attack Crossword Puzzles
List 2 Vocabulary 2024-09-27
25 Clues: or • but • and • then • she is • we are • to call • we sing • they ask • you call • you serve • it dances • she walks • she loves • y'all are • they carry • y'all work • we protect • I do attack • I am living • we wish for • y'all attack • y'all wish for • we are walking • she does wish for
Astma 2013-02-05
Across
- A way to reduce chance of a heart attack (10)
- A microscopic bug that can cause a heart attack (8)
- to much of it will increase chances of a heart attack (4)
- Can cause a heart attack (6)
- comes off animals and can trigger asthmatic attacks (6)
Down
- can fill up your lungs with tar (10)
- found on heart muscels (12)
- what type of disease asthma is (8)
- A person with asthma (10)
- a leading cause in heart attacks (7)
- clogs up the airways (5)
- where air comes from during and swells up during a asthma attack(7)
12 Clues: clogs up the airways (5) • A person with asthma (10) • found on heart muscels (12) • Can cause a heart attack (6) • what type of disease asthma is (8) • can fill up your lungs with tar (10) • a leading cause in heart attacks (7) • A way to reduce chance of a heart attack (10) • A microscopic bug that can cause a heart attack (8) • ...
Poke X Word : Puzzle # 17 (Hard) 2022-06-23
Across
- Attack: Dive and Rescue
- Pokédex Entry: This Pokémon dispatches its prey with fire. But it regrets this habit once it realizes that it has burned its intended prey to a charred crisp.
- Attack: Giant Fangs
- Attack: Cry of Destruction
- Supporter: During this turn, your Single Strike Pokémon’s attacks do 20 more damage to your opponent’s Active Pokémon for each Prize card your opponent has taken (before applying Weakness and Resistance).
- Attack: G-Max Pulverization
- Attack: Wide Wing
Down
- Attack: Pandemonium
- Pokédex Entry: The bug is mostly dead, with the mushroom on its back having become the main body. If the mushroom comes off, the bug stops moving.
- Ability: Hustle Bark
- Pokédex Entry: Pursued by Mareanie for the branches on its head, this Pokémon will sometimes snap its own branches off as a diversion while it escapes.
- Item: Search your deck for a card and put it into your hand. Then, shuffle your deck. Your turn ends.
- Pokédex Entry: Strong, but not too bright, this Pokémon can shatter even a skyscraper with its charging tackles.
- Ability: Sudden Cyclone
14 Clues: Attack: Wide Wing • Attack: Pandemonium • Attack: Giant Fangs • Ability: Hustle Bark • Attack: Dive and Rescue • Ability: Sudden Cyclone • Attack: Cry of Destruction • Attack: G-Max Pulverization • Item: Search your deck for a card and put it into your hand. Then, shuffle your deck. Your turn ends. • ...
Pokemon TCG crossword 2024-03-05
Across
- Lost ______, (LOR 217)
- Cramorant VMAX (SHF 55) attack [3,3]
- If Venusaur was not Grass type in the TCG, it would be this type [8]
- Water Pokemon with the attack "Sonic Dive" [8,2]
- First attack of Delibird (GE 36) that costs no energy [7]
- "You must discard a Water Energy card from your hand in order to use this ability. Once during your turn, you may choose 2 of your opponent's benched Pokemon and put _ damage counters on each of them" [3]
- Pokemon from 151 that has the ability "Let's have a blast" (MEW 110) [7]
Down
- Dragon Pokemon (CRZ GG69) [8,4]
- Pokemon that Tord Reklev paired with Rapid Strike Urshifu at the 2024 Utrecht Special Event (OBF 223) [9,2]
- Pokemon with "Scratch for 20" (LOR 70) [7]
- Artist who drew cards such as Grusha (PAL 268) and Geeta (OBF 226) [3]
- Maushold (SVI 161)'s "Family Attack"deals how much damage times the number of Maushold you have in play? [7]
- Comfey (LOR 79) attack, __________ Attack [8]
- Colorless Pokemon which received an artwork rare card in Paradox Rift (PAR 212) [7]
14 Clues: Lost ______, (LOR 217) • Dragon Pokemon (CRZ GG69) [8,4] • Cramorant VMAX (SHF 55) attack [3,3] • Pokemon with "Scratch for 20" (LOR 70) [7] • Comfey (LOR 79) attack, __________ Attack [8] • Water Pokemon with the attack "Sonic Dive" [8,2] • First attack of Delibird (GE 36) that costs no energy [7] • If Venusaur was not Grass type in the TCG, it would be this type [8] • ...
Poke X Word : Puzzle # 17 (Hard) 2022-06-23
Across
- Attack: G-Max Pulverization
- Pokédex Entry: This Pokémon dispatches its prey with fire. But it regrets this habit once it realizes that it has burned its intended prey to a charred crisp.
- Attack: Dive and Rescue
- Supporter: During this turn, your Single Strike Pokémon’s attacks do 20 more damage to your opponent’s Active Pokémon for each Prize card your opponent has taken (before applying Weakness and Resistance).
- Ability: Hustle Bark
- Attack: Pandemonium
- Attack: Giant Fangs
- Pokédex Entry: Its shell is overflowing with its heightened otherworldly energy. The ectoplasm serves as protection for this Pokémon’s core spirit.
- Pokédex Entry: The bug is mostly dead, with the mushroom on its back having become the main body. If the mushroom comes off, the bug stops moving.
Down
- Pokédex Entry: Strong, but not too bright, this Pokémon can shatter even a skyscraper with its charging tackles.
- Attack: Wide Wing
- Attack: Cry of Destruction
- Item: Search your deck for a card and put it into your hand. Then, shuffle your deck. Your turn ends.
- Ability: Sudden Cyclone
14 Clues: Attack: Wide Wing • Attack: Pandemonium • Attack: Giant Fangs • Ability: Hustle Bark • Attack: Dive and Rescue • Ability: Sudden Cyclone • Attack: Cry of Destruction • Attack: G-Max Pulverization • Item: Search your deck for a card and put it into your hand. Then, shuffle your deck. Your turn ends. • ...
Charlie and rebecca why the whales came 2021-03-30
20 Clues: war • a bay • island • torpedo • kings son • bad island • devils bay • vary famous • type of bird • birdmas there • on front cover • beside the map • whales need them • in the end of book • one of the chapters • children went on one • grace don't like them • attack attack at morning • fishing trip (gone wrong) • one of the main characters
Charlie and rebecca why the whales came 2021-03-30
20 Clues: war • a bay • island • torpedo • kings son • devils bay • bad island • vary famous • type of bird • birdmas there • beside the map • on front cover • whales need them • in the end of book • one of the chapters • children went on one • grace don't like them • attack attack at morning • fishing trip (gone wrong) • one of the main characters
VOCABULARY REVIEW 2021-10-21
Across
- a flirt
- not able to be broken into
- sloppy
- forgiveness
- slow/dim
- suck up for personal gain
- lecture at length/scold
- to cheat someone out of money
Down
- intending to cause harm
- well supplied
- shy/reserved
- everywhere
- not easily soothed
- patriotic
- bitter verbal attack/attack a person or idea
- poisonous
- profane talk about holy things
- complain
- sorry
- evil
20 Clues: evil • sorry • sloppy • a flirt • slow/dim • complain • patriotic • poisonous • everywhere • forgiveness • shy/reserved • well supplied • not easily soothed • intending to cause harm • lecture at length/scold • suck up for personal gain • not able to be broken into • to cheat someone out of money • profane talk about holy things • bitter verbal attack/attack a person or idea
15 2024-08-08
Across
- Increase power
- Game modifications
- Excessive messages
- Heads-up display
- Connection speed
- First-person shooter
- Decrease power
- Experience points
- Surprise attack
- Streaming platform
- Game error
- Group attack
- Display interface
Down
- Massively multiplayer online
- Game enemy
- Testing phase
- Signal check
- Damage per second
- Player vs environment
- Role-playing game
- Game update
- Alternate character
- Repeated tasks
- Group of players
- Good game
25 Clues: Good game • Game enemy • Game error • Game update • Signal check • Group attack • Testing phase • Increase power • Decrease power • Repeated tasks • Surprise attack • Heads-up display • Connection speed • Group of players • Damage per second • Role-playing game • Experience points • Display interface • Game modifications • Excessive messages • Streaming platform • Alternate character • First-person shooter • ...
Topic 4 Vocab 2017-02-06
24 Clues: I Eat • I Buy • I Lead • I Read • To Eat • I Send • I Show • I Sell • To Buy • To Send • I Drink • To Sell • To Show • To Lead • To Read • I Place • I Attack • To Drink • To Place • to Attack • I Hand Over • I Give Back • To Hand Over • To Give Back
Structured Literacy - Week 8 to Week 10 2022-09-29
39 Clues: slick • heart • scarf • invade • famine • pumice • citrus • except • device • bucket • volume • advice • stroll • market • carbon • attack • hockey • struck • ignite • regard • tarmac • rocket • fossick • pancake • massive • cricket • scoffed • traffic • chicken • process • costume • cyclone • specify • dandruff • impolite • thickest • convince • bluffing • sickening
9/11 2024-04-24
Across
- Left-Liberal political movement in the US advocating an aggressive, interventionist foreign policy
- What crashed into the buildings
- Flight that crashed in PA by passengers (two words)
- Number of planes there were
- Where the US invaded after 9/11
- Where the US president was reading to kids when he heard about the attacks
Down
- US president at the time (two words)
- Plane highjacker (two words)
- Month the attack occurred in 2001
- Main location of 9/11 attack (two words)
- Mastermind behind the attack
- Founder of Alqaeda
- Terrorist group behind the attack
13 Clues: Founder of Alqaeda • Number of planes there were • Plane highjacker (two words) • Mastermind behind the attack • What crashed into the buildings • Where the US invaded after 9/11 • Month the attack occurred in 2001 • Terrorist group behind the attack • US president at the time (two words) • Main location of 9/11 attack (two words) • ...
Cyber Security Unit-3 Puzzle 2025-10-07
Across
- Searching for insecure wireless networks to exploit.
- Small piece of code used to exploit a vulnerability.
- Memory structure targeted in buffer overflow attacks.
- Technique aimed at disturbing or halting services.
- Cross-site scripting that injects scripts into web pages.
- Process of gathering information before an attack.
- Method of guessing passwords by trying all possibilities.
- Engineering attack that manipulates human behavior.
Down
- Condition where timing flaws lead to security gaps.
- Code or tool designed to abuse vulnerabilities.
- Attack using precompiled lists of common passwords.
- Error caused when data exceeds memory storage limits.
- Attack that makes a system unavailable to users.
- Technique of inserting malicious code into input fields.
- Database query language often exploited for injection attacks.
15 Clues: Code or tool designed to abuse vulnerabilities. • Attack that makes a system unavailable to users. • Technique aimed at disturbing or halting services. • Process of gathering information before an attack. • Condition where timing flaws lead to security gaps. • Attack using precompiled lists of common passwords. • Engineering attack that manipulates human behavior. • ...
Pit bulls 2022-05-27
Across
- Why Pit bulls are so strong
- Pit bulls giving or expressing pleasure and amusement
- One species pit bulls attack
- Pit bulls are owned by humans also known as
- Pit bulls state or make known
- This type of species is a conman victim for pit bull attacks
- Dog with high attack rates
- Its not a cat its a
Down
- New York City should get rid of the ban or
- When a human hits a pit bulls
- Pit bulls ready or likely to attack or confront
- When a Pit bull is kind and pleasant
- Why Pit bulls are not liked
- Pit bulls are greater in size or
- If pit bulls are more muscular than other dogs then they are more
15 Clues: Its not a cat its a • Dog with high attack rates • Why Pit bulls are so strong • Why Pit bulls are not liked • One species pit bulls attack • When a human hits a pit bulls • Pit bulls state or make known • Pit bulls are greater in size or • When a Pit bull is kind and pleasant • New York City should get rid of the ban or • Pit bulls are owned by humans also known as • ...
Cyber Security Unit-3 Puzzle 2025-10-07
Across
- Database query language often exploited for injection attacks.
- Method of guessing passwords by trying all possibilities.
- Condition where timing flaws lead to security gaps.
- Technique of inserting malicious code into input fields.
- Memory structure targeted in buffer overflow attacks.
- Small piece of code used to exploit a vulnerability.
- Process of gathering information before an attack.
- Code or tool designed to abuse vulnerabilities.
Down
- Technique aimed at disturbing or halting services.
- Attack using precompiled lists of common passwords.
- Searching for insecure wireless networks to exploit.
- Error caused when data exceeds memory storage limits.
- Engineering attack that manipulates human behavior.
- Attack that makes a system unavailable to users.
- Cross-site scripting that injects scripts into web pages.
