attack Crossword Puzzles
ch 20 2021-05-24
Across
- bodily injuries caused by physical means with disruption of the normal continuity of structures.
- subjective sensation or motor phenomenon that precedes and marks the onset of a paroxysmal attack, such as an epileptic attack.
- fibrillation disorganized cardiac rhythm.
- illusion of movement; sensation as if the external world were revolving around the patient or as if the patient were revolving in space.
- abnormally diminished concentration of glucose in the blood.
- temporary suspension of consciousness as a result of generalized cerebral ischemia; faint or swoon.
- stroke or brain attack.
- forcible expulsion of the contents of the stomach through the mouth.
- unexpected or sudden occasion; an urgent or pressing needs.
- unpleasant sensation; vaguely referred to the epigastrium and abdomen and often culminating in vomiting.
- sudden stoppage of cardiac output and effective circulation.
- condition of profound hemodynamic and metabolic disturbance characterized by failure of the circulatory system to maintain adequate perfusion of vital organs.
- (AEDs) device used for application of external electrical shock to restore normal cardiac rhythm and rate.
Down
- hives.
- separation of the layers of a surgical wound.
- paleness; absence of skin coloration.
- (CPR) artificial substitution of heart and lung action as indicated for cardiac arrest or apparent sudden death resulting from electric shock, drowning, respiratory arrest, and other causes.
- bleeding.
- abnormally increased concentration of glucose in the blood.
- abnormal drowsiness or stupor; a condition of indifference.
- nosebleed; hemorrhage from the nose.
21 Clues: hives. • bleeding. • stroke or brain attack. • nosebleed; hemorrhage from the nose. • paleness; absence of skin coloration. • fibrillation disorganized cardiac rhythm. • separation of the layers of a surgical wound. • abnormally increased concentration of glucose in the blood. • abnormal drowsiness or stupor; a condition of indifference. • ...
Glencoe Health Chapter 9 Vocabulary 2021-09-13
Across
- any intentional sexual attack against antoher person.
- a problem-solving method in which each participant gives up something to reach a solution that satisfies everyone.
- the process of ending a conflict throughcooperation and problem solving.
- a pattern of intentionally causing bodily harm or injury to another person.
- any disagreement, struggle, or fight.
- one person in a dating relationship forces the other person to take part in sexual intercourse.
- respecting the privacy of both parties and keeping details secret.
- a pattern of attacking another person’s emotional development and sense of worth.
- use of communication and, in many cases, compromise to settle a disagreement.
Down
- violence committed for no particular reason.
- a process in which specially trained students help other students to resolve conflicts peacefully.
- conflicts between people or groups of people.
- the willful killing of one human being by another.
- the threatened or actual use of physical force or power to harm another person or to damage property.
- an unlawful physical attack or threat of attack.
- a pattern of sexual contact that is forced upon a person against the person’s will.
- the use of words to mistreat or injure another person.
- any form of unwelcome sexual contact direct at an induividual.
- bringing in a neutral third party to help others resolve their conflicts peacefully.
- repeatedly following, harassing, or threatening to an individual.
- to become more serious.
- any form of sexual intercourse that takes place against a parson’s will.
22 Clues: to become more serious. • any disagreement, struggle, or fight. • violence committed for no particular reason. • conflicts between people or groups of people. • an unlawful physical attack or threat of attack. • the willful killing of one human being by another. • any intentional sexual attack against antoher person. • ...
Chapter 14, Section 2 2013-04-23
Across
- Nickname General Erwin Rommel got because of his success.
- Admiral Nimitz sent two carriers; the Japanese sank the ....
- The march of the prisoners.
- American airplanes and warships began to use new..., including radar,sonar, and depth charges, to locate and attack submarines.
- People put up...,to protect the ships,cities on the East Coast.
- The commander of the U.S Navy in the Pacific.
- Who reported, "If we need more room,we got our axes and chopped some bamboo trees down."
- American cargo ships were easy..., especially at night.
- Churchill wanted to attack ...
- The Battle of Midway put the ...on the defensive for the rest of the war.
- "..." argued that the European theater must be the main focus.
- Admiral Nimitz sent two carriers; the .... got badly damaged.
Down
- Commander who retreated to the Bataan Peninsula.
- Was in command of the mission to bomb Tokyo.
- At the end of March, a crane loaded sixteen B-25s onto the aircraft carrier .....
- The loss of so many ships convinced the U.S Navy to set up a...
- As the Japanese prepared a second wave to attack Midway, aircraft from the Am. carriers Hornet, Yorktown and .... then launched counterattack.
- The Battle of Stalingrad put the ... on the defensive for the rest of the war.
- There was a 12-day battle in 1942 against the coastal city of..
- Those bombs could have killed the emperor, who was revered as a ...
20 Clues: The march of the prisoners. • Churchill wanted to attack ... • Was in command of the mission to bomb Tokyo. • The commander of the U.S Navy in the Pacific. • Commander who retreated to the Bataan Peninsula. • American cargo ships were easy..., especially at night. • Nickname General Erwin Rommel got because of his success. • ...
Life in the Trenches 2024-02-01
Across
- The abbreviation for prisoner of war.
- The kind of '10 Across' that ripped men's clothing and bodies.
- You began your attack on the enemy's trenches by going 'over the...'
- Almost as many died from this in the trenches as did from wounds.
- One of the new, most frightening weapons of the war.
- The territory between the opposing enemy's attack was called 'no man's'...
- These creatures filled the trenches and were better fed than the soldiers.
- Where all soldiers wanted to be after being in the trenches for some time.
- What you better have when attacked by '21 Across'.
- This was your constant companion and often your closest friend.
- Men bathed in water filled shell...
- What never seemed to fill the sky when in the trenches.
- This was everywhere.
- Soldiers were never free from these pests in the trenches.
- This word describes what the soldiers' meals always seemed to taste like.
Down
- The material used to slow down the enemy's attack towards your trenches.
- Soldiers in the trenches enjoyed receiving these from loved ones at home.
- What everyone in the trenches wanted to happen soon in the war.
- Men suffered from this after being shelled for hour after hour, day after day.
- When the trench soldiers thought the war would end.
- Weapons that made attacking across no-man's land almost impossible.
- An expensive weapons that was thrown at the enemy.
- What would likely happen if you put your head above the trench.
23 Clues: This was everywhere. • Men bathed in water filled shell... • The abbreviation for prisoner of war. • What you better have when attacked by '21 Across'. • An expensive weapons that was thrown at the enemy. • When the trench soldiers thought the war would end. • One of the new, most frightening weapons of the war. • What never seemed to fill the sky when in the trenches. • ...
Spy School Project X 2023-03-04
Across
- What is take aggressive action against someone
- What is top secret documents
- What is a person seized or held as security for the fulfillment of a condition.
- What is having committed an offense, crime, violation, or wrong
- What is wide cloth adhesive tape originally designed for sealing joints in heating or air-conditioning ducts.
- What is a a set of tasks which must be completed in order to arrive at a deliverable
- What is someone having care or charge of something : guardian, keeper.
- What is shallow inlet of the Atlantic Ocean along southeastern Florida
- What is Mustang is an American long-range, single-seat fighter and fighter-bomber used during World War II
- What is unlawfully seize (an aircraft, ship, or vehicle) in transit and force it to go to a different destination or use it for one's own purposes.
- What is a an institution for the teaching of children
- What is a person who murders an important person for political or religious reason
Down
- What is a place to keep oil
- What is the abbreviation for the Central Intelligence Agency
- What is an attack made in response to one by an enemy or opponent.
- What is a secret agent
- What is a a series of railroad cars
- What is the Witness-Protection-Program
- What is the name of a child that goes to school
- What is a part robot part human called
20 Clues: What is a secret agent • What is a place to keep oil • What is top secret documents • What is a a series of railroad cars • What is the Witness-Protection-Program • What is a part robot part human called • What is take aggressive action against someone • What is the name of a child that goes to school • What is a an institution for the teaching of children • ...
Anime Club 2022-12-20
Across
- The strongest level of sword release in Bleach
- famous dark fantasy manga by Miura
- Main character of seven deadly sins
- Name of the outer wall in Attack on Titan
- first name of Cowboy Bebop bounty hunter
- Name of the most dangerous sea in One Piece
- Name the public use for Light in Death Note
- Weather based name for rank 2 hero in OPM
- Duelist with a pharoah inside his body
- Aura based power system in HxH
- Asta is a member of the Black ____
- Naruto's iconic attack
- Influential Sci-fi anime movie
- the Lion's sin of pride
- Summoned ability in JoJo's Bizarre Adventure
- Strongest attack in JJK: ___ Expansion
- Treasurer in Kaguya-Sama: Love is War
- JoJo's vampire villain
Down
- Term for a japanese comic
- Reindeer Doctor in One Piece
- Style of breathing used by Tanjiro and Giyu
- historical japanese swordsman
- Top grade for JJK curses like Sukuna
- Last name of the Flame Alchemist in FMA:B
- Gon's best friend
- Green haired Sailor Moon sailor
- term for the Pillars of the Demon Slater Corp
- genre where a character goes to another world
- Dragon Ball villain defeated by Gohan
- anime genre: ___ Jump is a major magazine
- The type of Eye Uchica's have
- Name of the Saiyan home planet
- Red haired soul reaper in squad 6
- regiment Eren Yeager joins in AoT
34 Clues: Gon's best friend • Naruto's iconic attack • JoJo's vampire villain • the Lion's sin of pride • Term for a japanese comic • Reindeer Doctor in One Piece • historical japanese swordsman • The type of Eye Uchica's have • Aura based power system in HxH • Name of the Saiyan home planet • Influential Sci-fi anime movie • Green haired Sailor Moon sailor • Red haired soul reaper in squad 6 • ...
Modification of Spontaneous Colicin Production 2025-03-12
Across
- The DNA region that controls the transcription of colicin genes.
- The transcriptional repressor that prevents colicin gene expression under normal conditions.
- The type of attack strategy where colicin production is triggered by a competitor's presence.
- The method used to measure colicin expression levels in individual cells.
- The overall process of controlling colicin expression through genetic mechanisms.
- A protein that binds to colicin and prevents it from killing the producing bacteria.
