Type
Crossword
Description

Access and manipulate the spirits of the living and the dead Reapers
Tap into the mind, consciousness, dreams of others Connectors
Manipulate water and ice Tiders
Generate and manipulate fire Burners
Manipulate air and wind Winders
Manipulate the earth Grounders
Manipulate and bend metals Welders
Manipulate light and darkness Lighters
Heal a wide variety of ailments and injuries Healers
Infect the living with a wide variety of sicknesses and diseases Cancers
See into the past, present, and future Seers
Control and transform animals Tamers

Cyber Security Crossword

Type
Crossword
Description

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

Woman at the Well Crossword

Type
Crossword
Description

Healer Jesus
Followers of Jesus Disciples
Jacobs owner of well
Living Water 3rd Sunday of Lent
SYCHAR TOWN IN SAMARIA
CANA TOWN IN GALILEE
SOWER ONE WHO SOWS
MESSIAH JESUS
REAPER ONE WHO REAPS
JACOB OWNER OF THE WELL
SAMARITAN WOMAN WOMAN AT THE WELL

Technology Crossword Puzzle

Type
Crossword
Description

A client software program that runs against a Web server or other Internet server and enables a user to navigate the World Wide Web (WWW) to access and display data. Browser
A part of a computer system or network that is designed to block unauthorized access while permitting outward communication. Firewall
The combination of typeface and other qualities, such as size, pitch, and spacing. Font
A word or group of words that act as a way to cross reference to other documents or files on the computer. Link
A device that feeds data into a computer, such as a keyboard or mouse. Input
Any computer-generated information displayed on screen, printed on paper or in machine readable form, such as disk and tape. Output
Usually comprises the display device, circuitry, casing, and power supply. Monitor
Sending an email, posting photos on a social media site and using your webcam. Upload
An error, flaw, failure, or fault in a computer program or system that causes it to produce an incorrect or unexpected result or to behave in unintended ways. Bug
Usually consists of eight bits. Byte
The exclusive right, as recognized separately in each country, to publish and sell literary, artistic, or musical materials. Copyright
copy (data) from one computer system to another, typically over the Internet. Download
The collection of physical parts of a computer system. Hardware
A software system that links topics on the screen to related information and graphics, which are typically accessed by a point-and-click method. Hypertext
A measure of the amount of computational work that a computer system performs. Load

Wellness Crossword Puzzle

Type
Crossword
Description

This type of wellness is the ability to relate to and connect with other people in our world. Social
This type of wellness is the ability to recognize our own responsibility for the quality of the air, the water and the land that surrounds us. Enviromental
This type of wellness is the ability to establish peace and harmony in our lives. Spiritual
This type of wellness is the ability to understand ourselves and cope with the challenges life can bring. Emotional
This type of wellness is the ability to open our minds to new ideas and experiences that can be applied to personal decisions, group interaction and community betterment. Intellectual
This type of wellness is the ability to maintain a healthy quality of life that allows us to get through our daily activities without undue fatigue or physical stress. physical
An interactive process of becoming aware of and practicing healthy choices to create a more successful and balanced lifestyle. wellness
Making and maintaining _____ changes to improve our health and wellness is almost always easier if we have encouragement and support from our friends, family or co-workers positive
An unhealthy state or condition of the mind or body in which physical, social, emotional, intellectual, or spiritual functioning is compromised. illness
The forces or stimuli that impinge upon an individual; also, an individual's response to these forces. stress
A system of belief and practices aimed at the union of the individual self with the universal self. yoga
An altered state of consciousness in which the mind is focused in passive attention and quiet, resulting in an experience of transcendence. meditation
Use of beat, rhythm, pitch, harmony, synchrony, chords, and lyrics to facilitate healing, alter consciousness, reduce stress, facilitate movement, aid sleep, improve concentration, and more. music therapy
A method of altering consciousness by focusing attention on one thought, thereby distracting consciousness from other thoughts. hypnosis