15 Clues: Code or tool designed to abuse vulnerabilities. • Attack that makes a system unavailable to users. • Technique aimed at disturbing or halting services. • Process of gathering information before an attack. • Attack using precompiled lists of common passwords. • Condition where timing flaws lead to security gaps. • Engineering attack that manipulates human behavior. • ...
fencing passion 2025-01-15
Across
- quick, cutting motion to change the engagement of blades.
- A match between two fencers.
- A defensive move to deflect an opponent's thrust.
- Extending the arm with the point facing the opponent as a defensive measure.
- A forward leap to surprise the opponent.
- A situation where both fencers come into physical contact.
- A parry or guard position with the blade up and to the outside.
- a deceiving move made to draw out your opponent
- command to start bout
- A renewed attack after the initial attack is parried.
- A quick return thrust following a parry.
- The sequence of actions to establish right of way.
- Moving the foil around the opponent's blade.
- A foot stomp to distract or mislead the opponent.
Down
- A parry or guard position with the blade up and to the outside.
- A parry or guard position with the blade up and to the inside.
- A counter-attack
- The active engagement and willingness to fight by the fencers.
- The ready position
- When an attack goes past the target without hitting it.
- A parry with the blade down and to the outside.
- A move to catch and hold the opponent's blade, often leading to a halt.
- The strip or area where fencing matches take place.
- hen a parry is incorrectly executed, leading to a hit.
- a action to better position your blade on target
- A parry or guard position with the blade down and to the inside.
- An aggressive running attack.
27 Clues: A counter-attack • The ready position • command to start bout • A match between two fencers. • An aggressive running attack. • A quick return thrust following a parry. • A forward leap to surprise the opponent. • Moving the foil around the opponent's blade. • A parry with the blade down and to the outside. • a deceiving move made to draw out your opponent • ...
Poke X Word : Puzzle # 7 (Normal) 2022-04-15
Across
- Supporter: Choose up to 3 of your Benched Pokémon. For each of those Pokémon, search your deck for a different type of basic Energy card and attach it to that Pokémon. Then, shuffle your deck. Your turn ends.
- Attack: Trinity Nova
- Attack: Max Miracle
- Attack: Icicle Shot
- Pokedex Entry: When the bulb on its back grows large, the Pokémon seems to lose the ability to stand on its hind legs.
- Pokedex Entry: If it is angered or startled, the fur all over its body bristles like sharp needles that pierce foes.
Down
- Ability: Weather Reading
- Ability: Lesson in Zeal
- Attack: Aura Star
- Supporter: During this turn, your Pokémon’s attacks do 30 more damage to your opponent’s Active Pokémon (before applying Weakness and Resistance).
- Attack: Fiery Wrath
- Attack: Energy Burst
12 Clues: Attack: Aura Star • Attack: Fiery Wrath • Attack: Max Miracle • Attack: Icicle Shot • Attack: Trinity Nova • Attack: Energy Burst • Ability: Lesson in Zeal • Ability: Weather Reading • Pokedex Entry: If it is angered or startled, the fur all over its body bristles like sharp needles that pierce foes. • ...
Poke X Word : Puzzle # 7 (Normal) 2022-04-17
Across
- Pokedex Entry: When the bulb on its back grows large, the Pokémon seems to lose the ability to stand on its hind legs.
- Ability: Lesson in Zeal
- Ability: Weather Reading
- Attack: Max Miracle
- Attack: Aura Star
- Attack: Trinity Nova
Down
- Attack: Fiery Wrath
- Supporter: Choose up to 3 of your Benched Pokémon. For each of those Pokémon, search your deck for a different type of basic Energy card and attach it to that Pokémon. Then, shuffle your deck. Your turn ends.
- Pokedex Entry: If it is angered or startled, the fur all over its body bristles like sharp needles that pierce foes.
- Attack: Energy Burst
- Supporter: During this turn, your Pokémon’s attacks do 30 more damage to your opponent’s Active Pokémon (before applying Weakness and Resistance).
- Attack: Icicle Shot
12 Clues: Attack: Aura Star • Attack: Fiery Wrath • Attack: Icicle Shot • Attack: Max Miracle • Attack: Energy Burst • Attack: Trinity Nova • Ability: Lesson in Zeal • Ability: Weather Reading • Pokedex Entry: If it is angered or startled, the fur all over its body bristles like sharp needles that pierce foes. • ...
Poke X Word : Puzzle # 18 (Pokémon GO) 2022-06-30
Across
- Ability: Sudden Transformation
- Supporter: Draw 2 cards. If you drew any cards in this way, flip a coin. If heads, attach a Water Energy card from your discard pile to 1 of your Benched Pokémon
- Attack: Twilight Inspiration
- Attack: Raging Fin
- Ability: Loopy Lasso
- Attack: Buddy Bolt
- Pokedéx Entry: There is a plant seed on its back right from the day this Pokémon is born. The seed slowly grows larger.
- Ability: Excited Heart
- Attack: Split Bomb
Down
- Attack: Earthquake
- Item: Flip a coin, if heads search your deck for a Basic Pokémon, put in onto your Bench, and shuffle your deck. If tails, put this Egg Incubator at the bottom of your deck instead of discarding it.
- Ability: Sun Energy
- Pokédex Entry: It has the ability to alter the composition of its body to suit its surrounding environment.
- Ability: Kinda Lazy
14 Clues: Attack: Earthquake • Attack: Raging Fin • Attack: Buddy Bolt • Attack: Split Bomb • Ability: Sun Energy • Ability: Kinda Lazy • Ability: Loopy Lasso • Ability: Excited Heart • Attack: Twilight Inspiration • Ability: Sudden Transformation • Pokédex Entry: It has the ability to alter the composition of its body to suit its surrounding environment. • ...
Cyber Security Unit-3 Puzzle 2025-10-07
Across
- Attack using precompiled lists of common passwords.
- Searching for insecure wireless networks to exploit.
- Small piece of code used to exploit a vulnerability.
- Technique aimed at disturbing or halting services.
- Memory structure targeted in buffer overflow attacks.
- Process of gathering information before an attack.
Down
- Error caused when data exceeds memory storage limits.
- Technique of inserting malicious code into input fields.
- Cross-site scripting that injects scripts into web pages.
- Code or tool designed to abuse vulnerabilities.
- Method of guessing passwords by trying all possibilities.
- Attack that makes a system unavailable to users.
- Condition where timing flaws lead to security gaps.
- Engineering attack that manipulates human behavior.
- Database query language often exploited for injection attacks.
15 Clues: Code or tool designed to abuse vulnerabilities. • Attack that makes a system unavailable to users. • Technique aimed at disturbing or halting services. • Process of gathering information before an attack. • Attack using precompiled lists of common passwords. • Condition where timing flaws lead to security gaps. • Engineering attack that manipulates human behavior. • ...
Pearl Harbor 2022-02-09
12 Clues: bombers • day of attack • the weapons used • name of ship sank • what was attacked • leader of germany • month of pearl harbor • the country hilter led • president during attack • location of pearl harbor • number of ships attacked • what wasnt damaged in attack
CHAPTER 10 THE WAR OF 1812 2020-11-18
Across
- September British attack where 293
- Harbor Fort protecting city from Britain 293
- warships 292
- wrote The Star-Spangled Banner 293
- what was signed to end war 294
- Tecumseh killed at battle of the what 292
- U.S. and Creeks 1814 battle 292
Down
- British allies 292
- August 1814 British attack where 293
- armed private ships 292
- month in 1812 the war began 291
- achieved a decisive victory 294
- commander of the Lake Erie Forces 292
- Britain at war with U.S. and who 292
- City where Jackson and troops awaited Britain 294
- Star-Spangled Banner is the what 293
- Gen Prevost's goal to capture what city 294
- led U.S. attack on Creeks 292
- remained under British rule 292
- Native Americans in Mississippi territory 292
20 Clues: warships 292 • British allies 292 • armed private ships 292 • led U.S. attack on Creeks 292 • what was signed to end war 294 • month in 1812 the war began 291 • achieved a decisive victory 294 • remained under British rule 292 • U.S. and Creeks 1814 battle 292 • September British attack where 293 • wrote The Star-Spangled Banner 293 • August 1814 British attack where 293 • ...
Pearl Harbor 2016-12-19
Across
- the side of a ship projecting above the deck
- very bad reputation
- bullets or any means of attack or defense
- an indefinitely large number
- to intend beforehand
- a military drill hall
- discharged from the armed forces
- betrayal of trust
- to not be be a result in an attack
- reward for saving or rescuing cargo from danger or loss
- aircraft or flying
- any strong defense
Down
- happening at the same time
- a system for using reflection of radio waves to see objects
- all of a person's descendants
- of importance
- an artillery shell filled with small metal balls
- notorious
- appearing harsh
- passed on
- an assault or attack
- a storage house with guns
- a written account of years by years
23 Clues: notorious • passed on • of importance • appearing harsh • betrayal of trust • aircraft or flying • any strong defense • very bad reputation • to intend beforehand • an assault or attack • a military drill hall • a storage house with guns • happening at the same time • an indefinitely large number • all of a person's descendants • discharged from the armed forces • ...
SecOps Gartner Vocabulary Crossword puzzle 2022-12-03
Across
- Endpoint detection and response
- Cyber security Mesh Architecture
- pentest as a service
- Security Orchestration and automated response
- vulnerability prioritization technology
- external attack surface management
- risk-based vulnerability management
- identity and access management
- security service edge
- digital forensics and incident response
- cyber asset attack surface management
- managed endpoint detection and response
- Extended detection and response
- digital risk protection service
- Identity Threat Detection and Response
Down
- Breach and Attack Simulation
- endpoint protection platform
- Vulnerability Assessment
- Cyber-Physical systems security
- Cloud Access security Broker
- threat intelligence platform
- Security Information and Event Management
- managed extended detection and response
- network detection and response
- threat intelligence
- modern security operations center
- exposure management
- data discovery and management software
- Managed detection and response
29 Clues: threat intelligence • exposure management • pentest as a service • security service edge • Vulnerability Assessment • Breach and Attack Simulation • endpoint protection platform • Cloud Access security Broker • threat intelligence platform • network detection and response • identity and access management • Managed detection and response • Endpoint detection and response • ...
on Duty 2023-11-05
17 Clues: value • injure • attack • let go • deserve • policeman • find guilty • reprocuction • pierce, stab • gain, achieve • attack suddenly • uprising, unrest • loyalty, commitment • freely offer to do sth • start shooting (2 words) • a person seized by force • to assult with the intent of conquering by force
Pearl Harbor 2016-12-19
Across
- appearing harsh
- an artillery shell filled with small metal balls
- an assault or attack
- a written account of years by years
- to intend beforehand
- to not be be a result in an attack
- all of a person's descendants
- passed on
- reward for saving or rescuing cargo from danger or loss
- an indefinitely large number
- a system for using reflection of radio waves to see objects
Down
- any strong defense
- discharged from the armed forces
- very bad reputation
- happening at the same time
- of importance
- the side of a ship projecting above the deck
- betrayal of trust
- notorious
- a storage house with guns
- aircraft or flying
- a military drill hall
- bullets or any means of attack or defense
23 Clues: notorious • passed on • of importance • appearing harsh • betrayal of trust • any strong defense • aircraft or flying • very bad reputation • an assault or attack • to intend beforehand • a military drill hall • a storage house with guns • happening at the same time • an indefinitely large number • all of a person's descendants • discharged from the armed forces • ...
Pearl Harbor 2022-02-09
12 Clues: bombers • day of attack • the weapons used • name of ship sank • what was attacked • leader of germany • month of pearl harbor • the country hilter led • president during attack • location of pearl harbor • number of ships attacked • what wasnt damaged in attack
Attacks on Australia WW2 2014-03-08
Across
- Sea/ 54 land-based bombers and approximately 188 attack aircraft which were launched from four Japanese aircraft-carriers in the ___________.
- Five/ The second attack ceased after how many minutes?
- In the hours following the air raids, Darwin's population began to stream __________.
- Australian Air Force/ The second attack, involved high altitude bombing of the what base?
- The initial attacks were not a precursor to what?
- Other towns, in what part of Australia, were the target of Japanese air attack?
- Harbour/ More Japanese bombs were dropped on Darwin than this place.
Down
- four/ How many times did Japan bomb Darwin?
- The first attack ceased after how many minutes?
- Attacks on Darwin were staged in how many waves?
- The hospital that was attacked.
- Japanese were preparing to invade__________.
- The panic in the town was repeated at what base?
- Purpose of attacks were hinder Darwin's potential as a base and damage Australian__________.
14 Clues: The hospital that was attacked. • four/ How many times did Japan bomb Darwin? • Japanese were preparing to invade__________. • The first attack ceased after how many minutes? • Attacks on Darwin were staged in how many waves? • The panic in the town was repeated at what base? • The initial attacks were not a precursor to what? • ...