- The receptor required for colicin uptake into bacterial cells.
- The technique used to quantify fluorescent cells in this experiment.
- The toxin produced by E. coli to attack competitors.
- The immunity protein for colicin E2, which neutralizes its toxic effects.
Down
- The effect of high immunity protein levels on autoinduction and colicin production.
- The process by which the immunity protein binds colicin to prevent self-toxicity.
- The type of plasmid used to measure colicin promoter activity via GFP expression.
- The level of colicin expression seen in the control (E2R) strain.
- The strain containing only the colicin E2 reporter plasmid, serving as a baseline control.
- The process where colicin presence triggers more colicin production.
- A genetic change that can alter colicin or immunity protein regulation.
- The type of attack strategy where colicin is produced even before a competitor is detected.
- The strain that contains both the colicin E2 reporter and colicin plasmid, showing increased fluorescence.
- The bacterial stress response that regulates colicin production.
20 Clues: The toxin produced by E. coli to attack competitors. • The receptor required for colicin uptake into bacterial cells. • The DNA region that controls the transcription of colicin genes. • The bacterial stress response that regulates colicin production. • The level of colicin expression seen in the control (E2R) strain. • ...
cyber-sense 2025-03-24
Across
- A type of virus that locks files until a ransom is paid -
- Software embedded in hardware -
- type of security attack where data is intercepted during transmission -
- A set of rules for data transmission -
- The process of confirming a user’s identity before granting access -
- ADDRESS A unique identifier assigned to each device on a network -
- BREACH A security breach where data is stolen or leaked -
- Security based on physical characteristics -
- A step-by-step procedure for solving a problem -
- REPORT An official report of an attack, breach, or security incident -
- An encrypted connection that protects data sent over the internet -
- A method of verifying identity using two factors -
Down
- Software that tracks user activities without their knowledge -
- A system of interconnected devices -
- A security system that monitors and controls incoming and outgoing network traffic -
- A program that replicates itself and spreads from one device to another -
- The practice of disguising digital messages to protect them from unauthorized access -
- A software bug that allows unauthorized access to a system -
- A secret code used to protect accounts -
- A method for securing passwords -
- An attempt to guess a password by trying many different combinations -
- Malicious software designed to damage or disrupt systems -
- An attack where someone tricks you into giving personal information -
- A scam where an attacker pretends to be a trusted source -
- harmful program disguised as a legitimate file or software -
25 Clues: Software embedded in hardware - • A method for securing passwords - • A system of interconnected devices - • A set of rules for data transmission - • A secret code used to protect accounts - • Security based on physical characteristics - • A step-by-step procedure for solving a problem - • A method of verifying identity using two factors - • ...
WORLD WAR II - BATTLES AND PEOPLE 2020-05-07
Across
- Japanese suicide pilots
- Last large attack by Germans stopped by Allies
- Russian military
- British and German air forces fight in 1940-41
- Japanese city bombed by Allies on August 6, 1945
- British general drove Germans out of Egypt in 1942
- US Navy & Australian forces victory-turning point
- Leader of French government-in-exile during World War 2
- U.S. general led Allies-Battles of Leyte Gulf& Okinawa
- Italian dictator
- Japanese admiral who lead attack on US fleet in Hawaii
- Declaration of principles by Churchill&Roosevelt
- US Navy base attacked by Japanese on December 1941
- US sent planes to drop bombs on Tokyo in 1942
- Agreement
- U.S. general who helped lead Operation Torch
Down
- Moved to West Coast relocation camps
- To not invade or attack
- Allies save Australia from Japan May 1942
- US & Australian troops beat Japan - Feb 1943
- Killed himself in April 30, 1945
- Russian army forced Germans out of Russia1943
- U.S. President after Franklin D. Roosevelt
- Huge Allied invasion to retake France in 1944,i
- U.S. President during most of World War II
- Japanese city bombed by Allies to mark the end of WWII
- German general led troops in North Africa in WWII in 1942
- Warfare of surprise attacks followed by land attacks
- City captured by U.S. & British troops-Invasion of Italy
- Another name for Blitzkrieg
- Controlled amounts & kinds of goods people can have
- Leader of Britain during World War II
32 Clues: Agreement • Russian military • Italian dictator • Japanese suicide pilots • To not invade or attack • Another name for Blitzkrieg • Killed himself in April 30, 1945 • Moved to West Coast relocation camps • Leader of Britain during World War II • Allies save Australia from Japan May 1942 • U.S. President after Franklin D. Roosevelt • U.S. President during most of World War II • ...
Cardiovascular Disease 2018-06-08
Across
- An angiotensin-converting-enzyme inhibitor is a pharmaceutical drug used primarily for the treatment of hypertension and congestive heart failure
- surgical repair or unblocking of a blood vessel, especially a coronary artery
- disease generally refers to conditions that involve narrowed or blocked blood vessels that can lead to a heart attack, chest pain (angina) or stroke
- a sudden, sometimes temporary, cessation of function of the heart
- a drug that is used to treat abnormal heart rhythms
- hardening of the arteries
- a drug that slows heart rate
- a weakness of the heart that leads to a buildup of fluid in the lungs and surrounding body tissues
- drug induced growth of new blood vessels
- a condition characterized by a deficiency of red blood cells
- the removal or destruction of tissue
- a condition marked by severe pain in the chest
Down
- a machine that is used to administer an electric shock to the heart
- a ring of tough fibrous tissue that is attached to and supports the leaflets of the heart valve
- swelling
- the medical name for a heart attack
- relating to or denoting the arteries that surround and supply the heart
- an irregular heartbeat
- Pain in the chest that can be a result of many things, including angina, heart attack (coronary occlusion), and other important diseases
- condition in which there is not enough oxygen-rich blood supplied to the heart muscle
- shortness of breath
21 Clues: swelling • shortness of breath • an irregular heartbeat • hardening of the arteries • a drug that slows heart rate • the medical name for a heart attack • the removal or destruction of tissue • drug induced growth of new blood vessels • a condition marked by severe pain in the chest • a drug that is used to treat abnormal heart rhythms • ...
The lost boys vocabulary 2021-03-24
Across
- Extremely tough or accurate
- Extreme scarcity of food
- at or near equator
- Someone who feels they lost their dignity
- A mass departure, usually immigrants
- involving and limited to basic principals
- Handle or control with skillful manner
- serving or intended to preempt or forestall something, especially to prevent attack by disabling the enemy.
- Politics globally
- Be in the position of authority at a meeting or an ordily gathering
- Beaten or out of shape from hammering
- Traveling from place to place
- Having bizzare qualities
- Search widly of for food
- Kill, destroy or remove a large portion of
- Can not be explained or accounted for
- A slender threadlike appandage of a climbing tree
- A sudden attack or violent expression
Down
- The dispersion of a
- Neatly cut or trimmed
- Marked by involving public order
- corresponding in size or porportion
- So frightend you can't move
- A firm warning
- Unfocused from a sleep or tiredness
- gerund or present participle
- Making a harsh loud noise
- Rise and fall iregullary in number or amount
- Attack with bombs or guns from a low-flying aircraft
- A feeling of extreme excitement
- originate in or be caused by.
- A person who derives advantage, will, or trust
- disorderly or a noisy group of people
- A dangerous or difficult situation
- A person who does buisiness and takes on more than normal financial risks
35 Clues: A firm warning • Politics globally • at or near equator • The dispersion of a • Neatly cut or trimmed • Extreme scarcity of food • Having bizzare qualities • Search widly of for food • Making a harsh loud noise • Extremely tough or accurate • So frightend you can't move • gerund or present participle • originate in or be caused by. • Traveling from place to place • ...
Church History 2024-10-02
Across
- St. ____________ was burnt alive over a fire. He was also a deacon
- the founder of the first major heresy to attack the Church
- This Saint was Constantine's mother
- Early Christian writers who defended the Faith
- The last and worst emperor to persecute Christians in the Roman Empire
- St. Helena found this in the Holy Land
- Jerome The Saint who translated the Bible into Latin
- The Edict of _______________ legalized Christianity
- The first major heresy to attack the Church after the persecutions were over
- After legalizing Christianity, Constantine paid to build the Basilica of St. ___________ over the bones of the first pope
- This was the emperor/ruler that Constantine defeated to become sole emperor
Down
- This emperor legalized Christianity
- St. _________ was a Christian Roman soldiers who was shot with arrows
- The new city that Constantine founded
- The place were early Roman Christians buried their dead
- This emperor led the second worst persecution of Christians in the Roman Empire
- The battle of ______________ bridge was won by Constantine and made him the sole ruler in Rome
- St. ___________ was a teenage Greek princess who was tortured and killed by Diocletian
- This form of Roman government was established by Diocletian, making four rulers of the empire
- St. _________________ had her eyes plucked out for being a Christian
- This Church Council was called in 325 to respond to the first major heresy to attack the Church
21 Clues: This emperor legalized Christianity • This Saint was Constantine's mother • The new city that Constantine founded • St. Helena found this in the Holy Land • Early Christian writers who defended the Faith • The Edict of _______________ legalized Christianity • Jerome The Saint who translated the Bible into Latin • The place were early Roman Christians buried their dead • ...
Rizal 2023-10-21
Across
- Attack against friars refusal to bury mariano herbosa in catholic cemetery
- eldest daughter of beckett family
- Penname "Dimasalang"
- Defended the Noli me tangere against the attack of friars
- Los agricultores Filipinos
- Rizal and his kidlat members were inspired by troupe, a group of tall, dignified, proud and powerful indians?
- exposed the cancer present in Philippine history
- Some Filipinos who where destroying the reputation of Filipinos by?
- response to the anti-filipino writing by Patricio De La Escosura
- Where Rizal lived frim May 1888- March 1889
- lifestyle here was more affordable
- Rizal organized social group with his fellow Filipinos in Paris
- Served during governor migue De Legazpi's administration
- Librarian of the ministry of foreign affairs at the british museum
- Things about the philippines
- article countered the biased article entitled "Old truths"
- Una profanacion
- Vicente garcia defended the noli against the attack of what?
- New name of Kidlatclub
Down
- Written to defend his friend Blumentritt from defamatory insulting attacks of the latter’s enemy.
