Type
Word Search
Description

continuous delivery
safety critical
security
cyclomatic complexity
report
code complexity
bytecode
compiler
validation
verification
vmodel
scrum
waterfall
informal review
technical review
static analysis
inspection
walkthrough

Compliance Crossword Puzzle

Type
Crossword
Description

Occupational Safety and _________ Administration Health
FERC Order 706 governs these Standards CIP
Generally ________________ Accounting Principles Accounting
ATC’s FERC formula rates are housed within this MISO
An ATC ___________ has a $50,000 expenditure authorization limit Manager
Escheatment is the process of turning over ___________ property to a state authority Unclaimed
The frequency of completing ATC’s Business Ethics Questionnaire Annual
Regulation (acronym) enacted in 1996 aimed at ensuring medical records, medical billing, and patient accounts meet certain consistent standards with regard to documentation, handling, and privacy HIPAA
An employee may take maternity leave under the ________ and Medical Leave Act Family
The heading on Page 3 of ATC’s Code of Conduct: Doing What’s _________ Right
Tax (acronym) imposed on both employees and employers to fund Social Security and Medicare FICA
The Federal _____________ Guidelines outline the seven elements of an effective compliance program Sentencing
Tone at the ________ Top
An anonymous way to report an ethics or compliance concern Helpline
The number of members on ATC’s Policy & Ethics Committee Four
________________ Reliability Organization Midwest
Juanita Banks is ATC’s Designated ___________ Officer Compliance
Substantiated ethics and/or compliance violations are reported to ATC’s ____________ Committee Audit
Enterprise ____________ Management Information
Regulatory entity (acronym) that assists in the protection of employment discrimination on the basis of race, sex, religion, national origin, and a variety of other characteristics EEOC
Information should be classified as ATC __________ Information when the unauthorized disclosure, alteration, or destruction of that information could expose the Company to a significant level of risk Confidential
Controls for providing Users the means to verify or validate a claimed identity through the presentation of something they know (e.g., passwords), something they own (e.g., hardware token), or something they are (e.g., fingerprint, biometrics, etc.). Authentication
Per the Acceptable Use of Electronic Resources Policy, data moved to removable media sources (e.g. USB, CD, etc.) must be ___________. Encrypted
Ways to report potential issues or concerns are outlined in ATC’s Open ______ Policy Door
Employment ______________ and Professional References Policy Verification
Accepting a gift card from a supplier vying for business at ATC represents a Conflict of ________ Interest
Per the External Communications & Social Media Policy, do not represent yourself as a ____________ for ATC Spokesperson
Per the Gifts & Entertianment Policy, all tangible gifts given to an ATC employee, regardless of dollar amount, must be reported to _________ Payroll
Environmental ____________ Agency Protection
A competitive _________ is required to procure services over $100,000 Bid
___________ Oxley Act was instituted in 2002, as a result of a series of high-profile financial scandals Sarbanes
Per NERC, Critical __________ are facilities, systems, and equipment which, if destroyed, degraded, or otherwise rendered unavailable, would affect the reliability or operability of the bulk electric system Assets
Personnel Risk ____________ Policy Assessment
The Travel & Expense Policy governs transactions inputted into this system Concur
___________ employees who do not charge time to project work orders only need to report their exception time (e.g. vacation, sick, personal, or floating holiday hours) each pay period Exempt
Per ATC’s Code of Conduct, each ATC employee has a responsibility to promptly _________ any known violation or dishonest, unethical, or illegal conduct Report
_______ % of ATC’s corporate goal attainment ties to Reliability Compliance Fifteen
Behavior Based _________ Observations Safety

FOOD SAFETY Word Search

Type
Word Search
Description

Verification
Temperature
Thermometer
HAZARD Analysis
HAZARD
HACCP
Food Contact Surfaces
Employee
Disinfectant
Cross Contamination
Critical Limit
CCP
Control Measures
Corrective Actions
Chemicals
Bacteria

Workplace Safety Puzzle Crossword

Type
Crossword
Description

It's easy to remember how to use a fire extinguisher if you rememeber this word PASS
Spilled liquids create _______ and need to be cleaned up immediately Hazards
Do not read or text while walking. It is not worth the _________ Risk
Body position that promotes god ergonomics Neutral
First step in a safety conversation Observe
Critical to workplace safety Safety conversation
One step in the prevention of an incident occurence analysis
During an emergency, use the _________ exit to you Closest
Another element of a safety conversation Discussion
Reporting unsafe acts and conditions can help prevent Accidents
Acronym for the KP Safety Program CSMP
This is everyone's responsibility Safety
Monthly Safety Conversation Tracker Dashboard
Scan _________ while you walk Ahead

