attack Crossword Puzzles
Restart Vocab 2025-12-04
Across
- an outburst of applause
- puzzled or confused
- to make fun of
- emptied; drained; used up
- to use flattery to get something
- fair and sensible
- entrance hall
- doubtful
- weak
- a bitter verbal attack
- taken apart
- humble; low of rank
Down
- victorious
- a very large quantity of something
- in the middle of
- a short time; instant
- excited happiness
- unfairness
- unjustifiable negative behavior toward a group and its members
- hesitantly; unsurely
20 Clues: weak • doubtful • victorious • unfairness • taken apart • entrance hall • to make fun of • in the middle of • excited happiness • fair and sensible • puzzled or confused • humble; low of rank • hesitantly; unsurely • a short time; instant • a bitter verbal attack • an outburst of applause • emptied; drained; used up • to use flattery to get something • a very large quantity of something • ...
Vocabulary Lesson 1-4 Crossword 2026-01-15
Across
- attack helicopter
- to hold back
- rubble
- extinct elephant
- to snoop
- happening at a convenient time
- friendship
- to tint or add color to
- to weaken
- a defensive structure
- gloomy
- well spoken
- 10 years
Down
- a break
- a world
- someone famous
- serious or sudden
- to strike or beat
- to shove
- earthly; of solid land
- trash
- the main point
- a setting
- tastelessly showy
- earthquakes
25 Clues: trash • rubble • gloomy • a break • a world • to snoop • to shove • 10 years • to weaken • a setting • friendship • earthquakes • well spoken • to hold back • someone famous • the main point • extinct elephant • attack helicopter • serious or sudden • to strike or beat • tastelessly showy • a defensive structure • earthly; of solid land • to tint or add color to • happening at a convenient time
Past tense verbs 2024-09-11
43 Clues: fly • pay • fix • lie • ring • Hang • have • pack • earn • mean • play • blow • hide • lose • bite • bake • ride • beat • fall • wake • draw • lend • treat • Begin • build • shine • climb • stand • avoid • throw • spell • Finish • wonder • attack • chatch • choose • forget • borrow • accept • Become • contain • accompany • applauded
Caitlin and Jamie 2 years 2024-10-23
Across
- Italian black (masc)
- your work/my street
- Teeth
- Comedian twice seen
- Caitlin's favourite flower
- liquid sugar/petname
- dinner's ready!
- Enterprize part 2
- Vegetarian hunting location
- this.
- Not an east Fence
- onward!/birthday
Down
- Again but emotional
- *cough cough* stomach issues
- direct chequered attack
- farm life
- land of the holy/home
- sponge protected head weapon
- underground village musical
- subterranean fungus
- to disagree
- Favourite furniture in a hotel
22 Clues: Teeth • this. • farm life • to disagree • dinner's ready! • onward!/birthday • Enterprize part 2 • Not an east Fence • Again but emotional • your work/my street • Comedian twice seen • subterranean fungus • Italian black (masc) • liquid sugar/petname • land of the holy/home • direct chequered attack • Caitlin's favourite flower • underground village musical • Vegetarian hunting location • ...
RBW Crozzie #6 2025-09-23
Across
- Classical instrument
- Old woman in Russia
- Powhatan princess
- Defense Department set to delete this superbomber
- Viral hemorrhagic fever
- Ancient Japanese theatre form
- Vital metal
- Insectivore sounds Afrikaans in English
- Enormous antipodean tree
- Riverbank scavenger
- Relatively autonomous systems
- Happens by chance
Down
- Like a favourite uncle
- Exclusive fashion
- Relaxed
- Yearling sheep
- Neither bear nor cat
- Bitter attack
- Grumpy move ... or decoration
- Southern states of the US
20 Clues: Relaxed • Vital metal • Bitter attack • Yearling sheep • Exclusive fashion • Powhatan princess • Happens by chance • Old woman in Russia • Riverbank scavenger • Classical instrument • Neither bear nor cat • Like a favourite uncle • Viral hemorrhagic fever • Enormous antipodean tree • Southern states of the US • Ancient Japanese theatre form • Grumpy move ... or decoration • ...
Vocab final exam 2025-10-20
Across
- Give up control
- Ruler with all power
- Very picky
- Attack or hit
- Old records
- Cheerful and happy
- Tasty, not sweet
- Speed up
- Trade words
- Military flight out
- Annoy or block
Down
- Hard situation
- Soft or gentle
- Gather up
- Many kinds
- Very gross
- Natural liking
- Sick-looking color
- Not about religion
- A question
- Steal things
- Say it’s bad
- Various things
- Worst part
- Serious crime
25 Clues: Speed up • Gather up • Many kinds • Very gross • Very picky • A question • Worst part • Old records • Trade words • Steal things • Say it’s bad • Attack or hit • Serious crime • Hard situation • Soft or gentle • Natural liking • Various things • Annoy or block • Give up control • Tasty, not sweet • Sick-looking color • Not about religion • Cheerful and happy • Military flight out • Ruler with all power
Vocab Crossword 2026-05-14
Across
- Fiasco
- unfavorable
- Humble, Respect
- Impulsive
- persistent
- Diverse, Broadj
- boring
- Verbal Attack
- Flatter
- Honest, Sincere
- Surrender
- shortness
- communication device
- skillfull
- Wild and Messy
- friendly
- Causing Harm
Down
- last meal of the day
- Shy
- Apologetic
- lessen
- something worn on the feet
- Charm
- Irelevent,Unneeded
- scold
- alongside
- Beneficial
- Fearless
- unclear
- horrible
- support
- Inexperience
- Gentle
- Successful, Productive
34 Clues: Shy • Charm • scold • Fiasco • lessen • boring • Gentle • Flatter • unclear • support • Fearless • horrible • friendly • Impulsive • alongside • Surrender • shortness • skillfull • Apologetic • persistent • Beneficial • unfavorable • Inexperience • Causing Harm • Verbal Attack • Wild and Messy • Humble, Respect • Diverse, Broadj • Honest, Sincere • Irelevent,Unneeded • last meal of the day • communication device • Successful, Productive • ...
Verb from Jackie French 2023-11-27
13 Clues: bug • far • food • moving • chewing • of blood • a weapon • of Tongue • leave sleep • of something • MJ said in 1995 • you drink water • are the letters unscramble
Review for Jan. 6 2025-01-02
13 Clues: low BP • high BP • fainting • EKG machine • heart attack • EKG test + image • sphygmomanometer • unit of BP measurement • pumping heart chambers • number of chambers in heart • hollow interior of blood vessel • insufficient blood flow to heart • contraction + relaxation of heart
Volleyball-2 2023-06-15
Across
- BLOCKER - Player positioned near the net to block and attack
- JERSEY - Specialized jersey worn by the libero player
- - Serve that results in an immediate point without a defensive touch
- ORDER - Pre-determined sequence in which players rotate positions
- - Skill of passing a spiked ball close to the ground
Down
- LINE - Boundary lines that run parallel to the net
- ATTACK - Offensive hit by a middle blocker
- LINE - Boundary line that separates the front and back rows
- HANDS - Skill of using the fingertips to deliver precise sets
- OF BOUNDS - Ball that lands outside the court boundaries
10 Clues: ATTACK - Offensive hit by a middle blocker • LINE - Boundary lines that run parallel to the net • - Skill of passing a spiked ball close to the ground • JERSEY - Specialized jersey worn by the libero player • OF BOUNDS - Ball that lands outside the court boundaries • LINE - Boundary line that separates the front and back rows • ...