Poke X Word : Puzzle # 18 (Pokémon GO) 2022-06-30
Across
- Ability: Sudden Transformation
- Supporter: Draw 2 cards. If you drew any cards in this way, flip a coin. If heads, attach a Water Energy card from your discard pile to 1 of your Benched Pokémon
- Attack: Twilight Inspiration
- Attack: Raging Fin
- Ability: Loopy Lasso
- Attack: Buddy Bolt
- Pokedéx Entry: There is a plant seed on its back right from the day this Pokémon is born. The seed slowly grows larger.
- Ability: Excited Heart
- Attack: Split Bomb
Down
- Attack: Earthquake
- Item: Flip a coin, if heads search your deck for a Basic Pokémon, put in onto your Bench, and shuffle your deck. If tails, put this card at the bottom of your deck instead of discarding it.
- Ability: Sun Energy
- Pokédex Entry: It has the ability to alter the composition of its body to suit its surrounding environment.
- Ability: Kinda Lazy
14 Clues: Attack: Earthquake • Attack: Raging Fin • Attack: Buddy Bolt • Attack: Split Bomb • Ability: Sun Energy • Ability: Kinda Lazy • Ability: Loopy Lasso • Ability: Excited Heart • Attack: Twilight Inspiration • Ability: Sudden Transformation • Pokédex Entry: It has the ability to alter the composition of its body to suit its surrounding environment. • ...
Week 5 2025-12-17
Across
- shooting on Bondi Beach linked to ISIS
- and interpreter killed in ISIS attack
- car crashes into this grocery store
- arrests four in alleged new years attack plot.
- University head football coach fired
- sentenced in matthew Perry's death.
- digs out from major snowstorm
- charged with murder of his mother and father.
- chases tow truck pulling car with 4 year old inside
- man attacked on a subway
Down
- rescues man from boat fire
- flight loses power during takeoff.
- floods threaten millions in Pacific Northwest.
- defends chief of staff.
- community targeted in deadly attack
- theft ruining holidays
- professor fatally shot in home in Massachusetts
- trophy awarded to top football player
- University shooting, killing 2 people
- flight avoids midair collision
20 Clues: theft ruining holidays • defends chief of staff. • man attacked on a subway • rescues man from boat fire • digs out from major snowstorm • flight avoids midair collision • flight loses power during takeoff. • community targeted in deadly attack • car crashes into this grocery store • sentenced in matthew Perry's death. • University head football coach fired • ...
American Revolution 2022-12-07
Across
- to resistance a government
- a town with a harbor where ships load
- in a war
- a great distance
- three sides
- region
- to attack with artillery fire
- a special group of the American militia
- a blockade of a place by a military to
- act of building military defenses to
- large guns that are used to shoot
- a person lost, injured, or
Down
- to withdraw troops to escape
- people and supplies sent in to help an army
- promised to be ready to fight at a minute's notice
- to stop supplies from entering a country
- unload supplies
- supplies from entering while continuing to attack it
- against an attack
- body of land surrounded by water
- a country that supports and helps another country
21 Clues: region • in a war • three sides • unload supplies • a great distance • against an attack • to resistance a government • a person lost, injured, or • to withdraw troops to escape • to attack with artillery fire • body of land surrounded by water • large guns that are used to shoot • act of building military defenses to • a town with a harbor where ships load • ...
SAT 2 26-50 2022-03-04
Across
- n. assembly, flock, a group of animals
- n. knickknack, trinket
- v. to smuggle, to pirate
- n. uproar, noisy reaction
- n. related to cattle (cow, ox, buffalo)
- v. to make greater; improve, amplify, boost
- n. advantage, blessing, benefit,
- n. chaos, commotion
- adj. deadly, harmful, threatening
- adj. crude, impolite, vulgar,
- n. gradual weakening, erosion, wearing down
- v. trade,to give back and forth
- adj. unlearned, dark, ignorant
Down
- n. inheritance, legacy, endowment
- v.to support, to strengthen
- n. periphery, edge
- n. bombardment, overwhelming attack
- n. spoils, loot, goods seized by force
- v. to compensate, redeem, apologize
- adj. boring, dull, flavorless,
- adj. grandiose, pompous, grandiloquent
- n. assault, attack, beating
- v. to attack violently
- adj. audacious, bold,brave
- v. resist, to refuse to proceed
25 Clues: n. periphery, edge • n. chaos, commotion • n. knickknack, trinket • v. to attack violently • v. to smuggle, to pirate • n. uproar, noisy reaction • adj. audacious, bold,brave • v.to support, to strengthen • n. assault, attack, beating • adj. crude, impolite, vulgar, • adj. boring, dull, flavorless, • adj. unlearned, dark, ignorant • v. trade,to give back and forth • ...
TOTK 2024-08-02
Across
- village where you can get armor dyed
- zonai device used for flight
- mushroom found on cliffs
- sage of fire
- ancient ___ fish found on great sky island
- enemy made of rocks
- first enemy fought in TOTK
- ice dragon
- armor set that allows Link to climb slippery surfaces
Down
- how much fuse attack power a blue bokoblin horn is
- enemy fought on the stormwind ark
- ___ bananas
- zonai device that creates water
- attack up in cold weather armor set
- horn that is twelve fuse attack power
- what is used to make crystallized charges at crystal refineries
- farthest northeast region of hyrule
- enemy that drops a flotation device
- construct that you gives Link the purah pad
- region of hyrule containing zora’s domain
20 Clues: ice dragon • ___ bananas • sage of fire • enemy made of rocks • mushroom found on cliffs • first enemy fought in TOTK • zonai device used for flight • zonai device that creates water • enemy fought on the stormwind ark • attack up in cold weather armor set • farthest northeast region of hyrule • enemy that drops a flotation device • village where you can get armor dyed • ...
TOTK 2024-08-02
Across
- region of hyrule containing zora’s domain
- mushroom found on cliffs
- farthest northeast region of hyrule
- attack up in cold weather armor set
- village where you can get armor dyed
- how much fuse attack power a blue bokoblin horn is
- zonai device that creates water
- enemy that drops a flotation device
- zonai device used for flight
Down
- enemy fought on the stormwind ark
- enemy made of rocks
- what is used to make crystallized charges at crystal refineries
- construct that you gives Link the purah pad
- ___ bananas
- first enemy fought in TOTK
- armor set that allows Link to climb slippery surfaces
- horn that is twelve fuse attack power
- sage of fire
- ancient ___ fish found on great sky island
- ice dragon
20 Clues: ice dragon • ___ bananas • sage of fire • enemy made of rocks • mushroom found on cliffs • first enemy fought in TOTK • zonai device used for flight • zonai device that creates water • enemy fought on the stormwind ark • farthest northeast region of hyrule • attack up in cold weather armor set • enemy that drops a flotation device • village where you can get armor dyed • ...
TOTK 2024-08-02
Across
- construct that you gives Link the purah pad
- enemy that drops a flotation device
- zonai device used for flight
- first enemy fought in TOTK
- ancient ___ fish found on great sky island
- village where you can get armor dyed
- region of hyrule containing zora’s domain
- attack up in cold weather armor set
- sage of fire
- ___ bananas
Down
- mushroom found on cliffs
- how much fuse attack power a blue bokoblin horn is
- ice dragon
- enemy made of rocks
- enemy fought on the stormwind ark
- farthest northeast region of hyrule
- horn that is twelve fuse attack power
- zonai device that creates water
- what is used to make crystallized charges at crystal refineries
- armor set that allows Link to climb slippery surfaces
20 Clues: ice dragon • ___ bananas • sage of fire • enemy made of rocks • mushroom found on cliffs • first enemy fought in TOTK • zonai device used for flight • zonai device that creates water • enemy fought on the stormwind ark • enemy that drops a flotation device • farthest northeast region of hyrule • attack up in cold weather armor set • village where you can get armor dyed • ...
attack vocabulary 2023-01-27
Across
- to understand
- To bound something together
- an act or course of action to which a person is a morally or legally bound
Down
- a person exhibiting extreme symptoms of wild behavior, especially when violent and dangerous.
- someone who competes against or fights another in a contest, game, or argument; a rival or adversary.
- a surprise attack by people lying in wait in a concealed position.
- gives out or reflects small flashes of light.
7 Clues: to understand • To bound something together • gives out or reflects small flashes of light. • a surprise attack by people lying in wait in a concealed position. • an act or course of action to which a person is a morally or legally bound • a person exhibiting extreme symptoms of wild behavior, especially when violent and dangerous. • ...
Soul Surfer 2022-05-17
Across
- What day did the attack happened?
- What attacked Bethany?
- Bethany has a lot of this after the attack.
- What is the fake arm called?
- What kind of schooling did Bethany do?
- Name of Bethanys’s dog.
- What is Bethany dressed in 90% of the time?
- who was Bethany’s best friend?
- What did Bethany use to surf?
Down
- Where was Bethany attacked?
- Where did Bethany live?
- How old was Bethany when she was attacked?
- Who was Bethany sponsored by?
- What was Bethany’s dad about to have done during the attack?
- Name of Bethany’s mother.
- Name of Bethany’s father.
- What was Bethany’s last name?
- What did Bethany lose?
- Who did Bethany put all her faith into?
- What did Bethany name what’s left of her arm?
20 Clues: What attacked Bethany? • What did Bethany lose? • Where did Bethany live? • Name of Bethanys’s dog. • Name of Bethany’s mother. • Name of Bethany’s father. • Where was Bethany attacked? • What is the fake arm called? • Who was Bethany sponsored by? • What was Bethany’s last name? • What did Bethany use to surf? • who was Bethany’s best friend? • What day did the attack happened? • ...
CHAPTER 10 THE WAR OF 1812 2020-11-18
Across
- Britain at war with U.S. and who 292
- what was signed to end war 294
- Tecumseh killed at battle of the what 292
- U.S. and Creeks 1814 battle 292
- led U.S. attack on Creeks 292
- month in 1812 the war began 291
- wrote The Star-Spangled Banner 293
- remained under British rule 292
- achieved a decisive victory 294
Down
- armed private ships 292
- August 1814 British attack where 293
- warships 292
- commander of the Lake Erie Forces 292
- British allies 292
- Native Americans in Mississippi territory 292
- Star-Spangled Banner is the what 293
- City where Jackson and troops awaited Britain 294
- Harbor Fort protecting city from Britain 293
- Gen Prevost's goal to capture what city 294
- September British attack where 293
20 Clues: warships 292 • British allies 292 • armed private ships 292 • led U.S. attack on Creeks 292 • what was signed to end war 294 • U.S. and Creeks 1814 battle 292 • month in 1812 the war began 291 • remained under British rule 292 • achieved a decisive victory 294 • wrote The Star-Spangled Banner 293 • September British attack where 293 • August 1814 British attack where 293 • ...
TOTK 2024-08-02
Across
- mushroom found on cliffs
- ancient ___ fish found on great sky island
- horn that is twelve fuse attack power
- enemy made of rocks
- armor set that allows Link to climb slippery surfaces
- farthest northeast region of hyrule
- sage of fire
- ___ bananas
- first enemy fought in TOTK
- zonai device used for flight
Down
- enemy fought on the stormwind ark
- ice dragon
- what is used to make crystallized charges at crystal refineries
- how much fuse attack power a blue bokoblin horn is
- enemy that drops a flotation device
- village where you can get armor dyed
- attack up in cold weather armor set
- region of hyrule containing zora’s domain
- zonai device that creates water
- construct that you gives Link the purah pad
20 Clues: ice dragon • ___ bananas • sage of fire • enemy made of rocks • mushroom found on cliffs • first enemy fought in TOTK • zonai device used for flight • zonai device that creates water • enemy fought on the stormwind ark • enemy that drops a flotation device • attack up in cold weather armor set • farthest northeast region of hyrule • village where you can get armor dyed • ...
Poke X Word : Puzzle # 12 (Normal) 2022-05-21
Across
- Attack: Revenge Blast
- Attack: Leek Strike
- Ability: Red Assist
- Pokedex Entry: This Pokemon starts to dance at dusk. The one dancing in the middle is the leader of the flock.
- Supporter: Your opponent reveals their hand. Discard up to 2 in any combination of Pokémon Tool cards, Special Energy cards, and Stadium cards from it.
- Item: Flip a coin. If heads, discard an Energy from 1 of your opponent’s Pokémon.
- Attack: Fearsome Shadow
Down
- Attack: Grass Knot
- Ability: Lustrous Body
- Attack: Rainbow Flavor
- Pokedex Entry: It was built 20 years ago by scientists who dreamed of exploring space. Their dreams have yet to come true.
- Ability: Exoskeleton
12 Clues: Attack: Grass Knot • Attack: Leek Strike • Ability: Red Assist • Ability: Exoskeleton • Attack: Revenge Blast • Ability: Lustrous Body • Attack: Rainbow Flavor • Attack: Fearsome Shadow • Item: Flip a coin. If heads, discard an Energy from 1 of your opponent’s Pokémon. • ...