Jile Puzzle: Agile DevOps Crossword #1

Type
Crossword
Description

A list of the new features, bug fixes or infrastructure changes that a team may deliver Backlog
The first Agile DevOps platform developed specifically for product-centric Agile delivery Jile
Defines a specific Agile working model that each product team chooses to implement (3 words) Wayofworking
An Agile framework for developing and sustaining complex products in an iterative and incremental manner Scrum
A Lean Agile tool that supports a continuous flow model Kanban
A process improvement toolkit that provides lightweight guidance to help organizations streamline their processes in a context-sensitive manner (2 words) Disciplinedagile
A lightweight Agile framework for scaling Scrum, Lean and Agile development to many teams working on a single product (3 words) Largescalescrum
A large user story epic
A timebox during which development takes place Iteration
Synthetic biographies of fictitious users of the future product Personas
Estimates in units other than the time-honored “man-hours” Points
A role created by the Scrum Framework responsible for making sure the team delivers the desired outcome (2 words) Productowner
The person in this role is responsible for ensuring the team lives Agile values and principles (2 words) Scrummaster
A previously agreed period of time during which a person or a team works steadily towards completion of some goal Timebox
In consultation with the customer or product owner, the team divides up the work to be done into these functional increments (2 words) Userstories
A combination of collaboration among all involved stakeholders namely, biz, dev, test, security & ops, automation of repeatable tasks & governance across the value stream from inception to delivery DevOps
The month in 2020 when Jile 4.0 was launched February
The month in 2018 when Jile was officially launched August
Jile was included in the 2019 Magic Quadrant for Enterprise Agile Planning Tools...what analyst firm produced this report? Gartner

Agile Vocabingo

Type
Bingo Cards
Description

Daily Scrum
Product Backlog
MVP
Stories
Velocity
Burndown
Kanban
WIP Limits
Product Owner
Agile Transformation Team
Sprint Backlog
Scrum Team
Accountable
Committment
Agile Manifesto
Collaboration
Safety
Scrum Master
Impediments
Spikes
Anti Pattern
Modern Agile
Retrospective
Sprint Review

    Customize    

Agile Crossword

Type
Crossword
Description

Things we do at the end of each sprint Retrospective
Each sprint starts with ..... Sprint planning
This individual is your first stop for tasking Scrum Master
Agile metric reported during Sprint review Burndown Chart
Each Sprint team must have daily ......... Scrum
This man provides us continuous integration Jenkins
One of the key aspects of DevOps Automation
A CEC Product owner Steve Bolton
These prove excellent means of visibility to our Program management during sprint reviews Demos
Did you know that this tool provides cool graphical visibility for DevOps Grafanna
These describe the work to be done in each sprint Stories
These cause havoc during sprints popups

Chapter 2 Word Search

Type
Word Search
Description

behavior modification
determinism
coercion
lawful behavior
social validity
humane
therapeutic environment
services
informed consent
voluntary consent
treatment
accountability
applied behavior analysis

Cyber Security Crossword

Type
Crossword
Description

any software program in which advertising banners are displayed while the program is running. Adware
designed to detect and destroy computer viruses. Antivirus
an attempt by hackers to damage or destroy a computer network or system. Attack
a method, often secret, of bypassing normal authentication in a product back door
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. backup
refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Blended threat
are similar to worms and Trojans, but earn their unique name by performing a wide variety of automated tasks on behalf of their master (the cybercriminals) who are often safely located somewhere far across the Internet. bots
are small files that Web sites put on your computer hard disk drive when you first visit cookie
body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access cyber security
made possible by using algorithms to create complex codes out of simple data, effectively making it more difficult for cyberthieves to gain access to the information encryption
a network security system, either hardware- or software-based, that controls incoming and outgoing network traffic based on a set of rules. firewall
someone who seeks and exploits weaknesses in a computer system or computer network. hacker
global system of interconnected computer networks that use the Internet protocol suite internet
a local or restricted communications network, especially a private network created using World Wide Web software. intranet
used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system. malicious code
the activity of defrauding an online account holder of financial information by posing as a legitimate company. phishing
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. spyware
any malicious computer program which is used to hack into a computer by misleading users of its true intent trojan horse
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data virus
a standalone malware computer program that replicates itself in order to spread to other computers. worm

The key to Safety is you Word Search

Type
Word Search
Description

INSPECTION
pinch point
ACCIDENT
ACT
CAUTION
COMPLY
EMPLOYEE
EVACUATE
FALL
FIRSTAID
GUARD
HEALTH
HEARING
HELP
IMPORTANT
IMPROVE
INFORMATION
INJURY
LOCKOUT
LOSTTIME
MSDS
MUSCULOSKELETAL
ORIENTATION
REGULATION
REPORT
RESPECT
RESPONIBILITY
SAFETY
SAFETYFEATURE
SLIP
SPRAINS
STRAINS
TRAINING
TRIP
VIGILANT
WHMIS
WORKPLACE
WORKSAFE
ZERO

java CrossWord2

Type
Crossword
Description

The output of the Java compiler is known as ______________ Byte code
___________declares a class variable that is to be shared among all instances. Static
. An ____________ is an object that is generated when a run time error occurs Exception
A_____________is a collection of classes and interfaces. Package
_____________is a reference to the current object on which the method was invoked. This
abstract class and interface are used for runtime___________ Polymorphism
Array is _____________ data type reference
Another term for __________ is information hiding. encapsulation
the term __________ refers to a way of organizing classes that share properties. inheritance
A__________ variable is a data item that belongs to an object. instance
A __________ is a special kind of method used to initialize objects constructor
An array that uses more than one index is called a__________ array. multidimensional
The preferred class for output to a text file is __________. PrintWriter
______________members are accessible from object and the sub class objects protected
Java supports___________ programming. Multithreaded
_______________ is the java compiler. javac
Java uses ___________________ to represent characters. Unicode
A method declared with __________modifier cannot be overridden. Abstract
-------- tool is used for viewing HTML files. CLASSPATH
_______________members are accessible from object and the sub class objects. protected