attack Crossword Puzzles
cardiovascular health 2025-10-20
Across
- infarction
- chambers of the heart (often confused with ventricles)
- tissue of the heart
- of blood vessels
- chambers of the heart
- blood pressure
- heartbeat
- surrounding the heart
- pressure
- EKG worn by patient
- buildup in arteries
- lining of the heart
- heart function
Down
- heart electrical activity
- artery disease
- ultrasound to view the heart
- infarction
- heart failure
- attack
- catheterization
- heart failure
- condition
- monitor
- inserted into heart for diagnosis
24 Clues: attack • monitor • pressure • heartbeat • condition • infarction • infarction • heart failure • heart failure • artery disease • blood pressure • heart function • catheterization • of blood vessels • tissue of the heart • EKG worn by patient • buildup in arteries • lining of the heart • chambers of the heart • surrounding the heart • heart electrical activity • ultrasound to view the heart • ...
F5 Word Skills U.19,21 2025-10-10
Across
- ability to stay calm
- giving help
- look at sth. for a long time
- up for support
- ready to attack
- basic character
- with deal with
- care and attention
- sth. that encourages
- pressure
- a connection
- pressure influence on your behaviour of people of the same age
Down
- having bad effect
- stage
- being the same
- up become better
- feel sorry
- lack of
- very important
- cannot be avoided
20 Clues: stage • lack of • pressure • feel sorry • giving help • a connection • being the same • very important • ready to attack • basic character • with deal with • up for support • having bad effect • cannot be avoided • care and attention • up become better • ability to stay calm • sth. that encourages • look at sth. for a long time • pressure influence on your behaviour of people of the same age
Latin Verbs and Adjectives 2025-11-18
Across
- Christian
- heavy, severe, serious
- easy
- bad
- much, pl many
- first
- praise
- long
- difficult
- common
- good
- noble, renowned
- great, large
- neighboring, next
- attack, assault
Down
- beg, pray
- holy, saint
- brave, strong
- like, similar
- full
- narrow
- eager, desirous
- prepare, get ready
- remaining, the rest of
- seize
- safe
- all, every
- Roman
- short
- high, deep
30 Clues: bad • full • easy • long • safe • good • first • seize • Roman • short • narrow • praise • common • beg, pray • Christian • difficult • all, every • high, deep • holy, saint • great, large • brave, strong • like, similar • much, pl many • eager, desirous • noble, renowned • attack, assault • neighboring, next • prepare, get ready • heavy, severe, serious • remaining, the rest of
Crossword Round 1 2023-01-07
Nakamura12 Bitcoin Crossword 2021-04-14
10 Clues: attack • wallet • bitcoin unit • hash function • bitcoin forum • address format • bitcoin process • bitcoin exchange • layer 2 technology • decentralized digital currency
Sat Crossword by Arjun Mannan 2017-01-11
Emotions 2024-09-29
~vocab~ 2024-12-18
10 Clues: sad, unhappy • dread, worry • weakened, frail • attack, assault • dazed, confused • mute, speechless • formal, ceremonial • terrifying, frightening • affectation, pretension • dissatisfied, frustrated
World War II 2020-02-25
Across
- what was the name of the final Japanese ship the Yorktown engaged with in the Battle of Midway
- what secret language was used to communicate between U.S ships
- around how many days did the Wattle of Midway last
- what was the name of the project that developed the atomic bomb
- in what month did Pearl Harbor happen
- what did Japanese want control over which encouraged them to attack US ships at Pearl Harbor
- what was the largest seaborn invasion performed by Allies
- what was the name of the camps that held Jews captive
- what was the color of the coupons that controlled processed food during war
- how many Japanese aircraft carriers were sunk in the Battle of Midway
- in what battle did Japan lose almost all their naval ships
- where is Normandy located
- how many countries from the United Kingdom were apart of the Allies
- what was the name of the Women’s airforce
- what technique did the Allies use that involved warships in order to maintain shared protection
- in the 4 years America was in WWII, were there more or less than 6500 ships produced
Down
- what country invented the RADAR system
- how many US battleships were sunk in Pearl Harbor
- what type of government did Stalin create
- what inter-racial organization was formed to fight discrimination
- what tactic did Japan use to attack U.S allied ships
- were there more allied ships being produced or being sunk
- the Germans used a new strategy called
- when did DDay take place
- what U.S aircraft carrier was sunk in the Battle of Midway
- what event involved the mass-murder of anyone the Germans thought were sub-human
- what battle emerged from the German U-boats attack on American ships
- what was Hitler’s political philosophy called
- what device did Allies use to detect planes and ships
- which American naval commander defended the islands of Midway
30 Clues: when did DDay take place • where is Normandy located • in what month did Pearl Harbor happen • what country invented the RADAR system • the Germans used a new strategy called • what type of government did Stalin create • what was the name of the Women’s airforce • what was Hitler’s political philosophy called • how many US battleships were sunk in Pearl Harbor • ...
11-2 Neutrality to War (no spaces for 2 word answers) 2023-11-17
Across
- Per Churchill, FDR was looking for an event that would allow the U.S. to act hostilely toward ___ .
- Isolationists knew that attacks on U.S. ships brought America into ___ ___ 1 .
- Soviets & British were at war with the ___ , so they received aid from the Lend-Lease Act.
- Nye Committee Report documented the ___ that arms manufacturers made during WW 1.
- Idea that trade between nations creates prosperity and prevents war, supported by Roosevelt.
- 2,403 Americans killed, 180 aircraft destroyed, & several ships sunk, due to Japan’s ___ attack on Dec 7.
- 1937 Neutrality Act did not apply since ___ did not declare war, so Roosevelt sold weapons to China.
- Neutrality Act of 1937, nations must buy nonmilitary supplies on a ___ ___ ___ basis.
- Germany and ___ declared war on the U.S., hoping for Japan’s support against the Soviet Union.
- Despite negotiations, Japan planned to go to war with the U.S., per a message that U.S. intelligence ___ .
- To slow Japan’s war effort, Roosevelt blocked the sale of strategic materials, like ___ & fuel .
- Neutrality Act of 1936 made it illegal to make ___ to countries at war, which hurt Italy more than Abyssinia.
Down
- U.S. traded ships with Britain for the use of bases, & since there was no ___ , the Neutrality Act did not apply.
- Roosevelt limited oil to Japan & sent MacArthur to the Philippines, because Japanese forces entered ___ .
- Roosevelt’s shoot-on- sight policy toward German uboats led to Germany targeting 2 American ___ .
- Rise of ___ caused the United States to support isolationism.
- Based on Nye Committee, Neutrality Act of 1935 banned the sale of ___ to nations at war .
- Despite the fear of Nazis & Fascism, the U.S. joined W.W. 2 due to the attack on ___ ___ .
- U.S. wanted isolation because European nations said they could no longer pay their war ___ .
- U.S. Officials did not think Japan would attack Pearl Harbor, because of the ___ .
- Nye Committee said arms makers encouraged the U.S. to join W.W. 1, which led to U.S. ___ .
- Neutrality Act of 1939 finally allowed sale of ___ , but only for cash and only if nation carried them away.
22 Clues: Rise of ___ caused the United States to support isolationism. • Isolationists knew that attacks on U.S. ships brought America into ___ ___ 1 . • Nye Committee Report documented the ___ that arms manufacturers made during WW 1. • U.S. Officials did not think Japan would attack Pearl Harbor, because of the ___ . • ...
Cast study - An ethical approach to hacking 2025-06-12
Across
- Simulated cyberattacks used to assess system security.
- The analysis of systems and data to investigate security incidents or breaches.
- Software used to recover or bypass passwords through brute force or other methods.
- A testing method where the tester has full knowledge of the system’s internals.
- The technique of identifying active devices and services on a network.
- A testing method where the tester has partial knowledge of the system.
- A social engineering attack using phone calls to extract sensitive information.
- A unique identifier assigned to each device connected to a network.
- The creation of code or tools to take advantage of system vulnerabilities.
- Identifying the operating system of a target device during reconnaissance.
- Probing a system to identify open ports and available services.
- Psychological manipulation tactics to trick people into revealing confidential information.
- A documented strategy for detecting, responding to, and recovering from security incidents.
Down
- An evaluation of an organization’s overall cybersecurity strength and weaknesses.
- A web attack that injects malicious scripts into trusted websites.
- Using advanced search operators to find sensitive data or vulnerabilities online.
- The process of evaluating systems through defined methods to find vulnerabilities.
- Publicly available information gathered for analysis.
- Malicious software designed to harm or exploit systems.
- An exploit where a program overruns a buffer’s boundary and overwrites adjacent memory.
- A code injection attack targeting databases through malicious SQL queries.
- A social engineering method that involves inventing a scenario to steal information.
- An individual who gains unauthorized access to systems or data.
- A testing method where the tester has no prior knowledge of the system.
- The layout or structure of a network’s connections and devices.
- The process of discovering devices and connections within a network.