Cyber Security Crossword 2024-10-17
Across
- a popular DDOS tool
- Why a threat is performed
- A threat that happens due to mistakes
- A threat performed with malicious intent
- individuals who attack a system with inside knowledge
- an attack aimed to floor servers with traffic
Down
- Blocking access to a system
- an attack aimed to trick individuals
- Impact to a business due to insiders
- The aim behind an attack
- young personnel who perform server attacks.
- Possible aim of a script kiddie
12 Clues: a popular DDOS tool • The aim behind an attack • Why a threat is performed • Blocking access to a system • Possible aim of a script kiddie • an attack aimed to trick individuals • Impact to a business due to insiders • A threat that happens due to mistakes • A threat performed with malicious intent • young personnel who perform server attacks. • ...
WWII Crossword 2023-12-18
Across
- Battle's motive was sending goods and supplies to Great Britain safely
- Famous attack on Hawaii by Japan, which brought the US into the war
- System made by Canadians to transport supplies across the ocean to Great Britain safely
- Canadian government censored information on this by using ink
- Famous German scientist who helped create the atomic bomb
- Biggest death camp ever made
- Canadians were told to do what with items such as rubber, iron, aluminum, etc
- Province where most people strongly disagreed with Mackenzie King's decision to bring conscription back into effect
- Military attack from the ocean
- Loans made into the Canadian government to help pay for war efforts
- Canadian and allied attack, known today as the largest amphibious attack in history
- Name for the allies Germany, Italy, and Japan
- Hebrew name for the Holocaust
- Canada's prime minister during WWII
Down
- Number of measures apart of the Wartime prices and Trade Board
- Russia and Germany could not attack each other for how many years
- Group of travelling German U-Boats
- Indigenous Canadian war hero awarded the military medal of bravery
- Man that was in charge of making sure goods were produced properly and quickly
- First day of a attack
- Province in which Japanese internment camps were located
- Flower gardens in peoples backyards turned into vegetable gardens
- Period at the begging of the war when there was little to no fighting
- Canadian army battle that cleared the way for the final allied advance
- Elite group of Canadian and American paratroops
- Nickname given to the Sherman Flail tank
- Woman painted a seam down their leg to portray this piece of clothing
- Fastening joint limited to nine per piece of clothing
- Flight school created by Canada to help other countries gain pilots, navigators and ground crew
- Nickname given to NRMA soldiers
30 Clues: First day of a attack • Biggest death camp ever made • Hebrew name for the Holocaust • Military attack from the ocean • Nickname given to NRMA soldiers • Group of travelling German U-Boats • Canada's prime minister during WWII • Nickname given to the Sherman Flail tank • Name for the allies Germany, Italy, and Japan • Elite group of Canadian and American paratroops • ...
Volleyball 2024-11-05
Across
- Row The three players positioned furthest from the net in a standard rotation.
- A defensive pass to keep a spiked or fast-moving ball from hitting the court.
- The clockwise movement of players around the court after a side-out or score.
- A defensive move where players jump near the net to prevent an opponent's attack from crossing.
- An attack that results directly in a point, as the ball lands on the opponent’s court.
- A sequence of plays from the serve until the ball is out of play, resulting in a point.
- The player who typically handles the second contact to set up an attack.
- Blocker A player who specializes in blocking and often attacks balls from the center of the net.
- Ball A ball returned to the opponent without an aggressive spike, often allowing the opponent time to set up a play.
Down
- A pass or set that leads directly to a teammate’s successful attack.
- The act of sending the ball over the net to the opponent's side, usually in an attempt to score.
- Hitter A player who attacks balls from the left side of the court.
- Hit A violation where a player contacts the ball twice in succession.
- A violation where a player holds or scoops the ball instead of making a clean hit.
- A violation in which the ball is caught or thrown rather than cleanly hit.
- A serve that lands in the opponent's court without being touched or returned.
- A forearm pass used to receive the ball, especially on a serve or spike.
- A specialized defensive player who wears a contrasting jersey and cannot attack the ball above the net’s height.
- Out When the serving team loses the point, resulting in the other team serving.
- A soft shot made by lightly tapping the ball over the net, usually to avoid blockers.
20 Clues: Hitter A player who attacks balls from the left side of the court. • A pass or set that leads directly to a teammate’s successful attack. • Hit A violation where a player contacts the ball twice in succession. • A forearm pass used to receive the ball, especially on a serve or spike. • The player who typically handles the second contact to set up an attack. • ...
PEARL HARBOR 2014-03-28
Across
- these shot down Japanese planes
- island of Hawaii where attack took place
- these people launched a surprise attack on Pearl Harbor
- Japanese planes took off from this air craft carrier
- Japanese piloted these to drop bombs on Pearl Harbor
Down
- the date on which the attack happened
- attack took place here
- the attack happened in this state
- many of these were sunk during the attack on Pearl Harbor
- they had a base on Pearl Harbor
10 Clues: attack took place here • these shot down Japanese planes • they had a base on Pearl Harbor • the attack happened in this state • the date on which the attack happened • island of Hawaii where attack took place • Japanese planes took off from this air craft carrier • Japanese piloted these to drop bombs on Pearl Harbor • ...
Cyber Security 2021-10-14
Across
- attack injects a malicious code into the server
- who created a computer worm in 1988?
- spyware, ransomware, viruses, and worms
- what president created homeland security?
- created the first ransomware attack
- attack that floods a computer or network
- attackwhen hackers insert their way into a two party transaction
Down
- advanced, modular banking trojan
- attack relies most on human interaction
- this person created cyber security
- attacks that use fake communication to trick people
- what does SQL stand for?
12 Clues: what does SQL stand for? • advanced, modular banking trojan • this person created cyber security • created the first ransomware attack • who created a computer worm in 1988? • attack relies most on human interaction • spyware, ransomware, viruses, and worms • attack that floods a computer or network • what president created homeland security? • ...
Pearl Harbor 2022-02-01
Across
- What word means extreme dishonor?
- What month did the Pearl Harbor attack occur?
- The Japanese navy really wanted to catch ______, but they were out to sea that day!
- Who did FDR have to ask to declare war against Japan?
- Which Hawaiian island is Pearl Harbor located?
- Japan planned what kind of attack?
- What country attacked Pearl Harbor?
- What day of the week was the attack?
Down
- What word refers to the U.S. focusing on itself and not other countries?
- What animal does Tora Tora Tora represent?
- What ocean in Hawaii in?
- What year did the attack on Pearl Harbor occur...nineteen forty ________
- Eight of the U.S. Navy's _________ were destroyed or damaged at Pearl Harbor?
- What is the name of the naval base in Hawaii?
- Battleships are named after what?
- The USS _________ is a battleship memorial at Pearl Harbor after it was sunk killing many military men onboard.
- Japan wanted to take over which continent?
- Who was the military General for Japan?
- Japan was mad at the U.S. for placing a trade _______ between the two countries.
19 Clues: What ocean in Hawaii in? • What word means extreme dishonor? • Battleships are named after what? • Japan planned what kind of attack? • What country attacked Pearl Harbor? • What day of the week was the attack? • Who was the military General for Japan? • What animal does Tora Tora Tora represent? • Japan wanted to take over which continent? • ...
The birds 2025-02-11
Across
- who did Nat work for %.
- how many children does Nat have
- number of birds in the first attack
- the main character
- where does Nat get food
- what town is the story located in
- what don't the birds attack
- nats wife
- where the birds enter the house
Down
- how many birds were found dead in the kids room
- where do they attack Johnny
- why is Nat able to work outside
- how does Mr.trigg treat the bird gathering
- what country is the story located in
- nat's sons name
- what kind of winter
- nat's daughters name
- what happens to the airplanes sent to kill the birds
18 Clues: nats wife • nat's sons name • the main character • what kind of winter • nat's daughters name • who did Nat work for %. • where does Nat get food • where do they attack Johnny • what don't the birds attack • how many children does Nat have • why is Nat able to work outside • where the birds enter the house • what town is the story located in • number of birds in the first attack • ...
WW2 2025-12-04
Across
- The country that the US cut oil and scrap metal from
- Where the US moved their naval base to from San Diego
- Harbor Where did Japan preemptivly attack before they could attack Japan
- When Japanese aircraft carriers were on the way to Pearl Harbor what could they not throw out to avoid leaving a trail
- The Japanese consul was taking what of the harbor for months before the attack
- The country that Japan invaded that escalated the US's anger
- From WW1 what country was a lesson to Japan that if you are blockaded you are going to lose
- What event did china do that effected a large amount of women in china
- What note was late and Hawaii didn't receive till after the attack
- Carriers What was the US tracking and keeping an eye on before WW2 that belonged to Japan
Down
- The ship that nearly half the killed Americans were on board
- What did the Japanese think they had to destroy so that the US would be unwilling to fight them
- Where was the Racial Equality proposal rejected by the US
- What branch of the US military did Japan mainly want to take out
- Where did most of the shots that were taken at the Japanese jets and missed go to
- What required a formal declaration of war prior to attacking an enemy
- The country that Japan invaded and concurred in 1931
- what did people in Hawaii originally think the attack was
- How many Japanese Carriers went to pearl harbor
- What resource did Japan need from the US
- On how many battleships were the captians on shore during the attack and unaple to take control
- door What part of the ship trapped both water and men in when the compartments were closed
- What system at pearl harbor could pick up any plane within 150 miles when it worked
23 Clues: What resource did Japan need from the US • How many Japanese Carriers went to pearl harbor • The country that the US cut oil and scrap metal from • The country that Japan invaded and concurred in 1931 • Where the US moved their naval base to from San Diego • Where was the Racial Equality proposal rejected by the US • ...
Cyber Security 2021-10-14
Across
- attack injects a malicious code into the server
- created the first ransomware attack
- what does SQL stand for?
- what president created homeland security?
- attack relies most on human interaction
Down
- attacks that use fake communication to trick people
- this person created cyber security
- who created a computer worm in 1988?
- advanced, modular banking trojan
- attackwhen hackers insert their way into a two party transaction
- attack that floods a computer or network
- spyware, ransomware, viruses, and worms
12 Clues: what does SQL stand for? • advanced, modular banking trojan • this person created cyber security • created the first ransomware attack • who created a computer worm in 1988? • spyware, ransomware, viruses, and worms • attack relies most on human interaction • attack that floods a computer or network • what president created homeland security? • ...
Fencing Crossword 2023-11-22
Across
- to step forward
- An explosive attack made by kicking forward with the front foot, and pushing the body forward with the back leg
- When you attack immediately after you successfully parry
- "A half jacket that covers one arm and worn under the jacket on the ""sword arm"" side"
- an initial offensive action made by extending the sword arm and continuously threatening the opponent’s target
- when both blades are in contact
- deflection of the opponent’s attacking blade by making a half circle with the sword point
- Attack involving a Feint first
- the flexible half of the blade nearer the tip
- the right of way gained by the fencer by extending the sword arm and continually threatening the opponent’s target
- gardé Stand in a defensive position ready to attack or defend
- A gesture to your opponent and the referee by raising your sword to face height in respect
- One of the en garde positions with the sword protecting the upper part of the torso on the sword arm side of the body. Roughly translates to 6 in French
- threatening movement of the blade made with the intention of provoking a parry or similar response
Down
- A parry moving the blade sideways across the body
- crisp striking movement of the opponent’s blade creating a deflection, or obtaining a reaction; used as a preparation
- the area where a bout takes place
- One of the en garde positions with the sword protecting the upper part of the torso on the non sword arm side of the body. Roughly translates to 4 in French
- deflection of the opponent’s attacking blade by making a circle with the sword point
- An attack made while your opponent is already attacking
- passing the blade under or over the opponent’s blade
- The strong half of the blade nearer the hilt
22 Clues: to step forward • Attack involving a Feint first • when both blades are in contact • the area where a bout takes place • The strong half of the blade nearer the hilt • the flexible half of the blade nearer the tip • A parry moving the blade sideways across the body • passing the blade under or over the opponent’s blade • ...
Volleyball 2024-11-05
Across
- The clockwise movement of players around the court after a side-out or score.
- Blocker A player who specializes in blocking and often attacks balls from the center of the net.
- A violation where a player holds or scoops the ball instead of making a clean hit.
- A serve that lands in the opponent's court without being touched or returned.
- An attack that results directly in a point, as the ball lands on the opponent’s court.
- Hit A violation where a player contacts the ball twice in succession.
- The player who typically handles the second contact to set up an attack.
- A violation in which the ball is caught or thrown rather than cleanly hit.
- Row The three players positioned furthest from the net in a standard rotation.
Down
- A defensive pass to keep a spiked or fast-moving ball from hitting the court.
- A pass or set that leads directly to a teammate’s successful attack.
- Hitter A player who attacks balls from the left side of the court.
- A defensive move where players jump near the net to prevent an opponent's attack from crossing.
- A sequence of plays from the serve until the ball is out of play, resulting in a point.
