauthorized use or reproduction of another's work. • the ability to understand and share the feelings of another. • a person who is present at an event or incident but does not take part. • false information that is intended to mislead; deliberate misinformation • ...
Citizenship vocabulary crossword 2026-03-18
Across
- false information that is intended to mislead; deliberate misinformation.
- a branch of computer science that enables machines to mimic human cognitive functions, such as learning, reasoning, problem-solving, perception, and decision-making.
- false or inaccurate information.
- a person who speaks or acts in support of an individual or cause, particularly someone who intervenes on behalf of a person being attacked or bullied.
- a technology that overlays digital, 3D virtual elements onto the real-world environment in real-time, blending physical and virtual realities.
- the process of scrambling, or encoding, data into an unreadable format (ciphertext) to prevent unauthorized access, ensuring that only those with the correct cryptographic key can unlock and read the original information (plaintext).
- tools and configurations on websites, apps, and devices that allow users to control what personal information is shared, who can view their content, and how data is used.
- Fair use is a U.S. legal doctrine under Section 107 of the Copyright Act that permits limited use of copyrighted material without permission from the rights holder. It serves as an affirmative defense against infringement claims, typically for purposes such as criticism, comment, news reporting, teaching, scholarship, research, or parody.
- A person who uses information technology—such as the internet, social media, and mobile devices—regularly, effectively, and responsibly to engage in society, politics, and government.
- the time allotted to or occupied by a particular subject, actor, etc., on film or television.
- the process of scrambling, or encoding, data into an unreadable format (ciphertext) to prevent unauthorized access, ensuring that only those with the correct cryptographic key can unlock and read the original information (plaintext).
- he fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- a nonprofit organization that provides free, standardized, and easy-to-use copyright licenses, enabling creators to share their work with the public while retaining copyright.
- a form of intellectual property law that protects original works of authorship—such as books, music, art, and software—once they are fixed in a tangible form.
Down
- the compulsive, excessive, and uncontrollable use of digital devices, internet, or social media
- bullying that takes place over digital devices like cell phones, computers, and tablets through SMS, apps, social media, or gaming
- The unique trail of data you leave behind while using the internet, including websites visited, emails sent, and information submitted online.
- the ability to critically analyze stories presented in the mass media and to determine their accuracy or credibility.
- the act of presenting another person's work, words, ideas, or data as your own without proper acknowledgment or citation.
- a precise, step-by-step set of instructions or rules followed to solve a specific problem or accomplish a task
- the practice of protecting systems, networks, programs, and data from digital attacks, unauthorized access, and damage.
- any data that can identify, contact, or locate an individual, either on its own or when combined with other data.
- a high-precision, electronic measuring instrument used to determine the weight or mass of an object, displaying results on a digital screen.
- moral principles that govern a person's behavior or the conducting of an activity.
- The sum of all information, behaviors, and attributes—such as usernames, profiles, search history, and financial data—that represent an individual or entity on the internet.
- the ethical, safe, and sustainable use of technology, focusing on protecting privacy, security, and well-being while understanding the impact of digital actions on society and the environment.
- the practice of maintaining a nonjudgmental, present-moment awareness of one's thoughts, emotions, and surroundings, rather than acting on autopilot.
- the practice of attacking and robbing ships at sea
- a is present at an event or incident but does not take part.
- the ability to understand and share the feelings of another.
30 Clues: false or inaccurate information. • the practice of attacking and robbing ships at sea • a is present at an event or incident but does not take part. • the ability to understand and share the feelings of another. • false information that is intended to mislead; deliberate misinformation. • ...
Library crossword puzzle 2026-03-16
Across
- he process of scrambling, or encoding, data into an unreadable format (ciphertext) to prevent unauthorized access, ensuring that only those with the correct cryptographic key can unlock and read the original information
- the practice of protecting systems, networks, programs, and data from digital attacks, unauthorized access, and damage
- a form of intellectual property law that protects original works of authorship—such as books, music, art, and software—once they are fixed in a tangible form
- false or inaccurate information.
- a branch of computer science that enables machines to simulate human intelligence, allowing them to learn from data, reason, solve problems, and make decisions
- a person who is present at an event or incident but does not take part.
- a person who uses information technology—such as the internet, social media, and mobile devices—regularly, effectively, and responsibly to engage in society, politics, and government
- the total amount of time spent using devices with screens
- the branch of philosophy that systematically studies, defines, and defends concepts of right and wrong behavior
- a precise, step-by-step set of instructions or rules followed to solve a specific problem, perform calculations, or accomplish a task
- the practice of engaging with technology, resources, or daily activities with conscious awareness, purpose, and intention rather than on autopilot
- false information that is intended to mislead; deliberate misinformation.
- tools and configurations on websites, apps, and devices that allow users to control what personal information is shared, who can view their content, and how data is used
- the sum of all information, behaviors, and attributes—such as usernames, profiles, search history, and financial data—that represent an individual or entity on the internet.
- the ability to understand and share the feelings of another.
Down
- any data that can identify, contact, or locate an individual, either on its own or when combined with other data.
- nonprofit organization that provides free, standardized, and easy-to-use copyright licenses, enabling creators to share their work with the public while retaining copyright
- a set of social conventions and rules for polite, respectful, and responsible behavior in online interactions and electronic communication
- is a behavioral disorder characterized by compulsive, excessive use of digital devices
- a technology that superimposes digital information—such as images, 3D models, or text—onto the real world in real-time, enhancing a user's perception and interaction with their environment
- the act of presenting another person's work, words, ideas, or data as your own without proper acknowledgment or citation
- the unique trail of data you leave behind while using the internet, including websites visited, emails sent, and information submitted online.
- a person who speaks or acts in support of an individual or cause, particularly someone who intervenes on behalf of a person being attacked or bullied.
- bullying that takes place over digital devices like cell phones, computers, and tablets through SMS, apps, social media, or gaming.
- a U.S. legal doctrine under Section 107 of the Copyright Act that permits limited use of copyrighted material without permission from the rights holder
- the practice of attacking and robbing ships at sea.
- a high-precision, electronic instrument designed to measure the mass or weight of an object, providing quick and accurate readings on a digital screen, often down to the milligram level
- the ability to access, analyze, evaluate, create, and act upon all forms of communication, from social media to traditional news.
- he fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information
- the ethical, safe, and sustainable use of technology, focusing on protecting privacy, security, and well-being while understanding the impact of digital actions on society and the environment
30 Clues: false or inaccurate information. • the practice of attacking and robbing ships at sea. • the total amount of time spent using devices with screens • the ability to understand and share the feelings of another. • a person who is present at an event or incident but does not take part. • false information that is intended to mislead; deliberate misinformation. • ...
Tech quiz 2025-06-30
1 Clue: software, processing, network, internet, data, programming, algorithm, interface, digital, virtual, innovation, cybersecurity, automation, cloud
vocab words 2026-03-23
Across
- the information about a particular person that exists on the internet as a result of their online activity.
- the ability to critically analyze stories presented in the mass media and to determine their accuracy or credibility.
- a person who speaks or acts in support of an individual or cause, particularly someone who intervenes on behalf of a person being attacked or bullied.
- a practice similar to piracy but in other contexts, especially hijacking.
- a person who is present at an event or incident but does not take part.