26 Clues: Publicly available information gathered for analysis. • Simulated cyberattacks used to assess system security. • Malicious software designed to harm or exploit systems. • An individual who gains unauthorized access to systems or data. • Probing a system to identify open ports and available services. • ...
Magyani, Patrick Joseph Felix 3IT-C ICS133 2017-05-07
Across
- detect burst of errors
- used by modern Unix systems to indicate access rights
- creates botnet focused on financial fraud
- a complaint of a person is charged with breaking specific laws
- hierarchy of folders or directories
- make decisions based on similarities
- may take place at transition
- a complaint of party files lawsuit against another
- keep systems available and in operation
- devices that connect to keyboard’s usb cable
- detects attack without necessarily blocking it
- contain text interpreted by programming language interpreter
- spreads through email
- used by banking industry to protect electronic funds transfers
- first major Internet worm
- handles external devices
- override global file sharing policy
- less provoking
- used by Payment Card Industry to protect credit card transactions
- standards for protecting personal financial info
- system which defenses are weakened
- separate situation
- rights are inherited from enclosing folders
- numbers and other coded data
- causes transitions
Down
- bogus message given to computers
- spreads through Internet via Windows vulnerabilities
- protecting info from improper changes
- 2 parties rely on 3rd party (mediator) to help negotiate settlement
- list of instructions
- modify system to work for threat agent
- procedures that eavesdrop on keyboard input buffers
- financial and accounting standards for public companies
- makes an attack possible
- single arithmetic operation or comparison
- confidentiality attack
- system works on behalf of wrong user
- represented by arrows
- unchanging credential
- designed to infect each computer once
- attacks control logic in industrial plants
- running programs
- recovery from compromise
- selects the right file in the final directory in the path
- 512 bytes each
- simple, standard way for programs to use I/O devices & files
- security standards for certain types of personal health data
- botnet and spam package used to produce 7 million msgs in a day
- detect larger-scale errors
- generates different credential for each login
50 Clues: 512 bytes each • less provoking • running programs • separate situation • causes transitions • list of instructions • represented by arrows • unchanging credential • spreads through email • detect burst of errors • confidentiality attack • makes an attack possible • recovery from compromise • handles external devices • first major Internet worm • detect larger-scale errors • ...
Chapter 20 2022-09-10
Across
- Nosebleed; hemorrhage from the nose
- Condition of profound hemodynamic and metabolic disturbance characterized by failure of the circulatory system to maintain adequate perfusion of vital organs
- Escape of blood from the vessels; bleeding
- Bodily injuries caused by physical means with disruption of the normal continuity of structures
- Vascular reaction, usually transient, involving the upper dermis, representing localized edema caused by dilatation and increased permeability of the capillaries and marked by the development of wheals; also called hives
- Unexpected or sudden occasion; an urgent or pressing need
- around the patient or as if the patient were revolving in space
- subjective sensation or motor phenomenon that proceeds and marks the onset of a paroxysmal attack, such as in a elileptic attack.
- Forcible expulsion of the contents of the stomach through the mouth
- Stroke or Brain Attack Condition with sudden onset caused by acute vascular lesions of the brain; often followed by permanent neurologic damage
- Abnormally diminished concentration of glucose in the blood
Down
- Illusion of movement; sensation as if the external world were
- Paleness; absence of skin coloration
- Device used for application of external electrical shock to restore normal cardiac rhythm and rate
- Abnormally increased concentration of glucose in the blood
- Artificial substitution of heart and lung action as indicated for cardiac arrest or apparent sudden death resulting from electric shock, drowning, respiratory arrest, and other causes
- Temporary suspension of consciousness as a result of generalized cerebral ischemia; faint or swoon
- Disorganized cardiac rhythm
- Sudden stoppage of cardiac output and effective circulation
- Separation of the layers of a surgical wound; may be partial, superficial only, or complete, with disruption of all layers
- Unpleasant sensation, vaguely referred to the epigastrium and abdomen and often culminating in vomiting
- Abnormal drowsiness or stupor; a condition of indifference
22 Clues: Disorganized cardiac rhythm • Nosebleed; hemorrhage from the nose • Paleness; absence of skin coloration • Escape of blood from the vessels; bleeding • Unexpected or sudden occasion; an urgent or pressing need • Abnormally increased concentration of glucose in the blood • Abnormal drowsiness or stupor; a condition of indifference • ...
Module 5 Vocabulary Crossword Puzzle 2025-01-31
Across
- A group of compromised computers or mobile devices connected to a network such as the Internet that are used to attack other networks, usually for nefarious purposes.
- Make a copy of a file, program, or media.
- Hardware and/or software that protects a network’s resources from intrusion by users on another network, such as the Internet.
- The unauthorized and illegal duplication of copyrighted software.
- An object that can be tapped or clicked — such as a button, image, or link — on a website, pop-up ad, pop-under ad, or in an email message or text message contains a malicious program.
- An attack whose goal ranges from disabling a government’s computer network to crippling a country.
- The process of decoding encrypted data.
- A private combination of characters associated with the user name that allows access to certain computer, mobile device, or network resources.
- A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
- A compromised computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider.
- Creates software registration numbers and sometimes activation codes.
- The discovery, collection, and analysis of evidence found on computers and networks. See also cyberforensics
Down
- The process of converting data that is readable by humans into encoded characters to prevent unauthorized access.
- A small text file that a web server stores on your computer.
- Destructive event or prank
- Someone who accesses a computer or network illegally.
- Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action.
- Someone who demands payment to stop an attack on an organization’s technology infrastructure.
- A program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.
- The encrypted (scrambled) data
20 Clues: Destructive event or prank • The encrypted (scrambled) data • The process of decoding encrypted data. • Make a copy of a file, program, or media. • Someone who accesses a computer or network illegally. • A small text file that a web server stores on your computer. • The unauthorized and illegal duplication of copyrighted software. • ...
Volleyball Vocab 2025-05-17
Across
- most severe violation
- stepping on or over line during serve
- offensive move from behind 10 foot line
- "home" for volleyball game
- offensive hit
- a series of contests between a number of teams
- American abolitionist and orator, namesake
- passing a spiked ball
- one of three or five parts of a match
- attack resulting in immediate point or sideout
- toss, leap, hit to start play
- successive hits by same player
- first team in high school sports
- game official
- elite volleyball shoes
- fast stride toward net
- clockwise movement of players around the court
- vertical net rods
- noise from parents in the stands
- roaming defensive player
- snack stand
- second team in high school sports
- original name for "volleyball" game, coined by William Morgan
- hit or attack
- Kentucky high school sports governing body
- Occurs when a blocker gets hit in the head or face by a spiked ball
Down
- breaking plane of net during blocking
- defensive play to deflect the ball
- one handed reach to prevent ball falling to floor
- offensive front row player
- supporters of the team responsible for fundraising
- student proficient in sports
- FDHS mascot
- forearm pass
- game admission passes
- failure to play ball according to the rules
- catch and throw or prolonged contact with ball
- best sport ever
- a game event
- posture of player awaiting contact with ball
- forward rotation applied to serve
- unrotating serve
- leader, teacher and mentor
- serve that immediately scores point
- the receiving team successfully puts the ball away against the serving team
- pass or set to teammate who attacks for a kill
- court divider
- mid-leg equipment to protect during dives
- forward body motion to prevent ball from hitting the ground
- medical associate assisting with injury triage
50 Clues: FDHS mascot • snack stand • forearm pass • a game event • offensive hit • game official • court divider • hit or attack • best sport ever • unrotating serve • vertical net rods • most severe violation • game admission passes • passing a spiked ball • elite volleyball shoes • fast stride toward net • roaming defensive player • offensive front row player • "home" for volleyball game • ...
Let's engAJe terrorism 2017-04-26
Across
- In which century did terrorism start?
- drawn to terrorism
- /what is the main objective of a terrorist? Violence or division
- the 1880s, who were the group of people responsible for terrorism in the form of high profile assassinations of political leaders?
- of the most powerful terrorist organisation today.
Down
- is the aim of terrorism?
- /One nature of terrorist attack
- uniting characteristic that defines terrorism
- country that has 15 anti-Muslim attacks after a terrorist attack
- is the latest measure that the Singaporean government has deployed?
10 Clues: drawn to terrorism • is the aim of terrorism? • /One nature of terrorist attack • In which century did terrorism start? • uniting characteristic that defines terrorism • of the most powerful terrorist organisation today. • country that has 15 anti-Muslim attacks after a terrorist attack • /what is the main objective of a terrorist? Violence or division • ...
Vocab 2 2021-09-08
Across
- N-a loud and confused noise
- V-To take the work or an idea of someone else and pass it off as one's own.
- Adj-harsh and difficult to live in.
- N-a statement that denies something, especially responsibility.
- V-To peel the skin off (carcass)
Down
- Adj-not expressing a definite opinion or course of action
- Adj-having lost enthusiasm and hope; disheartened.
- N-a wrong or inaccurate name
- adj-defiant of authority; disobedient to orders.
- V-to make an attack or assault in return for a similar attack.