- Getrude's other name
- The deplorable farmers conditions
- Saturnina's husband
- Newspaper that serves as the official voice of propagandas
- Last resort and ultimate solution against spanish oppression
- Built the eiffel
- English transalion of Ala defensa
- English of Crueldad
- Became the inspiration of Rizal in naming his one societal club as Indios Bravos
- Rizal planned to establish a filipino college in?
30 Clues: Una profanacion • Built the eiffel • Saturnina's husband • English of Crueldad • Getrude's other name • Penname "Dimasalang" • New name of Kidlatclub • Los agricultores Filipinos • Things about the philippines • The deplorable farmers conditions • eldest daughter of beckett family • English transalion of Ala defensa • lifestyle here was more affordable • ...
Go Buffs WWII in Europe JCS 2026-01-25
Across
- Germany, Italy, and Japan signed a pact to become allies after the fall of France
- A document that signaled the U.S. and Britain as allies
- Germany, Italy and Japan were allies
- President after FDR and made the decision to drop nukes on japan
- Living space for the German people
- Prejudice against Jewish people
- Neville Chamberlain gave up Sudetenland for peace with Germany
- U.S. commander who played a crucial role in the battle of the bulge
- Leading isolationist voice of the U.S.
- Head of the communist party that caused ten million deaths
- Form of government led by a dictator
- Act that authorized the selling,transfer,exchange,lease,lending or disposing of government defense articles
- Field commander who oversaw the landings on normandy's beaches
- Supreme commander of the expeditionary force in Europe
- Surprise attack in the Ardennes Forest by the Germans as their last major attack
Down
- The leaders of Britain, France, and Italy met and agreed to the annexation of Sudetenland
- African American military pilots
- political ideology focused on nationalism
- Prime minister for the United Kingdom for the majority of ww2
- Countries including Britain, France, Soviet Union and the U.S. were allies
- The union of Austria under Germany
- German sudden attack
- British prime minister that was a part of the Munich pact
- The "Desert Fox" was a German Field marshal who was successful in north Africa and defending france
- Major allied forces operation on the beaches of normandy
25 Clues: German sudden attack • Prejudice against Jewish people • African American military pilots • Living space for the German people • The union of Austria under Germany • Germany, Italy and Japan were allies • Form of government led by a dictator • Leading isolationist voice of the U.S. • political ideology focused on nationalism • ...
Test 2024-12-16
Across
- - Software designed to damage or disrupt systems.
- - A cyber attack that overwhelms a server.
- - Simulating an attack to identify vulnerabilities.
- - A software update to fix vulnerabilities.
- - Fraudulent attempts to obtain sensitive information via email.
- - A group of infected computers under a hacker’s control.
Down
- - A hacker engaged in activism.
- - Software that detects and removes malware.
- Engineering - Manipulating people to gain confidential info.
- Breach - Unauthorized access to confidential data.
- - Software that secretly gathers information about a person.
- - Unsolicited messages or emails.
- - Malicious software disguised as legitimate software.
13 Clues: - A hacker engaged in activism. • - Unsolicited messages or emails. • - A cyber attack that overwhelms a server. • - A software update to fix vulnerabilities. • - Software that detects and removes malware. • - Software designed to damage or disrupt systems. • Breach - Unauthorized access to confidential data. • - Simulating an attack to identify vulnerabilities. • ...
Attack on your brain 2021-05-13
Across
- To surprise somebody very much.
- Expecting good things to happen or something to be successful
- To make somebody very angry.
- Bright, strong flame
- To talk in a noisy or excited manner
- To laugh quietly.
Down
- To look quickly at somebody/something.
- Full of excitement and interest in something.
- Someone who affects or changes the way that other people behave
9 Clues: To laugh quietly. • Bright, strong flame • To make somebody very angry. • To surprise somebody very much. • To talk in a noisy or excited manner • To look quickly at somebody/something. • Full of excitement and interest in something. • Expecting good things to happen or something to be successful • Someone who affects or changes the way that other people behave
Mission Alert: Viper Attack 2025-01-28
Across
- Push (someone or something) roughly.
- Inform someone in advance of a possible danger
- Strike hard and violently
- Feeling or showing surprise
- At a fast speed; rapidly
Down
- An opening, such as a door, passage, or gate, that allows access to a place.
- Shake slightly and uncontrollably as a result of being cold, frightened, or excited.
- Pounding or throbbing in a heavy, continuous way.
- A place from which to keep watch or view the landscape.
9 Clues: At a fast speed; rapidly • Strike hard and violently • Feeling or showing surprise • Push (someone or something) roughly. • Inform someone in advance of a possible danger • Pounding or throbbing in a heavy, continuous way. • A place from which to keep watch or view the landscape. • An opening, such as a door, passage, or gate, that allows access to a place. • ...
Attack on Pearl Harbor 2026-04-21
9 Clues: A tribute • Great size • Disastrous • Independence • Shameful fame • Mistake in planning • Actively engaged in warfare • Restrictions to punish behavior • Important and having effects on results
monkeys 2024-12-24
Lesson 6 -1 2024-09-13
Ingrid's Own Crossword Puzzle 2025-02-24
14 Clues: Deer • Retro • C.A.S • Flower • Burton • Camera • matcha • Season • Jewelry • Roseblood • Button eyes • Massive Attack • Opposite of sun • City that never sleeps
i survived grizzly attack 2023-04-18
9 Clues: get afraid • to search thru • nail of a bear • home in the woods • its brown on trees • its green and large • animal that lives in the woods • it smells and you put stuff in it • its common in glacier national park
Cyber Attack Groups (Expert) 2023-06-01
Across
- Bear Another Russian state-sponsored group, APT29 is known for its sophisticated and stealthy cyber espionage campaigns. They have targeted governments, think tanks, and diplomatic organizations.
- They been involved in various cyber attacks, including the destructive 2015 and 2016 attacks on Ukraine's power grid and the NotPetya ransomware attack.
- This Chinese cyber attack group operates both for personal gain and state interests. They engage in cyber espionage, financially motivated attacks, and supply chain compromises, targeting a wide range of industries globally.
- Believed to be linked to Iran, APT34 focuses on cyber espionage campaigns targeting organizations in the Middle East, particularly in the energy, telecommunications, and chemical industries.
- Originating from Vietnam, APT32 has been involved in cyber espionage campaigns targeting Southeast Asian countries, particularly focusing on political, media, and human rights organizations.
Down
- Linked to North Korea, Lazarus Group has conducted several notable cyber attacks, including the 2014 Sony Pictures hack and the 2017 WannaCry ransomware attack. They have targeted financial institutions, critical infrastructure, and cryptocurrency exchanges.
- This advanced persistent threat group targets individuals in the hospitality industry, mainly executives and high-profile business travelers, using sophisticated social engineering and zero-day exploits to gain access to their devices and networks.
- Widely believed to be associated with the United States' National Security Agency (NSA), Equation Group is known for developing and deploying highly sophisticated cyber weapons, including the Stuxnet worm and various advanced persistent threats (APTs).
- also known as FIN7 or Anunak, is a financially motivated cyber criminal group that has targeted banks, hospitality, and retail sectors. They are known for their sophisticated hacking techniques and large-scale data breaches.
9 Clues: They been involved in various cyber attacks, including the destructive 2015 and 2016 attacks on Ukraine's power grid and the NotPetya ransomware attack. • Believed to be linked to Iran, APT34 focuses on cyber espionage campaigns targeting organizations in the Middle East, particularly in the energy, telecommunications, and chemical industries. • ...
Number Bases Puzzle ATTACK!!! 2022-04-13
Across
- Calculate 467 base 7 - 141 base 5 and give your answer in base 10
- Convert 65 base 8 to base 2
- Calculate 10101 base 2 + 111 base 2 and give your answer in base 10
- Calculate 132 base 4 + 110 base 2 and give your answer in base 10
Down
- Calculate 2220 base 3 + 211 base 3 and give your answer in base 10
- Convert 400 base 10 to base 5
- Convert 633 base 7 to base 10
- Convert 43 to base 4
- Convert 110011110 base 2 to base 8
9 Clues: Convert 43 to base 4 • Convert 65 base 8 to base 2 • Convert 400 base 10 to base 5 • Convert 633 base 7 to base 10 • Convert 110011110 base 2 to base 8 • Calculate 467 base 7 - 141 base 5 and give your answer in base 10 • Calculate 132 base 4 + 110 base 2 and give your answer in base 10 • Calculate 2220 base 3 + 211 base 3 and give your answer in base 10 • ...
Scenario Crossword 2022-01-18
15 Clues: think • greed • untidy • cliche • return • harmful • peaceful • doubtful • agreement • enthusiasm • pale and thin • talk foolishly • fight or attack • a greedy person • anger or annoyance
The Hobbit Chapters 13-16 2025-02-22
16 Clues: pale • truce • gledes • sneaky • predator • polluted • mouldered • marauding • mouldered • recompense • make amends • threatening • strengthening • indestructible • covered with palm fronds • going about to steal or attack
WW2 2014-02-28
Across
- bip.. bip.. bip.. something is above us
- a persons style of clothing when something happens
- I said a hip hop, Hippie to the hippie, The hip, hip a hop, and you don't stop,
- attack germany in brilliant ways
- many land
- YIL-TAS
- we won in Europe
- BOOOOOOOOOOMMMM!!!!!
- 1944 Germany counters a attack
- hey is that pee or spit on me???
- 1st plave of a boom!
- a person who was born in the us but was from where?
- person who made the bomb in the US
- we won
- look at that airplane!
- give me the cure for another life!
- he was a drunk
- where countries meet up
- person that left Germany
- b-b d-f s-f b-c e-f d-g hmm what is this????
- I (hitler) am a great... what?
- we are half way there
Down
- the soviet union made this
- an air force
- gets rid of gas theres no liquid
- get biggie and little
- group that killed many people
- Germany failed to get this place
- stop it!!! we can't general!
- a book about a great talker
- 1944
- bop.. bop.. bop something is under us
- didn't see VE day
- this strategy got more land
- bomb!!! haha it didn't hit me!
- type of military attack
- 2nd BOOOOOOOOOOMMMM!!!!