- the sum of all information, behaviors, and attributes—such as usernames, profiles, search history, and financial data—that represent an individual or entity on the internet.
- the practice of being intentionally aware, present, and purposeful in how you engage with technology, resources, or daily activities, rather than acting on autopilot.
- tools and configurations on websites, apps, and devices that allow users to control what personal information is shared, who can view their content, and how data is used.
- a non-profit organization providing free, standardized, legal licenses that allow creators to share their work while retaining copyright.
- the application of computer systems able to perform tasks or produce output normally requiring human intelligence, especially by applying machine learning techniques to large collections of data.
- a precise, step-by-step set of instructions or rules followed to solve a problem, perform a calculation, or accomplish a task.
- time spent using a device such as a computer, television, or games console. The time allotted to or occupied by a particular subject, actor, etc., on film or television.
- a technology that overlays digital information—such as 3D models, images, or data—onto the real-world environment in real time using cameras on smartphones, tablets, or headsets
- a form of social engineering cyberattack where criminals impersonate reputable organizations or individuals via email, text, or phone to steal sensitive information like passwords, credit card numbers, or login credentials.
- Disinformation is false, inaccurate, or misleading information deliberately created and spread to deceive, manipulate, or harm, rather than to inform.
Down
- the act of presenting another person’s words, ideas, images, or creative work as your own, without proper attribution or citation.
- a U.S. legal doctrine permitting limited, unlicensed use of copyrighted material for purposes such as criticism, comment, news reporting, teaching, scholarship, or research.
- the established standards of respectful, polite, and responsible behavior in online environments.
- Personal information (PII) is any data that can identify, contact, or locate an individual, either on its own or when combined with other data.
- the use of digital devices (phones, computers, social media, gaming) to intentionally and repeatedly harass, threaten, humiliate, or target someone.
- false or inaccurate information.
- the ethical, safe, and accountable use of technology, focusing on managing one's digital footprint, respecting others' privacy, and ensuring secure online interactions.
- a form of intellectual property law that protects original works of authorship—such as books, music, art, and software—the moment they are fixed in a tangible medium.
- a person who uses information technology—such as the internet, social media, and mobile devices—regularly, effectively, and responsibly to engage in society, politics, and government.
- the process of converting readable information (plaintext) into an unreadable, scrambled format (ciphertext) using an algorithm and a cryptographic key.
- the practice of protecting systems, networks, programs, and data from digital attacks, unauthorized access, or damage.
- Technology addiction is a behavioral disorder characterized by compulsive, excessive use of digital devices (smartphones, social media, gaming)
- a high-precision, electronic instrument designed to measure the mass or weight of an object, providing quick and accurate readings on a digital screen, often down to the milligram level.
- the ability to understand and share the feelings of another.
- the branch of philosophy involved in the systematic study of what is morally right or wrong, good or bad.
30 Clues: false or inaccurate information. • the ability to understand and share the feelings of another. • a person who is present at an event or incident but does not take part. • a practice similar to piracy but in other contexts, especially hijacking. • ...
Digital Citizenship Vocabulary Crossword 2026-03-19
Across
- a person who is present at an event or incident but does not take part
- The unauthorized use or reproduction of another's work.
- Use a U.S. legal doctrine permitting limited, unlicensed use of copyrighted material for purposes such as criticism, comment, news reporting, teaching, scholarship, or research
- a precise, step-by-step set of instructions or rules followed to solve a problem, perform a calculation, or accomplish a task
- false or inaccurate information.
- media literacy is the ability to access, analyze, evaluate, create, and act using all forms of communication
- Commons Creative Commons (CC) is a non-profit organization providing free, standardized, legal licenses that allow creators to share their work while retaining copyright
- the established standards of respectful, polite, and responsible behavior in online environments
- a field of computer science dedicated to creating systems capable of performing tasks that typically require human intellect, such as reasoning, learning, problem-solving, and perception
- the time allotted to or occupied by a particular subject, actor, etc., on film or television.
- the ethical, safe, and accountable use of technology, focusing on managing one's digital footprint, respecting others' privacy, and ensuring secure online interactions
- the process of converting readable information (plaintext) into an unreadable, scrambled format (ciphertext) using an algorithm and a cryptographic key
Down
- Technology addiction is a behavioral disorder characterized by compulsive, excessive use of digital devices (smartphones, social media, gaming) that interferes with daily life, relationships, and responsibilities.
- Personal information (PII) is any data that can identify, contact, or locate an individual, either on its own or when combined with other data
- A person who uses information technology—such as the internet, social media, and mobile devices—regularly, effectively, and responsibly to engage in society, politics, and government
- false information that is intended to mislead; deliberate misinformation.
- the unique, often permanent, trail of data you leave behind while using the internet
- a cyberattack where criminals impersonate trusted entities (like banks or companies) through fake emails, texts, or messages to trick victims into revealing sensitive data (passwords, credit card numbers, SSNs) or installing malware, ultimately aiming for financial theft or identity fraud
- a form of intellectual property law that protects original works of authorship—such as books, music, art, and software—the moment they are fixed in a tangible medium
- the practice of protecting systems, networks, programs, and data from digital attacks, unauthorized access, or damage
- a person who speaks or acts in support of an individual or cause, particularly someone who intervenes on behalf of a person being attacked or bullied
- tools and configurations on websites, apps, and devices that allow users to control what personal information is shared, who can view their content, and how data is used
- the use of digital devices (phones, computers, social media, gaming) to intentionally and repeatedly harass, threaten, humiliate, or target someone
- the sum of all information, behaviors, and attributes—such as usernames, profiles, search history, and financial data—that represent an individual or entity on the internet
- the ability to understand and share the feelings of another.
- Ethical leadership, Transparency, Honesty, Integrity, Commitment, Honor, and Sincerity
- a high-precision, electronic instrument designed to measure the mass or weight of an object, providing quick and accurate readings on a digital screen, often down to the milligram level
- the act of presenting another person’s words, ideas, images, or creative work as your own, without proper attribution or citation
- Reality a technology that overlays digital information—such as 3D models, images, or data—onto the real-world environment in real time using cameras on smartphones, tablets, or headsets
- Use the intentional, nonjudgmental, and fully present engagement with an activity, object, or technology, rather than operating on "autopilot"
30 Clues: false or inaccurate information. • The unauthorized use or reproduction of another's work. • the ability to understand and share the feelings of another. • a person who is present at an event or incident but does not take part • false information that is intended to mislead; deliberate misinformation. • ...