10 Clues: N-a loud and confused noise • N-a wrong or inaccurate name • V-To peel the skin off (carcass) • Adj-harsh and difficult to live in. • adj-defiant of authority; disobedient to orders. • Adj-having lost enthusiasm and hope; disheartened. • Adj-not expressing a definite opinion or course of action • V-to make an attack or assault in return for a similar attack. • ...
Coach hulett vocab 2022-04-21
Across
- _____ abuse is a pattern of attacking another persons emotional development and sense of worth
- willful killing of one human being by another
- unlawful physical attack or threat of attack
- ______ abuse is a pattern of causing bodily harm or injury to another person
- use of communication and, in many cases compromise to settle a disagreement
Down
- disagreement, struggle, or fight
- ____ violence committed for no particular reason
- bringing in a neutral third party to help others resolve their conflicts peacefully
- repeatedly following, harassing, or threatening an individual
- become more serious
10 Clues: become more serious • disagreement, struggle, or fight • unlawful physical attack or threat of attack • willful killing of one human being by another • ____ violence committed for no particular reason • repeatedly following, harassing, or threatening an individual • use of communication and, in many cases compromise to settle a disagreement • ...
pests and diseases 2023-05-04
Across
- Chew and then suck causing plant tissue to become speckled
- larva of moths and butterflies
- eat leaves,stems,flowers,fruit and nuts
- Have two sponge-like structures that collect liquid food and move it into the food canal
- usually attack stems, but may eat other plant parts
- Attack underside of leaves causing gray to grayish-green spots
Down
- causes sticky substances and black mold
- Appear as black or brown raised lumps attached to stems
- eat all parts of plants
- Pierce and suck from underside of leaves and in leaf axils
10 Clues: eat all parts of plants • larva of moths and butterflies • causes sticky substances and black mold • eat leaves,stems,flowers,fruit and nuts • usually attack stems, but may eat other plant parts • Appear as black or brown raised lumps attached to stems • Chew and then suck causing plant tissue to become speckled • ...
The Pearl- Vocab 2023-11-28
Across
- soft, moist mass of material, typically of a plant applied to the body to relieve soreness
- or rude in speech or behavior
- solid wall-like structure raised for defense
- slowly and with heavy steps typically because of exhaustion or harsh conditions
Down
- agreement or cooperation
- mock blow or attack on or toward one part in order to distract attention on attack
- deceive, win over, or induce to do something by artful coaxing and wheedling or trickery
- drowsiness
- by outstanding strength
- express sorrow or mourning
10 Clues: drowsiness • by outstanding strength • agreement or cooperation • express sorrow or mourning • or rude in speech or behavior • solid wall-like structure raised for defense • slowly and with heavy steps typically because of exhaustion or harsh conditions • mock blow or attack on or toward one part in order to distract attention on attack • ...
Unit 5 crossword puzzle 2023-11-07
Across
- a line separating two countries
- a rapid surprise attack on an enemy
- a temporary suspension of fighting
- conditions relating to public health
- a person who moves from one place to another, especially in order to find work or better living conditions.
Down
- the reduction or withdrawal of military forces and weapons.
- a person who has been forced to leave their country in order to escape war, persecution, or natural disaster.
- an instance of defeating or being defeated.
- an unlawful seizure of power from a government.
- an attack made by aircraft
10 Clues: an attack made by aircraft • a line separating two countries • a temporary suspension of fighting • a rapid surprise attack on an enemy • conditions relating to public health • an instance of defeating or being defeated. • an unlawful seizure of power from a government. • the reduction or withdrawal of military forces and weapons. • ...
World War 2 Of Japan 2024-05-10
Across
- The Battle between the USA and Japanese Naval Forces
- The alliance between Japan,Germany and Italy
- Harbor The surprise attack by Japan on the USA
- The supreme ruler of Japan during World War 2
- The Imprisonments of the Japanese- Americans in the USA
Down
- The Japanese Admiral who planned the attack on Pearl Harbor
- Emperor of Japan and Prince of Tokyo
- The decision to end the war after the bombings of Hiroshima and Nagasaki
- Japans control over other countries during the war.
- A Battle Cry used during the World War 2
10 Clues: Emperor of Japan and Prince of Tokyo • A Battle Cry used during the World War 2 • The alliance between Japan,Germany and Italy • The supreme ruler of Japan during World War 2 • Harbor The surprise attack by Japan on the USA • Japans control over other countries during the war. • The Battle between the USA and Japanese Naval Forces • ...
chapter 31 One of us is Next 2025-01-06
Across
- Characterized by a state of nervousness, anxiety, or heightened stress.
- Using influence or control to gain an advantage over others, often in
- Susceptible to physical or emotional harm, danger, or attack.
- Not based on reason or logic; unreasonable or illogical.
- Feeling intense frustration or annoyance.
Down
- A hostile or argumentative meeting or encounter between people.
- Protecting oneself or one's position from criticism or attack.
- Not dependable or trustworthy; prone to failure or inconsistency.
- Having doubts or reservations about something; questioning or unsure.
- An unjustified or unreasonable attitude toward a group or individual,
10 Clues: Feeling intense frustration or annoyance. • Not based on reason or logic; unreasonable or illogical. • Susceptible to physical or emotional harm, danger, or attack. • Protecting oneself or one's position from criticism or attack. • A hostile or argumentative meeting or encounter between people. • Not dependable or trustworthy; prone to failure or inconsistency. • ...
BEGINNING OF WWII SUMMARY 2025-06-05
Across
- Powers – The WWII alliance of Germany, Italy, and Japan.
- – A government with total control over people’s lives.
- – Not taking sides in a war.
- Act – A U.S. law allowing weapons and supplies to be sent to Allied nations.
- – Giving in to demands to avoid conflict.
Down
- – A fast and powerful military attack meant to win quickly.
- – A ruler with total power, often using force.
- – The WWII alliance that included the U.S., Britain, and the Soviet Union.
- Superiority – Control of the air in a conflict.
- – An armed attack to take over another country.
10 Clues: – Not taking sides in a war. • – Giving in to demands to avoid conflict. • – A ruler with total power, often using force. • Superiority – Control of the air in a conflict. • – An armed attack to take over another country. • – A government with total control over people’s lives. • Powers – The WWII alliance of Germany, Italy, and Japan. • ...
Week 16 Vocabulary 2025-12-12
Across
- to invest with ministerial, priestly functions; to order or command
- a remaining, and usually small part of something
- to become spread throughout all parts of
- the point or gist of something; a shortened body part
- to satisfy, slake, or allay (thirst, desires, passion): to put out
Down
- wise or judicious in practical affairs; careful in providing for future
- existing, occurring, or operating at the same time
- to outdo; surpass; excel
- an onset, assault, or attack in a vigorous manner; to attack harshly
- to turn aside abruptly in movement or direction
10 Clues: to outdo; surpass; excel • to become spread throughout all parts of • to turn aside abruptly in movement or direction • a remaining, and usually small part of something • existing, occurring, or operating at the same time • the point or gist of something; a shortened body part • to satisfy, slake, or allay (thirst, desires, passion): to put out • ...
Grenade book Crossword 2021-05-11
15 Clues: bully • gun ammo • flying car • japans enemy • Americas enemy • an attack ship • scared not brave • a group of troops • a Japanese warrior • Shooty shoot shoot • protects your head • a hand held explosive • long ranged rifle man • one of the main characters • one of the main characters
Unit I & II Cumulative 2025-05-05
14 Clues: never • often • to judge • I wait for • at that time • I had praised • we will attack • we do set free • they will seize • he will prepare • then, therefore • we were overcoming • you (s) did disturb • you (s) will have explored
Protocols 2021-09-18
Across
- A MVC with rollover is a _________ mechanism.
- 19-D-05 handles patients just ____________ and/or defibrillated (external).
- __________ struck by lightning carry no electrical charge.
- The __________ of an unconscious person must be constantly maintained.
- __________ pain in cardiac range patients is considered a heart attack until proven otherwise.
- __________ medical problems involving 1st and 2nd party callers will be interrogated using protocol 26.
Down
- Non-/unresponsive is an example of an Altered Level of _______________.
- Presentation of the cord, hands, feet or buttocks.
- Uncertain/ineffective breathing (1st or 2nd party caller)
- First Law of Capsizing states that if a boat capsizes, _______ with the boat.
- Burning brush or grass
- Jaw pain is a symptom of a _________ attack.
- Uncontrolled bleeding is a _________ hemorrhage
- Any report of fire inside a structure is sent as an ________ from case entry.
14 Clues: Burning brush or grass • Jaw pain is a symptom of a _________ attack. • A MVC with rollover is a _________ mechanism. • Uncontrolled bleeding is a _________ hemorrhage • Presentation of the cord, hands, feet or buttocks. • Uncertain/ineffective breathing (1st or 2nd party caller) • __________ struck by lightning carry no electrical charge. • ...
Jesse Kinsumba 2018-11-16
Across
- programs that can enter computers or IT systems in a number of ways, causing effects that range from simply annoying to highly-destructive and irreparable.
