attack Crossword Puzzles
Vocab #7 2023-05-15
Across
- make an attack or assault in return for a similar attack
- a poor urban area occupied primarily by a minority group or groups
- a claim or dispute brought to a court of law for adjudication
- a statement or action expressing disapproval of or objection to something.
- an adequate amount of something
- a particular system of philosophical thought.
- an experienced and trusted adviser.
- the use of peaceful means
Down
- obtain or bring about by discussion
- the action of intimidating someone, or the state of being intimidated.
- end a policy of racial segregation in
- a person or group of people standing outside a place of work or other venue
- not in accordance with a political constitution, especially the US Constitution
- formally accuse of or charge with a serious crime
- the process of coming into view or becoming exposed after being concealed.
15 Clues: the use of peaceful means • an adequate amount of something • obtain or bring about by discussion • an experienced and trusted adviser. • end a policy of racial segregation in • a particular system of philosophical thought. • formally accuse of or charge with a serious crime • make an attack or assault in return for a similar attack • ...
Criminal Charges Crossword 2024-11-22
Across
- Being tried twice for the same crime (two words)
- Criminal charge of offering money or gifts to someone to influence their actions, usually in a corrupt way
- Criminal charge of stealing money that was trusted to you
- A less serious crime, like trespassing.
- Money paid to release someone from jail until their trial.
Down
- A serious crime, like murder or burglary.
- Criminal charge for the killing of one person by another.
- Criminal charge of intentionally setting fire to property
- Criminal charge for the deliberate destruction or damage to property
- Early release from prison under certain conditions.
- A court order requiring someone to appear or give evidence.
- Criminal charge for the theft of personal property.
- The person who files a lawsuit.
- Criminal charge of lying under oath in court.
- Criminal charge of a physical attack or threat of attack
15 Clues: The person who files a lawsuit. • A less serious crime, like trespassing. • A serious crime, like murder or burglary. • Criminal charge of lying under oath in court. • Being tried twice for the same crime (two words) • Early release from prison under certain conditions. • Criminal charge for the theft of personal property. • ...
Arms Race 1950s 2025-03-05
Across
- When countries compete to increase their military resources to gain military and political superiority.
- Inter-continental _____________ missiles.
- Discussions had for the atomic bomb to be dropped during this conflict.
- First to create the ICBM in 1957.
- Mutually assured ______________
- President in charge between 1953 and 1961.
- This doctrine assured that the other side would not attack if you had nuclear weapons.
- Name of the first soviet satellite in space.
Down
- Second atomic bomb dropped in this Japanese city.
- Planes capable of carrying and delivering nuclear weapons.
- ABMs can be used to _________ and destroy nuclear weapons.
- Perception by the West that the USA was trailing behind the USSR in development of missiles.
- The Soviet ICBM could fire a nuclear weapon ____ thousand km away.
- USA developed this in 1952, a year before the USSR.
- Famous PSA told students to _______ and cover in the event of a nuclear attack.
15 Clues: Mutually assured ______________ • First to create the ICBM in 1957. • Inter-continental _____________ missiles. • President in charge between 1953 and 1961. • Name of the first soviet satellite in space. • Second atomic bomb dropped in this Japanese city. • USA developed this in 1952, a year before the USSR. • Planes capable of carrying and delivering nuclear weapons. • ...
Animal Snoop 2022-03-24
Chris Crossword 2015-03-18
world war 2 2024-01-30
M-cybersecurity 2024-03-27
Across
- attack which consists of testing all the words in a list as a keyword
- word used to gain access to certain information
- a public-key cryptosystem, one of the oldest widely used for secure data transmission
- attack which consists of testing all possible password or key solutuions
Down
- a feature or defect of a computer system that allows surreptitious unauthorized access to data.
- type of computer attack that blocks access to a victim's device or files and demands payment of a ransom in exchange for restoring access
- uses encryption to protect your Internet connection from unauthorized access
- a symmetric encryption algorithm using 56-bit keys
8 Clues: word used to gain access to certain information • a symmetric encryption algorithm using 56-bit keys • attack which consists of testing all the words in a list as a keyword • attack which consists of testing all possible password or key solutuions • uses encryption to protect your Internet connection from unauthorized access • ...
Battle of Thermopylae 2013-04-17
Across
- Spartan King whom led the battle.
- How many Spartan soldiers were involved in this battle.
- Whom the command of the combined navy and army were under.
- Persian King who led his army to attack Greece.
- The Athenian leader, who provided the strategy behind the battle.
- How many days the Battle of Thermopylae lasted.
- The hot springs from which this city state takes its name.
- Whom the people consulted before going to battle.
- Where the second battle of the second Persian War took place.
Down
- All Spartans made this, "to stand in place, win or die".
- What triggered the Persians to attack Athens and the rest of Greece.
- Association of the Greek city-state to prevent future Persian attacks.
- The Greek city-states met at this city-state to work out a common defence.
- The outcome of the battle for the Greeks.
- Where the last battle of the second Persian War took place.
15 Clues: Spartan King whom led the battle. • The outcome of the battle for the Greeks. • Persian King who led his army to attack Greece. • How many days the Battle of Thermopylae lasted. • Whom the people consulted before going to battle. • How many Spartan soldiers were involved in this battle. • All Spartans made this, "to stand in place, win or die". • ...
Tittle3 2018-03-08
Across
- The taking of a person from their home using deception or force
- The best way to avoid the dangers of planned or intentional injuries
- A forced sexual intercourse
- Bullying with the use of technology and electronic means
- An initiation rite for fraternity neophytes
- An act intended to cause injury or damage to a person
- Someone who follows you around and makes you feel in dager
- A sexual contact betweet closely related person
- Harm or damage to someone as a result of an act or event
Down
- Abuse, verbal insult, or physical attack on a person
- Forcefully taking away of a person against his/her will
- A suicide attempt in which person does not intend to die
- Pressure through the use of terror and violence
- A violent attack,threat or attempt to harm a person
- A street based group mostly made up of young people, that engages in illegal acts
15 Clues: A forced sexual intercourse • An initiation rite for fraternity neophytes • Pressure through the use of terror and violence • A sexual contact betweet closely related person • A violent attack,threat or attempt to harm a person • Abuse, verbal insult, or physical attack on a person • An act intended to cause injury or damage to a person • ...
Computer Networks 2023-05-18
Across
- A cyber attack that makes a computer and its resources unavailable.
- Only authorized persons can modify the data and information on the computer.
- A malicious piece of computer programs that pretends to be legitimate.
- A device that connects your computer to the internet
- A cyber attack where someone pretends to be someone else to steal information.
- A device used to connect multiple computer network devices.
- A device that connects different computer networks together
- Persons can access the computer whenever they want and from any location.
Down
- A malicious piece of computer software.
- The transmission of data between computers
- Only authorized persons have access to sensitive data and information.
- A Company that provides internet.
- A type of virus that spreads through email.
- A device that boost a wireless signal.
- A malicious piece of software that steals information with your knowledge.
15 Clues: A Company that provides internet. • A device that boost a wireless signal. • A malicious piece of computer software. • The transmission of data between computers • A type of virus that spreads through email. • A device that connects your computer to the internet • A device used to connect multiple computer network devices. • ...
The Story of Owen Crossword puzzle 2022-11-22
Across
- This is what Dragons feed on and is what attracts them
- The town that Siobhan is from and Owen's new home
- Owen and Lottie's last name
- This is what Owen recieves from Mr.Huffman
- Owen's aunt who just moved from Toronto
- The city Aunt Lottie is from
Down
- Owen's algebra tutor and best friend
- This is where Siobhan hides most of the time when she is at Owen's house and there is a dragon attack
- A highschooler who struggles at math but is ready to take on the world
- A common weapon used for slaying dragons
- These fantasy beasts love to prey on carbon and attack villages and cities
- What Mr.Huffman is always holding in his hand and is often swinging it around
- Owen's Original home town
- The subject that Mr.Huffman teaches
- Owen is given the nickname "Owen the _" and is the title of chapter 1
15 Clues: Owen's Original home town • Owen and Lottie's last name • The city Aunt Lottie is from • The subject that Mr.Huffman teaches • Owen's algebra tutor and best friend • Owen's aunt who just moved from Toronto • A common weapon used for slaying dragons • This is what Owen recieves from Mr.Huffman • The town that Siobhan is from and Owen's new home • ...
Sonic. Exe THE DISASTER Survivor Trivia Crossword Puzzle 2026-04-24
Across
- Does not have any attack abilities but is really annoying
- A character I refer to as, “a coward”
- All of their abilities involve stunning
- A very helpful supporter with good escaping abilities
- Mistaken for a different species but loves music
- Sonic A character whose main purpose is… something..
- The ninja of the group
Down
- A character who can make two characters in particular powerful for a short time
- Has a range attack and can get people out of sticky situations
- A survivor who’s main power is a type of element
- A very powerful stunner with a stronger variant of one of his abilities
- A very helpful character who has a very similar ability to the character,Silver
- You know I hate this character
- Uses a source of energy to power another ability
- I LOVE THIS CHARACTER
- Knuckles Basically the same character as a certain character but can use drop attacks
16 Clues: I LOVE THIS CHARACTER • The ninja of the group • You know I hate this character • A character I refer to as, “a coward” • All of their abilities involve stunning • A survivor who’s main power is a type of element • Uses a source of energy to power another ability • Mistaken for a different species but loves music • Sonic A character whose main purpose is… something.. • ...
World War II 2026-05-07
Across
- The Japanese navy launched an attack at this place
- This man was the dictator for Germany during world war 2
- Instead of attacking Japan on foot, this was sent to attack instead
- This man was the dictator of Japan during world war 2
- This is celebrated after Europe won WWII
- Many Americans and Filipino soldiers died during this event
- This country used the policy of appeasement
- this man was the dictator of Italy during world war 2
Down
- The U.S. was able to communicate through these people
- This country was invaded and defeated by Germany
- This was signed by a president that assigned executive order 9066
- This was the president of the United States at the end of WWII
- This country was in a stance of neutrality in the beginning of WWII
- Germany invaded this country which activated WWII
- Germany started to lose after this event
15 Clues: Germany started to lose after this event • This is celebrated after Europe won WWII • This country used the policy of appeasement • This country was invaded and defeated by Germany • Germany invaded this country which activated WWII • The Japanese navy launched an attack at this place • The U.S. was able to communicate through these people • ...