Industrial security 2023-11-29
Across
- Measures to manage and regulate security
- Authorization for accessing classified information
- Security measures implemented within a facility
- Evaluation of security measures and vulnerabilities
- Adherence to laws, regulations, and standards
- Designated location for entering or exiting a secure area
- Regulation and management of systems or processes
- Practices to prevent and manage fires in industrial settings
- Coordinated actions in reaction to an emergency situation
- Education to enhance knowledge and skills related to safety or security
- Practice session simulating response to an emergency
- Examination to ensure equipment or processes meet standards
- Plan and actions taken after a security or safety incident
- Protected exchange of information between parties
- Hazardous Materials, substances harmful to health or the environment
- Physical obstacle preventing access or providing protection
- Measures to safeguard physical assets and spaces
- Isolated storage or processing system within an organization
- Set of rules and guidelines for ensuring security
- Regular upkeep of equipment and systems
- Supervisory Control and Data Acquisition, industrial control system
- Restriction and monitoring of user access to resources
- Practices to ensure safe handling of chemicals
- Devices used to secure doors, gates, or containers
- Integration of cybersecurity with physical security
- Measures to prevent accidents or harm to individuals
- Personnel responsible for monitoring and ensuring security
- Audible or visual signals indicating an emergency or problem
- Group responsible for managing and responding to incidents
- Evaluation of potential risks to determine their impact
- Unauthorized entry or interference with a system
- Established procedures to ensure safety in specific situations
- Established guidelines for ensuring safety in various contexts
- Unique physical or behavioral attributes for identification
- Accidental release of hazardous chemicals
- Tools or gear used to enhance safety in the workplace
- Examination for detecting prohibited items or threats
- Monitoring and regulation of industrial processes
- Controlled entry or exit point in a facility
Down
- Established steps to ensure safety in specific situations
- Preparation for potential emergency scenarios
- Programmable Logic Controller, used in industrial automation
- Evaluation of weaknesses in security defenses
- Essential systems and assets for societal functioning
- Designated exit for evacuating a facility in an emergency
- Surveillance devices capturing visual information
- Shared values and beliefs promoting safety within an organization
- Notification or warning of a potential threat or danger
- Personal Protective Equipment worn to minimize exposure to hazards
- Perimeter barrier for security or safety purposes
- Strategies to handle and overcome a crisis situation
- Swift departure from a facility in response to a threat
- Potential source of danger or harm in an industrial setting
- Prepared strategy for responding to emergencies
- Safeguarding valuable assets from loss or damage
- Measures to secure the outer boundaries of a facility
- Immediate cessation of operations in an emergency
- Use of control systems for operating industrial equipment
- Monitoring and observation of activities for security purposes
- Systematic examination of safety measures within an organization
- Recognition and assessment of potential hazards
- Implementation of security measures and regulation
- Protection against unauthorized access or harm
- Examination of potential risks or dangers to security
- Capacity to recover quickly from difficulties or disruptions
- Systematic examination of safety or security measures
- Measures to protect a network from unauthorized access
- Safety procedure to control hazardous energy during maintenance
- Individual responsible for evaluating safety practices
- Instruction to enhance knowledge and skills related to safety
- Use of technology to perform tasks without human intervention
- Devices detecting physical changes or conditions
72 Clues: Regular upkeep of equipment and systems • Measures to manage and regulate security • Accidental release of hazardous chemicals • Controlled entry or exit point in a facility • Preparation for potential emergency scenarios • Evaluation of weaknesses in security defenses • Adherence to laws, regulations, and standards • Practices to ensure safe handling of chemicals • ...
Thematic Puzzle 2024-12-16
Across
- people who lived in these homes and neighborhoods are forced to live somewhere else
- the unjust or prejudicial treatment of different categories of people
- Level that brings together closely related genera
- - Computer system that able to perform task
- A threat to biodiversity that harm both terrestrial and aquatic ecosystem
- Affected by the changes in land such as trees and pavement
- Level subdivides organisms with a phylum
- Consequences of polarization that lead to the rise of extremist groups and violence
- level that group closely related species
- Main component of biodiversity that refers the variety of different species that habit our planet
- a prolonged period of little or no growth in the economy with less than 2% of annual growth.e
- a body of water that is rising lately
- This can lead to government of dysfunction and a decline in public trust
- period which one or more technologies is replaced by another new technology
- method of data collection
- dioxide Biggest threat cause by global warming produced by anthropogenic activities
- the technique of making an apparatus, a process, or a system operate automatically.
- computing
- The science of naming, describing, and classifying organisms
- short for biological diversity
- design to help solve problems as a away to bypass the latency
- A threat to biodiversity that overfish, poach and illegal wildlife trade
- That protect biodiversity using laws and regulations at the national and international levels
- This invention in the mid 20th century
- main component of biodiversity that habitats and ecosystems on earth
- a fundamental human right that underpins freedom of association, thought and expression, as well as freedom from discrimination.
- The weather of a place averaged over a period of time often in 30 years
Down
- a type of taxonomy that employs a hierarchical system
- significant movement of people from one place to driven by economic and demographic
- type of electromagnetic radiation that is use by RFID
- Age -refers to a historical era and information technology-based economy
- suspension system of solid or liquid particles
- sent and received with a system
- More powerful greenhouse gas than CO2
- Level of the broadest category, grouping organisms
- Each sensor monitors data in a different location example are RFID and Location Service
- change refers to the changes in the variable climate over a long period
- increasing division between opposing political parties
- a chronological arrangement of events in the order of their occurrence.
- Platforms that often prioritize sensational and divisional content
- Level of group organisms with similar characteristics
- Process of attempting to steal data or gaining unauthorized access
- mass of tiny water droplet
- Main component of biodiversity that the diversity of genes within a single species
- Measure of hotness or coldness
- Level of dividing organisms within a kingdom based
- Climate change is mainly driven by
- network of physical object that are embedded with sensors, software and other technologies
- State of the atmosphere on a day-to-day basis
- the practice of protecting systems, networks, and programs from digital attacks.
- Consist of a number of blocks of data
- Monitors the global climate data
- Melting earlier compared to long-term averages
- Large amounts of data to uncover hidden patterns
- gap between the rich and poor
- use of software to automatic business processes such as interpreting application
- relating to moral principles or the branch of knowledge dealing with these.
- relating to economics or the economy.
- application of conceptual knowledge for practical purposes
- Warming Refers to the rise in global temperatures
60 Clues: computing • method of data collection • mass of tiny water droplet • gap between the rich and poor • Measure of hotness or coldness • short for biological diversity • sent and received with a system • Monitors the global climate data • Climate change is mainly driven by • More powerful greenhouse gas than CO2 • a body of water that is rising lately • ...
modern culture 2024-06-16
Across
- Data Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions.
- The practice of obtaining input, ideas, or services by soliciting contributions from a large group of people, typically via the Internet.
- Meeting our own needs without compromising the ability of future generations to meet their own needs, involving the balance of environmental, economic, and social aspects.
- Working from a remote location outside of a traditional office setting, often from home, and using digital communication tools to perform job duties.
- Technology Electronic devices that are worn on the body as accessories or implants, such as fitness trackers, smartwatches, and augmented reality glasses.
- Computing The delivery of different services through the Internet, including data storage, servers, databases, networking, and software.
- Unmanned aerial vehicles used for a variety of purposes, including surveillance, photography, and delivery services.
- Mining The process of discovering patterns and knowledge from large amounts of data, often using machine learning, statistics, and database systems.
- Learning A branch of artificial intelligence focused on building systems that learn from and make decisions based on data.
- The remote diagnosis and treatment of patients by means of telecommunications technology.
- Non-fungible token; a unique digital asset representing ownership of a specific item or piece of content, typically bought and sold using blockchain technology.
- Financial technology; an industry encompassing any kind of technology in financial services, including companies that operate with mobile banking, investment, and cryptocurrency.
Down
- Authentication Security process that relies on the unique biological characteristics of an individual to verify their identity, such as fingerprints, facial recognition, or iris scanning.
- Intelligence The simulation of human intelligence in machines that are programmed to think like humans and mimic their actions.