- Ball A ball returned to the opponent without an aggressive spike, often allowing the opponent time to set up a play.
- Out When the serving team loses the point, resulting in the other team serving.
- A forearm pass used to receive the ball, especially on a serve or spike.
- A specialized defensive player who wears a contrasting jersey and cannot attack the ball above the net’s height.
- A soft shot made by lightly tapping the ball over the net, usually to avoid blockers.
- The act of sending the ball over the net to the opponent's side, usually in an attempt to score.
20 Clues: Hitter A player who attacks balls from the left side of the court. • A pass or set that leads directly to a teammate’s successful attack. • Hit A violation where a player contacts the ball twice in succession. • A forearm pass used to receive the ball, especially on a serve or spike. • The player who typically handles the second contact to set up an attack. • ...
Application Attacks 2025-03-06
Across
- Overloading a system’s resources to cause performance degradation or crashes.
- The framework commonly used for penetration testing and executing exploits.
- A cyberattack that targets a vendor or third-party provider to introduce vulnerabilities.
- Junk email that is often used to spread malware, scams, or advertisements.
- A malicious attempt to access restricted files by altering a website’s URL path.
- A cyberattack where an application processes malformed XML data to manipulate database queries.
- The practice of keeping software up-to-date to protect against vulnerabilities.
- A social engineering attack that tricks users into providing sensitive information via emails or messages.
- The unauthorized redirection of users from a legitimate site to a malicious one.
- A cybersecurity practice that involves scanning attachments before opening them.
Down
- An attack that abuses an application programming interface to steal or manipulate data.
- A web attack where malicious scripts are injected into webpages and executed in a victim's browser.
- A defense mechanism that automatically removes dangerous spam from inboxes.
- A cyberattack that involves resending captured data packets to trick systems into repeated execution.
- The best practice that involves writing secure and well-tested software to prevent attacks.
- The technique of overwhelming a server by flooding it with excessive requests, making it unavailable.
- A targeted phishing attack that customizes fraudulent messages based on personal details.
- A cyberattack that redirects users to a fake website to steal their credentials.
- A phishing attack targeting high-profile individuals such as executives and politicians.
- A phishing attack conducted via voice communication to steal sensitive information.
- The term for data storage areas that can be exploited if improperly managed, leading to attacks.
- A security flaw where excess data overflows into adjacent memory space, leading to crashes or exploits.
- The process of validating and sanitizing user input to prevent code injection attacks.
- A tool often used for scanning networks and detecting vulnerabilities.
24 Clues: A tool often used for scanning networks and detecting vulnerabilities. • Junk email that is often used to spread malware, scams, or advertisements. • A defense mechanism that automatically removes dangerous spam from inboxes. • The framework commonly used for penetration testing and executing exploits. • ...
Volleyball Crossword 2014-04-02
Across
- set up
- outside of the lines
- first guy with black stripe shirt
- use this to make fire
- points person
- keep alive
- attack -----
- what is volleyball
- "in our out"
- last line
Down
- left and right lines
- baseball ref
- where you "attack"
- elevator is out of?
- reject
- area where you serve
- a letter formation
- first hit,first ball
- half line
- to save while falling
20 Clues: set up • reject • half line • last line • keep alive • baseball ref • attack ----- • "in our out" • points person • where you "attack" • a letter formation • what is volleyball • elevator is out of? • left and right lines • outside of the lines • area where you serve • first hit,first ball • use this to make fire • to save while falling • first guy with black stripe shirt
Vocab Crossword 2021-02-25
Across
- Extremely unpleasant
- Fake name
- Having a threatening appearance
- Displaying a weapon
- Open to an attack
- Lacking knowledge
- A very sad event
- Victorious
- Sadness
- Obstructed view
- Likely to attack
- Jealous
- Easily annoyed
Down
- Dirty
- Feel foolish
- Unable to concentrate
- Pause before doing something
- To break off
- Completely certain
- Completely destroy
- Set on completing a task
- Unpredictable danger
- Happens once in a while
23 Clues: Dirty • Sadness • Jealous • Fake name • Victorious • Feel foolish • To break off • Easily annoyed • Obstructed view • A very sad event • Likely to attack • Open to an attack • Lacking knowledge • Completely certain • Completely destroy • Displaying a weapon • Extremely unpleasant • Unpredictable danger • Unable to concentrate • Happens once in a while • Set on completing a task • Pause before doing something • ...
Security+Chap2 2023-01-22
Across
- attacks against cryptographic implementations or crypto algorithms
- group of compromised computers known as robots
- code that can run on a computer without any action from the user, self-replicating
- master computer that controls the botnet
- malware that occurs in memory of computer
- in the clear
- malware that restricts access to a system or encrypts files and demands payment
- malicious software downloaded unwittingly from a website or installed with some third-party software
- an attack on a hashing system that attempts to send two different messages for the same hash
- list of encrypted passwords located in a lookup table
- attacker captures credit card information from a cardholder
- attacker uses this to bypass normal authorization
- advanced form of ransomware that leverages advanced encryption techniques
- spyware that records your keystrokes
- software designed to gain administrator-level control over a computer system without being detected
- code added to software that will initiate when something specific happens
Down
- password attack where every possible password is attempted
- form of spyware that includes grayware, adware or jokes
- attack when a protocol is downgraded from the current version to a previous version, exploiting backward compatibility
- password attack uses a prearranged list of ordinary words
- malicious software
- software appears to perform a desired function but actually is performing malicious functions behind the scenes
- password attack where attacker uses simple passwords against targeted user accounts and moves on to other accounts before being detected
- type of attack where attackers target security weaknesses in the supply network
- attacker clones a credit card or SIM card
- computer used to distribute malware across the internet, also a zombie
- two different files end up using the same hash, MD5
- a trojan used to gain back-end access to a server
28 Clues: in the clear • malicious software • spyware that records your keystrokes • master computer that controls the botnet • malware that occurs in memory of computer • attacker clones a credit card or SIM card • group of compromised computers known as robots • attacker uses this to bypass normal authorization • a trojan used to gain back-end access to a server • ...
patriot day 2023-07-07
Poke X Word : Puzzle # 21 (Normal) 2022-07-16
Across
- Attack: Blissful Blast
- Ability: Regal Stance
- Ability: Strong Legs Charge
- Ability: Tar Generator
- Attack: Fly
Down
- Ability: Make Do
- Attack: Cheerful Charge
- Attack: Fusion Strike Assault
- Item: Attach a basic {D} Energy card from your discard pile to 1 of your Benched {D} Pokémon.
- Ability: Sun Energy
- Ability: Dew Guard
- Supporter: Draw 3 cards. If you drew any cards in this way, your opponent discards Pokémon from their Bench until they have 3.
12 Clues: Attack: Fly • Ability: Make Do • Ability: Dew Guard • Ability: Sun Energy • Ability: Regal Stance • Attack: Blissful Blast • Ability: Tar Generator • Attack: Cheerful Charge • Ability: Strong Legs Charge • Attack: Fusion Strike Assault • Item: Attach a basic {D} Energy card from your discard pile to 1 of your Benched {D} Pokémon. • ...
Poke X Word : Puzzle # 15 (Normal) 2022-06-10
Across
- Item: Look at the top card of your deck. You may put that card into your hand. If you don’t, discard that card and draw a card.
- Pokedex Entry: It’s nature’s cleaner—it eats anything and everything, including garbage and rotten things. The ground near its nest is always clean.
- Attack: Flare Shot
- Attack: Merciless Strike
- Supporter: You can use this card only if you discard a {R} Energy card from your hand. Look at the top 7 cards of your deck and put up to 2 of them into your hand. Shuffle the other cards back into your deck.
- Ability: Concealed Cards
- Attack: Max Balloon
- Attack: Strong Tail
Down
- Ability: Frontier Road
- Attack: Metal Blast
- Pokedex Entry: This Pokémon is said to have been born when a lonely spirit possessed a cold, leftover cup of tea.
- Attack: Bubbles Galore
12 Clues: Attack: Flare Shot • Attack: Metal Blast • Attack: Max Balloon • Attack: Strong Tail • Ability: Frontier Road • Attack: Bubbles Galore • Attack: Merciless Strike • Ability: Concealed Cards • Pokedex Entry: This Pokémon is said to have been born when a lonely spirit possessed a cold, leftover cup of tea. • ...
I survived a shark attack 2025-05-16
Across
- be all around
- A mark left in the skin
- up to close his eyes
- A wood container
- To fall
- To make something sure
- synonym of shiny
- Damage to person’s feeling
- shining with a sparkling light
- Tread heavily when we are angry
Down
- a very great size or huge
- A sauvage way to kill
- Hunting fish’s
- short duration
- Raise slightly and momentarily
- A tiny spots
- A huge thing
- Pull or drag with effort
- Eat hurriedly or noisily
- Having an uneven or irregular surface
20 Clues: To fall • A tiny spots • A huge thing • be all around • Hunting fish’s • short duration • A wood container • synonym of shiny • A sauvage way to kill • up to close his eyes • To make something sure • A mark left in the skin • Pull or drag with effort • Eat hurriedly or noisily • a very great size or huge • Damage to person’s feeling • Raise slightly and momentarily • shining with a sparkling light • ...
Attack of the Free Radicals! 2025-07-14
Across
- Fill in the blank: A free radical has a __________ __________ (2 words)
- A famous antioxidant found in oranges and guava (2 words)
- Smoke and this dirty air thing increase free radicals
- This gives us Vitamin D but can also create free radicals
- Too many radicals, too little defense = __________ ________ (2 words)
- I describe a molecule that is calm and happy with all its electrons.
- Tiny cell powerhouses where antioxidants guard energy production.
- Clue: What happens to cells when radicals win? __________ _______ (2 words)
- Your body makes this powerful antioxidant, starts with "G".
Down
- Sunlight gives me to your skin – wear sunscreen to stop __________ _______
- Things made by accident when making something else. One word, starts with "B"
- Wild oxygen team that loves to damage cells — 3 words, first word "R"
- Too many free radicals speed up this natural life process
- Normal body process that produces energy—and some free radicals.
- Another name for reactive substances that cause oxidative stress.
- I fight the bad guys called free radicals. Who am I? (Starts with "A")
- Fill in the blank: I am a mineral friend of antioxidants: S__________
- Fill in the blank: A ______ ________ is a lonely molecule missing a friend
- I hunt and catch free radicals. What am I? (One word, starts with "S")
- Cloudy lens in your eye, making vision blurry. What is this called?
- Antioxidants help protect this genetic material from damage.
21 Clues: Smoke and this dirty air thing increase free radicals • Too many free radicals speed up this natural life process • A famous antioxidant found in oranges and guava (2 words) • This gives us Vitamin D but can also create free radicals • Your body makes this powerful antioxidant, starts with "G". • Antioxidants help protect this genetic material from damage. • ...
ATTACK OF THE KILLER MUCKWADS 2025-10-11
21 Clues: jeter • santé • piles • Terre • côtés • panier • outils • déchets • déchets • emballé • pratique • composte • les deux • rouiller • emballage • le dernier • réutilisable • durée de vie • comportement • déchets/gaspiller • appareils électroniques
attack of the mutant 2019-11-08
Across
- firmly press
- look at someone with one or both eyes partly closed
- identify someone or something having encountered them before
- peculiar or characteristic habbit
- cease to exist or be in use
- inability to be seen
- resulting from or showing the effect of mutation
- impress a pattern or mark on a surface
- the action of collecting something
Down
- act against someone aggressively in a attempt to injure or kill
- vertical transport vehicle which moves people between floors of the building
- a state of the skin caused by cold fear or excitement
- in a distraught way owing to fear, anxiety, or other emotion
- a very great size
- magazine that presents a story in the style of comedy
15 Clues: firmly press • a very great size • inability to be seen • cease to exist or be in use • peculiar or characteristic habbit • the action of collecting something • impress a pattern or mark on a surface • resulting from or showing the effect of mutation • look at someone with one or both eyes partly closed • a state of the skin caused by cold fear or excitement • ...
ANIME ATTACK ON TITAN 2023-11-21
Across
- IBU DARI 9 TITAN SHIFTER
- SIAPA TITAN TERPENDEK
- SIAPAKAH NAMA AYAH EREN
- TANGGAL BERAPAKAH AOT TAMAT
- SIAPAKAH TOKOH UTAMA AOT
- SIAPAKAH KAPTEN DIPASUKAN PENGINTAI
- NAMA TITAN YANG DIMILIKI EREN KECUALI FOUNDING
- APA NAMA TITAN PESURUH FOUNDING TITAN
Down
- SIAPAKAH RATU DARI PULAU PARADISE
- TITAN YANG DITEBAS LEVI
- SIAPAKAH TITAN TERBESAR
- SIAPAKAH DIBALIK TITAN BINATANG
- SIAPAKAH ORANG DI BALIK TITAN CART
- SEASON BERAPAKAH HAPPY ENDING
- TITAN APA YANG DAPAT DIKENDALIKAN ZEKE
15 Clues: SIAPA TITAN TERPENDEK • TITAN YANG DITEBAS LEVI • SIAPAKAH TITAN TERBESAR • SIAPAKAH NAMA AYAH EREN • IBU DARI 9 TITAN SHIFTER • SIAPAKAH TOKOH UTAMA AOT • TANGGAL BERAPAKAH AOT TAMAT • SEASON BERAPAKAH HAPPY ENDING • SIAPAKAH DIBALIK TITAN BINATANG • SIAPAKAH RATU DARI PULAU PARADISE • SIAPAKAH ORANG DI BALIK TITAN CART • SIAPAKAH KAPTEN DIPASUKAN PENGINTAI • ...