Marcus Nyam 8L : Social Engineering 2023-02-02
Across
- pretending to be your old friend for your personal information
- manipulating you into giving them ur personal information
- an attack in which the perpetrator invents a scenario in order to convince the victim to give them data
Down
- an attack from app or social media
- email scam
- look over shoulder to see ur information
- tricking you into their trap
- downloading a app that takes all your information
- showing you fake selfies of them and make you fall in love with their fake faces
9 Clues: email scam • tricking you into their trap • an attack from app or social media • look over shoulder to see ur information • downloading a app that takes all your information • manipulating you into giving them ur personal information • pretending to be your old friend for your personal information • ...
Colin 2023-05-11
Across
- best defense ever
- Greatest striker
- great goalie skills
- mini messi
- Bell Best fast-food ever
- Goalie
- Likes violet
- short but feisty
- Music style that came from New Orleans
Down
- Great foot skills
- woodwind instrument made from brass
- top goal scorer
- super tall and likes to steal
- Great strength
- Good attack
- Were benny goodman is from
16 Clues: Goalie • mini messi • Good attack • Likes violet • Great strength • top goal scorer • Greatest striker • short but feisty • Great foot skills • best defense ever • great goalie skills • Bell Best fast-food ever • Were benny goodman is from • super tall and likes to steal • woodwind instrument made from brass • Music style that came from New Orleans
Team Name:_________________________ 2019-06-18
10 Clues: simon & • stunning • not sweet • side view • beach stone • shoppers aid • crossbow ammo • violent attack • final resting place • 1998 Police Movie set in Detroit
Word Attack Crossword 2013-12-01
Argentina 2015-02-23
Across
- What is the capitol of Argentina?
- What is being held to vote President Kirchner out of power?
- Where did Argentina's deadliest terror attack occur?
- What was the period between 1976-1983 known as?
- What are the Argentinian people resorting to get attention from the government on Nisman's death?
- What are the Argentinian people doing in the streets to try to rid of the president?
Down
- What rose during the economic crash in 2014?
- During the "Dirty War," over what land were Argentina and Britain fighting over?
- What happened to the peso in Argentina?
- What is the official language of Argentina?
- Who did Alberto Nisman blame for the bombing of the Jewish community center attack?
- Who is both the head of the state and the government?
- What is Argentina's main export?
- True or False: No one knows exactly who murdered Alberto Nisman.
14 Clues: What is Argentina's main export? • What is the capitol of Argentina? • What happened to the peso in Argentina? • What is the official language of Argentina? • What rose during the economic crash in 2014? • What was the period between 1976-1983 known as? • Where did Argentina's deadliest terror attack occur? • Who is both the head of the state and the government? • ...
ZMC Football World Cup 2018-06-17
Across
- To move back and try to stop a goal.
- Video Assisted Referee, technology to help the referee make correct decisions.
- The feeling in the stadium, e.g. when the fans are singing.
- What the goalkeeper tries to do when he receives a shot.
- Where the matches are played and watched
Down
- When the players or coaches are asked questions by the media.
- A fan, someone who wants one team to win.
- The name for the area where the coach and substitutes sit.
- To move forward to try and score a goal.
- To move forward as a team to try and stop the other team attacking.
- The part of the team that links defence and attack.
- A kick towards the goal to try and score.
- What you receive when you win a competition.
- An award (usually made of a precious metal e.g. gold)given to those who have done well.
14 Clues: To move back and try to stop a goal. • To move forward to try and score a goal. • Where the matches are played and watched • A fan, someone who wants one team to win. • A kick towards the goal to try and score. • What you receive when you win a competition. • The part of the team that links defence and attack. • What the goalkeeper tries to do when he receives a shot. • ...
AATT Cybersecurity 2024-10-21
Across
- Using more than one criteria for authentication
- Internal communications network only accessibly by employees
- Word used to gain access
- The process of verifying the identity of a user, device, or system
- A type of malware that demands payment in exchange for restoring access to data
- A security method that uses unique biological characteristics, such as fingerprints or facial recognition, to unlock your mobile device
- Type of attack that tricks users into revealing sensitive info
Down
- Network device that filters incoming and outgoing network traffic based on defined rules
- Using social interactions to gain information from a target
- A type of software that is designed to damage or exploit a computer system
- Type of attack where the attacker impersonates persons or companies in order to gain information
- Type of malware that allows an attacker to remotely control a system or network
- Malware removal software
- Unwanted emails
14 Clues: Unwanted emails • Word used to gain access • Malware removal software • Using more than one criteria for authentication • Using social interactions to gain information from a target • Internal communications network only accessibly by employees • Type of attack that tricks users into revealing sensitive info • ...
Reasons for US involvement in Vietnam 2025-05-12
Across
- Where did the USA fear communism would spread to?
- Describe the type of military force President Kennedy sent to Vietnam.
- Which religion did Ngo Dinh Diem dislike?
- In 1945, Ho Chi Minh declared Vietminh was what?
- Most of south Vietnam supported which group?
- The attack that led to the Gulf of Tonkin Resolution targeted which US ship?
- Many southern Vietnamese people were unhappy with which leader?
- What was the name of the Vietnamese resistance army?
Down
- When did China become communist?
- Ho Chi Minh was what type of leader?
- Which President sent a half a million US combat troops to Vietnam?
- A suspected second attack on the Maddox was presented to congress, but really it was ____ that it happened.
- What was the first Asian Nation to fall to Communism?
- Who was the leader of the communist Vietnamese resistance movement?
- The conflict in Vietnam that developed following the French defeat can best be described as this type of War
15 Clues: When did China become communist? • Ho Chi Minh was what type of leader? • Which religion did Ngo Dinh Diem dislike? • Most of south Vietnam supported which group? • In 1945, Ho Chi Minh declared Vietminh was what? • Where did the USA fear communism would spread to? • What was the name of the Vietnamese resistance army? • ...
possum 2018-12-07
19 Clues: To work • To fight • I am able • To attack • He was able • We are able • We are able • You are able • You are able • They are able • I will be able • He will be able • He has been able • He had been able • We have been able • They will be able • You have been able • We had been able to • They have been able
Matthew’s crossword puzzle 2021-09-23
Across
- #33 on periodic table
- constitution
- lacking the ability or strength to move
- very clear
- starving
- open to attack
- dishonest
- making someone weak
- head of a college
Down
- having six sides
- very detailed
- public ally supporting
- #18 on periodic table
- large or powerful
- what is done to dead people
- underground room to bury people
- never done before
17 Clues: starving • dishonest • very clear • constitution • very detailed • open to attack • having six sides • large or powerful • never done before • head of a college • making someone weak • #33 on periodic table • #18 on periodic table • public ally supporting • what is done to dead people • underground room to bury people • lacking the ability or strength to move
Attack on titan 2021-02-08
Godzilla Attack L2 2022-03-28
5 Clues: blocks that make sprites detect others • blocks that control movement of Sprites • blocks that start under certain conditions • blocks that are used to write math equations • blocks that create a training model to enable your computer to learn
Safe As Houses Chapter 7 Assignment 2016-01-18
11 Clues: very weird • light stick • like an axe • means attack • very, very big • cold, wet, dark • completely covered • heavy, destructive • another word for fell • another word for shook • organizes your clothes
Four-legged Friends 2022-04-09
Across
- Saved over 40 people between 1800 and 1812 and honored at the Natural History Museum in Berne, Switzerland.