- This is similar to a virus, but it differs in that all it does is make copies of itself (or part of itself).
- This refers to the process of a virus entering a computer or certain areas of a computer or files.
- (attack) A nuke attack is aimed at causing the network connection to fail. A computer that has been nuked may block.
- Someone who tries to break into (restricted) computer systems.
- horse Strictly speaking, a Trojan is not a virus, although it is often thought of as such. Really they are programs that, enter computers appearing to be harmless programs, install themselves and carry out actions that affect user confidentiality.
Down
- This is a Denial of Service (DoS) attack where multiple computers attack a single server at the same time. Compromised computers would be left vulnerable, allowing the attacker to control them to carry out this action.
- Someone who accesses a computer illegally or without authorisation.
- Files, programs, applications and operating systems that enable users to operate computers or other IT systems. These are the elements that make the hardware work.
- This is an executable file that contains various types of virus.
- Phishing involves massive sending of emails that appear to come from reliable sources and that try to get users to reveal confidential banking information. The most typical example of phishing is the sending of emails that appear to come from an online bank in order to get users to enter their details in a spoof web page.
- This is not a virus, but a trick that aims to make users believe they have been infected by a virus.
- bomb This is a program that appears quite inoffensive, but which can carry out damaging actions on a computer, just like any other virus.
- virus A virus that affects macros in Word documents, Excel spreadsheets, PowerPoint presentations, etc.
- messages distributed by electronic means from one computer user to one or more recipients via a network.
15 Clues: Someone who tries to break into (restricted) computer systems. • This is an executable file that contains various types of virus. • Someone who accesses a computer illegally or without authorisation. • This refers to the process of a virus entering a computer or certain areas of a computer or files. • ...
soliton's_Bitcoin#8 2021-09-29
Revision 1 2022-09-05
10 Clues: Long • Attack • Take in • Transmit • Depend on • Equipment • Highest level • Welcome somebody • Convincingly, strongly • Object that prevents dogs from barking
Crossword 2020-04-06
Week of Oct 9th 2020-10-06
The Lion and The Cows 2023-08-10
Vocab 2022-09-20
Spelling 11/28 2016-11-18
Across
- (v) make an attack or assault in return for a similar attack
- (adj) not enough; inadequate
- (n) lack of variety of interest; tedious repetition and routine
- (n) unsteady movement of air or water
- (n) a judgment that a person is not guilty of the crime which the person has been charged
Down
- (n) an act or incident involving excitement, daring, or adventure
- (adj) evoking a keen sense of sadness or regret
- (adj) causing great damage
- (adj) well meaning and kindly
- (n) a long, angry speech of criticism or accusation
10 Clues: (adj) causing great damage • (adj) not enough; inadequate • (adj) well meaning and kindly • (n) unsteady movement of air or water • (adj) evoking a keen sense of sadness or regret • (n) a long, angry speech of criticism or accusation • (v) make an attack or assault in return for a similar attack • (n) lack of variety of interest; tedious repetition and routine • ...
Master 2024-12-27
Across
- A network of infected computers controlled by a hacker.
- A string of text created from data for verification.
- An attack that floods a server with traffic to crash it.
- A deliberate effort to compromise a computer system.
- A security model where no one inside a network is trusted by default.
- A simulation of an attack to test security.
Down
- Investigating digital data to find evidence.
- A pathway used by attackers to exploit a vulnerability.
- Tools used to create fake emails for attacks.
- A deviation from normal behavior in system logs.
10 Clues: A simulation of an attack to test security. • Investigating digital data to find evidence. • Tools used to create fake emails for attacks. • A deviation from normal behavior in system logs. • A string of text created from data for verification. • A deliberate effort to compromise a computer system. • A network of infected computers controlled by a hacker. • ...
READING B page 94 2025-04-10
Across
- (adv) used when you admit that something is true
- (adj) susceptible to physical or emotional attack.
- (v) to suddenly move very quickly in a particular direction
- (v) to defend yourself successfully against people who attack
- (v) to do what you have to do or are asked to do.
Down
- (adj) extremely serious or terrible.
- (v) to move away from someone or something
- (v) to send people away from a dangerous place to a safe place
- (v) to imagine something that you think might happen in the future
- (v) used to make future tenses
10 Clues: (v) used to make future tenses • (adj) extremely serious or terrible. • (v) to move away from someone or something • (adv) used when you admit that something is true • (v) to do what you have to do or are asked to do. • (adj) susceptible to physical or emotional attack. • (v) to suddenly move very quickly in a particular direction • ...
Unit 7 Chapter 4 Vocabulary Word Puzzle 2023-05-09
Across
- to move back or away from danger or attack
- a possible effect or result that may take place in the future
- to make a place safe from attack by building defenses
- an official statement of something
- to use legal authority to demand and collect a fine or tax
Down
- the person who represents the government of his or her country in another country
- a person killed or injured during battle
- bullets, shells, and other objects used as weapons shot from guns
- to choose not to vote
- another term for 20
10 Clues: another term for 20 • to choose not to vote • an official statement of something • a person killed or injured during battle • to move back or away from danger or attack • to make a place safe from attack by building defenses • to use legal authority to demand and collect a fine or tax • a possible effect or result that may take place in the future • ...
Washington Crossing of the Delaware 2025-02-07
Across
- How many times did washington and his army have to cross the river
- Who did Washington want to attack during the crossing of the delaware
- what country did the hessian troops come from
- The Name of the people in the army
- First president of the USA
- what day does the crossing happpen on
Down
- how many prisoners did the continental army capture during the attack
- Washington's rank in the army
- what was the weather like during the crossing of the delaware
- what types of boats were used during the crossing of the delaware
10 Clues: First president of the USA • Washington's rank in the army • The Name of the people in the army • what day does the crossing happpen on • what country did the hessian troops come from • what was the weather like during the crossing of the delaware • what types of boats were used during the crossing of the delaware • ...
Volleyball Terms 2024-01-19
Across
- The movement of players in a clockwise manner after winning the serve.
- The second touch in a play, directed to a teammate for an attack.
- A player near the net, responsible for blocking and attacking in the center.
Down
- The defensive action where players jump to deflect an opponent's attack.
- A serve that results in a point because the other team fails to return it.
- A forceful hit over the net into the opponent's court.
- The basic skill of receiving the serve or an attack using the forearms.
7 Clues: A forceful hit over the net into the opponent's court. • The second touch in a play, directed to a teammate for an attack. • The movement of players in a clockwise manner after winning the serve. • The basic skill of receiving the serve or an attack using the forearms. • The defensive action where players jump to deflect an opponent's attack. • ...
What goes inside a First Aid Box? 2020-01-29
16 Clues: for fever • for asthma • pain killer • to cut gauze • to clean wound • to stick gauze • for minor cuts • for anaphylaxis • splinter removal • for heart attack • to secure bandages • to control bleeding • to prevent infection • for washing the wound • for your own protection • to see clearly in the dark
What goes inside a First Aid Box? 2020-01-29
16 Clues: for fever • for asthma • to cut gauze • a pain killer • to stick gauze • for minor cuts • for anaphylaxis • to clean wounds • for heart attack • to secure bandages • for washing wounds • to control bleeding • to prevent infection • for splinter removal • for your own protection • to see clearly in the dark
World War II 2024-01-24
Across
- churning
- suprie attack
- 7 concentration camps
- confinement of Japanese Americans
- ensure a stable food supply
- soviet union
- Bombing
Down
- leadership
- dictator of germany
- Top secret resarch
- loans to citizens could buy to help finance
- food stamps
- Warfare
- African Americans
- limmited resources and priortize use of war effort
- native language
16 Clues: Warfare • Bombing • churning • leadership • food stamps • soviet union • suprie attack • native language • African Americans • Top secret resarch • dictator of germany • 7 concentration camps • ensure a stable food supply • confinement of Japanese Americans • loans to citizens could buy to help finance • limmited resources and priortize use of war effort
Unit 12 Groups 3 & 4 2024-08-27
Across
- hodgepodge; mélange
- unity; fellowship
- to fester; to vex
- relapse into crime; reversion
- conclusion; termination
- to cut short; to abbreviate
- to predict; to prophesy
- worn-out expressions; commonplace
- to shirk; to avoid
Down
- to discourage; to demoralize
- to degrade; to disgrace
- raid; attack
- concerned; anxious
- to decrease; to lessen
- magnificent; imposing
- bankruptcy; indigence
16 Clues: raid; attack • unity; fellowship • to fester; to vex • concerned; anxious • to shirk; to avoid • hodgepodge; mélange • magnificent; imposing • bankruptcy; indigence • to decrease; to lessen • to degrade; to disgrace • conclusion; termination • to predict; to prophesy • to cut short; to abbreviate • to discourage; to demoralize • relapse into crime; reversion • ...