- The fifth generation technology standard for broadband cellular networks, which began deployment in 2019 and is the successor to 4G networks.
- Twin A virtual representation that serves as the real-time digital counterpart of a physical object or process, used for simulation, analysis, and control.
- The practice and study of techniques for securing communication and data in the presence of adversaries, involving methods such as encryption.
- Contract A self-executing contract with the terms of the agreement directly written into lines of code, often used in blockchain technology.
- A system in which a record of transactions made in cryptocurrency is maintained across several computers that are linked in a peer-to-peer network.
- The practice of protecting systems, networks, and programs from digital attacks, aimed at accessing, changing, or destroying sensitive information.
- Internet of Things; a system of interrelated computing devices, mechanical and digital machines, objects, animals, or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
- Computing A distributed computing paradigm that brings computation and data storage closer to the sources of data to improve response times and save bandwidth.
- Computing An area of computing focused on developing computer technology based on the principles of quantum theory, which explains the nature and behavior of energy and matter on the quantum (atomic and subatomic) level.
- Reality An interactive experience of a real-world environment where objects that reside in the real world are enhanced by computer-generated perceptual information.
- A collective virtual shared space, created by the convergence of virtually enhanced physical reality and physically persistent virtual space, including the sum of all virtual worlds, augmented reality, and the Internet.
25 Clues: The remote diagnosis and treatment of patients by means of telecommunications technology. • Unmanned aerial vehicles used for a variety of purposes, including surveillance, photography, and delivery services. • Intelligence The simulation of human intelligence in machines that are programmed to think like humans and mimic their actions. • ...
literasi digital 2024-08-19
Across
- strategi proteksi yang berasal dari alam bawah sadar seseorang disebut
- sebagian infrastruktur yang memungkinkan aplikasi untuk dijalankan dalam sebuah perangkat disebut
- layanan yang memungkinkan Anda menyimpan data dengan mentransfernya melalui Internet atau jaringan lain ke sistem penyimpanan di luar situs yang dikelola oleh pihak ketiga disebut
- upaya memanfaatkan teknologi dalam menemukan, menggunakan, dan menyebarluaskan informasi dalam dunia digital seperti saat ini disebut
- konten audio digital yang tersedia untuk diunduh atau streaming adalah
- perangkat lunak yang melindungi komputer dari virus adalah
- orang yang memiliki kemampuan pemrograman tinggi dan pemahaman mendalam tentang komputer, perangkat keras dan perangkat lunak, pemrograman, dan jaringan disebut
- media selalu berbagi pesan atau informasi kepada masyarakat merupakan prinsip dasar literasi digital yang ketiga yaitu
- singkatan dari internet service provider adalah
- singkatan dari internet of things adalah
- teknologi yang memungkinkan pengguna untuk mengirim dan menerima data video hampir secara real-time melalui internet disebut
- halaman digital yang menyediakan informasi di internet adalah
- tindakan intimidasi atau pelecehan melalui media digital disebut
- masyarakat memiliki kemampuan untuk mengakses, memahami serta menyimpan informasi untuk dibaca di lain hari adalah prinsip dasar literasi digital yaitu
- teknologi yang membuat mesin dapat melakukan tugas yang memerlukan kecerdasan manusia adalah
- alat digital yang digunakan untuk menghitung adalah
- fasilitas untuk mencatat dan menyimpan data sejarah penelusuran dan penggunaan internet disebut
- mesin pencari yang paling banyak dicari adalah
- data atau informasi yang dibutuhkan oleh sebuah sistem untuk selanjutnya diproses sesuai dengan ketentuan proses yang telah ditentukan disebut
- masyarakat memiliki kemampuan untuk memahami informasi yang diberikan media, baik secara implisit maupun secara eksplisit adalah prinsip dasar literasi digital yang pertama yaitu
- contoh komponen dalam literasi digital
- praktik melindungi komputer dan jaringan dari serangan digital disebut
- salah satu komponen dari sebuah komputer yang sifat alat nya bisa dilihat dan diraba secara langsung atau yang berbentuk nyata, yang berfungsi untuk mendukung proses komputerisasi disebut
- menerima atau mengambil data atau berkas dari Internet ke komputer Anda arti dari
- buku dalam format digital yang dapat dibaca dalam perangkat elektronik adalah
- ruang kelas digital yang digunakan untuk pembelajaran online disebut
- teknik pengamanan data dengan cara mengubahnya menjadi kode adalah
- Salah satu alat komunikasi saat ini untuk surat menyurat adalah
Down
- tampilan aplikasi disebut
- platform dan alat daring yang memungkinkan orang untuk membuat, berbagi, dan bertukar informasi dan konten dengan orang lain disebut sebagai
- nama pengguna yang digunakan untuk mengakses akun digital adalah
- proses menulis program komputer dalam bahasa pemrograman adalah
- metode pembelajaran yang dilakukan melalui platform digital adalah
- bertindak sebagai lapisan keamanan tambahan untuk mencegah pengguna yang tidak sah mengakses akun ini, bahkan ketika kata sandi telah dicuri disebut
- proses membuat salinan data untuk melindungi dari kehilangan adalah
- penyimpanan, pencadangan data, serta transfer file antar perangkat disebut sebagai
- komputer portabel yang sering digunakan di sekolah dan universitas disebut
- disebut apakah aplikasi bisa dalam satu tampilan untuk berbagai pekerjaan
- kode yang dapat dipindai oleh perangkat mobile untuk mengakses informasi adalah
- tindakan penipuan yang mencoba mencuri pribadi secara online adalah
- antara media yang satu dengan yang lainnya saling bergantung dan berhubungan adalah prinsip dasar literasi digital yang kedua yaitu
- teknologi yang memungkinkan perangkat terhubung ke internet tanpa kabel adalah
- informasi atau gambar yang dihasilkan oleh komputer atau printer disebut
- orang yang tahu apa yang dikerjakannya, tetapi seringkali tidak menyadari akibat dari perbuatannya disebut
- konten pornografi, isu sara dan lainnya adalah contoh dari konten
- cara untuk mengunduh, mengunggah, dan mentransfer berkas dari satu lokasi ke lokasi lain di internet dan antar sistem komputer disebut
- program yang menjalankan fungsi khusus adalah
- tes yang dilakukan secara digital untuk menguji pengetahuan adalah
- tindakan kejahatan yang berkaitan dengan komputer maupun perangkat jaringan, biasanya kejahatan ini dilakukan secara online adalah
- alat input untuk mengetik dan mengedit teks pada sebuah program atau aplikasi dalam komputer disebut
50 Clues: tampilan aplikasi disebut • contoh komponen dalam literasi digital • singkatan dari internet of things adalah • program yang menjalankan fungsi khusus adalah • mesin pencari yang paling banyak dicari adalah • singkatan dari internet service provider adalah • alat digital yang digunakan untuk menghitung adalah • perangkat lunak yang melindungi komputer dari virus adalah • ...
Cryptology Terms - Milan M. 2024-11-14
Across
- : The sentence “how often does a solar eclipse occur” could be rewritten as “what is the _________ of solar eclipses.”