- Discovered the famous Lascaux caves in France
- Served in the US Coast Guard.
- Sigmund Freud’s dog.
- Saved Alexander the Great’s life during a battle in India
- Trained in Switzerland as one of the first seeing eye dogs.
- Survived a fatal rocket attack for his owner.
Down
- lead sled dog on the last leg of a famous, life-saving medical delivery to Nome, Alaska, in 1925.
- Could have been a famous band but ended up in Oz instead.
- Timmy’s best friend.
- German Shepherd who was a Vietnam war veteran.
- Starred in nearly thirty films.
- Wagner sat this Cavalier King Charles Spaniel in a special chair and performed his music for him.
- In the ancient city of Corinth in Greece in the year 456 BC,was responsible for saving the city residents from an attack by Persians.
14 Clues: Timmy’s best friend. • Sigmund Freud’s dog. • Served in the US Coast Guard. • Starred in nearly thirty films. • Discovered the famous Lascaux caves in France • Survived a fatal rocket attack for his owner. • German Shepherd who was a Vietnam war veteran. • Could have been a famous band but ended up in Oz instead. • Saved Alexander the Great’s life during a battle in India • ...
crossword puzzle 2023-01-25
Across
- an attackin whickan attacker injects malicious executable scripts into the code of a trusted application or website
- an attack that forces an end user to execute unwanted actions on a web application
- A person who hacks for political gain
- uses computer hacking to spread fear
- a cyber attack that involves executing arbitrary commands on a host operating system(OS)
- one where the number generated is extremely hard for any third party to predict what it might be
Down
- meeting customers' cybersecurity ecpectations
- using libraries, frameworks, and other software modules that run the same privilages as the application
- bug found in a web application that attackers use to manipulate the URL
- the response and recovery procedures from error conditions present in a software application
- When the volume of data exceeds the storage capacity
- attacking information for millitary purposes
- uses the social media to campaign
- deliberate destution of an item or systeam
14 Clues: uses the social media to campaign • uses computer hacking to spread fear • A person who hacks for political gain • deliberate destution of an item or systeam • attacking information for millitary purposes • meeting customers' cybersecurity ecpectations • When the volume of data exceeds the storage capacity • ...
Vietnam War 2016-05-23
Across
- an attack,or a display of aggression or emotion, not caused by anything.
- Sent off to a destination for a purpose.
- Murder an important person for a political or religious reason.
- The confidence, enthusiasm and discipline of a group of people.
- A continuous attack with bombs, shells, or other missiles.
Down
- Prevent the development, action, or expression of restrain.
- A state of being confused and/or puzzled.
- Take over a thrown, inheritance, office, or other position form another leader.
- Not fully explained or understood.
9 Clues: Not fully explained or understood. • Sent off to a destination for a purpose. • A state of being confused and/or puzzled. • A continuous attack with bombs, shells, or other missiles. • Prevent the development, action, or expression of restrain. • Murder an important person for a political or religious reason. • ...
Colin 2023-05-11
Across
- best defense ever
- Greatest striker
- great goalie skills
- mini messi
- Bell Best fast-food ever
- Goalie
- Likes violet
- short but feisty
- Music style that came from New Orleans
Down
- Great foot skills
- woodwind instrument made from brass
- top goal scorer
- super tall and likes to steal
- Great strength
- Good attack
- Were benny goodman is from
16 Clues: Goalie • mini messi • Good attack • Likes violet • Great strength • top goal scorer • Greatest striker • short but feisty • Great foot skills • best defense ever • great goalie skills • Bell Best fast-food ever • Were benny goodman is from • super tall and likes to steal • woodwind instrument made from brass • Music style that came from New Orleans
Peacewise youth 2025-10-23
Across
- Something that stops forgiveness.
- Kindness and compassion.
- Calm after forgiveness.
- Tell the truth about what you did.
- Admitting regret.
- A disagreement.
- Take responsibility.
- Forgive yourself too.
Down
- Words or actions that hurt.
- Letting go of hurt.
- Things we want.
- Receiving an apology.
- Helps us forgive.
- Saying you’re sorry.
- Getting free from anger.
- Feel sorry and change.
16 Clues: Things we want. • A disagreement. • Helps us forgive. • Admitting regret. • Letting go of hurt. • Saying you’re sorry. • Take responsibility. • Receiving an apology. • Forgive yourself too. • Feel sorry and change. • Calm after forgiveness. • Kindness and compassion. • Getting free from anger. • Words or actions that hurt. • Something that stops forgiveness. • ...
vocab 2026-01-08
Across
- without fear
- an approachable person
- unoriginal or predictable
- something or someone that's convincing
- to tell the truth
- to criticize someone
- very skilled at something
- an individual accused of something
- to support something
Down
- skillful and quick
- someone who's humble
- a massive failure
- inexperienced or immature
- verbal attack against someone
- to cause harm
- something bad or huge
16 Clues: without fear • to cause harm • a massive failure • to tell the truth • skillful and quick • someone who's humble • to criticize someone • to support something • something bad or huge • an approachable person • inexperienced or immature • unoriginal or predictable • very skilled at something • verbal attack against someone • an individual accused of something • ...
the best crossword 2024-04-25
Across
- best kahoot name
- OG mrbeast competition loser
- blue freddy fazbear
- spongebob's lanky cousin
- erm
- ;
Down
- Her splash attack does damage!
- anthony and ian
- the first country i guess in globle
- "Hey apple!" "What?"
- winner of the most recent mob vote
- name an irish person
- very safe concert
- lauryn enthusiast
- okay buddy, BANNED!
- big fat red man
16 Clues: ; • erm • anthony and ian • big fat red man • best kahoot name • very safe concert • lauryn enthusiast • blue freddy fazbear • okay buddy, BANNED! • "Hey apple!" "What?" • name an irish person • spongebob's lanky cousin • OG mrbeast competition loser • Her splash attack does damage! • winner of the most recent mob vote • the first country i guess in globle
Cybersecurity Words 2020-11-18
Across
- a common tactic in identity theft schemes in which the attacker uses the stolen account information to conduct malicious or unauthorized activity.
- An observable occurrence or sign that an attacker may be preparing to cause an incident.
- uses trial-and-error to guess login info, encryption keys, or find a hidden web page.
- set of instructions to help IT staff detect, respond to, and recover from network security incidents.
- a type of cyber attack that disrupts its normal functions and prevents other users from accessing it.