Words 2025-11-03
Across
- – Safe, not dangerous
- – Tolerate hard situation
- – Illegal money exchange
- – Send criminal abroad
- – Street attack thief
- – Without any rules
- – Persuade not doing
- – Kind and generous
Down
- – Job skill requirement
- – Money from work
- – House theft crime
- – Show by example
- – Responsible and obedient
- – Repair or fix
- – Unwilling or hesitant
- – Think or suppose
16 Clues: – Repair or fix • – Money from work • – Show by example • – Think or suppose • – House theft crime • – Without any rules • – Kind and generous • – Persuade not doing • – Safe, not dangerous • – Street attack thief • – Send criminal abroad • – Job skill requirement • – Unwilling or hesitant • – Illegal money exchange • – Tolerate hard situation • – Responsible and obedient
League of Legends 2025-08-27
Across
- Can dance alongside player
- How many champs have 0 ability power scaling
- Quinn and Lulu can apply this to enemies. Ryze applies this debuff too but to himself and allies.
- When this champ feeds a poro it gains a mustache
- When this champion takes magical footwear, the rune is exchanged to cash back instead.
- Slowest projectile speed in the game. Hint:Support
- Gains 1 bonus movement speed while in the river.
- This jungler eats babies.
- First champ ever with infinite stacking
- Confirmed to be the smartest LOL character. Hint:Ap Midlaner
- This jungler's size changing weapon was forged by Doran.
- Messi of league
- This champ has pi(3.1415) as their ad growth
- Attack speed reduced by a percentage for the duration. Applied by fiora, malphite, and nasus
- This item alongside malignance are the 2 items that specifically give ultimate ability haste.
- This item is currently the only item in summoner's rift that gives a dash on active.
- Serylda was reincarnated into this Freljordian character.
- Least amount of specific dialogue
- This champion has an exclusive trinket that occupies the slot for the rest of the game
- Siblings with Ornn and Volibear
- Highest base movement speed in the game
- When this champion dances near Scuttle Crab, the crab also starts dancing.
- No aoe
- Passive: basic attacks on-attack against enemy champions grant a stack for 6 seconds, refreshing on subsequent attacks and stacking up to 6 times. Gain (6%/4.8%) bonus attack speed for each stack, up to (36%/28.8%) at maximum stacks. At maximum stacks, basic attacks are empowered to fire a bolt at the target on-attack that deals them (9–30/6–24)(based on level) bonus adaptive damage upon arrival, increased by (1%/0.66%) per 1% bonus attack speed. Stacks expire by one every 0.5 seconds when the duration ends.
- This league of legends gamemode allows players to have ultimate abilities in place of one of their summoner spells.
Down
- Slowest BASE movement speed
- This champion gains 2 extra gold when killing either karthus or sion, also working vice versa, karthus or sion killing this champ giving them 2 additional gold.
- Can vanish, blink, and gain immunity to crowd control in the same ability
- Amumu, Ahri, Aurelion Sol, Bel'Veth, Camille, Cho'Gath, Corki, Darius, Draven, Fiora, Garen, Gangplank, Gwen, K'Sante, Lillia, Kog'Maw, Master Yi, Olaf, Pyke, Rek'Sai, Renata Glasc, Samira, Sett, Smolder, Syndra, Twitch, Urgot, Vayne, Vel'Koz, Yone, Zoe
- Only champ that can increase and reduce in size without transformations. Hint:based on health and also this is their full name
- This champion has a passive that displays an X above an enemy champions head when fully stacked.
- Look at the cleanse. look at the moves. FAKER WHAT WAS THAT.
- You can store a sheen proc in a ...
- These champs can apply this on themselves: Blitzcrank, Caitlyn, Galio, Graves, Kled, Lissandra, Poppy, Rammus, Rumble, Sion, Tahm Kench, Varus, Vi, Xerath, and Ziggs
- This champion can apply debuffs to champions using jungle camps directly
- One of their favorite food is bloblets among other things
- Lets you switch your summoner spells.
- This champion's ultimate used to be called Blood Rage.
- Can true damage burn allies
- This champion can knock up non-champion targets they've killed "to the moon". i.e. really high up in the air
- Rune that used to give an active to boots letting you get even more movespeed towards enemy champions ramping up over 1.5seconds. After ramping up your next damaging basic attack or instance of ability damage against an enemy champion ends the active and does bonus magical or physical damage after a 0.25 second delay.
- 2nd highest base auto range
- When near this enemy champion Volibear gains 1 armor. When this champion is near an enemy volibear they gain 1 ap.
- I will not yield
- Blue buff will dance with this champion wearing a KDA/Popstar skin.
- This champ can fish in the river gaining gold
46 Clues: No aoe • Messi of league • I will not yield • This jungler eats babies. • Can dance alongside player • Slowest BASE movement speed • Can true damage burn allies • 2nd highest base auto range • Siblings with Ornn and Volibear • Least amount of specific dialogue • You can store a sheen proc in a ... • Lets you switch your summoner spells. • First champ ever with infinite stacking • ...
The Cost of Discipleship 2013-09-07
16 Clues: ponder • planning • complete • suffering • belongings • make fun of • approximate • attack (4, 3) • a tall structure • Jesus died on this • very strong, bright • base for a building • a student (of Jesus) • a large group of people • a place where grapes are grown • a group of people sent to make a deal
types of cybercrimes 2024-03-08
Reading Bite 08-09 2024-04-25
ICT - Revision (May) 2024-04-17
Across
- is an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.
- to checks incoming and outgoing network traffic.
- It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
- unwanted software that monitors and gathers information on a person and how they use their computer.
- an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
Down
- an attack designed to steal a victim's password or other sensitive data.
- a hostname that refers to the current computer used to access it.
- software that is designed to gain access to your computer with malicious intent.
- a piece of software that appears to perform a useful function (such as a game) but unbeknown to the user it also performs malicious actions.
- ______________is the practice of protecting systems, networks, and programs from digital attacks
- malicious form of self-replicating software.
11 Clues: malicious form of self-replicating software. • to checks incoming and outgoing network traffic. • a hostname that refers to the current computer used to access it. • an attack designed to steal a victim's password or other sensitive data. • software that is designed to gain access to your computer with malicious intent. • ...
Air Quality 2022-01-27
16 Clues: a smell • one cell • to remedy • antibiotic • we breathe it • microorganism • like a mushroom • water or liquid • a type of fungus • similar to a tree • microbially clean • attack of the immune • in a particular place • another word for inside • vegetative part of a fungus • microorganism that causes disease
Rifles for Watie Chapters 1-4 2023-09-30
Across
- an intestinal disease
- deep longing
- vengeful
- enemy
- treasonous; having committed betrayal
- confusion
- withdraw membership from a group
- lessen
- in a disrespectful or rude manner
Down
- those who attack from a hiding place
- food and supplies
- tremble or hide with fear
- argument
- guard
- wave around in a threatening manner
- avoidant
16 Clues: enemy • guard • lessen • vengeful • argument • avoidant • confusion • deep longing • food and supplies • an intestinal disease • tremble or hide with fear • withdraw membership from a group • in a disrespectful or rude manner • wave around in a threatening manner • those who attack from a hiding place • treasonous; having committed betrayal
Forming the Subjunctive 2024-05-07
16 Clues: To put/YO • To feel/TÚ • To make/Ella • TO gather/YO • To look for/ÉL • To turn off/TÚ • TO sleep/Ellos • To speak/Ellos • To think/Usted • TO attack/Ellas • To influence/YO • To realize/ELLA • To give/Nosotros • TO scrub/Nosotros • To know people/YO • To understand/Ustedes
Advertisement 2025-01-31
Across
- smth. creates excitement
- large outdoor board
- way of living your life
- manage to live
- attack continuously
- influenced
- shopper
- music
- customers remember a brand and its quality
Down
- own
- rules
- paper advertising a product
- famous person advertises product
- identity of a company, product
- people who might buy product
- suddenly appearing ads
16 Clues: own • rules • music • shopper • influenced • manage to live • large outdoor board • attack continuously • suddenly appearing ads • way of living your life • smth. creates excitement • paper advertising a product • people who might buy product • identity of a company, product • famous person advertises product • customers remember a brand and its quality
VOCABULARY 1 2023-05-17
16 Clues: False God • Upper limb • Bed cushion • Bright color • List of meals • One of the two • Computer input • Self-importance • Smallest number • Grass-eating animal • Not long ago, modern • Later part of the day • Long-necked water bird • Confidential or mystery • Foe; one who tries to attack • Show approval by clapping hands
Military English 2 2021-02-09
Across
- on-base housing for service members
- a detachment of ground, sea or air forces sent out to gather information or carry out a mission
- an organization of ships, aircraft, marine forces and shore-based fleet activities all under the same commander
- a good position that an army has taken in enemy land, from which it can attack the enemy more effectively
- the activity of fighting a war, often including the weapons and methods that are used
- a soldier trained to be dropped from an aircraft with a parachute
- activities, operations or organizations in which elements of two or more Services participate
- a military unit that is smaller than a platoon anв larger than a squad
- a land, sea or air vehicle that is operated by remote control or programmed to run automatically
Down
- an attack intended to stop or oppose an attack by an enemy
- the width of the inside of a pipe, especially of the long cylinder-shaped part of a gun, or the width of a bullet
- an important job, especially a military one, that someone is sent somewhere to do
- objects that can be shot from a weapon, such as bullets or bombs
- a prepackaged meal that comes with a Flameless Ration Heater (FRH) so service members can have a hot meal quickly, without fire
- the building in Washington where the US Defense Department is based, or the US Defense Department itself
- to move soldiers or equipment to a place where they can be used when they are needed
16 Clues: on-base housing for service members • an attack intended to stop or oppose an attack by an enemy • objects that can be shot from a weapon, such as bullets or bombs • a soldier trained to be dropped from an aircraft with a parachute • a military unit that is smaller than a platoon anв larger than a squad • ...