Volleyball 2023-07-25
Across
- :When a hitter intentionally hits the ball off the blocker's hands to score a point.
- :A defensive technique used to receive a spiked or fast-coming ball by diving to prevent it from hitting the ground.
- :The area of the court where players are positioned during the opponent's serve.
- :A specialized defensive player allowed to replace back-row players without counting as a substitution.
- :When a player gets hit in the face by a powerful spike.
- Set :A fast and low set usually delivered to the middle hitter to catch the opponents off guard.
- Error :A mistake made by a team in the rotation order, leading to incorrect positioning on the court.
- Violation :A fault that occurs when a player makes contact with the net during the game.
- :A powerful and aggressive downward hit, usually from the front row, to score a point.
- Ball :A ball that is passed over the net without spin or force, easy to defend against.
- :When the setter tactically pushes the ball over the net to score a point instead of setting for an attack.
- :When the receiving team wins a rally and takes control of the serve.
- :A one-handed defensive technique where the ball is trapped between the hand and the floor.
- Card :A penalty issued to a player for severe misconduct, resulting in ejection from the game.
- :When a player's block results in a direct and forceful rejection of the attacker's hit.
- Card :A warning issued to a player for minor misconduct or rule infractions.
- :A player who sets up the ball for attackers, orchestrating the team's offense.
- Substitution :A player substitution that occurs when the team is in rotation and the player enters the game for a specific position.
- Block :A powerful block that deflects the ball back to the attacker's side without it crossing the net.
- :The vertical rods mounted near the sidelines and extending vertically above the net to mark the boundary of the playing area.
Down
- Fault :A serving error that occurs when the server steps on or over the baseline during the serve.
- Blocker :A player positioned in the middle of the net, responsible for blocking and attacking.
- :When two opposing players simultaneously push the ball above the net, competing for control.
- :A defensive move where players attempt to stop the ball from crossing the net after a spike.
- Line :The line dividing the front and back rows, limiting where back-row players can jump to attack.
- Hitter :A player positioned near the sideline, primarily responsible for attacking from the left side.
- Change :When the teams switch sides of the court after finishing a set.
- :The area of the court where players are positioned during their team's serve.
- Hitter :A player positioned opposite the setter, responsible for strong hits from the right side.
- :An action to start the game by hitting the ball from behind the back boundary line over the net.
- :An overhead pass used to deliver the ball to a teammate for an attack.
- :An illegal ball handling fault where the ball comes to rest on a player's hand during contact.
- :The clockwise movement of players on the court after winning a rally and gaining a point.
- :A soft and controlled attack where the player uses their fingertips to guide the ball over the net.
34 Clues: :When a player gets hit in the face by a powerful spike. • :When the receiving team wins a rally and takes control of the serve. • :An overhead pass used to deliver the ball to a teammate for an attack. • :A player who sets up the ball for attackers, orchestrating the team's offense. • ...
Security Quiz 2021-12-07
Across
- Risk identified for the project should be documented and tracked in
- Phishing is a form of
- The major ransomeware trojan targeting windows in 2014
- This gives the contact numbers of all stakeholders
- this attack can be deployed by infusing a malicious code in website's comment section(abbreviation)
Down
- lack of access control policy is a
- Technology to hide information inside a picture
- Using this for doing competitive information gathering is a crime
- Compromising confidential information comes under
- This automates an action or attack so that repetitive tasks are done at a faster rate
- A malicious program do not replicate automatically
- Attackers could steal this to achieve illegitimate accessing to online accounts and disturbs the personal information
12 Clues: Phishing is a form of • lack of access control policy is a • Technology to hide information inside a picture • Compromising confidential information comes under • A malicious program do not replicate automatically • This gives the contact numbers of all stakeholders • The major ransomeware trojan targeting windows in 2014 • ...
9/11 - MGRR Submission 2023-04-07
Across
- How many planes were hijacked?
- What building in Washington DC was destroyed in the attack?
- Where were the majority of the terrorists from?
- Which buildings in New York City were destroyed in the attack?
- What was established due to security fears raised by 9/11?
- What was most likely the target of Flight 93, that was foiled by passengers?
Down
- What is the centerpiece of the 9/11 memorial museum?
- Who carried out the terrorist attacks?
- Where did Flight 11 take off from?
- Who was the president during 9/11?
- Where was Osama bin Kaden tracked down and killed by US forces?
- What is common among 9/11 survivors and rescue workers?
12 Clues: How many planes were hijacked? • Where did Flight 11 take off from? • Who was the president during 9/11? • Who carried out the terrorist attacks? • Where were the majority of the terrorists from? • What is the centerpiece of the 9/11 memorial museum? • What is common among 9/11 survivors and rescue workers? • What was established due to security fears raised by 9/11? • ...
i surrived the attack of grizzleies 2023-05-09
Across
- very suprising astonishing or remarkable
- a keeper of a park forest or area of countryside
- subject to shock
- obtain or bring about by discussion
- a particular from or version of a published text
- the scientific of the study of a human mind
Down
- the aggregute of people living together in a more or less ordered community
- ready or likely to attack
- unexpectidly expirence or be faced with something dificult or hostie
- relating to the natural world and the impact of human activity on its condition
- come near to someone or by something in the distance
- a felling of worry
- an award for an achivement in american jarnalisim lierature or music there are thirteen made each year
13 Clues: subject to shock • a felling of worry • ready or likely to attack • obtain or bring about by discussion • very suprising astonishing or remarkable • the scientific of the study of a human mind • a keeper of a park forest or area of countryside • a particular from or version of a published text • come near to someone or by something in the distance • ...
touch 10 #! 2021-09-08
Bush/Obama 2019-04-09
Across
- country that allowed terrorist training camps and then invaded by the U.S.
- both of these were his and collapsed
- Bush proclaimed this action after the attack on America
- to take control of something by force
- he was the leader of America during the 9/11 attack
- the mastermind of the nine-eleven attacks
Down
- military target of the terrorists
- day in 2001 terrorists attacked America
- those responsible for the terrorist attacks
- center in New York which was the main target
- group in Afghanistan that allowed bin-laden to operate
- one aircraft crashed in a field here after passengers rushed the terrorists
12 Clues: military target of the terrorists • both of these were his and collapsed • to take control of something by force • day in 2001 terrorists attacked America • the mastermind of the nine-eleven attacks • those responsible for the terrorist attacks • center in New York which was the main target • he was the leader of America during the 9/11 attack • ...
World War I 2022-04-06
Across
- Posters and films produced by the government, designed to persuade
- Country that Germany tried to get to attack the USA
- Control of the amounts and kinds of goods people can have
- Britain, France, and Russia comprised the Triple ___
- Glorifying war and preparing for it
- Agreement to stop fighting
Down
- Allied country that dropped out of the war because of a Communist overthrow of the government
- Title of Franz Ferdinand
- Middle Eastern Empire that was once strong and widespread, but surrendered WWI
- An entire ethnic group was targeted to be killed during the Armenian _____
- Military technology that made it so Germans could sneak-attack enemy ships
- Germany, Austria-Hungary, and Italy comprised the Triple ___
12 Clues: Title of Franz Ferdinand • Agreement to stop fighting • Glorifying war and preparing for it • Country that Germany tried to get to attack the USA • Britain, France, and Russia comprised the Triple ___ • Control of the amounts and kinds of goods people can have • Germany, Austria-Hungary, and Italy comprised the Triple ___ • ...
Vocabulary. 2023-02-06
12 Clues: area • to feel • opposite • sudden fall • all the same • force to move • attack someone • related to math • collecting things • lively and energetic • concern or feel others • very caLM OR omega calm
Cyber Security Words and Terms 2022-09-15
Across
- A simple form of code for software that can be written in word editors.
- The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
- A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- breach When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
- private network Also known as a VPN, it allows you to create a secure connection to another network using the internet.
- theft The deliberate use of someone else's identity, typically for financial gain.
- source Software that has their code listed as free to use, share, and modify.
- A form of malicious software that disguises itself as a harmless computer program but provides threat actors with the ability to execute any variety of attacks that steal information, disrupt functionality or damage data.
Down
- An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
- An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior. Often used to disable firewall or anti-malware software while consuming CPU activity to increase an endpoint’s vulnerability to attack.
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- text Text that can be read by the human eye, like this article!
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
17 Clues: text Text that can be read by the human eye, like this article! • A simple form of code for software that can be written in word editors. • source Software that has their code listed as free to use, share, and modify. • theft The deliberate use of someone else's identity, typically for financial gain. • ...
Crossword Marwan 2024-04-17
Across
- is used to transmit data securely and anonymously over public networks.
- attack which consists of testing all possible password or key solutions.
- attack which consists of testing all the words in a list as a keyword
- a symmetric encryption algorithm (block cipher) using 56-bit keys
Down
- malware that infects your PC or mobile device and collects information
- The principle holds that a cryptosystem should be secure, even if everything about the system, except the key, is public knowledge.
- a public-key cryptosystem, one of the oldest widely used for secure data transmission.
- attack that makes a server inaccessible in order to cause an outage
8 Clues: a symmetric encryption algorithm (block cipher) using 56-bit keys • attack that makes a server inaccessible in order to cause an outage • attack which consists of testing all the words in a list as a keyword • malware that infects your PC or mobile device and collects information • is used to transmit data securely and anonymously over public networks. • ...