- great talker
- an airplane
- 33 president
40 Clues: 1944 • we won • YIL-TAS • many land • an airplane • an air force • great talker • 33 president • he was a drunk • we won in Europe • didn't see VE day • BOOOOOOOOOOMMMM!!!!! • 1st plave of a boom! • get biggie and little • we are half way there • look at that airplane! • type of military attack • 2nd BOOOOOOOOOOMMMM!!!! • where countries meet up • person that left Germany • the soviet union made this • ...
Natalie’s Volleyball Crossword 2026-02-19
Across
- The only thing you do by yourself in the game
- A endurance drill that helps you practice blocking and hitting quickly
- The part of your foot you should stand on when on back row defense
- Hitter in the center front
- When the attack is soft over the net using the fingertips
- When a coach takes a player out of the game and replaces them with another
- front row Net defense
- How many seconds long is an Average Volleyball Rally?
- A ball that come over with a pass instead of an attack
- How many feet away from the net is the line where you start your hit approach from?
- A serve where you stop your hand instead of following through to make the ball move in the air
- what the third hit is called
- Hitter on the front right side
Down
- A series of games played that determine the winner of the league
- what the second hit is called
- What you call when you want to take the next hit
- Hitter on the front left side
- back row defense specialist
- A defensive move to get the ball with your hand flat on the floor
- A serve where you toss the ball high in front of you and hit it like a normal front row attack
- What the first hit is called
- second person to touch the ball in a rally
- The person who makes all the calls
23 Clues: front row Net defense • Hitter in the center front • back row defense specialist • What the first hit is called • what the third hit is called • what the second hit is called • Hitter on the front left side • Hitter on the front right side • The person who makes all the calls • second person to touch the ball in a rally • The only thing you do by yourself in the game • ...
Volleyball Terminology 2024-11-07
Across
- ; violation of the rules
- ; a player who sets the ball with a overhand pass and runs the offense
- ; when a back row player attacks the ball
- ; a left or right front attacker normally taking an approach which starts from outside the court
- ; a motion when a player jumps straight up and hits the ball intended to hit the ground
- ; a pass made by joining arms from elbow to wrist and hitting with the fleshly part of the forearms
- ; the line that runs directly under the net and divides the court into two equal halves
- ; a serve that is slightly tossed and hit with a closed fist
Down
- ; a pass executed with both hands open formed as a diamond, also known as a set
- ; a serve that is not passable and results immediately in a point
- ; the area from the end line to the attack line
- ; the offensive action of hitting the ball
- ; a defensive play by one or more players meant to deflect a spikes ball back into the hitter's court
- ; the line that is 3 meters from the net
- ; clockwise movement of players
- ; the hitter or spiker
- ; passing or setting the ball to a teammate who attacks the ball for a kill
- ; also known as a forearm pass
- ; serving the ball and striking it with the hand above the shoulder
- ; defensive players who are responsible for receiving the attack or serve and never plays at the net
20 Clues: ; the hitter or spiker • ; violation of the rules • ; also known as a forearm pass • ; clockwise movement of players • ; the line that is 3 meters from the net • ; when a back row player attacks the ball • ; the offensive action of hitting the ball • ; the area from the end line to the attack line • ; a serve that is slightly tossed and hit with a closed fist • ...
review 2023-08-03
MOVIES & FAMOUS PEOPLE 2021-12-01
Across
- what is the name of the character
- The strongest clan in "attack on titan"
- Naruto's wife
- The green big creature in avengers team
- A Scientist (E=mc2)
- A movie about giant ship sinking into cold ocean.
- The smartest wizard in the trio
- "Baby..Baby..Baby.. oh" (what is his last name)
Down
- "______!don't steal!!"
- A cute yellow little creature with lightning and electric power to attack.
- Female singer known for her hit song called "Someone Like You"
- What is the name of the character
- A movie about triangle love between human,vampire,and wolfboy.
- Female titan
14 Clues: Female titan • Naruto's wife • A Scientist (E=mc2) • "______!don't steal!!" • The smartest wizard in the trio • what is the name of the character • What is the name of the character • The strongest clan in "attack on titan" • The green big creature in avengers team • "Baby..Baby..Baby.. oh" (what is his last name) • A movie about giant ship sinking into cold ocean. • ...
WWI Vocabulary Crossword 2024-01-29
Across
- A sudden attack.
- Any material used in conflict.
- The act of leaving military service.
- Reduce or lower ranking or position.
- foot Injury of the blood vessels and nerves of the feet from being wet for long periods.
- Projectile filled with an explosive charge.
- All nations associated with a group fighting against another force.
Down
- A large group of soldiers in an army.
- Being at the front of any action.
- Agreement between warring parties.
- Death of the soft tissue of the body. Caused by bad circulation.
- A fixed allowance of food.
- Deep ditch that serves as a shelter from enemy attack.
- Emotional or mental condition.
- shock Stress disorder also known as battle fatigue.
15 Clues: A sudden attack. • A fixed allowance of food. • Any material used in conflict. • Emotional or mental condition. • Being at the front of any action. • Agreement between warring parties. • The act of leaving military service. • Reduce or lower ranking or position. • A large group of soldiers in an army. • Projectile filled with an explosive charge. • ...
WORD CROSS VER 2 QMA 2025-09-29
Across
- When you are experiencing symptoms of heart attack, you should immediately call the _________
- One of the factors that can increase the risk of heart attack
- Alongside maintaining a healthy lifestyle and a healthy diet, patients should also take their prescribed ___________
Down
- A serious disease that could damage the heart function
- If any of the heart vessels are blocked, the _________ and Blood supply will decrease
- The usual procedure is called Coronary Angiography and Percutaneous Coronary Intervention (PCI), In Brunei we call it ________
- One of the symptoms of heart attack
- The paramedics will confirm if you are having a heart attack using ______
8 Clues: One of the symptoms of heart attack • A serious disease that could damage the heart function • One of the factors that can increase the risk of heart attack • The paramedics will confirm if you are having a heart attack using ______ • If any of the heart vessels are blocked, the _________ and Blood supply will decrease • ...
sisäinen puolustus 2023-05-19
Across
- hyökkääjän vastakohta (opposite of attack)
- suuri nälkä (really hungry)
- käyvät kimppuun (they attack)
- puolustus-- (--system)
- sisältyy muistisoluja (includes memory cells)
Down
- syntyvät luuytimessä (bone marrow)
- tuottavat vasta-aineita (produces antibodies)
- mikrobin tuhoaminen (destroys microbes)
- tehostavat toimintaa (efficiency)
9 Clues: puolustus-- (--system) • suuri nälkä (really hungry) • käyvät kimppuun (they attack) • tehostavat toimintaa (efficiency) • syntyvät luuytimessä (bone marrow) • mikrobin tuhoaminen (destroys microbes) • hyökkääjän vastakohta (opposite of attack) • tuottavat vasta-aineita (produces antibodies) • sisältyy muistisoluja (includes memory cells)
ISCC : Chapter 7 Security, Ethics & Privacy Crossword 2025-12-15
Across
- - Moral guidelines governing the use of computers and information systems
- - Rules defining how computer systems may be used
- - An attack where communications are secretly intercepted
- - Security process requiring two forms of authentication
- - Encrypted code used to verify the sender of a message
- - Malicious software disguised as a legitimate program
- - Security method using physical characteristics for identification
- - Using computer resources for illegal or unapproved activities
- - A combination of words used for secure authentication
- - A small text file stored on a user’s computer by a web server
- - A duplicate copy of data for recovery purposes
- - An attack that disrupts access to an online service by overwhelming it
- - Manipulating people to gain unauthorized access to information
- - Converting readable data into an unreadable format for protection
- - A self-replicating program that spreads across networks without user action
- - Any event that can cause loss of data, hardware, software, or processing capability
- - Illegal activities carried out using computers or the internet
- - Fraudulent emails designed to steal personal information
- - Stealing confidential or personal data
- - A hidden method used to bypass normal security controls
- - Using a computer or network without permission
Down
- - A crime where attackers demand payment to stop an attack
- - A plan to restore systems after a major failure
- - Software that detects and removes malicious programs
- - A person who gains unauthorized access to computer systems
- - The right to control how personal data is collected and used
- - Hardware or software that protects a network from intrusion
- - Illegal copying or distribution of software
- - Trusted organization that issues digital certificates
- - Redirecting users to a fake website that appears legitimate
- - A network of infected computers controlled by an attacker
- - Science of designing workspaces for comfort and safety
- - An inexperienced attacker who uses existing hacking tools
- - A malicious program that attaches itself to files and damages systems
- - Stealing physical computer equipment
- - Reducing environmental impact through efficient computer use
- - Digital records of user behavior collected online
- - A denial-of-service attack launched from multiple compromised devices
38 Clues: - Stealing physical computer equipment • - Stealing confidential or personal data • - Illegal copying or distribution of software • - A duplicate copy of data for recovery purposes • - Using a computer or network without permission • - A plan to restore systems after a major failure • - Rules defining how computer systems may be used • ...
i survived grizzly attack 2023-04-18
9 Clues: get afraid • to search thru • nail of a bear • home in the woods • its brown on trees • its green and large • animal that lives in the woods • it smells and you put stuff in it • its common in glacier national park
Jesse Dieball 2015-12-17
Chapter 14, Section 2 2013-04-23
Across
- People put up...,to protect the ships,cities on the East Coast.
- At the end of MArch, a crane loaded sixteen B-25s onto the aircraft carrier .....
- Those bombs could have killed the emperor, who was revered as a ...
- The march of the prisoners.
- Was in command of the mission to bomb Tokyo.
- Admiral Nimitz sent two carriers; the .... got badly damaged.
- Nickname General Erwin Rommel got because of his success.
- American airplanes and warships began to use new..., including radar,sonar, and depth charges, to locate and attack submarines.
- Who reported, "If we need more room,we got our axes and chopped some bamboo trees down."
- The commander of the U.S Navy in the Pacific.
- Admiral Nimitz sent two carriers; the Japanese sank the ....
- The Battle of Midway put the ...on the defensive for the rest of the war.
Down
- The Battle of Stalingrad put the ... on the defensive for the rest of the war.