Volleyball 2023-09-20
Across
- people who don’t care about the rules of volleyball
- ball that falls on the floor and around it there is two or more players.
- preventing the ball from hitting the floor after being spiked by the opposing team.
- Its like a defensive move where players jumps up the net to stop the opponent’s attack.
- The setter is in charge of the offense and is in-charge of setting the ball up for their teammates to attempt a spike.
- a volleyball team is only allowed to score when they have the serve.
- preventing the ball from hitting the floor after being spiked by the opposing team.
- when you hit the ball in such a way the other team can’t touch it, you score a point after.
Down
- when a player jumps up and smacks the ball with all their might
- dive to the floor with an extended arm and palm flat on the floor.
- player on an indoor volleyball team who serves as a defensive specialist and is not allowed to serve or rotate to the front line
- The original name of the game of volleyball
- When you set up your teammate for a good attack.
- A float serve is a type of serve wherein the ball does not spin.
- a ball that is returned over the net with either a bump or pass and not a spike
- it can be recorded any time an opponent cannot return an attack that is directly related to the opponent not getting the ball back over the net.
- type of serve where the ball hits the net and goes over, but is still considered in play.
17 Clues: The original name of the game of volleyball • When you set up your teammate for a good attack. • people who don’t care about the rules of volleyball • when a player jumps up and smacks the ball with all their might • A float serve is a type of serve wherein the ball does not spin. • dive to the floor with an extended arm and palm flat on the floor. • ...
Animals 2024-11-11
11 Clues: nocturnal • eats cheese • jaws attack • green hopper • easter mascot • repeating bird • largest mammal • trunk water gun • long legs & neck • fastest cat on earth • black & white stripes
Animals 2024-11-11
11 Clues: nocturnal • eats cheese • jaws attack • green hopper • easter mascot • largest mammal • repeating bird • trunk water gun • long legs & neck • fastest cat on earth • black & white stripes
Matilda Vocabulary ch 3-4 2022-01-21
7 Clues: very unpleasant • old fashioned; distinguished • Move in a secret way; to hide • To strike or run into someone • Collection of money- usually small • face, to keep people from losing respect for you • attack, At attack because someone attacked you; to fight back
D senior_Lesson 5 2022-06-17
Defense Mechanism 2012-11-28
7 Clues: meeting someone face to face • a strong feeling of displeasure • use of negative words towards another • resistance against attack; protection • behavior in accord with rules of conduct • any offensive action, attack towards another • a feeling of dissatisfaction, often accompanied by anxiety
Papyrus 2020-04-14
15 Clues: lives in • brother of • my scarf is • my bones are • loves making • my first song • my catchphrase • is a student of • type of monster • bestie/girlfriend • favorite restaurant • sans! Pick up your ____! • the name of the crossword • my special attack makes you • makes_______ to capture humans
The Suffix Puzzle 2022-02-07
Across
- Satisfaction with achievement
- Ready or likely to attack
- A strong desire to be successful
- Decisive or convincing
- Shedding tears
- Not including
- Easily or strongly affected
Down
- Showing pleasure
- A person who has escaped
- Another possibility
- Cheerful and celebratory
- Motor vehicles
- Expressing great happiness
- Feeling displeasure or annoyance
- Held prisoner
15 Clues: Held prisoner • Not including • Motor vehicles • Shedding tears • Showing pleasure • Another possibility • Decisive or convincing • A person who has escaped • Cheerful and celebratory • Ready or likely to attack • Expressing great happiness • Easily or strongly affected • Satisfaction with achievement • A strong desire to be successful • Feeling displeasure or annoyance
Iraq War 2022-02-04
16 Clues: teror • omringe • befriet • Joe Biden • Joe Biden • Oil country • war country • krig på engelsk • the leader of USA • angribe på engelsk • when you are strong • Got killed in the war • gor killed in the war • Used to run people down • like Danmark and Norway • year in the majorityseveral
Literature story vocabulary 2018-10-04
Across
- restrained; spare, very plain
- violent storm that doesn't last long
- crawling; humiliating oneself in front of authority
- cringing and pleading
- extravagant
- determined
- inflicting severe punishment (whip)
Down
- rolled up
- praised
- violently
- twisted shape or motion
- noble; brave
- unable to fail or be wrong
- ordered, commanded
- attack
15 Clues: attack • praised • rolled up • violently • determined • extravagant • noble; brave • ordered, commanded • cringing and pleading • twisted shape or motion • unable to fail or be wrong • restrained; spare, very plain • inflicting severe punishment (whip) • violent storm that doesn't last long • crawling; humiliating oneself in front of authority
puzzle 2019-08-01
15 Clues: entropy • supply air • right angle • heat up steam • used in aircraft • velocity is zero • pre-heat the air • Record the pressure • safeguard the boiler • compressed air device • decreasing compressorwork • increasing kinetic energy • forced liquid into boiler • regulate the flow of steam • attack is larger than design angle
Call of the Wild by Jack London 2015-02-27
Across
- showing arrogant superiority
- deserving disgrace/shame
- event causing misfortune
- act of meeting someone's demands
- determination
- substance made from suet
- persistent in wrongdoing
- attack physically or emotionally
Down
- gain the good will of
- the act of protesting
- hard work
- in contradiction
- someone shirking duties
- without pity
- toward the north
15 Clues: hard work • without pity • determination • in contradiction • toward the north • gain the good will of • the act of protesting • someone shirking duties • deserving disgrace/shame • event causing misfortune • substance made from suet • persistent in wrongdoing • showing arrogant superiority • act of meeting someone's demands • attack physically or emotionally
Vocab (Syn/Ant) 2024-01-26
Across
- (SYN) Implore, Entreat
- (ANT) Clear, transparent, lucid
- (ANT) Renounce, Disavow
- (ANT) Scorched, Arid,Barren
- (SYN) Mask Feign
- (SYN) Outgoing, Extroverted
- (SYN) Tangy, Zestful
Down
- (SYN) Pronounce,Eloquent
- (SYN) Proximity,Similarity
- (SYN) Inject, Interpose,Introduce
- (SYN) Idealistic
- (ANT) Inter,Bury
- (SYN) Credit, trust,Confidence
- (ANT) Reassure
- (ANT) Diatribe, attack
15 Clues: (ANT) Reassure • (SYN) Idealistic • (ANT) Inter,Bury • (SYN) Mask Feign • (SYN) Tangy, Zestful • (SYN) Implore, Entreat • (ANT) Diatribe, attack • (ANT) Renounce, Disavow • (SYN) Pronounce,Eloquent • (SYN) Proximity,Similarity • (ANT) Scorched, Arid,Barren • (SYN) Outgoing, Extroverted • (SYN) Credit, trust,Confidence • (ANT) Clear, transparent, lucid • (SYN) Inject, Interpose,Introduce
Chadwick’s revenge 2023-05-10
15 Clues: clear • Singular • To bring up • Manipulation • to partake in • Opposite of sane • Mentally unstable • Pasted for cement • side of a mountain • The langue we speak • Like a heart attack • A prestigious school • To make someone believe • established deeply or firmly • A place that people go on there vacations
9/11 2022-05-25
15 Clues: city • unalive • building • a person • aircrafts • take over • depression • deep dislike • a big building • nation emergency • the day it happpened • people hurt in a sitution • people that hurt other people • some that plan before it happen • how die for the illness for all the debris
Crossword 2025-01-15
Across
- Fast, intuitive thinking
- LLM core function
- LLM task example
- Pre-trained LLM
- Large language models
- Self-improvement challenge
- Security attack type
- LLM evolution
- Security attack type
Down
- Fine-tuning data
- Training data size
- LLM learns this
- Slow, deliberate thinking
- Training cost (USD)
- Model's weights file
- Model execution code
- Security attack type
17 Clues: LLM evolution • LLM learns this • Pre-trained LLM • Fine-tuning data • LLM task example • LLM core function • Training data size • Training cost (USD) • Model's weights file • Security attack type • Model execution code • Security attack type • Security attack type • Large language models • Fast, intuitive thinking • Slow, deliberate thinking • Self-improvement challenge
Latin Crossword 2025-12-08
15 Clues: Duty • A show • To give • A answer • To make valid • To give something • Not in attendance • Person who donates • Place with weapons • Tool used to attack • Someone who officiates • Reason something happened • Group defending something • A person who is an example • Something effected something else to happen
Organizing Homeland Security 2017-04-26
Across
- A federal law designed to prevent political interference with the decisions and actions of governmental organizations.