Crossword - Exercise 1

Type
Crossword
Description

A basic security mechanism that consists of a secret word or phrase that must be used to gain access to an account Password
An attempt by hackers to damage or destroy a computer network or system. Attack
Someone who seeks and exploits weaknesses in a computer system or computer network. Hacker
The process of confirming the correctness of the claimed identity Authentication
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website Phishing
The body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access Cyber Security
A standalone malware computer program that replicates itself in order to spread to other computers. Worm
Are small files that Web sites put on your computer hard disk drive when you first visit Cookies
A technology that allows us to access our files through the internet from anywhere in the world. Cloud
Appears at the beginning of the web-link of a secured website HTTPS
Irrelevant or unsolicited messages sent over the Internet, typically to a large number of users, for the purposes of advertising, phishing, spreading malware, etc. Spam
A data classification mode that describes certain data or document as a secret Reporting
A government agency in Qatar that handles all reported incidents related to cyber attacks QCERT
The art of manipulating people to get access to sensitive information Social Engineering
A software that is a type of utility used for scanning and removing harmful software from your computer Antivirus
Any software program in which advertising banners are displayed while the program is running Adware
The use of electronic communication to bully a person Cyberbullying
A phone call tactic in which individuals are tricked into revealing critical financial or personal information Vishing
A software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive Spyware
Similar to worms and Trojans but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cyber criminals) who are often safely located somewhere far across the Internet. Bots

The Seven Sacraments Crossword

Type
Crossword
Description

Baptism cleanses from ______ ____ originalsin
______ and Eve were the first husband husband and wife Adam
Priesthood Holyorders
Sanctifying ______ Grace
Last Supper HolyEucharist
Pouring of water Baptism
Confession of sins Reconciliation
Holy Orders and _______ are examples of sacraments of service Matrimony
Signifies the gift of the Holy Spirit Confirmation
Anointing of the Sick is a sacrament of ______. Healing

7 Sacraments Word Search

Type
Word Search
Description

SERVICE
HEALING
INITIATION
GRACE OF GOD
HOLY ORDERS
ANOINTING OF THE SICK
MARRIAGE
CONFIRMATION
RECONCILIATION
EUCHARIST
BAPTISM

Human Impacts on the Environment Crossword

Type
Crossword
Description

a gradual increase in the overall temperature of the earth's atmospher Global warming
the increase in the number of individuals in a population population growth
environmental conditions that limit the growth, abundance, or distribution of an organism or a population of organisms in an ecosystem. Limiting Factor
crops that a region can support without environmental degradation. Carrying Capacity
the distribution of people among various ages. Age Structure
the presence in or introduction into the environment of a substance or thing that has harmful or poisonous effects. Pollution
cannot be readily replaced nonrenewable resources
may include goods or commodities such as wood, paper and leather renewable resources
cause economic or environmental harm or harm to human health invasive species
the action of clearing a wide area of trees. deforestation
the variety of life in the world or in a particular habitat or ecosystem. biodiversity

Cyber Security Crossword

Type
Crossword
Description

process of confirming the correctness of the claimed identity authentication
approval, permission, or empowerment for someone or something to do something authorization
cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one brute force
encrypted form of the message being sent ciphertext
stripping one llayer's headers and passing the rest of the packet up to next higher layer decapsulation
TCP/IP protocol specifying the transfer of text or binary files across the network File Transfer Protocol
pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1) loopback address
software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse) malicious code
prove that a user sent a message and the message has not been altered non repudiation
sequence of eight bits octet
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website phishing
gaining unauthorized logical access to sensitive data by circumventing a system's protections penetration
type of input validation attack where SQL code is inserted into application queries to manipulate the database SQL injection
basic communication language or "protocol" of the Internet TCP/IP
hidden, self-replicating section of computer software that inserts itself and becomes part of the another program virus

Biodiversity Crossword

Type
Crossword
Description

living biotic factors
non-living abiotic factors
the rich variety of life on earth. biodiverity
all the living and non-living parts of a community. ecosystem
the study of the interactions between organisms and their enviorment. ecology
the place in which an organism lives. habitat
all the members of a species in an ecosystem population
all the population in an ecosystem community
part of earth that contains all ecosystems. biosphere
everything that surrounds are animal, or plant, including living/non-living things enviorment