- Commander who retreated to the Bataan Peninsula.
- Churchill wanted to attack ...
- The loss of so many ships convinced the U.S Navy to set up a...
- "..." argued that the European theater must be the main focus.
- As the Japanese prepared a second wave to attack Midway, aircraft from the Am. carriers Hornet, Yorktown and .... then launched counterattack.
- There was a 12-day battle in 1942 against the coastal city of..
- American cargo ships were easy..., especially at night.
20 Clues: The march of the prisoners. • Churchill wanted to attack ... • Was in command of the mission to bomb Tokyo. • The commander of the U.S Navy in the Pacific. • Commander who retreated to the Bataan Peninsula. • American cargo ships were easy..., especially at night. • Nickname General Erwin Rommel got because of his success. • ...
Inflammation 2025-05-30
Across
- the side effect of sepsis if not treated
- Your bodies response to being attacked
- one way to prevent chronic inflammation, involves improving eating habits
- how you know that your body is fighting a sickness, makes you feel hot or cold
- a chemical involved in the response to attack
- the severe version of inflammation
- what happens when you use a knife improperly
- the inflammation that effects the appendix causing it to burst, and then you need emergency surgery
- what you would get if you didn’t have inflammation, bad infection
- A symptom of inflammation that makes the wound big
- the cells that respond to the attack, and they cause inflammation
Down
- what you would feel if you had chronic inflammation
- what causes infection and sickness
- where you should go if your cut is really infected
- the meat that helps fight inflammation, people who only eat this meat are pescatarian
- the good inflammation that is a normal response.
- inflammation does this to prevent the bacteria from spreading
- autoimmune disease involving the inflammation of the heart’s muscle
- The system that protects your body against sickness.
- the stuff that delivers the fighter cells to the location of the attack
- inflammation does this to the bacteria to prevent you from getting sick
- confuses the body, involves anesthesia, makes the body think it’s being attacked
- what it looks like when you are inflamed at the surface of your skin
23 Clues: what causes infection and sickness • the severe version of inflammation • Your bodies response to being attacked • the side effect of sepsis if not treated • what happens when you use a knife improperly • a chemical involved in the response to attack • the good inflammation that is a normal response. • where you should go if your cut is really infected • ...
Exploring outer space 2015-12-06
8 Clues: finally • bravely • to stare • suspicious • a huge cloud of gas • a tiny piece of something • a platform built outside a ship/space ship • attack assault – attack
BLAZE 2, Culture Corner 2020-05-24
16 Clues: λάδι • ομίχλη • κόκαλο • κοιλάδα • σταγόνα • σκοπεύω • γκρεμός • αξιοθέατο • δημιουργώ • μετατρέπω • ευκάλυπτος • στύλος,κολώνα • επιτίθεμαι σε κπ • σαρανταποδαρούσα • ένα κακό πλάσμα μιας ιστορίας • ένας θρύλος των ιθαγενών της Αυστραλίας
Bianca 2026-04-20
16 Clues: move • scarf • grabs • shawl • spouse • police • attack • villian • tourment • celebrate • agressive • stepmother • protecting • traumatized • beso kissed him • la hija de el juli live the daughter of el juli
Triangles tower defense game turrets 2024-06-27
Across
- Creates planes that shoot bombs rapidly.
- The standard cheap turret
- Better version if the standard
- Has a blast range
- Constant damage that deals a good amount
- Strong damage but slow recharge
- Strongest Cheap turret
Down
- Shoots projectiles that launch and then come back.
- Strongest turret in game so far. Makes puddles
- Slows down turrets but increases damage by 60% (I think you know which one it is)
- Medium damage and medium reload
- Increases attack speed of turrets in range
- Slow attack speed but slows down enemies
13 Clues: Has a blast range • Strongest Cheap turret • The standard cheap turret • Better version if the standard • Medium damage and medium reload • Strong damage but slow recharge • Creates planes that shoot bombs rapidly. • Constant damage that deals a good amount • Slow attack speed but slows down enemies • Increases attack speed of turrets in range • ...
Grade 10 Vocabulary Part I 2014-02-04
17 Clues: loud • ruler • to fool • cure-all • financial • difficulties • scorn; insult • thin covering • sprightly; gay • attack verbally • dress; clothing • criticize severely • excessive; insincere • humiliating, disgraceful • suitability; correctness • something greatly detested • visionary; imaginary; fantastic
Flamecharm Crossword 2023-01-27
17 Clues: Blue • Flint • Dagger • Cacoon • Depths • Revival • Wildfire • Pleeksty • Explosion • One Piece • Dash Attack • Mobility Mantra • Portable Campfire • Flamecharm Trainer • Used to Unlock Flamecharm • Location of Flamecharm Trainer • Training Equipment for Flamecharm
AN ENCOUNTER OF A SPECIAL KIND 2024-07-21
Chapter 7 Vocab -Nikki 2021-10-05
Across
- : Cannon used to hurl large stones at enemy fortifications.
- : A link or ring of a chain
- : An indiscriminate and brutal slaughter of people.
- : Make an attack or assault in return for a similar attack.
- : Without the basic necessities of life.
- : The state of being barred from one's native country, typically for political or punitive reasons.
Down
- : Tract of land set aside by a government for the use of one or more aboriginal person.
- : The land between the Great Lakes, the Mississippi, and the Ohio River.
- : Measurement of distance north or south of the Equator.
- : going about in search of things to steal or people to attack.
10 Clues: : A link or ring of a chain • : Without the basic necessities of life. • : An indiscriminate and brutal slaughter of people. • : Measurement of distance north or south of the Equator. • : Cannon used to hurl large stones at enemy fortifications. • : Make an attack or assault in return for a similar attack. • ...
Forensics 2021-04-29
13 Clues: rööv • kohus • ründama • asitõend • politsei • karistus • varastama • kuriteopaik • arreteerima • kurjategija • mõrvama,mõrv • kahtlusalune • a crime kuritegu sooritama
Challenge B Lesson 4 2023-09-21
The Maze Runner Ch. 1-3 Vocabulary 2026-04-15
18 Clues: alarm • bulgin • liftoff • mocking • insight • to stop • rundown • to absorb • not fresh • to flinch • pack tightly • loud or shrill • immensely large • completely empty • staggering motion • to completely destroy • to attack consistently • attachments or additions
National Security crossword puzzle 2026-05-17
Across
- Nuclear chemical or biological weapons capable of causing widespread devastation
- Practices and operations used by governments to prevent and dismantle terrorist networks
- Changes in population characteristics like aging or migration that affect national power
- The ability of a state to deploy military or economic assets far beyond its borders
- Explosive devices using nuclear reactions that serve as the ultimate tool of deterrence
- Strategy blending conventional military force with cyberattacks economic warfare and disinformation
- A formal pledge or guarantee by a state to defend an ally during an attack
- Complex long term issues like cyber threats that require strategic planning and adaptation
- The official military organizations of a state authorized to use force for national defense
- A weakness or gap in a security system that can be exploited by an enemy
- Official document outlining a countries core security concerns and plans to protect the state
- A state or group that initiates an unprovoked attack or invasion against another
- Continuous diplomatic and defensive efforts to maintain stability and prevent war
- Financial growth and stability that provides the material foundation for national defense
- Policy decisions and issues concerning only the internal functioning of a nation
- The fundamental legal and political system established by a nations constitution
Down
- The legal right of a state to use force to protect itself from an armed attack
- The deliberate creation and spreading of false information to deceive and destabilize
- Large scale disasters or accidents that threaten public safety and need immediate civil response
- The protection of citizens from daily hazards crime and civic unrest
- International law principle prohibiting nations from violating or changing another states borders
- The overarching requirement to maintain the survival and sovereignty of the state
- Criminal networks operating across borders involved in illegal trafficking and smuggling
- Core priorities like survival and sovereignty that a state will use force to protect
- Institutions and agencies like the police responsible for keeping public order and enforcing laws
- Groups or organizations not affiliated with any government that hold political or military influence
- The physical distance between a states borders and its core political or population centers
- Strategy aimed at discouraging an enemy attack by threatening a painful retaliation
- A military strike launched to neutralize an imminent enemy attack before it happens
- National effort focused primarily on domestic defense internal coordination and fighting terrorism
30 Clues: The protection of citizens from daily hazards crime and civic unrest • A weakness or gap in a security system that can be exploited by an enemy • A formal pledge or guarantee by a state to defend an ally during an attack • The legal right of a state to use force to protect itself from an armed attack • ...
DOG rescues BOY 2017-03-17
18 Clues: try • sad • save • funny • worry • attack • put down • operation • didn't die • like better • very clever • kill myself • drives plane • kill someone • in the middle • want to be boss • die under water • kill someone famous
Ava 2024-06-06
18 Clues: leaf • loco • book • free • questions • paintbrush • water suit • spraypaint • breath fire • scaly amour • n roll music • cold blooded • terimah kasi • cross country • pencil to paper • balance 4 wheels • heavy metal band • Centre, goal attack
Volleyball Terminology 2021-02-24
Across
- or toss, It is an over the head pass to a hitter so they are able to spike the ball over the net.
- It is smaller than the basketball.
- This refers when a player left the court during the game.
- Volleyball is originally called.
- down, It consist of light jogging and skipping and 3 - 5 minutes to stretch.
- It is done with the objectives to move the ball to teammate called setter. It is the first touch by the team.
- It is the time between set.
- It is a turning of a player to serve.
- fault, It indicates that the point is not awarded in any teams to be fair.
- is when one team makes a move trying to get the ball over the net and the other team reaches up and blocks the ball from coming onto the other side.
- It is made of fiberglass or to a similar materials.
- zone, This zone is between the net and the line attack and is in which are the 3 attack players block the opponents ball.
Down
- It is an un-played match that is recorded loss rather than a forfeit.
- It is a result of a rally.
- or kill, It is an act of scoring a point by slamming the ball over the net into opposing court effectively and aggressively.
- serve, It holds the ball below the waist and above the knees so that the serve is in good position.
- judge, It is an official who assist ball in, ball out, and ball touch.
- It is when two defending players go for the ball at the same time that is just above the net to attempt to push it back onto opponents side.