- Information law enforcement agencies, military units, or other security forces can use to prevent an attack or operation.
- favoring the process over accomplishments
- A multiagency operation in West Virginia that evaluates information gathered from a variety of governmental sources
- The criminal and social actions of individuals and groups before a terrorist attack
- Any outcome or output of analyzed information that can be used by law enforcement agencies, military units, or security forces to take an immediate action
Down
- A federal law designed to prevent political interference in the management of federal governmental organizations and to increase the efficiency of management
- Preparations from any agency to deal with natural, accidental, or man-made disasters
- The process of examining a community to determine the areas that might be subject to attack
- As used in this text, the ability to stay focused on the primary mission of an organization
- adding too many secondary tasks to a unit. Too many jobs divert a unit from its primary mission
11 Clues: favoring the process over accomplishments • The criminal and social actions of individuals and groups before a terrorist attack • Preparations from any agency to deal with natural, accidental, or man-made disasters • The process of examining a community to determine the areas that might be subject to attack • ...
SAT 1, 2 and 3 2012-11-06
15 Clues: Brief • Cliche • Abrupt • Hostile • To copy • To cheat • Beautiful; pure • Something rewarding • To give right to vote • Excessive; unnecessary • To abolish or make void • A violent attack of words • Psychically inclined; clear • Different from the natural course • A leader who invokes a strong emotional response
/ss/ hi 2020-08-06
15 Clues: win • angry • essential • a feeling • feeling awkward • login something • shiny and smooth • crossing something • an old antique thing • a thing that you wear • another word for leader • means without any purpose • physical attack on someone • a place where people learn • a short piece of writing based on something
Jonathan lesson 13 Crossword 2021-03-10
Across
- sad
- Einstein_____ the relationship between matter and energy.
- John has a ____ to beat marcus in basketball.
- Intensely eager
- elnrwan
- scontagiou
Down
- To attack violently or verbally
- change
- retrab
- hamper
- A keep off sign acts as a ______ against trespassers.
- A quality that can be used to advanatge
- penalty
- azanonb
- soumynonys
15 Clues: sad • change • retrab • hamper • penalty • elnrwan • azanonb • scontagiou • soumynonys • Intensely eager • To attack violently or verbally • A quality that can be used to advanatge • John has a ____ to beat marcus in basketball. • A keep off sign acts as a ______ against trespassers. • Einstein_____ the relationship between matter and energy.
Vocab for the 3rd major test 2017-05-23
15 Clues: reason • landscape • to attack • (to) press • price reduction • long discussion • shopping center • wonderful / great • (to) come together • to finish high shool • sth that helps is... • (to) find new things • you do it with your hands • place where you do sports • (to) hold somebody in your arms
Puzzle 2018-08-17
Across
- velocity is zero
- increasing kinetic energy
- used for liquid
- decreasing compressorwork
- used in aircraft
- do not have aerofoil blades
Down
- prefer close to unity
- entropy constant
- due to surging
- work absorbing device
- entropy
- attack is larger than design angle
- product of radius& Vw is constant
- blade speed
- right angle
15 Clues: entropy • blade speed • right angle • due to surging • used for liquid • entropy constant • velocity is zero • used in aircraft • prefer close to unity • work absorbing device • increasing kinetic energy • decreasing compressorwork • do not have aerofoil blades • product of radius& Vw is constant • attack is larger than design angle
Puzzle 2018-10-06
Across
- increasing turbine work
- steam turbine used
- right angle
- entropy constant
- do not have aerofoil blades
- piston used
- attack is larger than design angle
Down
- work producing device
- less than vapour pressure
- increase efficiency
- due to surging
- velocity is zero
- increasing kinetic energy
- net positive suction head
- use for liquid
15 Clues: right angle • piston used • due to surging • use for liquid • entropy constant • velocity is zero • steam turbine used • increase efficiency • work producing device • increasing turbine work • less than vapour pressure • increasing kinetic energy • net positive suction head • do not have aerofoil blades • attack is larger than design angle
Puzzle 2018-09-13
Across
- work producing device
- increasing turbine work
- less than vapour pressure
- piston used
- velocity is zero
- increasing kinetic energy
Down
- steam turbine used
- increase efficiency
- entropy constant
- right angle
- due to surging
- use for liquid
- do not have aerofoil blades
- net positive suction head
- attack is larger than design angle
15 Clues: right angle • piston used • due to surging • use for liquid • entropy constant • velocity is zero • steam turbine used • increase efficiency • work producing device • increasing turbine work • less than vapour pressure • net positive suction head • increasing kinetic energy • do not have aerofoil blades • attack is larger than design angle
Puzzle 2018-09-13
Across
- use for liquid
- due to surging
- do not have aerofoil blades
- increasing turbine work
- velocity is zero
- less than vapour pressure
- entropy constant
Down
- attack is larger than design angle
- increase efficiency
- piston used
- work producing device
- net positive suction head
- right angle
- increasing kinetic energy
- steam turbine used
15 Clues: piston used • right angle • use for liquid • due to surging • velocity is zero • entropy constant • steam turbine used • increase efficiency • work producing device • increasing turbine work • net positive suction head • increasing kinetic energy • less than vapour pressure • do not have aerofoil blades • attack is larger than design angle
king george by elijah alfaro 2023-05-18
15 Clues: king • a city • 60 minutes • frozen rain • the 4 season • a rebel name • local stories • where you live • where war fights • leaving unnoticed • letting someone know • attack and not escaping • the learning (jail) center • letting someone live with you • a place with lots of buildings
Aircraft Types 2023-12-13
Across
- - Rotary-wing hybrid
- - Lands on water
- - Unmanned aerial vehicle
- - Small, lightweight aircraft
- - Rigid airship type
- - Popular small airplane brand
Down
- - Soaring without an engine
- - Military attack aircraft
- - Rotary-wing flyer
- - Non-rigid airship
- - Three-winged design
- - Military aircraft for combat
- - Commercial aircraft manufacturer
- - Fast aircraft
- - Double-winged aircraft
15 Clues: - Fast aircraft • - Lands on water • - Rotary-wing flyer • - Non-rigid airship • - Rotary-wing hybrid • - Rigid airship type • - Three-winged design • - Double-winged aircraft • - Unmanned aerial vehicle • - Military attack aircraft • - Soaring without an engine • - Small, lightweight aircraft • - Military aircraft for combat • - Popular small airplane brand • ...
Vocab (Syn/Ant) 2024-01-26
Across
- (SYN) Implore, Entreat
- (ANT) Clear, transparent, lucid
- (ANT) Renounce, Disavow
- (ANT) Scorched, Arid,Barren
- (SYN) Mask Feign
- (SYN) Outgoing, Extroverted
- (SYN) Tangy, Zestful
Down
- (SYN) Pronounce,Eloquent
- (SYN) Proximity,Similarity
- (SYN) Inject, Interpose,Introduce
- (SYN) Idealistic
- (ANT) Inter,Bury
- (SYN) Credit, trust,Confidence
- (ANT) Reassure
- (ANT) Diatribe, attack
15 Clues: (ANT) Reassure • (SYN) Idealistic • (ANT) Inter,Bury • (SYN) Mask Feign • (SYN) Tangy, Zestful • (SYN) Implore, Entreat • (ANT) Diatribe, attack • (ANT) Renounce, Disavow • (SYN) Pronounce,Eloquent • (SYN) Proximity,Similarity • (ANT) Scorched, Arid,Barren • (SYN) Outgoing, Extroverted • (SYN) Credit, trust,Confidence • (ANT) Clear, transparent, lucid • (SYN) Inject, Interpose,Introduce
Star-spangled Vocabulary 2021-09-03
15 Clues: Flag • Song • Freedom • Right to vote • Loves country • Qualified voters • My country is #1 • Give right to vote • Too much patriotism • Most important U.S. law • Terrorist attack on U.S. • Government with no monarch • People overthrow government • Person wanting to end slavery • Weapon used in American Revolution
Exam Prep 2023-05-01
Across
- Collection of network resources.
- Password hacking tool used to capture keystrokes of a keyboard.
- This Linux command is used to filter the output of a command.
- reputable organizations that are responsible for issuing public certificates to companies or organizations.
- Public Keys are generated for each new session or message sent.
- Network resource in the Active directory.
- An IPsec protocol used for negotiation.
- This certificate type allows the organization to have multiple host names covered in one certificate.
- A well-known hashing algorithm.
- Password relates to things that people know, such as a mother's maiden name or a pet's name.
- Adding random bits of data to a password before it is stored as a hash.
- This log type provides VOIP event information.
- Highest level of certificate validation offered by a CA.
- An online certification checking protocol.
- Used to encrypt individual files and folders on a Windows Computer.
- Obfuscating a secret inside a file such as an image.
- The most common protocol analyzer.
- This file consist of account passwords on Linux systems.
- IDS detection types that compare the behaviour of traffic to baseline profiles.