Chapter 42 Vocabulary 2015-04-28
12 Clues: wave • poor • rich • wind • since • secretly • hut, cottage • school master • 1st principal part to attack • 3rd principal part to resist • 2nd principal part to escape • 2nd principal part to overcome
unit 2 2023-10-05
12 Clues: wise • many • a design • deceptive • a quarrel • efficient • to explain • to give up on • a violent attack • commanding attention • an evil or wicked person • to change from one form to another
Clothes and US 2023-04-18
12 Clues: garçon • un prix • un veuf • une honte • un défaut • un aperçu • un contribuable • une affirmation • les allocations • une crise cardiaque • system les aides sociales • quid une livre (sterling)
Pokémon with 150-159 Special Attack 2024-02-14
Across
- 150 Dragon/Fire V
- 150 Water/Dragon IV Origin Forme
- 150 Water III
- 159 Fire/Flying I Mega Y
- 154 Psychic I
- 154 Psychic/Fighting I Mega X
- 150 Water/Dragon IV
- 150 Steel/Dragon IV
- 150 Psychic/Ghost V Confined
Down
- 150 Dragon/Flying III
- 153 Water/Dark VI Ash
- 150 Psychic III Normal Forme
- 150 Steel/Dragon IV Origin Forme
- 157 Psychic/Ghost VII Dawn Wings
- 150 Ground/Fire III Primal
- 151 Fire/Ghost VII
16 Clues: 150 Water III • 154 Psychic I • 150 Dragon/Fire V • 151 Fire/Ghost VII • 150 Water/Dragon IV • 150 Steel/Dragon IV • 150 Dragon/Flying III • 153 Water/Dark VI Ash • 159 Fire/Flying I Mega Y • 150 Ground/Fire III Primal • 150 Psychic III Normal Forme • 150 Psychic/Ghost V Confined • 154 Psychic/Fighting I Mega X • 150 Steel/Dragon IV Origin Forme • 157 Psychic/Ghost VII Dawn Wings • ...
Shark Attack and Giant Squid Vocabulary 2025-02-04
Across
- giving off light naturally by certain kinds of insect, fish, or bacteria
- looked carefully
- a group of living things that are the same in many important ways
- natural environment of a plant or animal
- a specific environment in the living things in the environment
- the state of being caught, imprisoned
Down
- the range of life forms in a stated location
- without energy, lazy, slow
- able to change in order to fit new situations
- eager to drink blood
- animal that kills in each other animals
- a large sea monster once believed to live off the coast of Scandinavia
- (verb) to hunt catch and eat another animal, (noun) an animal that is hunted caught and eaten by another animal
13 Clues: looked carefully • eager to drink blood • without energy, lazy, slow • the state of being caught, imprisoned • animal that kills in each other animals • natural environment of a plant or animal • the range of life forms in a stated location • able to change in order to fit new situations • a specific environment in the living things in the environment • ...
Cyber Security Words and Terms 2022-09-15
Across
- A form of malicious software that disguises itself as a harmless computer program but provides threat actors with the ability to execute any variety of attacks that steal information, disrupt functionality or damage data.
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- theft The deliberate use of someone else's identity, typically for financial gain.
- A simple form of code for software that can be written in word editors.
- An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
- An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
- A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
Down
- The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
- Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- source Software that has their code listed as free to use, share, and modify.
- text Text that can be read by the human eye, like this article!
- private network Also known as a VPN, it allows you to create a secure connection to another network using the internet.
- Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
- A term coined in the mid-1990s to describe malware used to gain access to a user’s systems and monitor their data, files, and behavior. Often used to disable firewall or anti-malware software while consuming CPU activity to increase an endpoint’s vulnerability to attack.
- breach When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
- A cyber attacker who uses software and social engineering methods to steal data and information.
17 Clues: text Text that can be read by the human eye, like this article! • A simple form of code for software that can be written in word editors. • source Software that has their code listed as free to use, share, and modify. • theft The deliberate use of someone else's identity, typically for financial gain. • ...
MACK ATTACK: Leadership Puzzle III 2016-06-29
Across
- the center of interest or activity.
- the quality of being dedicated or committed to a task or purpose.
- give (someone) the authority or power to do something.
- work a great deal of effort or endurance.
- feeling or belief that one can rely on someone or something; firm trust.
Down
- the reason or reasons one has for acting or behaving in a particular way.
- a person who leads or commands a group, organization, or country.
- a software package designed to create electronic presentations consisting of a series of separate pages or slides.
- entrust (a task or responsibility) to another person, typically one who is less senior than oneself.
- the ability to understand and share the feelings of another.
10 Clues: the center of interest or activity. • work a great deal of effort or endurance. • give (someone) the authority or power to do something. • the ability to understand and share the feelings of another. • a person who leads or commands a group, organization, or country. • the quality of being dedicated or committed to a task or purpose. • ...
Attack of the black squares 2023-01-05
10 Clues: Run by males • restricted word • The book from lit circle • fighting for what's right • What Mac's dad claims to be • Hiding words from the truth • What Mac and his dad call the car • food Main restriction in the town • The sandwich they ate after the protest • Group of women who ask for equality towards men
Attack on Pearl Harbor Vocabulary 2025-07-16
Across
- A military encounter or battle; also refers to involvement in a particular activity or event.
- A foreign policy that seeks to limit a country’s involvement in international affairs and conflicts.
- To prepare and organize a nation’s resources and troops for active service or conflict.
- Relating to an empire; often used to describe a nation that has extensive territories and power.
- A penalty or restriction imposed by one country on another, usually to influence its behavior or policies.
- Ready or likely to attack or confront; characterized by a strong desire to win or dominate.
- Something handed down by a predecessor; can refer to the lasting impact of an event or individual.
Down
- Causing severe and widespread destruction or damage.
- The ability to recover quickly from difficulties; toughness and adaptability in the face of challenges.
- The state of being well known for a bad quality or deed; famously evil.
10 Clues: Causing severe and widespread destruction or damage. • The state of being well known for a bad quality or deed; famously evil. • To prepare and organize a nation’s resources and troops for active service or conflict. • Ready or likely to attack or confront; characterized by a strong desire to win or dominate. • ...
wwII but its primarily Japan 2022-05-23
Across
- camps designed for the relocation of japanese immigrants
- caused many people to die after the bombings took place
- japanese attack on american soil
- american retaliation for the attack on pearl harbor
- term tused for those who died as a result of the attacks, bombings, etc.
- the largest ___ operation in history
- japanese americans citizens league
Down
- those who had not died but were ___ because of the attacks
- president who signed an order allowinng for the relocation of any american on land deemed a "military zone"
- five of these were needed to be captured by americans during the invasion of normandy
- japanese city bombed on august 9, 1945
- beach not easily captured by the americans
- term used for those who were eventually let out of the camps in 1954
- president who apologized to and finacially compensated surviving japanese americans after their forced relocation
- japanese city bombed on august 6, 1945
15 Clues: japanese attack on american soil • japanese americans citizens league • the largest ___ operation in history • japanese city bombed on august 9, 1945 • japanese city bombed on august 6, 1945 • beach not easily captured by the americans • american retaliation for the attack on pearl harbor • caused many people to die after the bombings took place • ...
The Battle of Shiloh 2019-05-17
Across
- another nickname given to the Confederates by the Union
- many men died, but even more were _____in this battle
- the man who led the Confederacy into battle
- the man that led the Union into battle
- the side of the war that pro-slavery
- a common weapon used in the Civil War
- the man who led the reinforcements to the Union
- the river where the battle was fought
Down
- a common water source for soldiers in the Civil War (Hint: its a container)
- the life-savers of the Union army (Hint: its troops of men)
- General Johnston led 2 of these when the Confederates were loosing
- the line of men that stood their ground throughout the battle
- the side of the war that was anti-slavery
- over 13,047 of these happend in this battle
- a surprise attack (Hint: the first Confederate attack in the battle)
15 Clues: the side of the war that pro-slavery • a common weapon used in the Civil War • the river where the battle was fought • the man that led the Union into battle • the side of the war that was anti-slavery • the man who led the Confederacy into battle • over 13,047 of these happend in this battle • the man who led the reinforcements to the Union • ...
Jason Milgate Virus 2019-11-05
Across
- a bad computer program that makes a computer do unwanted things
- first virus to attack hardware
- coding info to make it harder to access
- a virus that replicates itself and spreads to other computers
- the act of using a computer to gain unauthorized access to data
- downloads that happen without your consent when you visit a website
- a program that a computer runs to do stuff
- electronic mail
Down
- a data storage device that can be plugged into any computer with a USB port
- a virus spread through email that overwrote your data
- a virus that encrypts your data and only gives it back if they are paid
- the act of making a website look real to bait you into getting scammed
- software designed to damage your computer
- a distributed denial of service attack that slows down a website
- a virus that disguises itself as legitimate software
15 Clues: electronic mail • first virus to attack hardware • coding info to make it harder to access • software designed to damage your computer • a program that a computer runs to do stuff • a virus that disguises itself as legitimate software • a virus spread through email that overwrote your data • a virus that replicates itself and spreads to other computers • ...
Chapter 3 Lesson 3 and 4 2021-11-05
Across
- a person who wanted the colonies to remain loyal to Britain
- a change or correction to improve something
- the capital of the colonies
- A representative
- used her business to make flags for the Pennsylvania Navy
- a group of states that together form one country
- the first plan for the United States government but it wasn't used long because it was too weak
Down
- a vehicle that helped people travel to new places and settle in Pennsylvania
- means to approve something officially
- occurred because people were being taxed on their homes and properties
- a surprise attack
- army crossed the Delaware River on December 25th and performed a victorious surprise attack on the British
- a document that outlines the laws of a government and each state had their own
- a change in government by force
- a person who supported the Revolution
15 Clues: A representative • a surprise attack • the capital of the colonies • a change in government by force • means to approve something officially • a person who supported the Revolution • a change or correction to improve something • a group of states that together form one country • used her business to make flags for the Pennsylvania Navy • ...
Canadian Japanese Internment Vocab 2023-05-23
Across
- Those who resisted internment were sent to these places
- About 1,200 of these were confiscated after the Japan's attack
- Japan attacked this naval base in 1941
- Under the WMA, Japanese Canadians were declared to be these
- What many feared Japanese Canadians were after Japan's attack
- First-generation Japanese immigrants
Down
- The statue passed by the Canadian PM in 1941
- The location of the livestock farms that were used as temporary confinement for Japanese Canadians
- After the war ended, the Japanese were given the option to be relocated to the _____ Mountains
- Able-bodied Japanese men were sent to these places to work for 25 cents an hour
- In exchange for their reunion, some Japanese families agreed to work on plantations that harvested this crop
- Japanese _____ Camps
- Prime Minister William Lyon _______
- much of Canadian society at the time was made up of this nationality
- Japanese term for the children of immigrants
15 Clues: Japanese _____ Camps • Prime Minister William Lyon _______ • First-generation Japanese immigrants • Japan attacked this naval base in 1941 • The statue passed by the Canadian PM in 1941 • Japanese term for the children of immigrants • Those who resisted internment were sent to these places • Under the WMA, Japanese Canadians were declared to be these • ...