- a situation in which a person or program successfully identifies as another by falsifying data, to gain and illegitimate advantage.
- ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization’s information systems.
- strategy used to make sure users do not send critical information outside of a corporate network.
- an automated program that runs over the Internet. Some bots run automatically, while others only execute commands when they receive specific input.
- integrated collection of security measures to prevent unauthorized access to a networked computer system
- a cyberattack on a server, service, website, or network floods it with Internet traffic.
- identifying your risks and vulnerabilities and applying administrative actions and comprehensive solutions to make sure your organization is adequately protected.
- the unauthorized movement of information being spread throughout the internet.
- Authentication via group
- a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software.
- used to detect malware.
- a system that allows web hosts to distinguish between human and automated access to websites.
- Someone or Something that authenticates
- a standalone malware computer program that replicates itself in order to spread to other computers.
- science concerned with data communication and storage in secure and usually secret form.
- related to cloud computing, in which it can hold information and photos.
- to successfully escape from an area under enemy control.
- Source code that is free to copy and modify.
- an emerging online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” forms of online money known as cryptocurrencies.
- Hacker who violates computer security for personal gain or malice.
- is the method where knowledge of internal and external information weakness of a particular organization are tested against real-world cyberattacks.
- The attack of a Software environment where an unauthorized user can try to enter data to or extract data from said environment.
- a type of encryption where only one key (a secret key) is used to both encrypt and decrypt electronic information.
Down
- an evaluation of events that can adversely affect operations and/or specific assets
- a type of monitoring software designed to record keystrokes made by a user.
- Source code that is not available
- the psychological manipulation of people into performing actions or divulging confidential information.
- a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code.
- software that displays unwanted advertisements on your computer.
- the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
- code that takes advantage of a vulnerability of flaw.
- a set of changes to a computer program or its supporting data designed to update, fix, or improve it
- an advanced attack method, where attackers intrude their target organization through small companies that work with the target company.
- List of people under suspicion, disfavor, etc.
- internet protocol address, which identifies the number associated with a specific computer or network.
- an individual or group that acts, or has the power, to exploit a vulnerability or conduct other damaging activities.
- are hackers who use automated techniques to scan specific network ranges and find vulnerable systems, such as machines without current security patches, on which to install their bot program.
- any malware which misleads users of its true intent.
- A thing that supports another thing
- Someone who breaks into someone else’s computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.
- an attack on the internet that is used to steal usernames and passwords from the network.
- a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period.
- a deceptive activity where a person creates a sockpuppet presence or fake identity on a social networking service, usually targeting a specific victim for abuse or fraud.
- keeping data safe
- process of collecting and searching through a database to discover information.
- a computer network that provides online privacy by creating an encrypted connection on the Internet.
- it ensures a person’s identity matches with who they are.
- a computer attack strategy in which an attacker guesses or observes which websites an organization often uses and infects one of more of them with malware.
- a person who operates the command and control of botnets for remote process execution.
- when data is coded a certain way to disallow others from seeing that information.
- a collection of internet-connected devices infected by malware that allow hackers to control them.
- offensive security professionals who are experts in attacking systems and breaking into defenses.
- a type of malware that is often disguised as legitimate software.
- unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information.
- identifies the information assets that could be affected by a cyber attack, such as hardware, systems, laptops, customer data and intellectual property.
- the methods that adversaries use to breach or infiltrate your network.
- Number generated from a string of text
- malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.
- to convert information into cipher
- short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information.
65 Clues: keeping data safe • used to detect malware. • Authentication via group • Source code that is not available • to convert information into cipher • A thing that supports another thing • Number generated from a string of text • Someone or Something that authenticates • Source code that is free to copy and modify. • List of people under suspicion, disfavor, etc. • ...
D&D Crossword Puzzle (Easy - PHB Only) 2020-04-05
Across
- / The subrace that can attempt to hide behind creatures that are one size larger than them.
- / The cunning race that has advantage on all Intelligence, Wisdom, and Charisma saving throws against magic.
- / Creatures with this condition have 0 speed and disadvantage on their attack rolls.
- / A feat that increases an ability score of your choice by 1 and grants you proficiency in saving throws using that ability.
- / The only Light Armor that grants disadvantage to stealth (AC 11).
- / 1 ______ coin = 100 silver
- / The number of arrows a quiver holds.
- / This 1st-level enchantment spell affects creatures within 20 feet of a point the caster chooses within range, including allies.
- / The home plane of Demons.
- / The Heavy Armor that requires 15 Strength to wear without penalty.
- / Another name for the Plane of Faerie. A plane of soft lights and eternal twilight, where the sun never truly sets or rises. Home to the Seelie and Unseelie Courts, where woodland beings dwell.
- / The feat that gives you a +5 bonus to your passive Perception and passive Investigation scores.
- / A word sometimes used to describe D&D's magic system, taken from the name of one of the authors in Appendix E.
- / This type of lantern casts bright light in a 30-foot radius and dim light for an additional 30 feet.
- / The mystic energy that fuels special maneuvers like "Stunning Strike" and "Patient Defense."
- / Creatures with this condition have disadvantage on attack rolls and ability checks.
- / This level 1 class ability gives you resistance to bludgeoning, piercing, and slashing damage.
- / This condition has six levels. Level 1 = Disadvantage on ability checks. 2 = Speed halved. Etc.
- / This 1st-level Cleric/Paladin spell affects up to three creatures of the caster's choice and lasts for up to 1 minute, with concentration.
- / The race that can (potentially) gain a feat at level 1.
- / At this pace, a party can travel 18 miles per day.
- / Unlike most spellcasters, this class regains its spell slots after a short rest.
- / Weapons need this property to be dual-wielded.
- / Starting at level 2, this "Jack of All Trades" class can add half its proficiency bonus to all ability checks.
- / Monks and Rogues gain this ability at level 7, which allows them to dodge out of the way of certain harmful area effects.
- / _______ hit points aren't cumulative, meaning you don't add them together.
- / The race that has advantage on saving throws against being frightened.
- / Traveling at this pace gives you a -5 penalty to your passive Wisdom (Perception) score.
- / At 5 cp apiece, the cheapest weapon on the Weapons table, which deals 1d4 piercing damage.
- / When you attack a target that you can't see, you have ________ on the attack roll.
- / The most expensive item on the Adventuring Gear list.
- / Whenever you divide a number and end up with a fraction, round _____, unless an ability tells you otherwise.
- / The subrace that has advantage on saving throws against poison and resistance against poison damage.
- / Creatures this size occupy a 15 x 15 ft. space on a grid.
- / A feat that gives you +5 bonus to initiative.
- / The race that has resistance to fire damage.
- / The home plane of Devils (two words).
- / Clerics specialize in ______ magic.
- / This spellcasting class has its own secret language, which it can use to leave hidden messages.
- / This item, when lit, casts bright light in a 20-foot radius and dim light for an additional 20 feet.
- / The dwarf subrace that has proficiency with light and medium armor.
Down
- / "Half" provides +2 AC, "Three-quarters" +5.
- / Besides a quarterstaff, the only simple melee weapon that deals 1d8 bludgeoning damage.