- Hashing attack that combines a collision attack and a brute-force attack.
- Linux command used to change permissions.
- Forensics techniques can you used to recover files based only on their structure.
- A security hardware or software that identifies and prevents intrusions.
- Packet filtering mechanism used by gateway routers and firewalls.
- A site redundancy with little or no configuration.
- command used to crack the password with the rainbow attack.
- Obtaining computer names, user accounts and open ports.
- CLI utility used to query a name server.
- Used to encrypt an entire volume.
- Transferring data from your system to another.
Down
- 802.1x is used on switching networks for this purpose.
- These types of malware reside solely in the system's memory making it more difficult to detect and remove.
- This VPN component uses to control access to provide network.
- A backup solution which will not clear the archive bit when the backup is created.
- protocol enables Virtual Private Network (VPN) traffic to pass through Network Address Translation (NAT) gateways or routers.
- SYN flood attack is a common example of this DDoS method.
- A vulnerability scanner that provides remediation.
- Type of cyber attack in which an attacker gathers information about a target organization.
- Used by Application control solutions to identify applications.
- This server provides authentication services.
- The science of gathering and analyzing digital data.
- A secured zone for publicly accessed servers.
- A list of steps needs to be taken by an administrator generated from SOAR.
- This system is used to organize and prioritize vulnerabilities.
- RSA and ECC are examples of these types of cryptographic algorithms.
- This ethical hacking team is responsible for managing other teams.
- A logging server.
- IPSec subprotocol provides data encryption.
- Linux and Unix command is used to query the name server.
- A forensic tool used for digital investigation and analysis.
- Cryptography algorithm used for comparison.
- The most volatile memory on a computer
- Provides fault tolerance for your storage devices.
- Logs related to OS like updates, errors, and failures.
- Used by Application Control Solution to slow down, delay or drop traffics.
- This SIEM component is responsible for gathering logs and events from network components.
- Decentralized and distributed ledger that records and verifies transactions between two parties.
- Set of tools, technologies, and processes that are designed to prevent the loss or unauthorized disclosure of sensitive information.
- A mobile solution to manage an organization's mobile devices.
- This email metadata can be used to check the authenticity of an email.
- Provides a framework for negotiating and selecting different authentication mechanisms supporting Kerberos and LDAP.
- connecting multiple servers to provide redundancy and load sharing.
- In this testing environment, the penetration tester has no information regarding the target or network.
- Environment in which public encryption keys can be created and managed throughout the key lifecycle.
- this cryptography hardware can generate asymmetric cryptographic public and private keys.
65 Clues: A logging server. • A well-known hashing algorithm. • Collection of network resources. • Used to encrypt an entire volume. • The most common protocol analyzer. • The most volatile memory on a computer • An IPsec protocol used for negotiation. • CLI utility used to query a name server. • Network resource in the Active directory. • Linux command used to change permissions. • ...
Fire Ground Terms 2023-08-01
Across
- Stopping the apparatus short of the incident, not committed to the block or complex, remaining readily deployable to any location on the incident.
- Attacking the seat of the fire from the interior of the structure.
- Search of the structure either primary or secondary in which we have a hose line to protect the searchers.
- Control or limiting of entry/egress doors until fire is under control, when possible.
- Attacking the seat of the fire from the exterior of the structure.
- Conditions Actions Air Needs
- Within the same opening, heated gasses escape at a high point while fresh air is drawn in below.
- Hose is deployed from the pumper at the incident scene back to the water source.
- Initial quick search of the floors of a structure to ensure there are no obvious victims.
- Primary suppression line for initial attack, either offensive exterior or interior attack.
- Damage to the structure either through fire, water, or salvage operations, has stopped.
- The main seat of the fire has been found the fire progression has been slowed or stopped.
- A fire where the heat release rate and fire spread are regulated by the available oxygen in a space.
- Composed of at least one inlet opening and one exhaust opening, and the connecting volume between the openings. The direction of flow is determined by the difference in pressure. Heat and smoke in a high-pressure area will flow towards areas of lower pressure.
- Ventilating at a point above the fire through existing or created openings and channeling the contaminated atmosphere vertically within the structure and out the top.
- Hose line used to protect the egress of fire attack crews.
- With this search method the team leader remains ________ to one place in the structure, such as the hose, the wall or an exit.
- Mechanical fans can be used to provide positive or negative pressure ventilation when used in tandem with either existing openings such as windows, skylights or heat/smoke vents on the roof; or by cutting new exhaust vents in the building.
Down
- Fire is no longer a threat of progressing.
- Mechanically increasing the pressure gradient of a compartment inside a structure.
- Air entering one opening and exiting from another typically low to high.
- The entire structure has had a primary and secondary search complete on all floors and no victims have been located.
- Operation of entering the structure on an unprotected search, isolate the compartment and conduct a rapid search in that compartment. After search/rescue of that compartment crew-members exit the structure.
- Any technique by which heat smoke and other products of combustion are channeled horizontally out of a structure by way of existing or created horizontal openings such as windows door or other openings in walls.
- The coordinated use of mechanical ventilation to help with fire suppression.
- Improve access/egress in and around the fire building to include forcible entry, window bar removal, lights at doorways, egress ladders, fence access, and other possible obstruction removal.
- Ventilation accomplished by using a spray stream to draw the smoke from a compartment through an exterior opening.
- Next line in to support and assist the “Attack Line” in fire attack. Hose line may be utilized to cover another floor, exposed area, etc.
- Designated area where all incoming resources will be staged and directed by an assigned staging officer or incident commander.
- Taking the heat and energy from a fire with a directed hose stream from an exterior location; with the expectation that you will transition to an offensive interior attack at some point.
- Supply hose is deployed from the water source to the incident location.
- Assessment of the ventilation needs and possibilities of a structure.
- The search of an area without the protection of a hose line.
- Attacking the fire from a safe distant exterior or uninvolved flanking location taking energy away and extinguishing, with an emphasis on protecting exposures.
- Thorough search of the floors of a structure to ensure there are no obvious victims.
35 Clues: Conditions Actions Air Needs • Fire is no longer a threat of progressing. • Hose line used to protect the egress of fire attack crews. • The search of an area without the protection of a hose line. • Attacking the seat of the fire from the interior of the structure. • Attacking the seat of the fire from the exterior of the structure. • ...
i suvived the shark attack of 1916 2018-03-01
Across
- the heading especially of an article or document
- shark teeth are sharp
- to make a long shrillery or noise
- to lose consuosness
- bring to mind or think again
- or imagined wrong
- I survived a shark attack
- to smear the face of an inetperienced fort hunter with blood
Down
- a thin process of an aquatic animal
- large,solid,or heavey in structure
- that's impossible
- I am relieved that he didn't get mad
- to blow with violence
- I shouted at my sister when she hit me
- can you refill my car
- a strong lasting feeling of resemtment toward someone for
- the fort killed on his first hunt
17 Clues: that's impossible • or imagined wrong • to lose consuosness • shark teeth are sharp • to blow with violence • can you refill my car • I survived a shark attack • bring to mind or think again • to make a long shrillery or noise • the fort killed on his first hunt • large,solid,or heavey in structure • a thin process of an aquatic animal • I am relieved that he didn't get mad • ...
Ria Bowles Spelling Crossword Puzzle 2020-09-21
12 Clues: to argue • to attack • to give up • evil person • form a plan • sharp powers • it is awesome • change something • producing rapidly • prove your actions • to have great numbers • to give the wrong idea
Vocab LOTF 1-3 2023-04-05
12 Clues: bloom • implied • downhill • hostility • accusation • joyful or cheerful • good taste or proper • loud noise or commotion • difficult to understand • protection against attack • change usually for the good • sermon or long angry speech
2sec 2022-10-20
12 Clues: scam • avoid • restrain • can't breathe • illegal hunter • physical attack • financial crisis • fine heavy penalty • vessel ship with sails • stealing money from your job • unintentionally killing somebody • crime illegal action by young people
2sec 2022-10-20
12 Clues: scam • avoid • restrain • can't breathe • illegal hunter • physical attack • financial crisis • fine heavy penalty • vessel ship with sails • stealing money from your job • unintentionally killing somebody • crime illegal action by young people
Traveling 2020-05-14
english crossword 2022-06-13
10 Clues: adapt • edit/adjust • help/defend • reason/purpose • friends/together • fightback/attack • destruction/break • no use/not needed • frequent/currently • individual/personal
SPRING BREAK, WOO! 2024-04-04
10 Clues: here • comparison • sound words • to make clear • to exaggerate • the main point • personal attack • popular reference • sequential sounds • root word changer
vocab words for mrs.curtis 2022-09-15
coyote sunrise 2023-03-07
12 Clues: very mad • a secret • move slowly • to be empty • pull you down • secret attack • a closed space • empty of people • admit something • not real or true • not open for debate • wishing for something
Vocabulary 2013-02-05
10 Clues: / snotty • / tenderly • / unjust manner • / violent attack • / extreme anger • / move with caution • / stuck in it • / extreme sadness • / to make strong • / extreme hatred