Tittle3 2018-03-08
Across
- A violent attack,threat or attempt to harm a person
- The best way to avoid the dangers of planned or intentional injuries
- Bullying with the use of technology and electronic means
- Harm or damage to someone as a result of an act or event
- A forced sexual intercourse
- Pressure through the use of terror and violence
- A street based group mostly made up of young people, that engages in illegal acts
Down
- Someone who follows you around and makes you feel in dager
- An act intended to cause injury or damage to a person
- Abuse, verbal insult, or physical attack on a person
- An initiation rite for fraternity neophytes
- Forcefully taking away of a person against his/her will
- A suicide attempt in which person does not intend to die
- The taking of a person from their home using deception or force
- A sexual contact betweet closely related person
15 Clues: A forced sexual intercourse • An initiation rite for fraternity neophytes • A sexual contact betweet closely related person • Pressure through the use of terror and violence • A violent attack,threat or attempt to harm a person • Abuse, verbal insult, or physical attack on a person • An act intended to cause injury or damage to a person • ...
Deanna Herbert 2018-11-16
Across
- If you ______ your files can be saved from hackers locking them
- Can damage networks.
- Type of attack that floods a system with traffic (Denial of Service)
- Is used to get information from a person's computer
- A software used to protect your computer from a type of malware
- Can be let into your computer by a form of communication
- Made up of code, can be downloaded onto your computer.
Down
- Unwanted Software that is type of malware
- A person who may try to get into your computer
- A ransomware that was used in an attack in Atlanta.
- You should not ________ anything suspicious onto your computer
- Is used to scare or cause anxiety to the user
- Fraud Email that can be sent to you
- Software that is meant to harm your computer.
- A virus that acts like another virus as a disguise.
15 Clues: Can damage networks. • Fraud Email that can be sent to you • Unwanted Software that is type of malware • Is used to scare or cause anxiety to the user • Software that is meant to harm your computer. • A person who may try to get into your computer • A ransomware that was used in an attack in Atlanta. • Is used to get information from a person's computer • ...
Ground Zero Crossword 2025-12-11
Across
- a huge plane used to hold around 400-600 passengers
- an ancient town in what is present day Afghanistan
- a hidden explosive device(generally buried)
- a flimsy wall material similar to drywall
- a Finnish tech company famous for making extremely durable phones
- an American attack helicopter used commonly today
- to help someone(a refugee)
- a commonly used word in Pashtunawali that means "dear," or "darling"
- the indigenous language of the Pashtuns
Down
- a full body garment worn by some Muslim women in public, covering the entire body and face with a mesh screen allowing sight
- an unwritten code of ethics, honor, and behavior for the Pashtun people
- a type of rifle used by the british
- an American attack helicopter commonly used in the early 2000's
- a type of clothing worn on the face
- a type of revenge
15 Clues: a type of revenge • to help someone(a refugee) • a type of rifle used by the british • a type of clothing worn on the face • the indigenous language of the Pashtuns • a flimsy wall material similar to drywall • a hidden explosive device(generally buried) • an American attack helicopter used commonly today • an ancient town in what is present day Afghanistan • ...
Cyber security - 6 2025-07-09
Across
- A potential cause of an unwanted incident that may result in harm.
- A standard for managing customer data based on five trust service principles.
- Proactively searching for signs of malicious activity.
- A solution that collects and analyzes security data in real time.
- An attack that manipulates a database query through input fields.
- Protocols for securing communications over a network.
- Encryption using the same key for both encryption and decryption.
Down
- Information about threats and threat actors used to inform decisions.
- Manipulating people into divulging confidential information.
- A service that encrypts your internet connection for privacy and security.
- A standard for message logging in a network.
- A security process requiring two different forms of identification.
- Replacing sensitive data with unique identification symbols.
- A targeted phishing attack aimed at a specific individual or organization.
- A physical or digital device used to authenticate identity.
15 Clues: A standard for message logging in a network. • Protocols for securing communications over a network. • Proactively searching for signs of malicious activity. • A physical or digital device used to authenticate identity. • Manipulating people into divulging confidential information. • Replacing sensitive data with unique identification symbols. • ...
Vocab 2026-04-10
Across
- Widespread destruction or devastation. Great confusion.
- Any fact or event that can be observed or described. An unusual fact, event, or person.
- To pull away from with a twist. To take by force or as if by force.
- Happening or existing at the same time.
- Like a picture; pleasing or charming to look at.
- A much larger supply than is needed. To supply a much larger amount than is needed.
- To reach or bring to the highest point.
Down
- Not easily made tired; tireless.
- Impossible to attack successfully.
- A fierce attack.
- A wall-like structure used as a defense. A person or thing that protects or defends.
- To require as part of an agreement or contract.
- Able to be done; possible or likely.
- Open or subject to; easily influenced or affected by.
- To swallow up by covering completely; to overwhelm.
15 Clues: A fierce attack. • Not easily made tired; tireless. • Impossible to attack successfully. • Able to be done; possible or likely. • Happening or existing at the same time. • To reach or bring to the highest point. • To require as part of an agreement or contract. • Like a picture; pleasing or charming to look at. • To swallow up by covering completely; to overwhelm. • ...
Vocab 2026-04-10
Across
- Widespread destruction or devastation. Great confusion.
- Any fact or event that can be observed or described. An unusual fact, event, or person.
- To pull away from with a twist. To take by force or as if by force.
- Happening or existing at the same time.
- Like a picture; pleasing or charming to look at.
- A much larger supply than is needed. To supply a much larger amount than is needed.
- To reach or bring to the highest point.
Down
- Not easily made tired; tireless.
- Impossible to attack successfully.
- A fierce attack.
- A wall-like structure used as a defense. A person or thing that protects or defends.
- To require as part of an agreement or contract.
- Able to be done; possible or likely.
- Open or subject to; easily influenced or affected by.
- To swallow up by covering completely; to overwhelm.
15 Clues: A fierce attack. • Not easily made tired; tireless. • Impossible to attack successfully. • Able to be done; possible or likely. • Happening or existing at the same time. • To reach or bring to the highest point. • To require as part of an agreement or contract. • Like a picture; pleasing or charming to look at. • To swallow up by covering completely; to overwhelm. • ...
Vocab 2026-04-10
Across
- Widespread destruction or devastation. Great confusion.
- Any fact or event that can be observed or described. An unusual fact, event, or person.
- To pull away from with a twist. To take by force or as if by force.
- Happening or existing at the same time.
- Like a picture; pleasing or charming to look at.
- A much larger supply than is needed. To supply a much larger amount than is needed.
- To reach or bring to the highest point.
Down
- Not easily made tired; tireless.
- Impossible to attack successfully.
- A fierce attack.
- A wall-like structure used as a defense. A person or thing that protects or defends.
- To require as part of an agreement or contract.
- Able to be done; possible or likely.
- Open or subject to; easily influenced or affected by.
- To swallow up by covering completely; to overwhelm.
15 Clues: A fierce attack. • Not easily made tired; tireless. • Impossible to attack successfully. • Able to be done; possible or likely. • Happening or existing at the same time. • To reach or bring to the highest point. • To require as part of an agreement or contract. • Like a picture; pleasing or charming to look at. • To swallow up by covering completely; to overwhelm. • ...
How to Survive a Bear Attack 2026-02-02
Across
- – Wild animals that look like dogs and live in packs.
- – A bag you carry on your back when travelling or hiking.
- – Male cows, often strong and aggressive.
- – A cream that protects your skin from the sun.
- – Small insects that bite and suck blood.
- – Large wild animals that like honey and live in forests.
Down
- KNIFE – A tool used for cutting; it can be dangerous.
- – Small insects that live in large groups and work together.
- BAG – A warm bag you sleep in when camping.
- – A small portable light used in the dark.
- – Insects that make honey and can sting.
- – A small area of water, often found in nature.
- – Long animals with no legs that can be dangerous.
13 Clues: – Insects that make honey and can sting. • – Male cows, often strong and aggressive. • – Small insects that bite and suck blood. • – A small portable light used in the dark. • BAG – A warm bag you sleep in when camping. • – A small area of water, often found in nature. • – A cream that protects your skin from the sun. • ...
Lesson 1 2022-10-18
crossword puzzle 2023-02-09
music crossword 2015-10-01
Enfermedades 1 2023-10-15
10 Clues: viruela • leucemia • sarampión • parálisis • depresión • estreñimiento • derrame cerebral • arrest paro cardíaco • infarto, ataque al corazón • failure insuficiencia renal
Chapter 5 Vocab 2025-09-22
Bush/Obama 2019-04-09
Across
- Bush proclaimed this action after the attack on America
- group in Afghanistan that allowed bin-laden to operate
- those responsible for the terrorist attacks
- one aircraft crashed in a field here after passengers rushed the terrorists
- to take control of something by force
- country that allowed terrorist training camps and then invaded by the U.S.
Down
- both of these were his and collapsed
- center in New York which was the main target
- the mastermind of the nine-eleven attacks
- day in 2001 terrorists attacked America
- military target of the terrorists
- he was the leader of America during the 9/11 attack
12 Clues: military target of the terrorists • both of these were his and collapsed • to take control of something by force • day in 2001 terrorists attacked America • the mastermind of the nine-eleven attacks • those responsible for the terrorist attacks • center in New York which was the main target • he was the leader of America during the 9/11 attack • ...
Vocab 2 2020-09-29
Across
- The bombing of Hiroshima had an ineffable effect on the victims.
- To bluntly say something insulting to someone.
- Simp
- When someone underestimates the power of someone else in a movie.
- Sports cars are very __________.
- Tai lung is very ______ when addressing poe.(kung fu panda)
Down
- Thanos seems ______ but is actually attempting to fix the world(just the wrong way about it).