- / A feat that increases your hit point maximum by an amount equal to twice your level.
- / Creatures with this condition can't take actions or reactions.
- / The class with the lowest starting wealth (by a lot).
- / In dim light, you have disadvantage on this skill.
- / The type of saving throw you make whenever you take damage while concentrating on a spell.
- / You can move through a hostile creature's space only if it is ____ sizes larger or smaller than you. The creature's space is still considered difficult terrain.
- / A feat that increases your speed by 10.
- / When you take this action on your turn, you can act later in the round using your reaction.
- / If you cast a spell as a bonus action, you can't cast any other spells on your turn unless it's a ______ with a casting time of 1 action.
- / The fighting style that gives you a +1 bonus to AC when you're wearing armor.
- / Wizards specialize in ______ magic.
- / Half-orcs deal extra damage when they score this type of hit.
- / When you take this action, your movement doesn't provoke opportunity attacks for the rest of the turn.
- / 100 _____ coins = 1 gold
- / The race that has resistance to poison damage and advantage on saving throws against poison.
- / The dwarf subrace that gets more hit points.
- / Half-elves gain proficiency in two _____ of their choice.
- / Taking this action in combat gives you advantage on Dexterity saving throws.
- / Another name for the Plane of Shadow, a world of darkness where color has been leached from everything, and where the sky is a black vault with neither sun nor stars.
- / The type of damage dealt by a Paladin's Divine Smite.
- / A creature with this condition can't attack the person who gave it to them or target them with harmful abilities or magical effects.
- / Besides cantrips, level 1 Sorcerers know ___ spell(s).
- / The fighting style that gives you a +2 bonus to damage rolls when you are wielding a melee weapon in one hand and no other weapon.
- / The only "weapon" on the Weapons table that doesn't do any damage.
- / One of the races that has advantage on saving throws against being charmed and can't be put to sleep by magic.
- / The ranged weapon with the longest range (150/600).
- / This class gets more Ability Score Improvements than any other class; 7 altogether.
- / An undead turned by a Cleric is turned for 1 minute or until it takes any _______.
- / The school of magic for Cure Wounds and Magic Missile.
- / An attack roll against a creature with this condition has advantage if the attacker is within 5 feet. Otherwise, the attack roll has disadvantage.
- / Creatures with this condition are incapacitated, can't move, and can speak only falteringly. They also automatically fail Strength and Dexterity saving throws -- and attack rolls against them have advantage.
- / Sneak attacks must use a _____ or a ranged weapon.
- / Besides Dexterity, Rangers have proficiency in this saving throw.
- / If the d20 roll for an attack is a 20, the attack ____ regardless of any modifiers or the target's AC.
- / 10 ____ coins = 1 platinum
- / The class that has proficiency in Wisdom and Intelligence saving throws.
- / Demons are chaotic evil, whereas devils are ______ evil.
- / 20 _______ coins = 10 silver
- / The elf subrace that has a base walking speed of 35 feet.
- / The type of damage dealt by the Chill Touch cantrip.
83 Clues: / 100 _____ coins = 1 gold • / The home plane of Demons. • / 1 ______ coin = 100 silver • / 10 ____ coins = 1 platinum • / 20 _______ coins = 10 silver • / Wizards specialize in ______ magic. • / Clerics specialize in ______ magic. • / The number of arrows a quiver holds. • / The home plane of Devils (two words). • / A feat that increases your speed by 10. • ...
attack on titan 2023-04-05
5 Clues: todaly is op at killing titans • is even better at killing titans • thae were called devils by Marly • he was scared when he saw Eren Yeager • they blew up an enemy train and got praised
Pearl Harbor 2023-04-19
Across
- a group of ships
- The state where Pearl Harbor is located
- These were the targets for Japanese bombers
- he was the U.S. admiral at the time of the Pearl Harbor attack
- a sudden surprise attack by plane
Down
- an underwater missel that explodes when it hits a target
- large vessel that serves as a water-based flight deck
- a large airplane that drops bombs on targets
- Fill in the blank: Yesterday, December 7th 1941, a date which will live in _________
9 Clues: a group of ships • a sudden surprise attack by plane • The state where Pearl Harbor is located • These were the targets for Japanese bombers • a large airplane that drops bombs on targets • large vessel that serves as a water-based flight deck • an underwater missel that explodes when it hits a target • he was the U.S. admiral at the time of the Pearl Harbor attack • ...
MARC Crossword 2023-06-29
Across
- VTOL attack plane
- Commands a ship
- Graduate of BUDS
- Elite light infantry
- Device for challenges
- Marine Special Ops
- Soldier's best friend
- Liberated in February 91
- Something on a Marine's head
Down
- Fast way out of a helicopter
- Famous PT boat commander
- Underwater boat
- Army general/Infantry vehicle
- Beloved CAS aircraft
- Transported by vehicle
- Queen of battle
16 Clues: Commands a ship • Underwater boat • Queen of battle • Graduate of BUDS • VTOL attack plane • Marine Special Ops • Elite light infantry • Beloved CAS aircraft • Device for challenges • Soldier's best friend • Transported by vehicle • Famous PT boat commander • Liberated in February 91 • Fast way out of a helicopter • Something on a Marine's head • Army general/Infantry vehicle
Harry Potter Characters TT 2024-12-13
Across
- Sent To Kill Dumbledore
- The Boy Who Lived
- Headmaster Of Hogwarts
- Ron's Younger Sister
- Potions Teacher Until 6th Year
- Parents Were Tortured To Death By Bellatrix Lestrange
Down
- Muggle Parents
- He Survived The Hogwarts Attack
- Draco's Aunt
- Molly Weasley's Youngest Son
- Shot In The Ear
- Harry's Godfather
- Transfiguration Teacher
- Squib
- Daughter Of Xenophilius
- 7 Horcruxes
16 Clues: Squib • 7 Horcruxes • Draco's Aunt • Muggle Parents • Shot In The Ear • The Boy Who Lived • Harry's Godfather • Ron's Younger Sister • Headmaster Of Hogwarts • Sent To Kill Dumbledore • Transfiguration Teacher • Daughter Of Xenophilius • Molly Weasley's Youngest Son • Potions Teacher Until 6th Year • He Survived The Hogwarts Attack • Parents Were Tortured To Death By Bellatrix Lestrange
Colin 2023-05-11
Across
- best defense ever
- Greatest striker
- great goalie skills
- mini messi
- Bell Best fast-food ever
- Goalie
- Likes violet
- short but feisty
- Music style that came from New Orleans
Down
- Great foot skills
- woodwind instrument made from brass
- top goal scorer
- super tall and likes to steal
- Great strength
- Good attack
- Were benny goodman is from
16 Clues: Goalie • mini messi • Good attack • Likes violet • Great strength • top goal scorer • Greatest striker • short but feisty • Great foot skills • best defense ever • great goalie skills • Bell Best fast-food ever • Were benny goodman is from • super tall and likes to steal • woodwind instrument made from brass • Music style that came from New Orleans
CROSSWORD--2016年第1回英検2級 1(15)(16) 2017-04-10
Across
- not knowing what to do
- almost possible or available
- the ability to protect against attack orharm, or something used to protect against attack or harm
Down
- the process of doing something, or something done, esp. for a particular purpose
- usually
- an occasion that allows something to be done; an opportunity
- in a series without interruption
- the ability to make reasonable judgments
8 Clues: usually • not knowing what to do • almost possible or available • in a series without interruption • the ability to make reasonable judgments • an occasion that allows something to be done; an opportunity • the process of doing something, or something done, esp. for a particular purpose • ...