Attack on titan puzzle 2024-04-21
15 Clues: 1/2 • nose • Erehh • clorox • a bird • potato • bottom • Lesbian • pregnant • four eyes • امه معلقة • booty booty • Shinzou wo sasageyo • also simp but hiding • A guy who needs therapy
art attack final exam 2024-03-25
Across
- the place where art is traded and sold
- "gribouillage" en Français;Nom d'artiste connu
- One of the most brilliant artist of all times
- old, ugly, fashionnable, but we don't know why
- synonymous of eternal;never outfashioned
- a ball, a boat, a zeppelin can be it
- plastic poach you can blow and distort to make animals
- contrary to pessimism
- synonymous of "bright", like the sun
- all modern living artist are considered like that
Down
- synonymous of huge, big, oversized
- synonymous of "balance"
- "inoxydable" en Français
- surface like a mirror
- "au quotidien" en Français
15 Clues: surface like a mirror • contrary to pessimism • synonymous of "balance" • "inoxydable" en Français • "au quotidien" en Français • synonymous of huge, big, oversized • synonymous of "bright", like the sun • a ball, a boat, a zeppelin can be it • the place where art is traded and sold • synonymous of eternal;never outfashioned • One of the most brilliant artist of all times • ...
attack on titan characters 2023-08-01
Across
- - Mysterious character known as the Beast Titan.
- - Strategic thinker and close friend of Eren.
- - Main protagonist and titan shifter.
- - Former commander of the Survey Corps.
- - Enigmatic character with ties to the titan history.
- - Formerly known as Krista, an important figure with royal blood.
- - Energetic and food-loving member of the Survey Corps.
- - Brilliant scientist and researcher of titans.
Down
- - Soldier with a secret identity as a titan shifter.
- - Female titan shifter and former member of the Survey Corps.
- - Skilled soldier and member of the Survey Corps.
- - Skilled soldier and captain of the Special Operations Squad.
- - High-ranking military official and commander.
- - Skilled fighter and Eren's adoptive sister.
- - Loyal soldier and friend of the main characters.
15 Clues: - Main protagonist and titan shifter. • - Former commander of the Survey Corps. • - Strategic thinker and close friend of Eren. • - Skilled fighter and Eren's adoptive sister. • - High-ranking military official and commander. • - Brilliant scientist and researcher of titans. • - Mysterious character known as the Beast Titan. • ...
CW1 2017-10-08
Across
- Program secretly collecting information.
- :A powerful machine which answers.
- : An attack which slows down or crashes equipment and programs
- :interconnects networks
- : These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.
- :Network Can grow
- :Deny or allow packet based on rules.
- :Stealing your username and password.
- :Blocks Unauthorised access to networks.
- :Creates a secure connection for remote workers.
- :__________Signals are used to carry message in fibre optic cables
- :command to go from switch> to switch#
- :An attack named after greek-trojan war.
- :interconnect end devices in a limited area such as a home, school, office building, or campus.
- :Network attack that occurs on the first day that a vulnerability becomes known.
Down
- :WANs are in control of _______________.
- :Address space for IoT
- :A program to stop virus attack.
- :Marks IP address in network diagram
- :Business and Personal equipment must be protected
- :Priority Queues
- :Access to people inside company only.
- :A Method to connect Business to Internet
- :All devices can talk to each other.
- :A machine which asks or start communication.
- :A known person trying to access you system.
26 Clues: :Priority Queues • :Network Can grow • :Address space for IoT • :interconnects networks • :A program to stop virus attack. • :A powerful machine which answers. • :Marks IP address in network diagram • :All devices can talk to each other. • :Deny or allow packet based on rules. • :Stealing your username and password. • :Access to people inside company only. • ...
CW1 2017-10-08
Across
- :A program to stop virus attack.
- :Deny or allow packet based on rules.
- :Blocks Unauthorised access to networks.
- :A powerful machine which answers.
- : An attack which slows down or crashes equipment and programs
- :interconnects networks
- :Stealing your username and password.
- :Marks IP address in network diagram
- :A machine which asks or start communication.
- :All devices can talk to each other.
- : These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.
- Program secretly collecting information.
Down
- :An attack named after greek-trojan war.
- :Access to people inside company only.
- :Network Can grow
- :Network attack that occurs on the first day that a vulnerability becomes known.
- :Business and Personal equipment must be protected
- :WANs are in control of _______________.
- :A known person trying to access you system.
- :__________Signals are used to carry message in fibre optic cables
- :A Method to connect Business to Internet
- :interconnect end devices in a limited area such as a home, school, office building, or campus.
- :Address space for IoT
- :Priority Queues
- :command to go from switch> to switch#
- :Creates a secure connection for remote workers.
26 Clues: :Priority Queues • :Network Can grow • :Address space for IoT • :interconnects networks • :A program to stop virus attack. • :A powerful machine which answers. • :Marks IP address in network diagram • :All devices can talk to each other. • :Deny or allow packet based on rules. • :Stealing your username and password. • :Access to people inside company only. • ...
First Aid 2021-01-28
Across
- the I in RICE
- when the skin doesn't fall together nicely, these are needed
- life-threatening condition where the body cannot heat itself
- can trigger asthma attack
- this organ will die within 6-10 minutes
- heart stops or beats irregularly
- give to a person having a heart attack
- indicates a 2nd degree burn
- do this when in cardiac arrest
- give thrusts here when a pregnant woman is choking
- the E in RICE
- lean this way with a bloody nose
- abdominal thrust and back blows for choking
Down
- shape of lyme disease rash
- needed within 6-10 minutes to prevent damage
- use this for an asthma attack
- the C in RICE
- the R in RICE
- concern when bitten by an animal
- used to shock the heart into a regular rhythm
- broken tooth should be placed in this
- diabetes is the inability to process this
- red, hot swollen tissue with pus
- common food young children choke on
- use this if alone and choking
- blood flow to part of the heart is blocked
- symptom of asthma attack
- the bite of this causes lyme disease
28 Clues: the I in RICE • the C in RICE • the R in RICE • the E in RICE • symptom of asthma attack • can trigger asthma attack • shape of lyme disease rash • indicates a 2nd degree burn • use this for an asthma attack • use this if alone and choking • do this when in cardiac arrest • heart stops or beats irregularly • concern when bitten by an animal • red, hot swollen tissue with pus • ...
Chapter 2 2024-02-22
Across
- The attack surface of social engineering
- redirect users into a fake Web site masquerading as a legitimate one and divulging personal information
- False or inaccurate misinformation that comes from a malicious intent.
- An attack directed toward a small group of specific individuals
- A social engineering attack that uses the SMS to send fraudulent text messages.
- advanced Google search
- Making something unintelligible
- An invention or a work that is the result of creativity
- The country-specific requirements that apply to data.
- attack that takes advantage of electronically making payments or transferring funds
- Voice phishing that uses a telephone call to contact the victim.
Down
- The process of cleaning data to provide privacy
- Creating a copy of original data to make it unintelligible
- The highest level of data sensitivity
- Obfuscation of sensitive data elements into a random string of characters.
- Masquerading as a real or fictitious character
- A device that detects or measures a physical property and responds to it.
- Identifying data’s location
- A means of eliciting information or convincing a user to take action that weakens.
- disinformation
- Obtaining private information through social engineering
21 Clues: disinformation • advanced Google search • Identifying data’s location • Making something unintelligible • The highest level of data sensitivity • The attack surface of social engineering • Masquerading as a real or fictitious character • The process of cleaning data to provide privacy • The country-specific requirements that apply to data. • ...
MTG crossword 2022-08-30
Across
- A Permanent that you can only have one of on the field at a time
- When you turn a permanent sideways to use an ability or attack
- Every playable card except lands
- What you use to cast spells
- A permanent spell that attacks
- A normally coloured permanent type that doesn't attack
- When you play a spell
- A spell that stays on the field after being cast
- A permanent that can be tapped for mana
- When a permanent is destroyed by a spell
- What happens when your creature hits an opponent or a spell damages them
Down
- An impermanent spell that can only be cast on your turn
- A normally colourless permanent type that doesn't attack
- What MTG is set in
- A permanent with loyalty abilities
- An impermanent spell that can be cast at any time
- Where you put spells after use or they are destroyed
- total How much health you have
- What colour a spell is which changes what mana is needed to cast it
- What you play the game with
- When you use your creatures to damage your opponent
- The first plane created
22 Clues: What MTG is set in • When you play a spell • The first plane created • What you use to cast spells • What you play the game with • total How much health you have • A permanent spell that attacks • Every playable card except lands • A permanent with loyalty abilities • A permanent that can be tapped for mana • When a permanent is destroyed by a spell • ...
Battles of World War II Puzzle 2022-05-12
Across
- How many tanks were used in the battle of Kursk?
- Who often went out into the streets of London?
- In Midway battle, how many Japanese Carriers were destroyed?
- a German Bomber
- a small English Plane able to evade Luffewaffe
- Who Initiated the battle of Kursk?
- Where was the Dieppe raid?
- The Pearl Harbor attack left how many aircraft carriers
Down
- How many tanks were lost in the battle of Kursk?
- The Kursk battle was the first of?
- The Pearl Harbor surprise attack caused who to join the war?
- The Pearl Harbor attack destroyed most of what Navy
- which battle was fought in 1943?
- Who was responsible for the Dieppe raid?
- What percentage of the troops were killed as the German Army was Prepared?
- Was the dieppe raid invasion a failure or a success?
- What part of the day did the Dieppe raid happen?
- In the Dieppe raid, how many different points did the forces attack at?
- a group of German Submarines
- How long did the battle of Kursk last?
- During the Kursk battle, the Germans defeated Russia during what time of the year?
21 Clues: a German Bomber • Where was the Dieppe raid? • a group of German Submarines • which battle was fought in 1943? • The Kursk battle was the first of? • Who Initiated the battle of Kursk? • How long did the battle of Kursk last? • Who was responsible for the Dieppe raid? • Who often went out into the streets of London? • a small English Plane able to evade Luffewaffe • ...
Heart attack 2021-12-13
Across
- To fall down suddenly.
- Convulsive catching of breath.
- Drug or other form of medicine that is used to treat or prevent disease.
Down
- Action or state of being squished down.
- "Blood..." gelatinous mass of fibrin and blood cells formed by the coagulation of blood.
- The passage by which air reaches a person's. lungs.
- What you need to ask for person, who is having heart attack, to do with aspirin tablet?
7 Clues: To fall down suddenly. • Convulsive catching of breath. • Action or state of being squished down. • The passage by which air reaches a person's. lungs. • Drug or other form of medicine that is used to treat or prevent disease. • What you need to ask for person, who is having heart attack, to do with aspirin tablet? • ...
Cyber security Scruffle 2023-09-07
Across
- bait to receive money from the victim
- keeps your data from being breached/recognized
- an in-person device used to access your data on web
- a form of securing your accounts from other people
- verifies if you are "you"
- a type of attack that is initiated by a user interaction
Down
- a form of attack where someone listens to a conversation to gain personal access
- taking measures to make sure no unknown person has your online data
- protects from online attacks against a business
- no cable internet
- a cyber attack that spreads in a large quantity
- a group of devices which are sharing the same data
- an operating system for your device
- Drive a small plug in with saved files, photos, ect.
- a saved version of your files or general work in case it is lost
- a way of accessing personal information/account unauthorized
- emails, texts or messages from a bait to gain access to your information
- information on your device that is related to what you are doing
- device used to access the online web
- accessing your account through a password to authenticate it is the user.
20 Clues: no cable internet • verifies if you are "you" • an operating system for your device • device used to access the online web • bait to receive money from the victim • keeps your data from being breached/recognized • protects from online attacks against a business • a cyber attack that spreads in a large quantity • a group of devices which are sharing the same data • ...