- Some people are too ______ when it comes to disciplining.
- The stars are a _______ of how the world used to be.
- The crab's shell in Moana can be described as?
- Megamind's plans are very ______."You have have outsmarted me"
- "Sir what is the plan of attack" "The plan? attack!"
12 Clues: Simp • Sports cars are very __________. • To bluntly say something insulting to someone. • The crab's shell in Moana can be described as? • The stars are a _______ of how the world used to be. • "Sir what is the plan of attack" "The plan? attack!" • Some people are too ______ when it comes to disciplining. • Tai lung is very ______ when addressing poe.(kung fu panda) • ...
Vocab 2 2020-09-29
Across
- The bombing of Hiroshima had an ineffable effect on the victims.
- To bluntly say something insulting to someone.
- Simp
- When someone underestimates the power of someone else in a movie.
- Sports cars are very __________.
- Tai lung is very ______ when addressing poe.(kung fu panda)
Down
- Thanos seems ______ but is actually attempting to fix the world(just the wrong way about it).
- Some people are too ______ when it comes to disciplining.
- The stars are a _______ of how the world used to be.
- The crab's shell in Moana can be described as?
- Megamind's plans are very ______."You have outsmarted me but I have out smarted your outsmarting"
- "Sir what is the plan of attack" "The plan? attack!"
12 Clues: Simp • Sports cars are very __________. • To bluntly say something insulting to someone. • The crab's shell in Moana can be described as? • The stars are a _______ of how the world used to be. • "Sir what is the plan of attack" "The plan? attack!" • Some people are too ______ when it comes to disciplining. • Tai lung is very ______ when addressing poe.(kung fu panda) • ...
Splatoon 2 2020-11-13
Across
- The first weapon you ever get from online battle
- An action to make people mad when you did it after you killed somebody
- Something explodes when you shoot them
- The first weapon you ever got in story mode
- press ZR for grounded attack and midair for vertical attack
- Mostly get spawnkilled after that action
Down
- you jump very high and down and then kill lots of people
- The most original sub-weapon
- Annoying weapon that turns the pro con quickly and release ZL to snipe people
- instant exploding sub-weapon
- Turns into a ball and roll kill people
- Aim people in a small circle and then shoots them
12 Clues: The most original sub-weapon • instant exploding sub-weapon • Turns into a ball and roll kill people • Something explodes when you shoot them • Mostly get spawnkilled after that action • The first weapon you ever got in story mode • The first weapon you ever get from online battle • Aim people in a small circle and then shoots them • ...
History and Geography Revision Facts Y8 Nov 2021 2021-11-25
Across
- The number of languages Elizabeth could speak by the time she was 16.
- These were sent to cause chaos among the Spanish ships at Calais.
- Elizabeth was two years old when her mother, Anne ............. was executed.
- This king passed laws against Catholics.
- The large Spanish fleet sent to attack England.
- Family name of the Englishman who led an attack on Spanish ships at Cadiz
Down
- name of the Spanish king during the time of Elizabeth.
- Family name of the man who tried to blow up pariament.
- Elizabeth was this type of Christian (not Catholic).
- Elizabeth's half-brother who became king.
- Elizabeth's Religious Settlement ideas are also known as her ................. way.
- Elizabeth's half-sister who became queen.
12 Clues: This king passed laws against Catholics. • Elizabeth's half-brother who became king. • Elizabeth's half-sister who became queen. • The large Spanish fleet sent to attack England. • Elizabeth was this type of Christian (not Catholic). • name of the Spanish king during the time of Elizabeth. • Family name of the man who tried to blow up pariament. • ...
WW1 2024-09-10
Across
- People were ____ about the Governments official statement.
- Oversaw manufacturing of America and found ways to covert industries for the war times.
- The country that was about to receive a telegram from Germany
- Daily routine of standing in a trench before dawn waiting for a German attack
- Germany made a new weapon to combat British blockades
- Low mortality, but highly debilitating
- Passenger ship that was shot by torpedoes
Down
- the right to engage in legal activities such as expression without being hindered by the gov.
- Very dangerous weapon of war
- Germany tried to persuade a country to attack America but we intercepted it.
- Allies with Belgium
- Joins the fight late
12 Clues: Allies with Belgium • Joins the fight late • Very dangerous weapon of war • Low mortality, but highly debilitating • Passenger ship that was shot by torpedoes • Germany made a new weapon to combat British blockades • People were ____ about the Governments official statement. • The country that was about to receive a telegram from Germany • ...
CROSSWORD PUZZLE 2018-03-08
Across
- Bullying with the use of technology and electronic means
- A violent attack, threat or attempt to harm a person
- Someone who follows you around and makes you fell in danger
- The best way to avoid the dangers of planned or intentional injuries
- The taking of a person from their home using deception or force
- A street based group mostly made up of young people, that engages in illegal acts
Down
- An act intended to cause injury or damage to a person
- A sexual contact between closely related person
- A suicide attemt in which person does not intend to die
- Abuse, verbal insult, or physical attack on a person
- Forcefully taking away of a person against his/her will
- Pressure through the use of terror and violence
- A forced sexual intercourse
- An initiation rite for fraternity neophytes
- Harm or damage to someone as a result of an act or event
15 Clues: A forced sexual intercourse • An initiation rite for fraternity neophytes • A sexual contact between closely related person • Pressure through the use of terror and violence • Abuse, verbal insult, or physical attack on a person • A violent attack, threat or attempt to harm a person • An act intended to cause injury or damage to a person • ...
Test Your Knowledge on Abolition- Crossword! 2013-03-25
Across
- Newspaper published by Garrison
- Biography of the fugitive abolitionist who established the North Star
- Newspaper published by Frederick Douglass
- A fugitive slave abolitionist who established the North Star
- A peaceful abolitionist who published the Liberator first starting in 1831
Down
- Pamphlet published by Benjamin Lundy
- Reformers of Beecher family
- Abolitionists of the Beecher family
- Largest attack of Browns career and where he is arrested
- Attack led by Brown in Kansas that killed five people
- A book written by Harriet Beecher Stowe to inform others about her opinions of slavery
- Local abolitionist newspaper published in 1834 by William C Bloss and Reverend Thomas James
- Brown A violent abolitionist who killed many in the slaughters of Pottawatomie and Harpers Ferry
- The regiment of African American soldiers who fought alongside the Union Army and was partially recruited by Douglass
- The movement to relocate fugitive and free African Americans back to Liberia, Africa
15 Clues: Reformers of Beecher family • Newspaper published by Garrison • Abolitionists of the Beecher family • Pamphlet published by Benjamin Lundy • Newspaper published by Frederick Douglass • Attack led by Brown in Kansas that killed five people • Largest attack of Browns career and where he is arrested • A fugitive slave abolitionist who established the North Star • ...
Major Israel Wars 2022-01-10
Across
- What IDF shows as a result of Sinai war
- Israel accepted this in 1967 from the UN, but did not need to
- The type of war the Six Day War was
- Israel and Egypt began ____________ in 1974
- Israel obtains this place in 1967, that they later use to create peace with Egypt
- UN acknowledges Israel's __________ as an outcome to the Six Day War
- What Nassar does to the Canal that shuts out British and French in 1956
Down
- Israel takes this place in 1967
- President of Egypt
- Israel ____________ fell apart before Yom Kippur War
- This person resigned as an outcome to the war in 1977
- These two countries launched an attack on Yom Kippur in Israel
- launched an attack on Israel in attempt to show they needed peace
- force that withdrew in 1967 that cause help the war
- Israel risked their entire airforce in 1967, but obliterated this countries airforce
15 Clues: President of Egypt • Israel takes this place in 1967 • The type of war the Six Day War was • What IDF shows as a result of Sinai war • Israel and Egypt began ____________ in 1974 • force that withdrew in 1967 that cause help the war • Israel ____________ fell apart before Yom Kippur War • This person resigned as an outcome to the war in 1977 • ...
Lessons 43 & 44 2022-10-07
Across
- make worse; exasperate or irritate
- gain favor with somebody by deliberate efforts
- badmouth someone or something; speak unfavorably about
- a false accusation of an offense or a malicious misrepresentation of someone's words or actions; an abusive attack on a person's character or good name
- excessively sentimental or so sappy it's sickening
- a false and malicious publication printed for the purpose of defaming a living person; print slanderous statements against
Down
- expressing offensive reproach
- cause annoyance in; disturb, especially by minor irritations; be a mystery or bewildering to; subject to prolonged examination, discussion, or deliberation
- spread negative information about
- the trait of being rude and impertinent; inclined to take liberties; cheekiness; irritate or vex
- to dirty or tarnish, particularly someone's reputation; charge falsely or with malicious intent
- so lacking in interest as to cause mental weariness; annoying in a tiresome way
- overly sweet
- light teasing repartee
- attack as false or wrong
15 Clues: overly sweet • light teasing repartee • attack as false or wrong • expressing offensive reproach • spread negative information about • make worse; exasperate or irritate • gain favor with somebody by deliberate efforts • excessively sentimental or so sappy it's sickening • badmouth someone or something; speak unfavorably about • ...
Crossword puzzle 2024-04-15
Across
- abuse, verbal insult, or physical attack on a person
- an act intended to cause injury or damage to a person
- a forced sexual intercourse
- a violent attack, threat or attempt to harm a person
- bullying with the use of technology and electronic means
- a street-based group, mostly made up of young people, that engages in illegal acts
- a sexual contact between closely related persons
- the best way to avoid the dangers of planned or intentional injuries is through
Down
- a suicide attempt in which a person does not intend to die
- someone who follows you around and makes you feel in danger
- pressure through the use of terror or violence
- an initiation rite for fraternity neophytes
- taking of a person from their home using deception or force
- harm or damage to someone as a result of an act or event
- forcefully taking away of a person against his/her will
15 Clues: a forced sexual intercourse • an initiation rite for fraternity neophytes • pressure through the use of terror or violence • a sexual contact between closely related persons • abuse, verbal insult, or physical attack on a person • a violent attack, threat or attempt to harm a person • an act intended to cause injury or damage to a person • ...