CROSSWORD--2016年第1回英検2級 1(15)(16) 2017-04-10
Across
- the ability to make reasonable judgments
- not knowing what to do
- an occasion that allows something to be done; an opportunity
- almost possible or available
- the ability to protect against attack orharm, or something used to protect against attack or harm
Down
- usually
- the process of doing something, or something done, esp. for a particular purpose
- in a series without interruption
8 Clues: usually • not knowing what to do • almost possible or available • in a series without interruption • the ability to make reasonable judgments • an occasion that allows something to be done; an opportunity • the process of doing something, or something done, esp. for a particular purpose • ...
Network Security Terminologies 2025-02-26
Across
- A principle ensuring data is accurate and unaltered.
- An attack that floods a network to disrupt service.
- A deceptive attack designed to steal sensitive information.
- A security method requiring more than just passwords.
Down
- A method to protect data by scrambling it.
- A tool that encrypts internet connections for privacy.
- A security approach that assumes no implicit trust.
- A security device that filters traffic between networks.
8 Clues: A method to protect data by scrambling it. • A security approach that assumes no implicit trust. • An attack that floods a network to disrupt service. • A principle ensuring data is accurate and unaltered. • A security method requiring more than just passwords. • A tool that encrypts internet connections for privacy. • ...
WWII Crossword Puzzle 2023-03-15
Across
- Japanese city where the first atomic bomb was dropped
- The date of the Japanese attack on Pearl Harbor attack
- code name for the Allied invasion of Normandy
- General Marshall's rank in the military
- Marshall served as ____ during World War II
Down
- The supreme Commander of the Allied Forces in Europe during World War II.
- Marshall's famous plan to rebuild Europe after the war
- German dictator during WWII
8 Clues: German dictator during WWII • General Marshall's rank in the military • Marshall served as ____ during World War II • code name for the Allied invasion of Normandy • Japanese city where the first atomic bomb was dropped • Marshall's famous plan to rebuild Europe after the war • The date of the Japanese attack on Pearl Harbor attack • ...
Fight virus with vaccines 2020-12-09
Across
- Abnormal condition that negativity affects the function of all parts of an organism.
- prepared the immune system to fight illness.
- Attack cells in the body that have already been infected.
- Contain a weakened version of a lived virus.
- are white blood cells swallow up digest germ.
Down
- produce antibodies that attack pieces of virus that are left behind by macrophages.
- is a substance that cause your immune system produce antibodies.
- contain inactive disease causing organism/protein made by pathogen.
- a bacterium or virus that cause disease.
- Contain a messenger of Mrna that in-codes antigens.
10 Clues: a bacterium or virus that cause disease. • prepared the immune system to fight illness. • Contain a weakened version of a lived virus. • are white blood cells swallow up digest germ. • Contain a messenger of Mrna that in-codes antigens. • Attack cells in the body that have already been infected. • is a substance that cause your immune system produce antibodies. • ...
Chloe-Terrorism Crossword Puzzle 2022-04-20
Across
- Something is possible,true,maybe having a feeling
- attack such as bombing,shooting and stabbing lead in injury
- one impact or terror attack
- death people injured places were damage
- some self raidicalised individuals may decided to carry out terror attacks on their own
- cameras that designed to dete,detect and help police solves crimes and actitives
Down
- A cause by something that result in 1 or more situation to be Chaos
- the intentional use of force or violence by individuals or group to cause far and intimate other.
- when two or more parties have disagreements
- forms of aggression
10 Clues: forms of aggression • one impact or terror attack • death people injured places were damage • when two or more parties have disagreements • Something is possible,true,maybe having a feeling • attack such as bombing,shooting and stabbing lead in injury • A cause by something that result in 1 or more situation to be Chaos • ...
War of 1812 2019-01-14
Across
- What treaty ended the war of 1812?
- Who surrendered Fort Detroit to Brock and Tecumseh on the 16th of august 1812?
- What battle happened on the 24th of june 1812?
- Name the battle that Isaac Brock died?
- How did the war of 1812 end?
- What is the original name of Toronto?
Down
- What was the name of the ship that impressed Americans and lead to declaration of war?
- Who was one of the British’s greatest First Nation leader ally?
- Who hiked 32 km to warn the English about an american attack?
- Where Did the Canadiens first attack when the war began?
10 Clues: How did the war of 1812 end? • What treaty ended the war of 1812? • What is the original name of Toronto? • Name the battle that Isaac Brock died? • What battle happened on the 24th of june 1812? • Where Did the Canadiens first attack when the war began? • Who hiked 32 km to warn the English about an american attack? • ...
Logical Fallacies 2024-06-19
Across
- Justifying answers through public consensus
- Makes the argument much more dramatic in a short period of time
- Offer less options than available
- Because one thing happened after the other, the first thing caused the second
Down
- Choosing to disregard something because you have never seen or learnt about
- Changing the meaning of a word to mean something else
- Attack the person, not the argument
- Using the argument to justify the conclusion and the conclusion to justify the argument
- Distort the attack to make it easier to dismiss
- Citing experts and bending the truth to convince people of things
10 Clues: Offer less options than available • Attack the person, not the argument • Justifying answers through public consensus • Distort the attack to make it easier to dismiss • Changing the meaning of a word to mean something else • Makes the argument much more dramatic in a short period of time • Citing experts and bending the truth to convince people of things • ...
Cybersecurity Intro Vocabulary 2023-09-07
Across
- the avenue or path the hacker uses to commit the attack
- usually operates outside the law
- a hacker who is generally ethical and law-abiding.
- the act of circumventing or breaking past security boundaries.
Down
- process of protecting a system against unintended or malicious changes or use
- a malicious software code that is unleashed and attempts to perform its destructive content
- an attempt to steal, damage, or destroy data or a computer system
- a person who engages in hacking
- They do no harm, but they don't ask permission
- hacking into a phone system
10 Clues: hacking into a phone system • a person who engages in hacking • usually operates outside the law • They do no harm, but they don't ask permission • a hacker who is generally ethical and law-abiding. • the avenue or path the hacker uses to commit the attack • the act of circumventing or breaking past security boundaries. • ...
Isolation and Infamy Crossword Puzzle 2022-05-03
Across
- He was prime minister of Britain.
- A list of "common principles" between the U.S. and Britain.
- The US sent China one hundred of these to fight Japan.
- Allowed the sale of weaponry to World War II belligerents on a cash basis.
Down
- He set out with sixteen B-25 bombers from the carrier USS Hornet to attack Japan.
- American desire to avoid foreign entanglements and wars.
- The commander of all American forces in the Far East.
- FDR declared that December 7, 1941 would live in this.
- Japanese attack on U.S. forces in Hawaii.