- : Given the following AES Encryption = UgOXGh2Cug/NoVStuWLhyQ==, Key = 1234567890qwerty Mode = CBC, and Padding = PKCS5Padding. I wonder what “UgOXGh2Cug/NoVStuWLhyQ==” means? I’ll use the key in AES UgOXGh2Cug/NoVStuWLhyQ== -> Hello.
- : A “I wonder how Google makes its coin flip random?” B “Google’s coin flip probably uses a mathematical algorithm that generates a ____________ which determines whether or not it lands on heads or tails.”
- : A “What if instead of just using the same one alphabet for a cipher we use multiple different alphabets?”
- : A “My history teacher talks way too fast during lectures and I can’t write my notes in time. If only there was some method of writing that is faster and uses abbreviations and symbols” B “That does exist it's called _________”
- : Math 1, 2, 3, 4, 5, 6…
- Machine : A “We need a faster way of encrypting and decrypting messages in this war. If only there was some kind of device that could do that for you.” B “There is something like that it's called the ______ _______ and it could really help in this war.”
- : Caesar ______ +3 Hello = -> Khoor. A->D, B->E, C->F, D->G, E->H, F->I, G->J, H->K, I->L, J->M, K->N, L->O, M->P, N->Q, O->R, P->S, Q->T, R->U, S->V, T->W, U->X, V->Y, W->Z, X->A, Y->B, Z->C.
- : A “Out of all of the letters in the alphabet I think that I am the most important” A thinks that he is the _________ of the alphabet.
- : C “What is your favorite color?” A ”I’m not telling you since you are C” C “I am B” A “oh ok since you are B I will tell you my favorite color is blue.”
- : User “Computer do something!” Computer “SyntaxError invalid syntax” User “print(“Hello World”)” Computer “Hello World”
- Principal : A “Instead of making a strong key that will be hard to remember, I’ll just make my cipher algorithm a secret.” B “Don’t do that according to ___________ _________ the secrecy of the key is what really matters, not the secrecy of the cipher algorithm.”
Down
- : A “I only want person B to know what my message is. So I’ll use __________. I’ll use an __________ algorithm and make a key that I will share with B to create a message that only B will know.”
- : A “What is ______________?” B “This.”
- : A “I keep up to date with cybersecurity while B does not so I am more safer from danger and threats than B so I have better ________”
- : “I know a lot about blank, blank, blank,...”
- : Website “How do I really know that you are User123? Give me a secret string of characters to show that it is really you?” User123 “Qwerty” Website “Ok you are User123” What is “Qwerty” in this example?
- : A "Who are you?" B "Im B" A "If you are really B what is my favorite color?" B "Blue" A “ok you are B”
- : Opposite of this = Caesar Cipher +3 Hello->Khoor, this = Caesar Cipher +3 Khoor->Hello.
- : Caesar Cipher +1 Khoor->Jgnnq = Doesn’t work, Caesar Cipher +2 Khoor->Ifmmp = Doesn’t work, Caesar Cipher +3 Khoor->Hello = Works!
- : Get peanut butter, jelly, and two pieces of bread. 1 Spread peanut butter on one piece of bread 2 Spread jelly on the other piece of bread 3 Combine peanut butter bread and jelly bread. Peanut butter and jelly sandwich made.
21 Clues: : Math 1, 2, 3, 4, 5, 6… • : A “What is ______________?” B “This.” • : “I know a lot about blank, blank, blank,...” • : Opposite of this = Caesar Cipher +3 Hello->Khoor, this = Caesar Cipher +3 Khoor->Hello. • : A "Who are you?" B "Im B" A "If you are really B what is my favorite color?" B "Blue" A “ok you are B” • ...
crossword puzzle for Media 2025-11-18
Across
- false or inaccurate information.
- the study of ethical principles and moral issues that arise from the use of computer technology
- the information about a particular person that exists on the internet as a result of their online activity.
- the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same.
- a high-precision electronic weighing instrument or the practice of mindful management of digital technology
- the ability to critically analyze stories presented in the mass media and to determine their accuracy or credibility.
- Personal information is any data that can identify a living individual, either directly or indirectly. This includes a wide range of data, from obvious identifiers like a name, address, or phone number, to more sensitive information such as medical records, financial details, and even biometric data like fingerprints or facial recognition. The exact definition can vary depending on the specific law or regulation, but it fundamentally involves information that, alone or combined with other information, points to a specific person.
- technology that overlays computer-generated digital information, such as images, text, and sound, onto the real-world environment through a device like a smartphone or special glasses
- Commons a nonprofit organization that provides free copyright licenses allowing creators to share their work under specific conditions, while still retaining copyright
- the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- controlled options on devices, software, and online platforms that allow you to manage how your personal information is collected, used, and shared
- the practice of using technology and information in an ethical, safe, and accountable way
- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
- the practice of being intentionally aware and conscious of your actions, thoughts, and feelings, often applied to specific activities like technology use, eating, or even daily routines
Down
- the social and digital persona an individual creates through online interactions, including profiles, usernames, and content they share on platforms like social media and forums
- the set of electronic standards for polite and appropriate behavior when using digital devices and communicating online
- a person who speaks or acts in support of an individual or cause, particularly someone who intervenes on behalf of a person being attacked or bullied.
- a computer that performs tasks typically requiring human intelligence, such as learning, problem-solving, and decision-making, through technologies like machine learning and neural networks
- the practice of taking someone else's work or ideas and passing them off as one's own.
- the ability to understand and share the feelings of another.
- a person who is present at an event or incident but does not take part
- a the time allotted to or occupied by a particular subject, actor, etc., on film or television.
- the practice of protecting systems, networks, and data from digital attacks and unauthorized access
- the process of converting readable data into a secret code to prevent unauthorized access
- a legal doctrine in the United States that permits the limited use of copyrighted material without acquiring permission from the rights holders
- unauthorized use, copying, distribution, modification, or selling of copyrighted software
- the practice of bullying a person by sending messages or posting social media content of an intimidating, mocking, or threatening nature.
- false information that is intended to mislead; deliberate misinformation.
- excessive and compulsive use of digital devices and online activities that interferes with daily life and causes significant distress
- someone who uses technology and the internet responsibly and ethically
30 Clues: false or inaccurate information. • the ability to understand and share the feelings of another. • a person who is present at an event or incident but does not take part • someone who uses technology and the internet responsibly and ethically • false information that is intended to mislead; deliberate misinformation. • ...
Vocab words 2026-03-23
Across
- high-precision electronic instrument used to measure the mass or weight of an object, providing a fast, accurate digital readout.
- the ethical, safe, and sustainable use of technology, encompassing accountability for one's online actions, data privacy, and digital footprint.
- a person who uses information technology regularly, effectively, and responsibly to engage in society, politics, and government.
- nonprofit organization that provides free, standardized, and irrevocable legal licenses allowing creators to share their work with the public, granting specific permissions for reuse while retaining copyright
- Use:the practice of being fully present, conscious, and intentional in our daily actions, technology usage, and consumption
- a form of social engineering cyberattack where criminals impersonate reputable organizations or individuals via email, text, or websites to trick users into revealing sensitive data like passwords, credit card numbers, and login credentials
- tools in software, web browsers, and social media that allow users to manage who can access their personal information, activity, and content.
- the excessive, compulsive, and poorly controlled use of digital devices—such as smartphones, computers, and social media—that leads to impairment, distress, or negative consequences in daily life.