Chapter 8 Crossword Puzzle 2023-03-02
Across
- the tipping point that made America join WWI
- American president during WWI with 14 very important points
- the deadliest battle of WWI
- an alliance between Germany, Austria-Hungary, Ottoman Empire, and Bulgaria in WWI
- area operated by LN rich in coal mines and given to germany
- made for sustaining world peace and supported by Woodrow Wilson
- the date in mmmm/dd/yyyy (ex: jan11917)form that WWI started
- an alliance between France, the UK, and Russia during WWI
Down
- a style of attack in which two enemies build parallel trenches and attack from them
- the title and first and last name of whose assassination started WWI
- french diplomat who helped create the Treaty of Versailles
- a country created after WWI out of parts of Austria-Hungary
- a country created after WWI out of parts of Russia
- pizza brand/ very popular German pilot during WWI
- the treaty ending WWI and starting WWII
15 Clues: the deadliest battle of WWI • the treaty ending WWI and starting WWII • the tipping point that made America join WWI • pizza brand/ very popular German pilot during WWI • a country created after WWI out of parts of Russia • an alliance between France, the UK, and Russia during WWI • french diplomat who helped create the Treaty of Versailles • ...
Lee 19 2023-04-14
Across
- Widespread destruction or devastation. Great confusion.
- Any fact or event that can be observed or described. An unusual fact, event, or person.
- To pull away from with a twist. To take by force or as if by force.
- Happening or existing at the same time.
- Like a picture; pleasing or charming to look at.
- A much larger supply than is needed. To supply a much larger amount than is needed.
- To reach or bring to the highest point.
Down
- Not easily made tired; tireless.
- Impossible to attack successfully.
- A fierce attack.
- A wall-like structure used as a defense. A person or thing that protects or defends.
- To require as part of an agreement or contract.
- Able to be done; possible or likely.
- Open or subject to; easily influenced or affected by.
- To swallow up by covering completely; to overwhelm.
15 Clues: A fierce attack. • Not easily made tired; tireless. • Impossible to attack successfully. • Able to be done; possible or likely. • Happening or existing at the same time. • To reach or bring to the highest point. • To require as part of an agreement or contract. • Like a picture; pleasing or charming to look at. • To swallow up by covering completely; to overwhelm. • ...
Alas Babylon 2025-02-26
Across
- A crucial resource that becomes scarce after the bomb is dropped.
- punishment for the highwaymen
- scientist whose theory of natural selection is discussed in the story
- name of the small town in Florida where the story takes place.
- name of the woman Randy is romantically interested in after the attack.
- character attacked by the highwaymen
- Randy’s brother who works in the military and is involved in the government’s response to the crisis.
- Character that is temporarily blinded
- is forced to become the leader of the community after the disaster.
Down
- character who owned the birds, cat, & fish in the beginning of the story
- A crucial resource that becomes scarce after the bomb is dropped.
- Disease that has polluted the river
- character becomes a key figure in organizing the town’s survival efforts.
- Character who's appendix is removed in the story
- Family that raises the livestock for the River Road group.
- nuclear attack on this country is the catalyst for the novel's events.
16 Clues: punishment for the highwaymen • Disease that has polluted the river • character attacked by the highwaymen • Character that is temporarily blinded • Character who's appendix is removed in the story • Family that raises the livestock for the River Road group. • name of the small town in Florida where the story takes place. • ...
vocabularybns 2019-02-05
11 Clues: force • not fresh • worrisome • to suppose • sly, clever • imprecision • not bright,bleak • mess up (two words) • irresistible impulse • likely to(two words) • susceptible to attack
Dariusz Prusinowski 2022-04-24
11 Clues: skrzep • w ciąży • demencja • śpiączka • urojenia • defibrylacja • attack zawał serca • wstrząs anafilaktyczny • allergy uczulenie na orzechy • deliver a baby przyjąć poród • arrest zatrzymanie akcji serca
Anime 2022-06-26
Across
- bighit boy group
- How many fingers did itadori yuji eat in season 1 [anime : jujutsu kaisen ]
- real name of rm from BTS
- EXO main vocalist
- song by SHINee
- The group of living beings in bleach that have the ability to detect hollows and other beings [anime : Bleach ]
Down
- The evil corporation in steins gate [anime:Steins Gate ]
- Senku's favorite number [anime : Dr Stone ]
- The innermost wall in attack on titan [anime : attack on titan ]
9 Clues: song by SHINee • bighit boy group • EXO main vocalist • real name of rm from BTS • Senku's favorite number [anime : Dr Stone ] • The evil corporation in steins gate [anime:Steins Gate ] • The innermost wall in attack on titan [anime : attack on titan ] • How many fingers did itadori yuji eat in season 1 [anime : jujutsu kaisen ] • ...
Operation Cherry Blossoms at Night 2022-05-20
Across
- The type of bombs dropped on the U.S.
- The amount of casualties from the bombing
- Carried and dropped the 9,300 bombs in the successful attack on the Western U.S.
Down
- One of the two locations the U.S. dropped an atomic bomb
- The reason the plan never happened
- The country that was at war with the U.S.
- When the plan was scheduled in 1945
- He created the plan
- What the attack planned on spreading
9 Clues: He created the plan • The reason the plan never happened • When the plan was scheduled in 1945 • What the attack planned on spreading • The type of bombs dropped on the U.S. • The country that was at war with the U.S. • The amount of casualties from the bombing • One of the two locations the U.S. dropped an atomic bomb • ...
Cybersecurity Hacker Group Edition 2025-05-07
Across
- Iranian group targeting journalists and human rights organizations
- North Korean-backed group known for global financial attacks
- Turkish group known for malware distribution through fake software
- Russian group primarily targeting Ukraine
Down
- U.S.-linked hacking group known for sophisticated attack methods
- Russian cybercrime group targeting businesses for credit card data
- Vietnamese group targeting international and human rights organizations
- Russian group linked to the SolarWinds attack
- Russian group involved in NotPetya malware and attacks on Ukraine
9 Clues: Russian group primarily targeting Ukraine • Russian group linked to the SolarWinds attack • North Korean-backed group known for global financial attacks • U.S.-linked hacking group known for sophisticated attack methods • Russian group involved in NotPetya malware and attacks on Ukraine • Russian cybercrime group targeting businesses for credit card data • ...
Vocab 2025-08-19
Heart disease and Asthma 2013-02-01
Across
- the branches in the lungs
- little vessels that carry deoxiginated blood
- vessels that carry oxiginated blood
- asthmatics use this to help them breathe by inhaling it
- little bugs that live in your house and are tiny and can cause asthamtics to have an asthma attack
Down
- the main ingridiant in a ciggarette can trigger an asthma attack
- bodys over response to a subsatance
- used to relive stress and is helpfull for heart disease commonly used by monks
- a vital organ to live that pumps blood round your body
- a vital organ to breath
- a condition involving breathing, you need an inhaler for medicine
- a sector in food that can cause heart disease if consumed too much
12 Clues: a vital organ to breath • the branches in the lungs • bodys over response to a subsatance • vessels that carry oxiginated blood • little vessels that carry deoxiginated blood • a vital organ to live that pumps blood round your body • asthmatics use this to help them breathe by inhaling it • the main ingridiant in a ciggarette can trigger an asthma attack • ...
Russia Launches Attacks on Ukraine as Invasion Begins 2022-03-04
Across
- suffering, deaths, or damage
- to officially force a rule, tax, punishment, etc. to be obeyed or received
- the fact of something such as a bomb exploding
- a situation in which the military takes control of government functions during a national emergency
- a person who has a position of responsibility in an organization
- to be likely to cause harm or damage to something or someone
Down
- an act of expressing very strong disapproval
- fragments from an exploding bomb, artillery shell, mine, etc.
- to attack with explosives
- a person who supports separating a group of people from a country, region, etc.
- soldiers on duty in a large group
- a violent attack
12 Clues: a violent attack • to attack with explosives • suffering, deaths, or damage • soldiers on duty in a large group • an act of expressing very strong disapproval • the fact of something such as a bomb exploding • to be likely to cause harm or damage to something or someone • fragments from an exploding bomb, artillery shell, mine, etc. • ...
The Heart 2020-06-30
Across
- How many chambers are there in your heart?
- Left and right...
- What type of blood does the right side of the heart take?
- What carries oxygenated blood?
- Where does the heart pump the oxygenated blood to?
- What is your heart?
- What is the average beats per minute in a heart for a 10 year old?
Down
- What is the most common day of the year to have a heart attack?
- Where does the heart pump the deoxygenated blood to?
- Left and right...
- What carries the deoxygenated blood?
- What makes sure your blood doesn’t go the wrong way in your heart?
- What is the most common day of the week for someone to have a heart attack?
13 Clues: Left and right... • Left and right... • What is your heart? • What carries oxygenated blood? • What carries the deoxygenated blood? • How many chambers are there in your heart? • Where does the heart pump the oxygenated blood to? • Where does the heart pump the deoxygenated blood to? • What type of blood does the right side of the heart take? • ...
Vocab 2 2020-09-29
Across
- The bombing of Hiroshima had an _______ effect on the victims.
- To bluntly say something insulting to someone.
- Simp
- When someone underestimates the power of someone else in a movie.
- Sports cars are very __________.
- Tai lung is very ______ when addressing poe.(kung fu panda)
Down
- Thanos seems ______ but is actually attempting to fix the world(just the wrong way about it).
- Some people are too ______ when it comes to disciplining.
- The stars are a _______ of how the world used to be.
- The crab's shell in Moana can be described as?
- Megamind's very ______ when making plans."You have outsmarted me but I have out smarted your outsmarting"
- "Sir what is the plan of attack" "The plan? attack!"
12 Clues: Simp • Sports cars are very __________. • To bluntly say something insulting to someone. • The crab's shell in Moana can be described as? • The stars are a _______ of how the world used to be. • "Sir what is the plan of attack" "The plan? attack!" • Some people are too ______ when it comes to disciplining. • Tai lung is very ______ when addressing poe.(kung fu panda) • ...
Vocab 2 2020-09-29
Across
- The bombing of Hiroshima had an _______ effect on the victims.
- To bluntly say something insulting to someone.