A Child Called It 2022-05-17
Across
- to attack or treat with ridicule
- a daring or bold resistance to authority
- incapable
- treated with contempt
- to cause to be disturbed
- to smile, laugh
- devoid
- to twist
- affects the sense of taste or smell
- unwilling
- to cut
Down
- humble
- shaking of the body
- harassed, nag
- vigorous attack
- helping to improve
- hostile
- remove debris
- a strong, wave-like, rush
19 Clues: humble • devoid • to cut • hostile • to twist • incapable • unwilling • harassed, nag • remove debris • vigorous attack • to smile, laugh • helping to improve • shaking of the body • treated with contempt • to cause to be disturbed • a strong, wave-like, rush • to attack or treat with ridicule • affects the sense of taste or smell • a daring or bold resistance to authority
CW1 2017-10-08
Across
- Program secretly collecting information.
- :Deny or allow packet based on rules.
- :A program to stop virus attack.
- :Business and Personal equipment must be protected
- :All devices can talk to each other.
- :Marks IP address in network diagram
- :An attack named after greek-trojan war.
- :Network Can grow
- :Access to people inside company only.
- :A powerful machine which answers.
- :interconnects networks
Down
- : An attack which slows down or crashes equipment and programs
- :Network attack that occurs on the first day that a vulnerability becomes known.
- :A machine which asks or start communication.
- :A Method to connect Business to Internet
- :Address space for IoT
- :Blocks Unauthorised access to networks.
- :WANs are in control of _______________.
- :A known person trying to access you system.
- :__________Signals are used to carry message in fibre optic cables
- :Creates a secure connection for remote workers.
- :command to go from switch> to switch#
- :Stealing your username and password.
- :interconnect end devices in a limited area such as a home, school, office building, or campus.
- : These are used to identify fast-spreading threats, such as zero-day or zero-hour attacks.
- :Priority Queues
26 Clues: :Priority Queues • :Network Can grow • :Address space for IoT • :interconnects networks • :A program to stop virus attack. • :A powerful machine which answers. • :All devices can talk to each other. • :Marks IP address in network diagram • :Deny or allow packet based on rules. • :Stealing your username and password. • :command to go from switch> to switch# • ...
MTG crossword 2022-08-30
Across
- A permanent that can be tapped for mana
- When you play a spell
- The first plane created
- When you turn a permanent sideways to use an ability or attack
- total How much health you have
- A normally coloured permanent type that doesn't attack
- A spell that stays on the field after being cast
- What colour a spell is which changes what mana is needed to cast it
- What you play the game with
- Where you put spells after use or they are destroyed
- A Permanent that you can only have one of on the field at a time
Down
- What you use to cast spells
- A permanent spell that attacks
- An impermanent spell that can only be cast on your turn
- What happens when your creature hits an opponent or a spell damages them
- An impermanent spell that can be cast at any time
- When a permanent is destroyed by a spell
- What MTG is set in
- A normally colourless permanent type that doesn't attack
- Every playable card except lands
- A permanent with loyalty abilities
- When you use your creatures to damage your opponent
22 Clues: What MTG is set in • When you play a spell • The first plane created • What you use to cast spells • What you play the game with • A permanent spell that attacks • total How much health you have • Every playable card except lands • A permanent with loyalty abilities • A permanent that can be tapped for mana • When a permanent is destroyed by a spell • ...
Beachvolleyball 2025-04-04
Across
- how long does the break between two sets lasts for?
- a competition/ event with multiple teams
- The dividing structure between the two teams
- the number of sets needed to win
- when you set the ball so that your teammate can attack
- the person who tries to make a point when hitting the ball over the net
- when you try to defend an attack
Down
- The maximum number of touches a team can make before returning the ball
- A one-handed attack using stiff fingers to poke the ball over the net
- what you get when your attack was succesfull
- the length of one side of the court
- the person who starts the rally
- kind of defence right at the net
- the sports equipment you are using to play
- The surface on which beach volleyball is played
- A serve that lands untouched on the opponent's court
16 Clues: the person who starts the rally • kind of defence right at the net • the number of sets needed to win • when you try to defend an attack • the length of one side of the court • a competition/ event with multiple teams • the sports equipment you are using to play • what you get when your attack was succesfull • The dividing structure between the two teams • ...
Cybersecurity Awareness Month - Week 3 2022-10-05
Across
- Cirrus' tool for endpoint security
- A memorized secret consisting of a sequence of random words that is longer than a typical password
- Cirrus' email security platform
- A password attack that uses trial-and-error by attempting every possible combination
- Malware that disables access to data until a fee is paid
- A type of virus that automatically spreads itself
Down
- software designed to detect and destroy viruses
- A network of devices infected and controlled by the same virus
- A physical device that connects to a network
- A social engineering attack delivered by SMS text message
- A phishing attack aimed at senior executives
- The process of encoding data using complex algorithms for confidentiality
- An attack that prompts an MFA approval request over and over
- Malware that is disguised as legitimate software
- A social engineering technique where an attacker creates a fake scenario
- A type of trojan spyware that records your keystrokes
16 Clues: Cirrus' email security platform • Cirrus' tool for endpoint security • A physical device that connects to a network • A phishing attack aimed at senior executives • software designed to detect and destroy viruses • Malware that is disguised as legitimate software • A type of virus that automatically spreads itself • A type of trojan spyware that records your keystrokes • ...
B2U1&B2U2 2025-12-05
Across
- dolphin
- attack
- extinct
- paraphrase
- application
- comparison
- reserve
- attempt
- species
- creatively
- recover
- process
- unusual
- worthwhile
- prevent
- authority
- antelope
- contribution
- establish
- historic
- disappear
- balance
Down
- harmony
- donate
- entrance
- document
- committee
- proposal
- quality
- sacred
- investigate
- archaeologist
- threaten
- department
- antelope
- identify
- kangaroo
- attack
- habitat
- heritage
- professional
- extinction
- binoculars
- average
44 Clues: donate • attack • sacred • attack • harmony • dolphin • extinct • quality • reserve • attempt • species • recover • process • unusual • habitat • prevent • average • balance • entrance • document • proposal • threaten • antelope • identify • kangaroo • heritage • antelope • historic • committee • authority • establish • disappear • paraphrase • comparison • department • creatively • worthwhile • extinction • binoculars • application • investigate • professional • ...
Chapter 6 Advance Cyber 2025-11-16
Across
- Unpatched or outdated applications that create security holes.
- An attack that compromises a website known to be frequented by a specific target group.
- False information spread intentionally to deceive.
- The social engineering tactic of creating a fabricated scenario to obtain information.
- A network connected using physical cables, like Ethernet.
- A threat delivered via an attachment, like a malicious PDF or DOC file.
- Phishing conducted via SMS text message.
- A potential physical threat vector, like a USB drive.
- False information that is spread, regardless of the intent to deceive.
- Registering a domain name very similar to a popular one, relying on user mistypes.
- End-of-life (EOL) software that no longer receives security patches. (2 Words)
- A network that uses radio waves, like Wi-Fi.
- A short-range wireless protocol used for PANs (Personal Area Networks).
Down
- A type of spam that embeds its message in a picture to evade text filters.
- Network ports left accessible and running services, creating potential entry points.
- Security software installed directly on an endpoint, like a laptop or PC.
- An attack that mimics the look and feel of a legitimate company's logo, website, or email.
- Security scanning performed remotely, without installing software on the target device.
- A social engineering attack using email to trick a user into revealing credentials.
- Phishing conducted over a voice call.
- Unsolicited and unwanted bulk email.
- The technical name for text messaging (Abbr: SMS).
- An attack that targets a trusted third-party vendor to compromise the final target.
- The medium used for a 'vishing' attack.
24 Clues: Unsolicited and unwanted bulk email. • Phishing conducted over a voice call. • The medium used for a 'vishing' attack. • Phishing conducted via SMS text message. • A network that uses radio waves, like Wi-Fi. • False information spread intentionally to deceive. • The technical name for text messaging (Abbr: SMS). • A potential physical threat vector, like a USB drive. • ...
Security 2025-02-26
Across
- A type of malware that records keystrokes to steal sensitive data.
- A technique where an attacker sends fraudulent emails to steal sensitive information.
- A network device that filters incoming and outgoing traffic based on security rules.
- The process of disguising data within an image or another file to hide its presence.
- A wireless attack that involves setting up a fraudulent Wi-Fi access point.
- An attack that overloads a system with excessive requests, making it unavailable.
- A network of compromised computers controlled remotely by an attacker.
- An attack where an unauthorized person intercepts communication between two parties.
- An attack where an unauthorized user gains access by following an authorized user.
Down
- A cryptographic attack that attempts to find two different inputs producing the same hash.
- A social engineering technique where an attacker manipulates victims by creating a sense of urgency.
- Software that automatically displays or downloads advertisements, often without user consent.
- Software that secretly gathers information about a user without their knowledge.
- The process of confirming a user’s identity before granting access.
- A type of malware that enables persistent, unauthorized access to a computer.
- The principle that ensures only authorized users can access certain data.
- A type of malware that locks users out of their system until a payment is made.
- A malicious program that disguises itself as legitimate software.
- A security protocol that provides encrypted communication over a computer network.
19 Clues: A malicious program that disguises itself as legitimate software. • A type of malware that records keystrokes to steal sensitive data. • The process of confirming a user’s identity before granting access. • A network of compromised computers controlled remotely by an attacker. • The principle that ensures only authorized users can access certain data. • ...
PREFIXES Crossword 2014-09-16
Across
- something perfomed by a pair of individuals
- an american whos family cames from england
- relating or including many different cultures
- to say that is not allowed
- something beyond earth
- a half of the earth
- sad, depressed or disapointed
- a compaound with two oxygen atoms per molecule
Down
- sounds that are too high to hear
- straight line that join two opposites corners of a shape
- the middle of the night
- an attack made as a replay of another attack
- to open or release something
- the part of the invisible spectrum
- opossite statement
- the study of secret writting
- to be sad or gloomy
- when bloodn have less celss than aberage
- to change words from one language into another languge
- something under the surface of the sea
20 Clues: opossite statement • to be sad or gloomy • a half of the earth • something beyond earth • the middle of the night • to say that is not allowed • to open or release something • the study of secret writting • sad, depressed or disapointed • sounds that are too high to hear • the part of the invisible spectrum • something under the surface of the sea • ...
The Langley Lexicon: Haunted Cleat Edition 2025-10-22
Across
- Pressure, __________, Balance
- Our favourite type of corner
- Formation that defines us
- We break the curse with this dessert
- When we’re on the attack inside the six-yard box, what zone are we in?
- Still in high school but plays like a vet
- On the attack, we get __________
- Future Oscar winner — her performances never miss
- When outnumbered on the attack, we __________
- Fastest feet in Langley
- The position that runs a half marathon every game AKA the workhorses of our team
Down
- Sideline, aka __________
- This award goes to the player who never gives up
- 2 is ______
- Three team values (Commitment, Skill and __________)
- Fixes backs by day, breaks ankles by night
- Tuesday night training program
- Club acronym
- Prefers her apples microwaved
- Extinguishes danger: in the back line and the backcountry
20 Clues: 2 is ______ • Club acronym • Fastest feet in Langley • Sideline, aka __________ • Formation that defines us • Our favourite type of corner • Pressure, __________, Balance • Prefers her apples microwaved • Tuesday night training program • On the attack, we get __________ • We break the curse with this dessert • Still in high school but plays like a vet • ...
The Devil's Light 2012-11-27
Across
- The mastermind behind the attack
- Analyst who studied al Qaeda operatives
- The nuclear bomb is smuggled out of which country?
- This is where the bomb was transported.
- When the attack was supposed to take place
- What river did Al Zaroor cross to get into Syria?
- Dr. Laura Reynolds was this
- Anit killed the Palestinian in the windpipe with this.
- Al Zaroor was in a cave in these mountains.
- Chandler is sent here
- What is actually the devil's light in the novel?
- Al Zaroor has suicide planes fly in to the this
- Associated with bin Laden
- Chandler believed that Israel would attack this in Lebanon.
- strategist
- Skeptical of Chandler
- York Where did Anit study before the attack on 9/11?
Down
- Chandler's retired mentor
- bin Laden released this and explained what was going to happen to an American city
- Osama bin Laden is called this
- Al Zaroor's original name
- What religious background was Anit?
- CIA agent
- God-willing
- Where did Marwan study?
- The bomb is stolen from a Pakistani
- If the intended targets are carried out, it would result in a civil war between these two groups.
- Where the attack also took place in the beginning of the novel.
- Who was Laura's intern?
- Reynolds Who really was Anit?
- Chandler's cover was blown by a colleague in this country
- Anit's only source in the Jefaar clan.
- Chandler believes that this is the real target
33 Clues: CIA agent • strategist • God-willing • Chandler is sent here • Skeptical of Chandler • Where did Marwan study? • Who was Laura's intern? • Chandler's retired mentor • Al Zaroor's original name • Associated with bin Laden • Dr. Laura Reynolds was this • Reynolds Who really was Anit? • Osama bin Laden is called this • The mastermind behind the attack • What religious background was Anit? • ...