- It is used to put the ball into play to start a rally.
- can be spike, tip, set, or hit as an over-the-head contact.
- G. Morgan, He invented the game volleyball.
- It is a player that wears a different color from the rest of the team.
- It is used to support the net.
- Volleyball, It is a version where the origins in beaches of California.
24 Clues: It is a result of a rally. • It is the time between set. • It is used to support the net. • Volleyball is originally called. • It is smaller than the basketball. • It is a turning of a player to serve. • G. Morgan, He invented the game volleyball. • It is made of fiberglass or to a similar materials. • It is used to put the ball into play to start a rally. • ...
czasowniki 2013-05-28
Latin revision 2 2025-08-15
BLAZE 2, Culture Corner 5 2020-05-24
16 Clues: λάδι • ομίχλη • κόκαλο • κοιλάδα • σταγόνα • σκοπεύω • γκρεμός • αξιοθέατο • δημιουργώ • μετατρέπω • ευκάλυπτος • στύλος,κολώνα • επιτίθεμαι σε κπ • σαρανταποδαρούσα • ένα κακό πλάσμα μιας ιστορίας • ένας θρύλος των ιθαγενών της Αυστραλίας
Chapter 9 Definitions 2021-09-27
Across
- a pattern of intentionally causing bodily harm or injury to another person.
- occurs when one person in a dating relationship forces the other person to take part in sexual intercorse.
- the threatened or actual use of physical force or power to harm another person or to damage property.
- the use of words to mistreat or injure another person.
- Conflicts- conflicts between people or groups of people.
- any disagreement, struggle, or fight
- a pattern of sexual contact that is forced upon a person against the person’s will.
- the process of ending a conflict through cooperation and problem solving.
- a problem solving method in which each participant gives up something to reach a solution that satisfies all.
Down
- a pattern of attacking another person’s emotional development and sense of worth.
- violence committed for no particular reason.
- the use of communication to settle disagreements.
- the willful killing of one human being by another.
- any intentional sexual attack against another person.
- an unlawful physical attack or threat of attack.
- any form of unwanted sexual contact directed at an individual.
- bringing a neutral third party to help others resolve their conflicts peacefully.
- to become more serious
- a process in which specially trained students help other students resolve conflicts peacefully.
- respecting the privacy of both parties and keeping details secret.
- any form of sexual intercourse that takes place against a person’s will.
- repeatedly following, harassing, or threatening an individual.
22 Clues: to become more serious • any disagreement, struggle, or fight • violence committed for no particular reason. • an unlawful physical attack or threat of attack. • the use of communication to settle disagreements. • the willful killing of one human being by another. • any intentional sexual attack against another person. • ...
First Aid Crossword 2022-10-26
Across
- attack A heart attack is a medical emergency. A heart attack usually occurs when a blood clot blocks blood flow to the heart
- artery The femoral artery is the main blood vessel supplying blood to your lower body
- Cardiopulmonary resuscitation is an emergency procedure consisting of chest compressions
- used to add to the swelling
- is cut made into the body during surgery
- A object that gets thrown at you
- A type of bandage
- Aid is emergency care given immediately to an injured person
- artery major blood vessel supplying blood to your upper arm, elbow, forearm and hand
- devise for arresting bleeding by forcibly compressing a blood vessel as a bandage tightened
- a small hole in a tire resulting in an escape of air
Down
- cut that does not go all the way through the skin.
- A object that causes precision wounds
- devise for arresting bleeding by forcibly compressing a blood vessel as a bandage tightened
- bandage Bandage that applies pressure to the wound
- type of open wound that's caused by the skin rubbing against a rough surface.
- is the removal of a limb
- an injury to living tissue caused by a cut, blow, or other impact, typically one in which the skin is cut or broken
- A stroke is a medical emergency.
- a dull object you get hit with
- of stroke include trouble walking, speaking, and understanding, as well as paralysis or numbness of the face, arm, or leg
- used to calm down the swelling
22 Clues: A type of bandage • is the removal of a limb • used to add to the swelling • a dull object you get hit with • used to calm down the swelling • A stroke is a medical emergency. • A object that gets thrown at you • A object that causes precision wounds • is cut made into the body during surgery • cut that does not go all the way through the skin. • ...
Karate Terminology Crossword 2023-06-27
Across
- Temple bell sound
- To view the sky - greater
- Back fist strike
- Break through a fortress - greater
- Sparring
- Stop
- Place of learning
- 3 Battles (Body, Mind, Spirit)
- Focused mind-where one is aware in all situations
- Lower body-waist and below
- Condition one’s body, by striking objects such as posts etc.
- Flying swallow
- Upper body-mid chest and up
- Seated meditation
- Hammer fist strike
- Able to stop attack before it is launched
- Inside
- Ready
- Palm heel strike
- Spear hand
- Ridge hand strike
Down
- Beginner’s mind-state of openness, eagerness, and lack of preconceptions when studying, even at an advanced level
- Hidden meaning
- Name of a Chinese military expert
- No mind–state where one ignores all interference to concentrate
- Way of empty hand
- Belt
- Formal exercise consisting of choreographed sequence of punches/kicks/blocks.
- Start
- Knife hand strike
- To clear the mind
- Study of weapons
- Stop attack using opponent’s weakness
- Moving practice
- Able to sense danger
- Teacher/one who has gone before
- Way of the warrior
- Elbow strike
- Able to stop attack with block and counter
- Preparatory position
- To view the sky – lesser
- Rooted mind-where one can’t be deterred from carrying out action intended actions
- To walk far to conquer
- Yell or shout of spirit
- Senior instructor
- Mid body-waist to mid chest
46 Clues: Belt • Stop • Start • Ready • Inside • Sparring • Spear hand • Elbow strike • Hidden meaning • Flying swallow • Moving practice • Back fist strike • Study of weapons • Palm heel strike • Temple bell sound • Way of empty hand • Knife hand strike • To clear the mind • Place of learning • Seated meditation • Senior instructor • Ridge hand strike • Way of the warrior • Hammer fist strike • Able to sense danger • ...
Chpater 9 - Conflict Resolution 2024-02-15
Across
- A pattern of intentionally causing bodily harm or injury to another person.
- Repeatedly following, harassing, or threatening an individual.
- Any form of sexual intercourse that takes place against a person's will.
- Sexual contact between family members who cannot marry by law.
- Violence committed for no particular reason.
- Become more serious
- The use of words to mistreat or injure another person.
- Processes in which specially trained students help other students resolve conflicts peacefully.
- A pattern of attacking another person's emotional development and sense of worth.
- A pattern of sexual contact that is forced upon a person against his or her will.
- Any disagreement, struggle, or fight
- Any form of unwelcome sexual contact directed at an individual.
Down
- Conflicts that take place within an individual
- An unlawful physical attack or threat of attack.
- Conflicts between people or groups of people
- The willful killing of one human being by another.
- One person in a dating relationship forces the other person to take part in sexual intercourse.
- Respecting the privacy of both parties and keeping details secret.
- The use of communication and, in many cases, compromise to settle a disagreement.
- Bringing in a neutral third party to help others resolve their conflicts peacefully.
- When a person uses violence in a dating relationship to control his or her partner.
- Any intentional sexual attack against another person.
- The threatened or actual use of physical force or power to harm another person and to damage property.
23 Clues: Become more serious • Any disagreement, struggle, or fight • Conflicts between people or groups of people • Violence committed for no particular reason. • Conflicts that take place within an individual • An unlawful physical attack or threat of attack. • The willful killing of one human being by another. • Any intentional sexual attack against another person. • ...
CASP Exercise 1.1 2024-05-21
Across
- Rogue access points can intercept data flowing through the network, including
- is a process that identifies a cellular phone or any other radio transmitter by the?
- uses rules and heuristics to identify suspicious patterns of network behavior.
- firewalls will need to actively support extension of security support and collaboration for selective user communities within an enterprise.
- has two security modes
- uses open protocols to control the virtual and physical devices responsible for routing the data packets.
- locks down DNS like a digital fortress, protecting you from fake websites and ensuring reliable domain lookups
- Rogue devices can spoof?
- allows good traffic and blocks all other.
- Evenly distributing tasks helps maintain high throughput, allowing systems to handle more requests simultaneously.
Down
- Wireless attack tool
- vulnerability where an attacker inserts malicious SQL code into an application’s input fields
- This security tool runs on Windows Server and can process packet capture files generated by Snort.
- analyzes network packets for attack signatures—unique characteristics or behaviors that are associated with a specific threat.
- monitors network traffic, analyzing packets to identify suspicious patterns or known attack signatures.
- It messes with Wi-Fi signals.
- allows all traffic and only blocks known bad traffic.
- It spies on nearby networks.
- Not only does it detect suspicious activity, but it also actively prevents attacks.
- ensures only authorized users and trusted devices can enter a network.
- Benefits are Privacy, Security, Access
21 Clues: Wireless attack tool • has two security modes • Rogue devices can spoof? • It spies on nearby networks. • It messes with Wi-Fi signals. • Benefits are Privacy, Security, Access • allows good traffic and blocks all other. • allows all traffic and only blocks known bad traffic. • ensures only authorized users and trusted devices can enter a network. • ...
crimes 2024-11-27
Across
- illegally entering a building to commit a crime, usually theft.
- the deliberate destruction or damage of property.
- stealing money or valuables from someone’s pocket without them noticing.
- the unintentional killing of a person due to reckless or negligent behavior.
- the unlawful taking and holding of someone against their will, often for ransom.
- demanding money or favors from someone by threatening to reveal damaging information.
- a physical attack or threat of attack on someone.
- the act of forcing someone to engage in sexual activity against their will.
- the use of violence or intimidation for political aims.
Down
- illegally taking control of a vehicle, often an aircraft, by force.
- stealing goods from a store while pretending to be a customer.
- offering money or favors to influence someone in a position of power.
- disruptive or violent behavior, often by young people in groups.
- stealing from a person or place, often using force or intimidation.
- robbery, the act of stealing money from a bank by force or threat.
- a secret plan by a group to commit an illegal or harmful act.
- an attack on someone in public to steal their belongings.
- the criminal act of deliberately setting fire to property.