- Simp
- When someone underestimates the power of someone else in a movie.
- Sports cars are very __________.
- Tai lung is very ______ when addressing poe.(kung fu panda)
Down
- Thanos seems ______ but is actually attempting to fix the world(just the wrong way about it).
- Some people are too ______ when it comes to disciplining.
- The stars are a _______ of how the world used to be.
- The crab's shell in Moana can be described as?
- Megamind's very ______ when making plans."You have outsmarted me but I have out smarted your outsmarting"
- "Sir what is the plan of attack" "The plan? attack!"
12 Clues: Simp • Sports cars are very __________. • To bluntly say something insulting to someone. • The crab's shell in Moana can be described as? • The stars are a _______ of how the world used to be. • "Sir what is the plan of attack" "The plan? attack!" • Some people are too ______ when it comes to disciplining. • Tai lung is very ______ when addressing poe.(kung fu panda) • ...
Cybersec 2024-08-19
14 Clues: 5 • 2 • 3 • 1 • 1 of CIA • 1 of CIA • Our Topic • Our institute • University Name • 1 of common attack • Output from algorithm • Use Publickey for this • One key for enc and dec • plaintext of pigpen enc on slide!
Tui Rizz Crossword 2025-06-11
Richmond Together & Friends5 2020-03-30
12 Clues: exams • Council • Attack! • projects • accounts • workbooks • online modules • VIP Consultant • print or digital • workshops (tailor-made) • She is the newest member in the team • She loves bike riding and technology
Richmond Together & Friends5 2020-03-30
12 Clues: exams • Council • Attack! • projects • accounts • workbooks • online modules • VIP Consultant • print or digital • workshops (tailor-made) • She is the newest member in the team • She loves bike riding and technology
Esther - 8L - Social Engineering 2023-02-02
Across
- An attack designed to steal a victim's password or other sensitive data
- An attack which the perpetrator invents a scenerio in order to get their data or money
- An attack that requires a quiz
- An attack which the victim receives an email with a suspicious link
Down
- Seek to exploit human or security vulnerabilities in order to steal passwords, data or money directly
- A set of methods to deceive people into giving out their information, used for fraudulent purposes
6 Clues: An attack that requires a quiz • An attack which the victim receives an email with a suspicious link • An attack designed to steal a victim's password or other sensitive data • An attack which the perpetrator invents a scenerio in order to get their data or money • ...
Old Yeller 2016-09-22
Blink HB 2022-09-30
Malware & Social Engineering 2023-11-23
Across
- locks a computer, encrypts files, and therefore prevents the user from being able to access the data.
- A piece of software that appears to perform a useful function (such as a game) but unbeknown to the user it also performs malicious actions.
- malicious software
- attacker will demand that a ransom be paid before they decrypt the files and unlock the computer.
- an attack designed to steal a victims password or other sensitive data. it involves the attacker watching while the victims provides sensitive information
Down
- a large collection of malware connected devices
- an attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data
- replicate themselves but do not attach themselves to files
- unwanted software that monitors and gathers information on a person and how they use their computer.
- can be a worm, virus, or Trojan. It infects a computer and causes it to download or display malicious adverts or pop-ups when the victim is online.
- an attack in which the perpetrator invents a scenario in order to convince the victim to give them data or money.
- a malicious form of self-replicating software.
- automated programs that perform tasks repeatedly.
13 Clues: malicious software • a malicious form of self-replicating software. • a large collection of malware connected devices • automated programs that perform tasks repeatedly. • replicate themselves but do not attach themselves to files • attacker will demand that a ransom be paid before they decrypt the files and unlock the computer. • ...
myocardial heart attack 2021-05-20
attack -2 v. 2023-02-17
5 Clues: [I, T] to rush forward and attack sb/sth • [I, T] to attack sb/sth, especially suddenly • [T] to attack a place without warning and then leave • [T, I] to suddenly attack a place, especially in order to capture it • [T, I] to use weapons, such as guns and bombs against an enemy in a war or battle
Spelling Words 2020-09-02
Across
- transport or carry to a place.
- give a practical exhibition and explanation of( how a machine, skill, or craft works or is performed.
- an aggressive and violent act against a person or place.
- the lightest spot or area (as in a painting)
- lay stress on(a word or phrase) when speaking
- a detailed analysis and assessment of something, especially a literary, philosophical, or political theory.
- represent by a drawing, painting or other art form.
- put forward for consideration
Down
- acknowledge(a significant or happy day or event) with a social gathering or party.
- resist an attack made on(someone or something);protect from harm or danger
- differ strikingly.
- place or deal with close together for contrasting effect.
- indicate the faults of( someone or something) in a disapproving way.
- express complete disapproval of; censure
- depict( someone or something) in a work of art or literature.
15 Clues: differ strikingly. • put forward for consideration • transport or carry to a place. • express complete disapproval of; censure • the lightest spot or area (as in a painting) • lay stress on(a word or phrase) when speaking • represent by a drawing, painting or other art form. • an aggressive and violent act against a person or place. • ...
World War I Vocab 2022-02-07
Across
- foreign policy in which a country refuses to choose a side during a war
- government bonds sold to the public in order to raise money for the war
- countries who support each other for a common reason
- The Archduke of Austria-Hungary who was assassinated in Serbia
- extreme pride in one's country
- murder by sudden or secret attack often for political reasons
- telegraph sent from Germany to Mexico asking them to attack the U.S.
- alliance between Germany, Austria-Hungary and the Ottoman Empire
- peace-keeping organization for settling disputes between countries
Down
- alliance between U.S., England, France and Russia
- treaty that ended WWI and punished Germany harshly
- President Woodrow Wilson's plan for peace after World War I
- American passenger ship attacked by German U-boats
- building up military to compete with other country's armed forces
- tactic in which battles are fought in man-made tunnels in the ground
15 Clues: extreme pride in one's country • alliance between U.S., England, France and Russia • treaty that ended WWI and punished Germany harshly • American passenger ship attacked by German U-boats • countries who support each other for a common reason • President Woodrow Wilson's plan for peace after World War I • ...
Pokemon 2012-12-20
Across
- The pokemon with the pokedex number 493.
- Ash's first pokemon in Kanto.
- The only pokemon that knows the move sketch.
- The type of _______________ depends on it's surroundings.
- A Johto starter that evolves into Croconaw at level 18.
- Used to level up pokemon by one level.
- Lowers the user's SP ATK by two stages.
- The user harshly smacks the opponent.
- The only pokemon that has the abillity Wonder Guard.
Down
- Use a dawn stone on a male __________ to evolve into Gallade.
- Use a dawn stone on a female __________ to evolve into Frosslass.
- A physical attack that raises the pokemon Speed stat.
- Used to catch Victini in Castelia City.
- Lowers the user's speed by one stage but raises the user's attack and defense stat by one.
- Lowers the opponent's accuracy by one.It is also able to illuminate caves..
15 Clues: Ash's first pokemon in Kanto. • The user harshly smacks the opponent. • Used to level up pokemon by one level. • Used to catch Victini in Castelia City. • Lowers the user's SP ATK by two stages. • The pokemon with the pokedex number 493. • The only pokemon that knows the move sketch. • The only pokemon that has the abillity Wonder Guard. • ...
Battle of Thermopylae 2013-04-17
Across
- All Spartans made this, "to stand in place, win or die".
- Persian King who led his army to attack Greece.
- Association of the Greek city-state to prevent future Persian attacks.
- The Athenian leader, who provided the strategy behind the battle.
- Where the last battle of the second Persian War took place.
- Spartan King whom led the battle.
- Whom the command of the combined navy and army were under.
Down
- What triggered the Persians to attack Athens and the rest of Greece.
- How many Spartan soldiers were involved in this battle.
- Whom the people consulted before going to battle.
- How many days the Battle of Thermopylae lasted.
- The hot springs from which this city state takes its name.
- The Greek city-states met at this city-state to work out a common defence.
- The outcome of the battle for the Greeks.
- Where the second battle of the second Persian War took place.
15 Clues: Spartan King whom led the battle. • The outcome of the battle for the Greeks. • Persian King who led his army to attack Greece. • How many days the Battle of Thermopylae lasted. • Whom the people consulted before going to battle. • How many Spartan soldiers were involved in this battle. • All Spartans made this, "to stand in place, win or die". • ...
Activity #1 : Intentional Injuries 2016-01-18
Across
- Bullying with the use of technology
- A suicide attempt in which a person does not intend to die
- Forcefully taking away of a person against his/her will
- Someone who follows you around and makes you feel in danger
- A force sexual intercourse
- Pressure through the use of terror and violence
- The taking of person from their home using deception or force
- A street-based group, mostly made up of young people that engages in illegal acts
- An act intended to cause injury or damage to a person
Down
- / The best way to avoid the dangers planned or intentional injuries is through ____________
- A violent attack, threat or attempt
- A sexual contact between closely related persons
- Harm or damage to someone as a result of an act or event
- An initiation rite for fraternity neophytes
- Verbal insult or physical attack on a person
15 Clues: A force sexual intercourse • Bullying with the use of technology • A violent attack, threat or attempt • An initiation rite for fraternity neophytes • Verbal insult or physical attack on a person • Pressure through the use of terror and violence • A sexual contact between closely related persons • An act intended to cause injury or damage to a person • ...
Woods Runner Part 2 2023-01-13
Across
- At first, Coop and his gang thought Samuel was with the _______.
- After being hit in the head, Samuel was out _____ days.
- This man took care of Samuel when he was wounded.
- During the attack on the British Samuel heard a sound behind him, and turned to see two _______ coming at him.
- Coop said, "I thought you might lose your ______."
- Coop and his gang attacked the British because they had seen what was done at ________ Crossing.
- Samuel's settlement was ______.
- Old Bobby told Samuel the attackers had come in the ______.
- Samuel came across another settlement that had been destroyed called ______ Crossing.
Down
- Coop treated Samuels wound with _______ juice.
- These soldiers attack Annie's farm.
- Samuel followed this to locate his parents.
- Samuel meets Annie while trying to steal a _____.
- Samuel was hit in the head with a ______.
- The weapon every frontier family needed.