- time spent using a device such as a computer, television, or games console.
- Illegal reproduction, distribution, use, or counterfeiting of copyrighted software without authorization from the owner
- the ability to understand, share, and vicariously experience the feelings, thoughts, and perspectives of another person
- the practice of protecting systems, networks, programs, and data from digital attacks, unauthorized access, or damage.
- an individual who witnesses bullying, injustice, or high-risk situations and chooses to intervene to support the target, rather than remaining a passive bystander
- (PII or Personal Data) is any data that identifies, relates to, describes, or can be reasonably linked, directly or indirectly, to a specific individual or household.
- an individual who observes a conflict, emergency, or injustice without directly participating,
- the unique, often permanent trail of data and information a user intentionally or unintentionally leaves behind while using the internet.
Down
- the unethical act of using another person's ideas, words, or work without proper attribution, representing them as one's own
- a branch of applied philosophy that analyzes the moral, legal, and social implications of computer technology, guiding the responsible behavior of users and IT professionals
- Reality:a technology that superimposes computer-generated digital elements—such as images, text, or 3D models—onto a live, real-world view
- the standard of conduct and polite behavior expected online to ensure respectful, professional, and safe communication
- a form of intellectual property law protecting original works of authorship—such as books, music, art, and software—fixed in a tangible medium of expression
- a field of computer science dedicated to creating systems capable of performing tasks that typically require human intelligence.
- a precise, step-by-step set of instructions used to solve problems, perform computations, or automate tasks, transforming inputs into desired outputs
- false or inaccurate information spread without malicious intent, distinct from "disinformation" (deliberately misleading) and "malinformation" (factual, yet manipulated to harm).
- the sum of characteristics, behaviors, and data—such as usernames, profiles, browsing history, and purchasing habits—that represent a person or entity in digital spaces
- willful, repeated, and hostile behavior intended to harm, threaten, or humiliate others through digital devices like phones, computers, and social media
- false information that is intended to mislead; deliberate misinformation
- a U.S. legal doctrine permitting limited use of copyrighted material without permission for purposes such as criticism, news reporting, teaching, and research
- he process of converting information or data into an unreadable, scrambled format (ciphertext) to prevent unauthorized access, ensuring only authorized parties with a specific key can unlock and read it
- ability to access, analyze, evaluate, create, and act using all forms of communication.
30 Clues: false information that is intended to mislead; deliberate misinformation • time spent using a device such as a computer, television, or games console. • ability to access, analyze, evaluate, create, and act using all forms of communication. • ...
CYBERSECURITY 2026-01-19
Cybersecurity 2021-11-30
1 Clue: - the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Ai Ethics 2022-02-15
Computer Definitions 2024-06-24
Across
- files embedded within online communication channels such as emails, instant messages, or social networks
- the transmission of high-quality data of wide bandwidth.
- a type of malware that downloads onto a computer disguised as a legitimate program
- a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography
- the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer.
- used to refer to computer files or memory that can be read or used, but not changed or added to in any way
- a computer which uses continuously changeable entities like mechanical, electrical, hydraulic, etc.
- the amount of data that can reside within the disk drive or storage medium to a maximum limit.
- allows devices to communicate with each other without cables or wires.
- the practice of protecting systems, networks, and programs from digital attacks
- a data measurement unit applied to digital computer or media storage
- a multi-platform, object-oriented, and network-centric language that can be used as a platform in itself.
- a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies
- a file format that can contain multiple files combined and compressed into one file.
- the use or operation of computers.
- A computer program that can copy itself and infect a computer without permission or knowledge of the user
- the capacity at which a network can transmit data.
- the process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it.
- malicious software that enters a user's computer, gathers data from the device and user, and sends it to third parties without their consent.
- the logic circuitry that responds to and processes the basic instructions that drive a computer
Down
- the ability of software and hardware from different sources to work together without having to be altered to do so
- any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems.
- a software program used to locate and display information on the Internet or an intranet.
- a unit of data that is eight binary digits long
- Any stored data.
- a set of rules for formatting and processing data.
- device that is used to store data or programs (sequences of instructions) on a temporary or permanent basis for use in an electronic digital computer.
- a storage location used to temporarily store data used by servers, apps, and browsers to speed load times.
- the number of pixels that are displayed per inch for an image
- computer systems that are connected to a network and are accessible to users from anywhere at any time
- any unsolicited communication sent in bulk.
- a type of malware that can automatically propagate or self-replicate without human interaction, enabling its spread to other computers across a network.
- small files of information that a web server generates and sends to a web browser
- to reload the operating system of a computer:
- the smallest unit of data that a computer can process and store.
- the clock speed of a central processing unit (CPU), which determines how many instructions a processor can execute per second.
- any criminal activity that involves a computer, network or networked device.
- a tiny wafer of semiconducting material with an embedded electronic circuit.
- a computer on a network that provides the interface between two applications or networks that use different protocols
- an image, video, piece of information, etc. that is circulated rapidly and widely on the internet.
40 Clues: Any stored data. • the use or operation of computers. • any unsolicited communication sent in bulk. • to reload the operating system of a computer: • a unit of data that is eight binary digits long • a set of rules for formatting and processing data. • the capacity at which a network can transmit data. • the transmission of high-quality data of wide bandwidth. • ...
Digital Citizenship Vocabulary 2026-03-23
Across
- false information that is intended to mislead; deliberate misinformation.
- a branch of computer science dedicated to creating systems capable of performing tasks that typically require human intelligence, such as reasoning, learning, problem-solving, and perception.
- false or inaccurate information.
- A person who speaks or acts in support of an individual or cause, particularly someone who intervenes on behalf of a person being attacked or bullied.
- a technology that superimposes digital elements—graphics, audio, or data—onto the real-world environment in real-time, enhancing the user's physical surroundings rather than replacing them.
- The process of converting information or data into a code, especially to prevent unauthorized access.
- Tools and configurations on websites, apps, and devices that allow users to control what personal information is shared, who can view their content, and how data is used.
- a U.S. legal doctrine permitting limited use of copyrighted material without permission from the rights holder, typically for purposes such as criticism, commentary, news reporting, teaching, scholarship, or research.
- A person who uses information technology—such as the internet, social media, and mobile devices—regularly, effectively, and responsibly to engage in society, politics, and government.
- the total time spent using devices with screens
- The established standards of respectful, polite, and responsible behavior in online environments.
- A form of social engineering cyberattack where criminals impersonate reputable organizations or individuals via email, text, or phone to steal sensitive information like passwords, credit card numbers, or login credentials.
- an international non-profit organization that provides free, standardized licenses allowing creators to share their work legally
- a form of intellectual property law that automatically protects original works of authorship—such as books, music, art, and software—once they are fixed in a tangible medium.
Down
- - a compulsive, harmful dependence on digital devices or online platforms—such as smartphones, social media, or gaming—that interferes with daily life, relationships, and mental health.
- The practice of bullying a person by sending messages or posting social media content of an intimidating, mocking, or threatening nature.
- The information about a particular person that exists on the internet as a result of their online activity.
- The ability to access, analyze, evaluate, create, and act using all forms of communication.
- the act of presenting someone else's work, ideas, or language as your own without proper acknowledgment or authorization.
- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
- The practice of protecting systems, networks, programs, and data from digital attacks, unauthorized access, or damage.