Attack On Titan (AOT) 2022-04-13
Across
- Traditionally, they were a bloodline of warriors that protected Eldia's king
- to the seller
- Connie's best friend
- Sasha Braus killed by
- Horse face
- main character
- leader of the Anti-Marleyan Volunteers
Down
- was in charge of their training and evaluation to become soldiers.
- Eren's titan
- was saved by eren as a kid
- Peick's titan
- Beast titan
- Female titan
- childhood friend of eren and mikasa/arm-in arm-out
- leader of the scout regiment
15 Clues: Horse face • Beast titan • Eren's titan • Female titan • to the seller • Peick's titan • main character • Connie's best friend • Sasha Braus killed by • was saved by eren as a kid • leader of the scout regiment • leader of the Anti-Marleyan Volunteers • childhood friend of eren and mikasa/arm-in arm-out • was in charge of their training and evaluation to become soldiers. • ...
ANIME ATTACK ON TITAN 2023-11-21
Across
- IBU DARI 9 TITAN SHIFTER
- SIAPA TITAN TERPENDEK
- SIAPAKAH NAMA AYAH EREN
- TANGGAL BERAPAKAH AOT TAMAT
- SIAPAKAH TOKOH UTAMA AOT
- SIAPAKAH KAPTEN DIPASUKAN PENGINTAI
- NAMA TITAN YANG DIMILIKI EREN KECUALI FOUNDING
- APA NAMA TITAN PESURUH FOUNDING TITAN
Down
- SIAPAKAH RATU DARI PULAU PARADISE
- TITAN YANG DITEBAS LEVI
- SIAPAKAH TITAN TERBESAR
- SIAPAKAH DIBALIK TITAN BINATANG
- SIAPAKAH ORANG DI BALIK TITAN CART
- SEASON BERAPAKAH HAPPY ENDING
- TITAN APA YANG DAPAT DIKENDALIKAN ZEKE
15 Clues: SIAPA TITAN TERPENDEK • TITAN YANG DITEBAS LEVI • SIAPAKAH TITAN TERBESAR • SIAPAKAH NAMA AYAH EREN • IBU DARI 9 TITAN SHIFTER • SIAPAKAH TOKOH UTAMA AOT • TANGGAL BERAPAKAH AOT TAMAT • SEASON BERAPAKAH HAPPY ENDING • SIAPAKAH DIBALIK TITAN BINATANG • SIAPAKAH RATU DARI PULAU PARADISE • SIAPAKAH ORANG DI BALIK TITAN CART • SIAPAKAH KAPTEN DIPASUKAN PENGINTAI • ...
Word Attack Skills 2015-10-07
10 Clues: wise • noisy • secret • horrible • slanderous • to immunize • dishonor, shame • a fortified place • a troubling situation • restraining behavior or appetite
Attack on titan 2025-06-13
Across
- "Attack on titan" for short
- Erens adoptive sister
- 60 metres tall titan
- Main charecter that transforms into Attack Titan
- Erens last name
- Giant that eats humans
Down
- What protects humans from the titans?
- Captains of the Survey Corps name
- The last name of the protagonist's best friend, Armin
- What is female titans name?
10 Clues: Erens last name • 60 metres tall titan • Erens adoptive sister • Giant that eats humans • "Attack on titan" for short • What is female titans name? • Captains of the Survey Corps name • What protects humans from the titans? • Main charecter that transforms into Attack Titan • The last name of the protagonist's best friend, Armin
vocab 2013-02-11
Across
- please
- sluggish or drowsy
- to pulsate with unusual rapity from emotion (beat)
- void of freshness
- impulsive or unpredictable
- worn out
- to advise or caution
- high sounding or pretentious
- wise
Down
- quick attack
- to protest or attack with words
- wicked or criminal
- apeace to anger
- to make of become confused
- calm anger of excitment
- vaporize
- hatred or malous
- to roll or toss
- contant persiverence
- reduce in amount
20 Clues: wise • please • vaporize • worn out • quick attack • apeace to anger • to roll or toss • hatred or malous • reduce in amount • void of freshness • wicked or criminal • sluggish or drowsy • contant persiverence • to advise or caution • calm anger of excitment • to make of become confused • impulsive or unpredictable • high sounding or pretentious • to protest or attack with words • ...
vocab 2013-02-11
Across
- apeace to anger
- worn out
- calm anger of excitment
- hatred or malous
- void of freshness
- please
- impulsive or unpredictable
- to advise or caution
- high sounding or pretentious
- to roll or toss
Down
- sluggish or drowsy
- to protest or attack with words
- wise
- quick attack
- to pulsate with unusual rapity from emotion (beat)
- reduce in amount
- wicked or criminal
- contant persiverence
- vaporize
- to make of become confused
20 Clues: wise • please • worn out • vaporize • quick attack • apeace to anger • to roll or toss • hatred or malous • reduce in amount • void of freshness • sluggish or drowsy • wicked or criminal • contant persiverence • to advise or caution • calm anger of excitment • impulsive or unpredictable • to make of become confused • high sounding or pretentious • to protest or attack with words • ...
Pokemon Trading Card Game Crossword #1 2022-02-27
10 Clues: Attack: Bubble Pod • Ability: Dark asset • Attack: Royal Blaze • Ability: Chromashift • Ability: Cotton Lift • Attack: Electro Ball • Ability: Luminous Sign • Attack: Fists of Strife • Ability: Dance of the Ancients • Trainer: Each player shuffles their hand into their deck and draws 4 cards.
CHAPTER 16-3 SECESSION AND WAR 2021-02-11
Across
- "The ________ Established" 446
- Confederates demand what of the fort? 449
- Virginian concerned about the future 446
- withdraw from the Union 446
- used to justify secession 446
- Captain who witnessed the attack 449
- state that separated from Virginia in 1861 447
- what was attacked to start the Civil War 449
- "No human power can save the _____" 446
Down
- harbor location of attack on the fort 449
- "The Union of these states is _______" 448
- first state to secede from the Union 447
- Lincoln contacts what Governor after attack 449
- what states talked of secession 446
- issue that split the Democratic party 445
- Confederate guns open fire "___ 12, 1861 449
- Most northerners believed the Union should be ______447
- President of the Confederate states? 446
- Northern democrats supported what? 445
- "______ Lincoln" 445
20 Clues: "______ Lincoln" 445 • withdraw from the Union 446 • used to justify secession 446 • "The ________ Established" 446 • what states talked of secession 446 • Captain who witnessed the attack 449 • Northern democrats supported what? 445 • "No human power can save the _____" 446 • first state to secede from the Union 447 • President of the Confederate states? 446 • ...
iouytiufdhvjb 2023-01-10
Across
- only called out to defend the land in the emergence
- to admit defeat
- resistance against an attack
- flag carried into battle
- aka the confederacy
- to practice military formations
- to rush toward the enemy
Down
- the cruel killing of people
- northerners who opposed the war effort
- aka the union
- to pretend to attack in one direction
- blocking supply lines and escape routes
- to lie and wait for an unexpected attack
- people owned by other people
- branch of the military uses ships to conduct warfare
15 Clues: aka the union • to admit defeat • aka the confederacy • flag carried into battle • to rush toward the enemy • the cruel killing of people • resistance against an attack • people owned by other people • to practice military formations • to pretend to attack in one direction • northerners who opposed the war effort • blocking supply lines and escape routes • ...
Cybersecurity Vocabulary 2021-12-14
Across
- Force attack a cryptographic hack that relies on guessing possible combinations of a targeted password until the correct password is discovered.
- exchange a method in cryptography by which cryptographic keys are exchanged between two parties
- Attack an algebraic mathematical manipulation that attempts to reduce the complexity of the cryptographic algorithm.
- Attack is an attack model for cryptanalysis where the attacker has access to both the plaintext and its encrypted
- Middle Attack is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other, as the attacker has inserted themselves between the two parties
- is cyberwarfare that bypasses or sabotages a victim's strengths while targeting their vulnerabilities Confusion increases the ambiguity of ciphertext
- two properties of the operation of a secure cipher identified by Claude Shannon in his 1945 classified report A Mathematical Theory of Cryptography
Down
- a process of finding weaknesses in cryptographic algorithms and using these weaknesses to decipher the ciphertext without knowing the secret key
- the process of encoding information.
- a collision attack on a cryptographic hash tries to find two inputs producing the same hash value, i.e. a hash collision.
- Attack a method for circumventing the security of a cryptographic system by finding a weakness in a code, cipher, cryptographic protocol or key management scheme
- Exploitation Attack any attack that takes advantage of vulnerabilities in applications, networks, operating systems, or hardware.
12 Clues: the process of encoding information. • exchange a method in cryptography by which cryptographic keys are exchanged between two parties • Attack is an attack model for cryptanalysis where the attacker has access to both the plaintext and its encrypted • ...
attack at sea 2016-02-25
Snack Attack _Animação 2020-06-17
Across
- Perante a atitude do rapaz, ela fica muito
- Sentada no banco a senhora começa a ler o
- A ação decorre numa estação de
- O rapaz não fez nada
- O rapaz está a ouvir
- Quando a máquina dos snacks não funciona, a senhora fica
Down
- Quando se senta no comboio, a senhora percebe o seu erro e sente-se
- A senhora acha que o rapaz está a ser
- Sentados no banco, a senhora e o rapaz comem (palavra inglesa)
- No final, o rapaz mostra que é educado, quando coloca o lixo no
10 Clues: O rapaz não fez nada • O rapaz está a ouvir • A ação decorre numa estação de • A senhora acha que o rapaz está a ser • Sentada no banco a senhora começa a ler o • Perante a atitude do rapaz, ela fica muito • Quando a máquina dos snacks não funciona, a senhora fica • Sentados no banco, a senhora e o rapaz comem (palavra inglesa) • ...
MACK ATTACK II 2016-06-08
Across
- voluntary time off
- What gives you the opportunity to engage in conversations with our members about Navy Federal's products and services!
- a type of check that do not have expiration date
- Navy Federal Online Account Access
Down
- are made available immediately after the member receives a Deposit Approved Notification email
- program was created in 2004 in response to increasing member interest
- A card can be used for withdrawals at ATMs or used to make purchases and the cardholder can select "credit" or "debit" to begin the transaction
- provides members a variety of self-serve options, as well as a routing system that connects them to the correct department right away, if needed
- indicate the system and type of transaction that has occurred on the account
- is a virtual suggestion box that allows employees to submit ideas and feedback on ways the member experience can be improved
10 Clues: voluntary time off • Navy Federal Online Account Access • a type of check that do not have expiration date • program was created in 2004 in response to increasing member interest • indicate the system and type of transaction that has occurred on the account • are made available immediately after the member receives a Deposit Approved Notification email • ...
Zombie Attack 2 2024-05-28
Across
- This is red, you can see it when you cut your hand
- This is in your head and you think with it
- When something bad happens to something
- The colour between black and white
- To cut something with your teeth
Down
- We walk on this
- A dead person who comes alive
- To make something hot with fire
- To start hitting someone suddenly
- A place where we put dead people under the ground
10 Clues: We walk on this • A dead person who comes alive • To make something hot with fire • To cut something with your teeth • To start hitting someone suddenly • The colour between black and white • When something bad happens to something • This is in your head and you think with it • A place where we put dead people under the ground • ...
The Devil's Light 2012-11-27
Across
- If the intended targets are carried out, it would result in a civil war between these two groups.
- York Where did Anit study before the attack on 9/11?
- Chandler is sent here
- Chandler believes that this is the real target
- eleven When the attack was supposed to take place
- Osama bin Laden is called this
- God-willing
- CIA agent
- Where did Marwan study?
- Chandler's retired mentor
- Where the attack took place in the beginning of the novel.
- Skeptical of Chandler
- Chandler's cover was blown by a colleague in this country
- What is actually the devil's light in the novel?
- Al Zaroor has suicide planes fly in to the this
- Associated with bin Laden
- Analyst who studied al Qaeda operatives
- What river did Al Zaroor cross to get into Syria?
- What religious background was Anit?
- strategist
Down
- Al Zaroor was in a cave in these mountains.
- The bomb is stolen from a Pakistani
- Anit's only source in the Jefaar clan.
- bin Laden released this and explained what was going to happen to an American city
- Anit killed the Palestinian in the windpipe with this.
- Dr. Laura Reynolds was this
- Chandler believed that Israel would attack this in Lebanon.
- Al Zaroor's original name
- Who was Laura's intern?
- The nuclear bomb is smuggled out of which country?
- The mastermind behind the attack
- This is where the bomb was transported.
- Reynolds Who really was Anit?
33 Clues: CIA agent • strategist • God-willing • Chandler is sent here • Skeptical of Chandler • Where did Marwan study? • Who was Laura's intern? • Al Zaroor's original name • Chandler's retired mentor • Associated with bin Laden • Dr. Laura Reynolds was this • Reynolds Who really was Anit? • Osama bin Laden is called this • The mastermind behind the attack • The bomb is stolen from a Pakistani • ...