- FDR's Republic opponent in 1940.
10 Clues: FDR's Republic opponent in 1940. • He was prime minister of Britain. • Japanese attack on U.S. forces in Hawaii. • The commander of all American forces in the Far East. • FDR declared that December 7, 1941 would live in this. • The US sent China one hundred of these to fight Japan. • American desire to avoid foreign entanglements and wars. • ...
World War II 2025-03-06
Across
- tanks used by the Third Reich
- A conflict between Finland and the U.S.S.R. to make finland into a soviet buffer state
- A devastating nuclear attack on a Japanese city
- A dictator who led the Third Reich during WWII
- The day that the Allies began to liberate Europe
Down
- A political system that makes it so that every thing equal among everyone
- the leader of the Italian Empire
- An attack against a American port
- A brutal battle during WWII against the Red Army and the German SS
- a camp where Jews were worked to death
10 Clues: tanks used by the Third Reich • the leader of the Italian Empire • An attack against a American port • a camp where Jews were worked to death • A dictator who led the Third Reich during WWII • A devastating nuclear attack on a Japanese city • The day that the Allies began to liberate Europe • A brutal battle during WWII against the Red Army and the German SS • ...
Guns 2025-12-04
Across
- An association of 50 states founded in 1776
- Mugging of one or more people (shooting, attack)
- Item which can hurt or kill animals or people
- Left wing of Americans politics, more tolerant than republicans and often against guns. Democratic President : Clinton, Obama, Biden
- Weapon which shoot bullets thanks to a propulsion system
Down
- Right wing of Americans politics, fight for indépendance and for carrying guns. Republicans présidents : Tramp, Bush, Reagan
- Protect oneself using violence against attack
- People who fight for the right to carrying guns
- Use force o solve problems
- Action to kill (many) people with guns
10 Clues: Use force o solve problems • Action to kill (many) people with guns • An association of 50 states founded in 1776 • Item which can hurt or kill animals or people • Protect oneself using violence against attack • People who fight for the right to carrying guns • Mugging of one or more people (shooting, attack) • Weapon which shoot bullets thanks to a propulsion system • ...
Endocrine Crossword by Brad Dwyer 2013-11-28
Across
- CONTROLS BLOOD PRESSURE
- A LACK OF THESE CELLS CAN RESULT IN BECOMING A DIABETIC
- THE DISCOLOURATION OF THE SKIN
- THE STRUCTURE OF BODIES
- IS THE MAIN LINK BETWEEN THE ENDOCRINE AND NERVOUS SYSTEM
- A GLANDULAR ORGAN FOUND IN THE DIGESTIVE SYSTEM THAT PRODUCES IMPORTANT HORMONES
- MAKES YOUR BONES STRONG
- USED TO MAKE YOU GROW
- MADE OUT OF PROTEIN AND CONTRACTS OR RELAXES TO MOVE OUR BODY
Down
- ENDOCRINE GLANDS THAT SIT ON THE KIDNEYS. RELEASES A CHEMICAL THAT IS USED IN "FIGHT OR FLIGHT"
- A METABOLIC DISEASE THAT OCCURS WHEN A PERSON HAS A HIGH SUAGR LEVEL, HAS A LACK OF INSULIN OR CELLS DON'T RESPOND TO INSULIN CORRECTLY
- A PHYSIOLOGICAL REACTION THAT OCCURS WHEN FACED WITH A HARMFUL EVENT, ATTACK OR A LIFE THREATENING EVENT THAT RELEASES ADRENALINE TO ATTACK OR FLEE
- REMOVES LIQUID WASTE AND TURNS IT INTO URINE
- REGULATES METABOLISM
14 Clues: REGULATES METABOLISM • USED TO MAKE YOU GROW • CONTROLS BLOOD PRESSURE • THE STRUCTURE OF BODIES • MAKES YOUR BONES STRONG • THE DISCOLOURATION OF THE SKIN • REMOVES LIQUID WASTE AND TURNS IT INTO URINE • A LACK OF THESE CELLS CAN RESULT IN BECOMING A DIABETIC • IS THE MAIN LINK BETWEEN THE ENDOCRINE AND NERVOUS SYSTEM • ...
Battle of Thermopylae 2013-04-15
Across
- League Association of the Greek city-state to prevent future Persian attacks.
- How many Spartan soldiers were involved in this battle.
- Persian King who led his army to attack Greece.
- The hot springs from which this city state takes its name.
- Spartan King whom led the battle.
- The Greek city-states met at this city-state to work out a common defence.
- What triggered the Persians to attack Athens and the rest of Greece.
- The outcome of the battle for the Greeks.
Down
- Where the last battle of the second Persian War took place.
- How many days the Battle of Thermopylae lasted.
- All Spartans made this, "to stand in place, win or die".
- The Athenian leader, who provided the strategy behind the battle.
- Whom the people consulted before going to battle.
- Whom the command of the combined navy and army were under.
14 Clues: Spartan King whom led the battle. • The outcome of the battle for the Greeks. • How many days the Battle of Thermopylae lasted. • Persian King who led his army to attack Greece. • Whom the people consulted before going to battle. • How many Spartan soldiers were involved in this battle. • All Spartans made this, "to stand in place, win or die". • ...
Causes of Vietnam War 2023-05-11
Across
- Which President sent a half a million US combat troops to Vietnam?
- The peasants supported Vietminh and the ___.
- Which religion was Diem against?
- The leader of the communist Vietnamese resistance declared Vietnam independent after capturing which city?
- What was the idea that if one country fell to communism, the others around it would fall as well.
- What agreement stated the French would leave and that Vietnam would be split?
- The attack in which US state caused the USA to escalate the war?
- The conflict in Vietnam that developed following the French defeat can best be described as this type of War.
Down
- What was the first Asian Nation to fall to Communism?
- The second attack was not passed onto the _________.
- Who were the South Vietnamese unhappy with?
- The _____ faced attacks from within itself.
- Who was the leader of the communist Vietnamese resistance movement?
- Which part of Vietnam did the USA send supplies to?
- Describe the type of military force President Kennedy sent to Vietnam.
15 Clues: Which religion was Diem against? • Who were the South Vietnamese unhappy with? • The _____ faced attacks from within itself. • The peasants supported Vietminh and the ___. • Which part of Vietnam did the USA send supplies to? • The second attack was not passed onto the _________. • What was the first Asian Nation to fall to Communism? • ...
Bullying Crossword Puzzle 2023-11-27
Across
- Someone who helps those who are being bullied.
- Disapproving of or refusing to accept ideas or ways of behaving that are different from your own.
- Persistently annoying others.
- To make fun of.
- Deliberately harming or threatening another person who cannot easily defend himself or herself.
- Mental, emotional or physical mistreatment of one person to another.
- Sending or posting mean messages intended to inflame the emotions of others.
Down
- Altering digital images so that the main subject is placed in a compromising or embarrassing situation.
- Bullying that involves sending messages threatening a person's physical safety.
- Stealing someone’s password and taking over their online accounts to send or post incriminating or humiliating pics, videos or info.
- Bullying that takes place over digital devices.