15 Clues: Samuel's settlement was ______. • These soldiers attack Annie's farm. • The weapon every frontier family needed. • Samuel was hit in the head with a ______. • Samuel followed this to locate his parents. • Coop treated Samuels wound with _______ juice. • This man took care of Samuel when he was wounded. • Samuel meets Annie while trying to steal a _____. • ...
Japan's early success in the Pacific War up to 1941 2020-12-01
Across
- "- carriers" were ships that functioned as floating armed airfields
- Soldiers trained to invade territories from warship
- Japan attacked "- Indochina" in 1941
- Japan successfully invaded here in 1941 and benefitted from its rice production and oilfield
- The largest US-held territory
- Japan's attack on this place gave Japan access to Singapore
- Japan's attack at the end of 1941 is called "-Harbour"
Down
- Resulted in Japanese control of the Indian Ocean
- Country with Lend-Lease Programme
- Something that the US imposed on Japan
- Asian country fought in WW2 in this ocean
- Place where acted as a junction for undersea cables linking the USA to the Philippines
- Japan built a massive naval and air base on this territory for over 100,000 troops
- Isolated country in Asia
- Japan announced in 1940 that their empire was the "Greater Asia Co-prosperity -" which means that Asia is free from the European and US control.
15 Clues: Isolated country in Asia • The largest US-held territory • Country with Lend-Lease Programme • Japan attacked "- Indochina" in 1941 • Something that the US imposed on Japan • Asian country fought in WW2 in this ocean • Resulted in Japanese control of the Indian Ocean • Soldiers trained to invade territories from warship • ...
The Civil War 2021-04-13
Across
- A military strategy aimed at preventing people and goods from entering or leaving an area.
- Designed to keep safe or protect against attack.
- To end something, such as an organization.
- To keep or save.
- A plan of action created to achieve a specific goal.
- A place where weapons and other military equipment are stored.
- Bullets or shells.
- To actively use or do something.
- Permission to join a group or enter a place.
Down
- Allowed or legal under the terms of the U.S. Constitution.
- A continuous attack with bombs, missiles, or other types of ammunition.
- Of or relating to the eleven states that seceded from the Union to form a new and separate republic.
- A member of the Senate in the Congress of the United States.
- To formally withdraw membership.
- A person who runs away or hides to avoid capture.
15 Clues: To keep or save. • Bullets or shells. • To formally withdraw membership. • To actively use or do something. • To end something, such as an organization. • Permission to join a group or enter a place. • Designed to keep safe or protect against attack. • A person who runs away or hides to avoid capture. • A plan of action created to achieve a specific goal. • ...
Tittle3 2018-03-08
Across
- The taking of a person from their home using deception or force
- Pressure through the use of terror and violence
- A violent attack,threat or attempt to harm a person
- A suicide attempt in which person does not intend to die
- A street based group mostly made up of young people, that engages in illegal acts
- An initiation rite for fraternity neophytes
- An act intended to cause injury or damage to a person
Down
- Harm or damage to someone as a result of an act or event
- Bullying with the use of technology and electronic means
- Abuse, verbal insult, or physical attack on a person
- Someone who follows you around and makes you feel in dager
- The best way to avoid the dangers of planned or intentional injuries
- A forced sexual intercourse
- Forcefully taking away of a person against his/her will
- A sexual contact betweet closely related person
15 Clues: A forced sexual intercourse • An initiation rite for fraternity neophytes • Pressure through the use of terror and violence • A sexual contact betweet closely related person • A violent attack,threat or attempt to harm a person • Abuse, verbal insult, or physical attack on a person • An act intended to cause injury or damage to a person • ...
Code Talker Vocabulary 2 2023-12-11
Across
- a long, curving blade fastened at an angle to a handle, for cutting grass,
- to attack with bombs.
- to authorize, approve, or allow
- to occupy (a fort or post) with troops
- a disease characterized by attacks of chills, fever, and sweating.
- to crush
- a small pit, usually for one or two soldiers, dug as a shelter in a battle area
Down
- restricts access in terms of secrecy
- any of various submarine explosive devices for destroying hostile ships
- the code of the samurai, stressing unquestioning loyalty and obedience and valuing honor above life.
- Metal shell fragments
- to accompany or escort, usually for protection
- the largest of the Solomon Islands, in the W Pacific Ocean: part of Papua New Guinea
- Japanese saying for 10,000 years for the empire: suicide attack.
- Translates to Holy Wind, but was a suicide mission of crashing a plane to cause damage to your enemies.
15 Clues: to crush • to attack with bombs. • Metal shell fragments • to authorize, approve, or allow • restricts access in terms of secrecy • to occupy (a fort or post) with troops • to accompany or escort, usually for protection • Japanese saying for 10,000 years for the empire: suicide attack. • a disease characterized by attacks of chills, fever, and sweating. • ...
WW1_Korrós_Dániel 2024-01-04
Across
- Thomas Woodrow …., USA president (1913-1921)
- a french town, where Entente and it’s allies signed the peace treaty on June 28, 1919
- The first chairman of the Council of Soviet People's Commissars
- where was the peace treaty around Paris that ended World War I signed
- italian river, place of important battles
- Vittorio Emanuele ……, Italian Prime Minister
- famous building in Saint Petersburg, it was owned by the Provisional Government in 1917
Down
- a demand accompanied by a threat, the fulfillment of which is tied to a specific time
- It is a military strategy that is based on a concentrated, unexpected and rapid attack
- combat vehicle
- unconditional grant, aslo known as
- yellow ……….. (title of Beatles song)
- Austrian emperor, Hungarian and Czech king, the first ruler of the Austro-Hungarian Monarchy
- otherwise known as siege lock
- two hostile parties do not attack each other until peace negotiations
15 Clues: combat vehicle • otherwise known as siege lock • unconditional grant, aslo known as • yellow ……….. (title of Beatles song) • italian river, place of important battles • Thomas Woodrow …., USA president (1913-1921) • Vittorio Emanuele ……, Italian Prime Minister • The first chairman of the Council of Soviet People's Commissars • ...
APHUMANGEO 4.9 2024-02-19
Across
- Access to information, knowledge and services is an example of ?
- What is it called when a central government shares power?
- What is an example of devolution in Nigeria
- What is one thing that constant connections result in?
- What state was dissolved as a result of severe devolution?
- When one attack against one ally is considered as an attack against all allies is called?
- NATO is an example of what type of organization?
Down
- What often results in independence movements or devolution?
- What is one positive of The Arctic Council?
- States, Nations, Nation-states are all examples of?
- What is an example of devolution in Belgium?
- What is an example of devolution in Spain
- What is a state’s or political entity’s authority to control its territory and govern itself?
- hat is one negative of being a part of NATO?
- What is an example of devolution in Canada?
15 Clues: What is an example of devolution in Spain • What is one positive of The Arctic Council? • What is an example of devolution in Nigeria • What is an example of devolution in Canada? • What is an example of devolution in Belgium? • hat is one negative of being a part of NATO? • NATO is an example of what type of organization? • ...
World War I 2025-12-13
Across
- Large caliber guns
- USA (FDR) Russia ( Joseph Stalin) Great Britain ( Winston Churchill)
- Germany (Adolf Hitler) Japan (Tojo Hediki) Italy (Benito Mussolini)
- Rapid-fire guns that can fire up to 400 rounds in a minute
- Style of fighting from ditches in the ground protected by barbed wire.
- Anti- Jewish belief
- area between the trenches that was extremely dangerous
Down
- A conflict in which participating countries devote all of their resources towards the war effort.
- country’s submarines attack any ship without warning.
- Drains water from the trenches
- bias ideas spread to influence public opinion for or against an idea
- A Japanese attack on USA Navy base, happened on Dec 7th 1941
- agreements between two or more states for defense and support in case of war.
- a destructive bomb that uses nuclear energy, causing damage through heat, blast & radio activity.
- a government that aims to control all aspects of its citizens lives
15 Clues: Large caliber guns • Anti- Jewish belief • Drains water from the trenches • country’s submarines attack any ship without warning. • area between the trenches that was extremely dangerous • Rapid-fire guns that can fire up to 400 rounds in a minute • A Japanese attack on USA Navy base, happened on Dec 7th 1941 • ...
Gabriel Poulsen History 2025-10-06
Across
- Whose command was the German army under when they took Mont Didier?
- Whose defense tactics did the British adopt at the end of 1918?
- Who was elected as a representative from colonies to the French parliament?
- Who was Senegal's first President?
- In 1918 who did the Germans focus their attack on?
- Which month did Georgette open?
- What month was the 28 - Day armistice signed by Russia and Germany?
- What did the colonial powers promise their colonized subjects if they fought?
- Who was the first Prime minister of the UK in 1918?
Down
- In WW1 what were the American soldiers known as?
- What percentage of armistice land did Russia lose because of the treaty?
- Who was the best strategist for the Germans?
- What year was the treaty of Bucharest?
- Where was the peaceful conference held to lobby delegates?
- Where did the Germans launch their initial attack?
15 Clues: Which month did Georgette open? • Who was Senegal's first President? • What year was the treaty of Bucharest? • Who was the best strategist for the Germans? • In WW1 what were the American soldiers known as? • In 1918 who did the Germans focus their attack on? • Where did the Germans launch their initial attack? • Who was the first Prime minister of the UK in 1918? • ...
Chapter 05 Part 01 2017-05-09
Across
- Is someone who uses the Internet or network to destroy or damage computers for political reasons?
- what is a program or set of instructions in a program that allows users to bypass security controls?
- In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?
- What kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?
- Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?
Down
- Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?
- How long can digital certificates be valid?
- To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
- What type of individual may steal credit card numbers to make fraudulent purchases?
- What is the term for a program that performs a repetitive task on a network?
- Is someone who demands payment in order to stop an attack on an organization's
- What is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
- What is the term for a website that uses encryption techniques to protect its data?
- What term refers to making a copy of a file?
14 Clues: How long can digital certificates be valid? • What term refers to making a copy of a file? • What is the term for a program that performs a repetitive task on a network? • Is someone who demands payment in order to stop an attack on an organization's • What type of individual may steal credit card numbers to make fraudulent purchases? • ...