- the act of deceiving someone to gain money or personal advantage.
- illegally transporting goods or people across borders.
- the intentional killing of a person with malice aforethought.
- the act of stealing property or belongings.
22 Clues: the act of stealing property or belongings. • the deliberate destruction or damage of property. • a physical attack or threat of attack on someone. • illegally transporting goods or people across borders. • the use of violence or intimidation for political aims. • an attack on someone in public to steal their belongings. • ...
War of 1812 2025-01-14
Across
- When the British forced American sailors into the Royal Navy
- The banning of trade relations
- was the 7th president and led his troops in the Battle of New Orleans
- Wrote "The Star-Spangled Banner" during the British attack on Fort McHenry.
- A British victory against the U.S. where Isaac Brock was killed.
- Was a US ship that was shot at by the HMS Leopard
- The U.S. president who led the nation into the War of 1812.
- Pro-war U.S. congressmen who pushed for conflict with Britain.
- A U.S. general who became the 9th President but was also the shortest-lived president
Down
- A battle where Harrison defeated Tecumseh’s confederacy in 1811.
- The treaty that ended the War of 1812 and restored pre-war borders.
- The Canadian city which was burned down by the U.S and is now called Toronto
- An Indigenous leader who allied with the British
- A Canadian heroine who warned British forces of an impending American attack.
- The idea that the Americans were destined to expand into more land
- U.S. general who surrendered Detroit to the British without a fight.
- One of the most fierce battles of the war of 1812
- A U.S. naval commander who secured victory at the Battle of Lake Erie.
- His wars with Britain opened up ideal timing for the U.S to attack the British
- A British general celebrated for his defense of Canada during the War of 1812.
20 Clues: The banning of trade relations • An Indigenous leader who allied with the British • One of the most fierce battles of the war of 1812 • Was a US ship that was shot at by the HMS Leopard • The U.S. president who led the nation into the War of 1812. • When the British forced American sailors into the Royal Navy • ...
Unit 5 Test Crossword Puzzle 2026-02-02
Across
- Known as the hydrogen bomb, it had a force of 1 million tons of TNT.
- From the increase in nuclear stockpiles and any nuclear attack would result in total destruction, the United States and the Soviet Union was not willing to consider a direct attack against its opponent.
- He was President Dwight Eisenhower’s Secretary of State throughout the 1950s.
- He was an American pilot whose spy plane was shot down in the Soviet Union, starting the U-2 Spy Plane Incident.
- It was a social and artistic faction that advocated unrestrained self-expression and nonconformity with mainstream culture.
- He was an African American lawyer who with the help of other NAACP lawyers won 29 out of the 32 cases argued before the Supreme Court.
- This organization was formed in 1960; it coordinated sit-ins and other protests to provide young African Americans a larger role in the civil rights movement.
- A company that offers similar products or services in many locations.
Down
- President Eisenhower warned that this entity was gaining too much influence in American political affairs.
- A seamstress and an NAACP officer that helped start the Montgomery Bus Boycott.
- Martin Luther King Jr. and other leaders formed this organization in 1957; this group advocated to work for civil rights through peaceful protests.
- A Cold War military strategy that intended to discourage a nuclear attack by committing to launch a devastating counterstrike.
- He helped coordinate the efforts of the Montgomery Improvement Association, which dealt with the Montgomery Bus Boycott.
- An international contest between countries seeking a military advantage over each other.
- This military alliance linked the Soviet Union with seven Eastern European countries.
- President Dwight Eisenhower concluded that the United States would defend the Middle East from any attack by a communist country.
- The unprecedented population surge in the United States after World War II.
- He developed a polio vaccine during the early 1950s.
- Means of communication that reach large audiences.
- He was the leader of the Soviet Union after Joseph Stalin.
20 Clues: Means of communication that reach large audiences. • He developed a polio vaccine during the early 1950s. • He was the leader of the Soviet Union after Joseph Stalin. • Known as the hydrogen bomb, it had a force of 1 million tons of TNT. • A company that offers similar products or services in many locations. • ...
Iraq war 2022-02-04
15 Clues: oil • free • land • shoot • trump • saddam • terror • hussain • use weapon • big weapon • war country • be together • all country • kings and queens • the people who leads
Latin choice board 2023-11-07
15 Clues: farm • drunk • alas! • boldly • because • one says • certainly • therefore • small shop • from the inn • aim at,attack • departs,leaves • painting,picture • frighten greatly • come back,return
Vocabulary 9 (16-20) 2024-08-13
15 Clues: tolo • valor • atacar • objetivo • respirar • assediar • carreira • aceitação • intimidar • orgulhoso • auto-estima • relacionamento • confiar; confiança • feito (past participle of DO) • encontrado (past participle of meet)
Peacewise 2025-10-15
15 Clues: fight • sorry • I want • myself • remorse • harmony • I did it • argument • apologise • possession • in the way • compassion • break free • no longer angry • creator of the universe
Unit 2, Station 3 2025-03-17
17 Clues: Waffe • Tasse • passen • Schwert • Werkzeug • Kämpfer/in • Jagd, Jagd- • verteidigen • Landwirt/in • Kelte/Keltin • (sich) selbst • Angriff, Überfall • Stamm, Gesellschaft • original, ursprünglich • Angeln, Fischen, Fischerei • selber; wir (selbst); selbst • verantwortlich, verantwortungsvoll
ROOKIES PART 2 2023-01-22
17 Clues: move • claim • faint • candid • attack • admire • bizarre • destroy • abolish • watchful • evaluate • research • friendly • conference • sufficient • having a strong wish to do harm • not loud, bright, noticeable, or obvious in any way
England 2024-03-13
Punic Wars 2021-10-26
Across
- The Roman leader who defeated Carthage after a very bad losing streak
- The leader of Carthage who finally defeated the Romans with the sneak attack
- Romes first _________ was Asia
- The island that started the first Punic war
- Cartage used these animals in war
- The battle that Scipio lead that Rome finally defeated Carthage
Down
- The Punic wars were fought between Rome and _______
- A small movable bridge that the Romans invented so they could get onto Carthaginian ships and actually fight them
- The mountain that Carthage crossed for a sneak attack on the Romans
- The battle that Carthage won due to their sneak attack; battle took place in Southern Italy
10 Clues: Romes first _________ was Asia • Cartage used these animals in war • The island that started the first Punic war • The Punic wars were fought between Rome and _______ • The battle that Scipio lead that Rome finally defeated Carthage • The mountain that Carthage crossed for a sneak attack on the Romans • ...
WWII Timeline 2023-04-05
Across
- the date of the attack for #2 down: __ 7, 1941
- the year Hitler become leader of Germany: ninteen__
- the date of the Invasion of Normandy: June 6, ninteen__
- the Japanese city the United State dropped the atomic bomb on first
- the name of the German air attack on Great Britain: __ of Britain
Down
- another name for the battle where the Allies attacked Germany on the coast of France
- the cause of the United States entering World War II: Attack on __
- the year that World War II began: ninteen__
- became president when Roosevelt died in 1945
- the event that triggered the start of World War II: Germany attacked __
10 Clues: the year that World War II began: ninteen__ • became president when Roosevelt died in 1945 • the date of the attack for #2 down: __ 7, 1941 • the year Hitler become leader of Germany: ninteen__ • the date of the Invasion of Normandy: June 6, ninteen__ • the name of the German air attack on Great Britain: __ of Britain • ...
Case Study Puzzle (Lenovo Superfish) 2025-07-22
Across
- Which company was involved in the 2015 Superfish hash collision incident?
- What type of attack (short form) was enabled through the hash collision certificate forgery?
- The Superfish case exposed serious _______ weaknesses.
- What general cyber threat occurred due to weak hash use in Superfish?
- Name the adware that exploited certificate vulnerabilities on Lenovo devices.
Down
- Rogue _______ authorities were created using forged certificates.
- What process was used to create fake certificates that seemed genuine?
- In MITM, the attacker positions in the _______ between sender and receiver.
- Which hash function weakness was exploited in the Superfish attack?
- Which type of security certificate was exploited in this incident?
10 Clues: The Superfish case exposed serious _______ weaknesses. • Rogue _______ authorities were created using forged certificates. • Which type of security certificate was exploited in this incident? • Which hash function weakness was exploited in the Superfish attack? • What general cyber threat occurred due to weak hash use in Superfish? • ...
3d- Wild world 2021-12-06
jalebis 2024-01-08
16 Clues: attack • uproar • respect • coaxing • sitting • ablution • sent for • treasury • loud noise • narrow lane • eaten quickly • good and nobel • large open pot • sweetmeat seller • talking confusedly • two wheeled vehicle
Ava 2024-06-07
18 Clues: leaf • loco • book • free • questions • paintbrush • water suit • spraypaint • breath fire • scaly amour • n roll music • cold blooded • terimah kasi • cross country • pencil to paper • balance 4 wheels • heavy metal band • Centre, goal attack
The Maze Runner Ch. 1-3 Vocabulary 2026-04-15
18 Clues: alarm • bulgin • liftoff • mocking • insight • to stop • rundown • to absorb • not fresh • to flinch • pack tightly • loud or shrill • immensely large • completely empty • staggering motion • to completely destroy • to attack consistently • attachments or additions
Kaylee Chapter 7 2021-10-05
Across
- : cannon used to hurl large stones at enemy fortifications.
- : a link or ring of a chain
- : an indiscriminate and brutal slaughter of people.
- : make an attack or assault in return for a similar attack.
- : without the basic necessities of life.
- : the state of being barred from one's native country, typically for political or punitive reasons.
Down
- : tract of land set aside by a government for the use of one or more aboriginal peoples.
- : the territory was acquired by the United States after its victory in the American Revolution
- : measurement of distance north or south of the Equator.
- : going about in search of things to steal or people to attack.
10 Clues: : a link or ring of a chain • : without the basic necessities of life. • : an indiscriminate and brutal slaughter of people. • : measurement of distance north or south of the Equator. • : cannon used to hurl large stones at enemy fortifications. • : make an attack or assault in return for a similar attack. • ...