- Any data that can identify, contact, or locate an individual, either on its own or when combined with other data.
- a high-precision, electronic instrument used to measure the mass or weight of substances with high accuracy, typically down to the milligram level, by converting gravitational force into an electrical signal.
- the moral principles, standards, and values that govern human conduct, defining what is acceptable, good, and right versus what is bad or wrong.
- The sum of a person's digital representation, interactions, and data—such as usernames, social media profiles, and purchasing habits—that define them across the internet.
- - The ethical, safe, and informed use of technology, encompassing accountability for online actions, protection of privacy, and respectful interaction in digital spaces.
- the intentional, conscious, and purposeful engagement with technology, tools, or surroundings, rather than reacting impulsively or automatically.
- the illegal copying, distribution, modification, or use of software without a valid license or in violation of its terms.
- A person who is present at an event or incident but does not take part.
- The ability to understand and share the feelings of another.
30 Clues: false or inaccurate information. • the total time spent using devices with screens • The ability to understand and share the feelings of another. • A person who is present at an event or incident but does not take part. • false information that is intended to mislead; deliberate misinformation. • ...
Digital Citizenship Vocabulary Crossword 2026-03-18
Across
- a high-precision, electronic instrument designed to measure the mass or weight of an object, providing quick and accurate readings on a digital screen, often down to the milligram level.
- a type of social engineering cyberattack where criminals impersonate reputable sources—via email, text, or phone—to steal sensitive data like passwords, credit card numbers, or login credentials.
- -Fair use is a U.S. legal doctrine under Section 107 of the Copyright Act that permits limited use of copyrighted material without permission from the rights holder. It serves as an affirmative defense against infringement claims, typically for purposes such as criticism, comment, news reporting, teaching, scholarship, research, or parody.
- the ability to understand and share the feelings of another.
- a branch of computer science that enables machines to simulate human intelligence, allowing them to learn from data, reason, solve problems, and make decisions.
- he intentional, conscious, and non-judgmental engagement with technology, tools, or daily activities.
- -the practice of attacking and robbing ships at sea.
- -the practice of protecting systems, networks, programs, and data from digital attacks, unauthorized access, and damage.
- the process of scrambling, or encoding, data into an unreadable format (ciphertext) to prevent unauthorized access, ensuring that only those with the correct cryptographic key can unlock and read the original information (plaintext).
- someone who is present in a courtroom without participating in the proceedings.
- a nonprofit organization that provides free, standardized, and easy-to-use copyright licenses, enabling creators to share their work with the public while retaining copyright.
- a set of social conventions and rules for polite, respectful, and responsible behavior in online interactions and electronic communication
- any data that can identify, contact, or locate an individual, either on its own or when combined with other data.
- false or inaccurate information.
- the unique trail of data you leave behind while using the internet, including websites visited, emails sent, and information submitted online.
- -a person who speaks or acts in support of an individual or cause, particularly someone who intervenes on behalf of a person being attacked or bullied.
Down
- -false, inaccurate, or misleading information deliberately created and spread to deceive people, manipulate public opinion, or cause harm.
- a technology that superimposes digital information—such as images, 3D models, or text—onto the real world in real-time, enhancing a user's perception and interaction with their environment.
- the act of presenting another person's work, words, ideas, or data as your own without proper acknowledgment or citation.
- the branch of philosophy that systematically studies, defines, and defends concepts of right and wrong behavior.
- the unique trail of data you leave behind while using the internet, including websites visited, emails sent, and information submitted online.
- a behavioral disorder characterized by compulsive, excessive use of digital devices (smartphones, social media, gaming) that interferes with daily life, relationships, and responsibilities.
- the ethical, safe, and sustainable use of technology, focusing on protecting privacy, security, and well-being while understanding the impact of digital actions on society and the environment.
- -bullying that takes place over digital devices like cell phones, computers, and tablets through SMS, apps, social media, or gaming.
- the ability to critically analyze stories presented in the mass media and to determine their accuracy or credibility.
- a nonprofit organization that provides free, standardized, and easy-to-use copyright licenses, enabling creators to share their work with the public while retaining copyright.
- a person who uses information technology—such as the internet, social media, and mobile devices—regularly, effectively, and responsibly to engage in society, politics, and government.
- -tools and configurations on websites, apps, and devices that allow users to control what personal information is shared, who can view their content, and how data is used
- a form of intellectual property law that protects original works of authorship—such as books, music, art, and software—once they are fixed in a tangible form.
- -a precise, step-by-step set of instructions or rules followed to solve a specific problem, perform calculations, or accomplish a task,
30 Clues: false or inaccurate information. • -the practice of attacking and robbing ships at sea. • the ability to understand and share the feelings of another. • someone who is present in a courtroom without participating in the proceedings. • he intentional, conscious, and non-judgmental engagement with technology, tools, or daily activities. • ...
cYBERSECURITY 2024-02-20
cybersecurity 2023-10-06
CYBERSECURITY 2022-11-17
Cybersecurity 2024-11-06
Careers in STEM 2023-10-31
Across
- design, program, build and test robots
- collect and study samples of soil and water to determine the level and quantity of pollutants present in the samples.
- work in a range of industries including film, broadcasting (radio or television), live performance (theatre, music, dance), advertising, and audio recordings. They are required to assemble, operate, and maintain the technical equipment used to record, amplify, enhance, mix, and reproduce sound. They identify the sound requirements for a given situation and use their specialized knowledge to produce this sound.
- utilize satellite images, aerial photographs, and Light Detection and Ranging (LiDAR) technology to craft models of the Earth’s features and surface to create topographic maps.
- design, implement, and analyze algorithms for solving problems. This career requires a high level of expertise in mathematics because the codes used are based on numerical theories and cutting-edge mathematical algorithms; decipher secret coding systems and decode messages for military, political, or law enforcement agencies or organizations, helping to provide privacy for people and corporations and keep hackers out of important data systems.
- The study of relationships between animals, plants, and the environment. They investigate urban, suburban, rural, forest, freshwater, estuarine, and marine environments, helping us understand the connections between organisms and their environment.
- the people who make sure that the products we use not only smell and feel good, but are also safe for us to use. Some might work on the formulation of new cosmetics, while others might focus on improving the performance of the current product.
- they make fireworks fly, designing displays for use in sports arenas and concert venues, and for special effects in movies and television.
- While it’s not necessary to have a qualification in ecological studies, biology or botany is essential to have a working knowledge of both. Planning and maintaining a rooftop garden needs a good understanding of gardening, conservation methods and ecology.
- information security professionals who are in charge of monitoring and safeguarding computer networks, sensitive information and proprietary data from hackers and malware.
- analyzing everything from blood samples to tire tracks in order to provide impartial scientific evidence for use in courts of law to support the prosecution or defense in criminal and civil investigations.
Down
- design, operate and maintain nuclear reactors and plants. They also implement procedures that allow the safe disposal of nuclear waste and ensure that every nuclear plant has safety measures in place in case of a leak.
- A type of herpetologist which in turn is a type of zoologist. People who work in this highly specialized area extract venom from snakes and other reptiles which produce venom that could cause illness and death
- an experimental technique in which a defective mutant allele is replaced with a functional one.