Chapter 7 Oklahoma history 2021-10-05
Across
- an indiscriminate and brutal slaughter of people
- without the basic necessities of
- a cannon of the earliest type, which originally fired a stone ball
- Northwest- the region around the Great Lakes and between the Ohio and Mississippi rivers
- an area of land managed by a Native American tribe under the U.S. Bureau of Indian Affairs.
- going about in search of things to steal or people to attack
Down
- restrain; limit
- the state of being barred from one's native country, typically for political or punitive reasons
- make an attack or assault in return for a similar attack
- scope for freedom of action or thought
10 Clues: restrain; limit • without the basic necessities of • scope for freedom of action or thought • an indiscriminate and brutal slaughter of people • make an attack or assault in return for a similar attack • going about in search of things to steal or people to attack • a cannon of the earliest type, which originally fired a stone ball • ...
Israel's Defining Wars - Ian Liss 2025-01-06
Across
- In the Six Day War, The US told Israel not to attack first, and the ____ told the Arab nations not to attack first.
- Terrorist attack during the 1972 Munich Olympics carried out by the group Black September
- The ____(acronym) Hijacked four planes and blew them up in Jordan
- In 1956, Gamal Al Nasser Nationalized this key trade passage.
- Capturing this city led to Messianic excitement across Israel
Down
- No peace, no negotiations, no recognitions
- Nationalist, Militant leader of the Fedayins and the PLO
- The armed conflict between Jordan and the PLO
- The ________ Accords violated the Khartoum resolution.
- Prime Minister of Israel during the Yom Kippur War
10 Clues: No peace, no negotiations, no recognitions • The armed conflict between Jordan and the PLO • Prime Minister of Israel during the Yom Kippur War • The ________ Accords violated the Khartoum resolution. • Nationalist, Militant leader of the Fedayins and the PLO • In 1956, Gamal Al Nasser Nationalized this key trade passage. • ...
Volleyball Crossword 2025-03-13
Across
- The action of putting the ball in play.
- When the serving team loses the serve.
- A defensive pass used to prevent the ball from hitting the ground after an opponent’s spike.
Down
- (Attack): A forceful hit intended to score points.
- A serve that lands inbounds and is not touched by the opposing team.
- A defensive specialist who wears a different jersey and can substitute freely in the back row.
- (Bump) A forearm pass used to receive serves or digs.
- A defensive move to stop an opponent’s attack at the net.
- An overhead pass to prepare for an attack.
- The shifting of player positions following a side-out.
10 Clues: When the serving team loses the serve. • The action of putting the ball in play. • An overhead pass to prepare for an attack. • (Attack): A forceful hit intended to score points. • (Bump) A forearm pass used to receive serves or digs. • The shifting of player positions following a side-out. • A defensive move to stop an opponent’s attack at the net. • ...
Ava 2024-06-06
18 Clues: leaf • loco • book • free • questions • paintbrush • water suit • spraypaint • breath fire • scaly amour • n roll music • cold blooded • terimah kasi • cross country • pencil to paper • balance 4 wheels • heavy metal band • Centre, goal attack
LeighAnna Slaven-Crossword 2015-12-02
19 Clues: lice • fuel • brief • weird • color • crimson • annoyed • peaceful • irregular • compromise • argumentative • violent attack • understandable • amount of medicine • coarse cabbage leaves • concessions- agreement • petty details in an argument • bread- cornbread and fried pork skins • soap- cleaning supply that is very strong
Vocabulaire Des Discussions Pt. 2 2014-12-02
19 Clues: A Gap • Common • Hygiene • To Allow • To Direct • To Attack • To Demand • A Billion • A Sickness • Thus,So,As • To Respect • A Neighbor • To Deposit • The Armistice • A Major Event • Many(Feminine) • The Cleanliness • To Fight Against • The Space Tourism
Anime Characters 2024-03-25
19 Clues: Bleach • Naruto • Berserk • Hellsing • One Piece • Full Metal • Death Note • Tokyo Ghoul • Dragon Ball • Vinland Saga • Chainsaw Man • Demon Slayer • One Punch Man • HunterxHunter • Jujutsu Kaisen • Mob Psycho 100 • Attack On Titan • My Hero Academia • My Dress-Up Darling
pearl harbor attack 2022-02-09
LATIN VERBS "A" FAMILY (1st conjugation) 2016-09-19
19 Clues: I am • I live • I work • I walk • I kill • I tell • I give • I shout • I watch • I fight • I delay • I stand • I enter • I attack • I wander • I entrust • I prepare • I look at • I point out
30a 2024-06-22
Across
- Guarding movement
- Rapid increase
- No progress
- Overwhelm enemy
- Position forces
- Encircle area
- Surprise attack
- Regular scout
- Irregular warfare
Down
- Take control
- Protective cover
- Self-destruct ship
- Arrange troops
- Dugout defense
- Distract move
- Wear down enemy
- Chase enemy
- Scavenge supplies
- Surround enemy
- Conceal position
20 Clues: No progress • Chase enemy • Take control • Distract move • Encircle area • Regular scout • Arrange troops • Dugout defense • Rapid increase • Surround enemy • Wear down enemy • Overwhelm enemy • Position forces • Surprise attack • Protective cover • Conceal position • Guarding movement • Scavenge supplies • Irregular warfare • Self-destruct ship
Crossword with Vepit - Wibu edition 2022-06-15
15 Clues: desa • kamu • mafia • basket • gunung • detektif • inuyasha • one piece • dragon ball • pokemon 001 • light yagami • selamat siang • hokage terkuat • attack on titan • kimetsu no yaiba
Lesson 7. crossword puzzle 2025-09-25
Vocab for ¨bomb¨ 2021-01-29
17 Clues: tame • legate • attack • accuse • rule/law • approved • accociate • agreement • inprovment • settlement • intelligence • put together • atomic reaction • Undercover work • germany, japan, italy • GB,USA,China,SU,France • Adolf Hitler,Benito Mussolini,Hideki Tōjō
Cybersecurity 2022-08-15
Across
- Full name of a DoS attack (three words).
- A program or script that performs an automated task; there are good ones like web crawlers or virtual customer service agents, but there are also several malicious ones.
- The ... Code Act 1995 (Cth) is the federal law used to prosecute cybercrime in Australia.
- A collection of malware infested computers that form a network to attack (e.g. a DDoS attack).
- (See xx) A set of cybersecurity threats that rely on a victim falling for a trap set for them (two words).
- An important process that verifies a user is really who they are; many different ways this can be done.
- An email that contains a message with a suspicious link designed to steal personal information.
- An annoying malware that spams you with ads.
- A name ... attack is a type of silly survey or quiz that actually harvests personal information from unaware users.
- Ethical hacking in order to find any cybersecurity weaknesses is known as ... testing.
- A technique used typically to guess a password by trying every single combination in order without much extra thought or effort; usually only breaks weak passwords (two words).
- I am not a robot.
- Settings on folders or files that control who is allowed to access them.
- A hacking attack where multiple systems flood a target computer system with multiple requests, making it impossible for the target to handle all requests and function correctly (first word only).
- In Australia, the ... principles are 13 rules that must be adhered to if an organisation collects personal information from its customers.
- A type of malware that records every single press of the keyboard that you make.
Down
- When raw data is put into context and has meaning, the data transforms into ...
- Hacking to try and champion a cause, e.g. climate change, rather than to steal information.
- Term used for one of several computers that are infected by a 'master' computer, lying in wait for attack instructions.
- See clue xx.
- An example would be an email from a Nigerian prince asking you to send your name, address, contact number and bank details to him reportedly so you can receive many millions of dollars.
- Stealing information from someone simply by looking from behind them.
- A ... is created about a user based on data - for example, personal data, shopping habits, etc. - in order to better target that user.
- Malicious code intended to monitor your activity without your permission.
- Any identification method that uses parts of our body, e.g. iris, face, fingerprint etc.
- Gaining unauthorised access to or control of a computer system.
- Malicious code that does not need to be attached to a file and runs independently, replicating itself across systems and consuming system and network resources.
- ... authentication requires an additional method of checking that it is really you trying to interface with another system (two words).
- A malicious code typically disguised as a legitimate program.
- A bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known.
- Protection for a network by monitoring and controlling traffic that passes through it.
- The general term for programs that gains access to your system for unethical reasons, e.g. to steal data, cause system damage, send you spam, etc.
32 Clues: See clue xx. • I am not a robot. • Full name of a DoS attack (three words). • An annoying malware that spams you with ads. • A malicious code typically disguised as a legitimate program. • Gaining unauthorised access to or control of a computer system. • Stealing information from someone simply by looking from behind them. • ...
The Story of Chocolate 2020-06-30
16 Clues: Fabrik • bitter • der Ast • der Rahm • schmecken • die Nüsse • der Hönig • das Klima • zerstören • der Soldat • das Gewürz • das Schiff • der Angriff • die Mischung • der Baumstamm • die Schokolade
Years 8 Health 2024-08-22
15 Clues: area • hoop • choice • border • matches • hitting • purpose • defending • strategic • intricacy • area-based • objective, aim • object of attack • physical activity • things that build to defence, barrier
Vocab Crossword 2026-01-12
15 Clues: humble • problem • harmful • friendly • immature • fearless • boring/old • persistent • warm-hearted • peacebuilding • verbal attack • blunt/truthful • reinforce, or brace • chaotictoic situation • giving someone an earful
Cyber Crossword 2023 2023-10-06
Across
- A technique where an attacker moves from one compromised system to the next.
- A cyber attack that makes a system unavailable to its intended users.
- The group responsible for defending the organization's information systems during a cybersecurity test.
- A cyber attack where the victim's data is held hostage and the attacker demands a payment.
Down
- Type of authentication that requires users to enter more than just a password.
- An exhaustive method for cracking passwords.
- In this attack, the attacker intercepts communication to eavesdrop or impersonate.
- Triad of cybersecurity tenets.
- Ancient cipher used by the Greeks.
- A group of penetration testers used to simulate the actions of those who are malicious.
10 Clues: Triad of cybersecurity tenets. • Ancient cipher used by the Greeks. • An exhaustive method for cracking passwords. • A cyber attack that makes a system unavailable to its intended users. • A technique where an attacker moves from one compromised system to the next. • Type of authentication that requires users to enter more than just a password. • ...