- professionals who care and maintain marine life in aquariums and marine conservation centers. They can specialize in a number of different areas, including safely breeding creatures in captivity, creating and maintaining aquatic exhibits and shows, training sea life, and educating the public about sea life.
- study to try to detect the presence of cryptids – animals that are considered to be long extinct or maybe even mythical. This career contributed to discovering animals such as giant squids, Komodo dragons and okapi were all once considered creatures of legend but have since been proven to exist.
- experiment with the chemical makeup of foods to make them safer, tastier, longer-lasting, or easier to ship.
- Specialized geologists who study the patterns of volcanoes. by studying a variety of ash and rock samples, simulate controlled explosions that mimic volcanic activity, and even listen to the gurgles of a volcano.
- Use of both science and art to produce photographs, videos, and graphical images for use in health care, helping to promote scientific knowledge to patients and the greater public.
19 Clues: design, program, build and test robots • an experimental technique in which a defective mutant allele is replaced with a functional one. • experiment with the chemical makeup of foods to make them safer, tastier, longer-lasting, or easier to ship. • ...
Cybersecurity Unit 1 Vocabulary 2021-09-17
CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET C Duration :15 mins Marks:20 2025-10-16
Across
- Self-replicating program that attaches itself to files and spreads when executed.
- Unauthorized access to data or systems
- Malicious software that encrypts data and demands ransom
- The electronic version of junk mail, often unsolicited commercial advertising
- A proactive exercise searching for threats concealed within the network or IT infrastructure
- Malicious software specifically designed to disrupt or damage computer systems.
- Examining malware without executing it, often involving analyzing the code.
- Policies and training that educate employees about risks
- Technique to recover deleted or hidden files
- Covertly observing a person's keystrokes or screen to obtain sensitive information.
Down
- The oldest and most fundamental type of firewall that works at the network and transport layers.
- Type of firewall that operates as a cloud-based service
- Unauthorized email scams that trick users into revealing information
- The process of collecting, analyzing, and preserving electronic evidence for investigations.
- A security mechanism that creates a virtual trap to lure attackers and study their techniques
- Attempt to make a system unavailable by flooding it with traffic
- Exploiting vulnerabilities in web application input fields to manipulate a database.
- Data describing other data, such as timestamps or authors
- Malicious software disguised as a legitimate program to trick users into executing it.
- A security device that filters all incoming and outgoing network packets
- Network tool for capturing and analyzing traffic
21 Clues: Unauthorized access to data or systems • Technique to recover deleted or hidden files • Network tool for capturing and analyzing traffic • Type of firewall that operates as a cloud-based service • Malicious software that encrypts data and demands ransom • Policies and training that educate employees about risks • ...
CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET A Duration :15 mins Marks:20 2025-10-16
Across
- Malicious software that encrypts data and demands ransom
- Unauthorized access to data or systems
- Policies and training that educate employees about risks
- Type of firewall that operates as a cloud-based service
- Exploiting vulnerabilities in web application input fields to manipulate a database.
- The electronic version of junk mail, often unsolicited commercial advertising
- Network tool for capturing and analyzing traffic
- Attempt to make a system unavailable by flooding it with traffic
- A security device that filters all incoming and outgoing network packets
- Examining malware without executing it, often involving analyzing the code.
- Technique to recover deleted or hidden files
- A security mechanism that creates a virtual trap to lure attackers and study their techniques
- The oldest and most fundamental type of firewall that works at the network and transport layers.
Down
- Covertly observing a person's keystrokes or screen to obtain sensitive information.
- The process of collecting, analyzing, and preserving electronic evidence for investigations.
- Data describing other data, such as timestamps or authors
- Self-replicating program that attaches itself to files and spreads when executed.
- Unauthorized copying of trade secrets or patents
- Malicious software disguised as a legitimate program to trick users into executing it.
- A proactive exercise searching for threats concealed within the network or IT infrastructure
- Unauthorized email scams that trick users into revealing information
21 Clues: Unauthorized access to data or systems • Technique to recover deleted or hidden files • Unauthorized copying of trade secrets or patents • Network tool for capturing and analyzing traffic • Type of firewall that operates as a cloud-based service • Malicious software that encrypts data and demands ransom • Policies and training that educate employees about risks • ...
CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET C Duration :15 mins Marks:20 2025-10-16
Across
- Malicious software that encrypts data and demands ransom
- Unauthorized access to data or systems
- Policies and training that educate employees about risks
- Type of firewall that operates as a cloud-based service
- Exploiting vulnerabilities in web application input fields to manipulate a database.
- The electronic version of junk mail, often unsolicited commercial advertising
- Network tool for capturing and analyzing traffic
- Attempt to make a system unavailable by flooding it with traffic
- A security device that filters all incoming and outgoing network packets
- Examining malware without executing it, often involving analyzing the code.
- Technique to recover deleted or hidden files
- A security mechanism that creates a virtual trap to lure attackers and study their techniques
- The oldest and most fundamental type of firewall that works at the network and transport layers.
Down
- Covertly observing a person's keystrokes or screen to obtain sensitive information.
- The process of collecting, analyzing, and preserving electronic evidence for investigations.
- Data describing other data, such as timestamps or authors
- Self-replicating program that attaches itself to files and spreads when executed.
- Unauthorized copying of trade secrets or patents
- Malicious software disguised as a legitimate program to trick users into executing it.
- A proactive exercise searching for threats concealed within the network or IT infrastructure
- Unauthorized email scams that trick users into revealing information
21 Clues: Unauthorized access to data or systems • Technique to recover deleted or hidden files • Unauthorized copying of trade secrets or patents • Network tool for capturing and analyzing traffic • Type of firewall that operates as a cloud-based service • Malicious software that encrypts data and demands ransom • Policies and training that educate employees about risks • ...
CrossWord 21CSE492T CYBERCRIMES AND CYBERSECURITY IV Year / VII Sem FT3 -17.10.25 SET C Duration :15 mins Marks:20 2025-10-16
Across
- The process of collecting, analyzing, and preserving electronic evidence for investigations.
- Covertly observing a person's keystrokes or screen to obtain sensitive information.
- Type of firewall that operates as a cloud-based service
- Examining malware without executing it, often involving analyzing the code.
- A security device that filters all incoming and outgoing network packets
- The oldest and most fundamental type of firewall that works at the network and transport layers.
- Attempt to make a system unavailable by flooding it with traffic
- Unauthorized email scams that trick users into revealing information
- Malicious software that encrypts data and demands ransom
- A security mechanism that creates a virtual trap to lure attackers and study their techniques
Down
- Network tool for capturing and analyzing traffic
- The electronic version of junk mail, often unsolicited commercial advertising
- Exploiting vulnerabilities in web application input fields to manipulate a database.
- Policies and training that educate employees about risks
- Data describing other data, such as timestamps or authors
- Unauthorized access to data or systems
- Self-replicating program that attaches itself to files and spreads when executed.
- A proactive exercise searching for threats concealed within the network or IT infrastructure
- Technique to recover deleted or hidden files
- Malicious software disguised as a legitimate program to trick users into executing it.
20 Clues: Unauthorized access to data or systems • Technique to recover deleted or hidden files • Network tool for capturing and analyzing traffic • Type of firewall that operates as a cloud-based service • Policies and training that educate employees about risks • Malicious software that encrypts data and demands ransom • ...