- Cruel teasing, name-calling, threatening others, mean jokes rumors, gossip, saying things about others that aren’t true.
- Someone who witnesses bullying going on.
- An unlawful physical attack or threat to attack
14 Clues: To make fun of. • Persistently annoying others. • Someone who witnesses bullying going on. • Someone who helps those who are being bullied. • Bullying that takes place over digital devices. • An unlawful physical attack or threat to attack • Mental, emotional or physical mistreatment of one person to another. • ...
T Level Paper 2 Revision 2025-03-25
Across
- A type of malware that encrypts files and demands payment
- A weakness in a system that can be exploited by a threat
- A virtual space where users interact with applications and services over the internet
- A network type that allows remote access to a secure private system
- A type of cloud service that provides a fully managed computing environment
- A security measure that inspects and filters network traffic
- A key concern when deploying applications in a cloud environment
- A form of cyber attack where an attacker tricks users into providing sensitive information
Down
- The process of encoding data to prevent unauthorized access
- A type of cyber attack that floods a network with traffic
- A model of computing where resources are dynamically allocated and managed as needed
- The ability of a system to handle increasing workloads by adding resources
- A security process that verifies a user's identity
- A legal framework that regulates personal data protection
14 Clues: A security process that verifies a user's identity • A weakness in a system that can be exploited by a threat • A type of malware that encrypts files and demands payment • A type of cyber attack that floods a network with traffic • A legal framework that regulates personal data protection • The process of encoding data to prevent unauthorized access • ...
Crime 1920s 2022-02-28
11 Clues: gun • gun • jail • knife • to kill • attack 1920 • al capone's gang • banning of alcohol • famous bank robber • illegal sale of alcohol • nickname for famous mobster
Shakespeare 2021-09-10
10 Clues: brave • jealous • no friends • can be hurt • will attack • cant be hurt • steals money • to copy something • slowly fall apart • don't know somethings happening
PLTs 2024-02-06
Across
- cnweonenfoiwenfmokewnfkewnfklfe
- wekvnlkewnklwenflweknweklnwef
- Using language to make something sound intentionally worse than it is for effect
- Hwjkefbjebfkjwebfwekjbfkjewbew
- nvkwelvnweklvngkwelgnkwelngweklngkwelf
- jwebkjewnbgkjewgkjwegwekjgwekj
Down
- vlwekvnklwevnklwenvklwev
- ownvenw,mcsdlkamklcnfkejlkw
- welfnwelknweklngv d.c
- wjgnwejkgnwelkgnwelkngwe
10 Clues: welfnwelknweklngv d.c • vlwekvnklwevnklwenvklwev • wjgnwejkgnwelkgnwelkngwe • ownvenw,mcsdlkamklcnfkejlkw • wekvnlkewnklwenflweknweklnwef • Hwjkefbjebfkjwebfwekjbfkjewbew • jwebkjewnbgkjewgkjwegwekjgwekj • cnweonenfoiwenfmokewnfkewnfklfe • nvkwelvnweklvngkwelgnkwelngweklngkwelf • Using language to make something sound intentionally worse than it is for effect
The five people you meet in heaven 2022-05-20
vocab choice board 2 tommy 2023-10-11
10 Clues: intense • shameful • luxurious • shapeless • to weaken • to make right • decaying flesh • a concern for others • to surround or attack • lasting only a brief time
The Second Battle of Ypres 2014-03-16
Across
- Number of major engagements in the Battle
- The type of gas used by the Germans
- The year the Battle took place
- The name given to the allied intrusion in the German territory
Down
- The country where Ypres is located in
- The Nationality of the soldiers who rushed to defend the breached front line in the first gas attack
- The nationality of the soldiers hit by the first gas attack
- The name of the side the Germans fought for
- Poem written at the Battle of Ypres
- The substance hanker chiefs were soaked in to counter the gas
10 Clues: The year the Battle took place • The type of gas used by the Germans • Poem written at the Battle of Ypres • The country where Ypres is located in • Number of major engagements in the Battle • The name of the side the Germans fought for • The nationality of the soldiers hit by the first gas attack • The substance hanker chiefs were soaked in to counter the gas • ...
Crimes 2023-09-20
Across
- the unlawful unintentional killing of one human being by another
- the act of deliberately giving false evidence while under oath
- stealing of money that belongs to the company or organization that one works for
- the crime of intentionally setting fire to property
- an attack of someone in order to rob them
Down
- the act of attempting to obtain money by threatening to reveal shameful information
- a violent attack, either physical or verbal
- the crime of making a fraudulent imitation
- the act of capturing and holding (a person), usually for ransom
- deliberate deception or cheating intended to gain an advantage
10 Clues: an attack of someone in order to rob them • the crime of making a fraudulent imitation • a violent attack, either physical or verbal • the crime of intentionally setting fire to property • the act of deliberately giving false evidence while under oath • deliberate deception or cheating intended to gain an advantage • ...
Vocabulary - The Pearl (Bridger Ligon) 2023-11-28
Across
- a long tiring walk
- secret agreement or cooperation for an illegal or deceitful purpose
- a soft usually heated and sometimes medicated mass spread on cloth and applied to sores or other lesions
- a crying out in grief
Down
- an unwavering partisan
- a mock blow or attack on or toward one part in order to distract attention from the point one really intends to attack
- a solid wall-like structure raised for defense
- insolent rude in speech or behavior
- to deceive, win over, induce to do something by artful coaxing and wheedling or shrewd trickery
- abnormal drowsiness
10 Clues: a long tiring walk • abnormal drowsiness • a crying out in grief • an unwavering partisan • insolent rude in speech or behavior • a solid wall-like structure raised for defense • secret agreement or cooperation for an illegal or deceitful purpose • to deceive, win over, induce to do something by artful coaxing and wheedling or shrewd trickery • ...
The Pearl Vocab (Jordan P7) 2023-11-29
Across
- A solid wall like structure for defense
- A soft heated and sometimes medicated mass spread on cloth and applied to sores or other lesions
- A mock blow or attack on or toward one part in order to distract attention from the point one really intends to attack
- Insolent or rude in speech or behavior
- To express sorrow, mourning, or regret demenstratively
Down
- Secret agreement or cooperation
- Marked by outstanding strength and vigor of body
- Abnormal drowsiness
- To deceive win over or induce to do something by artful coaxing and wheedling or shrewd trickery
- To walk or march steadily and laborisly
10 Clues: Abnormal drowsiness • Secret agreement or cooperation • Insolent or rude in speech or behavior • A solid wall like structure for defense • To walk or march steadily and laborisly • Marked by outstanding strength and vigor of body • To express sorrow, mourning, or regret demenstratively • ...
Volleyball-1 2023-06-15
Across
- - Player who orchestrates the team's offense and sets up the attackers
- - Powerful attacking hit downward into the opponent's court
- - Defensive specialist who wears a contrasting jersey
- - Change of service possession after a failed attempt to score
Down
- - Offensive action of hitting the ball to score a point
- - Movement of players in a clockwise direction after winning a rally
- - Method of initiating play by hitting the ball over the net
- - Defensive play to stop the opponent's attack at the net
- - Skill of placing the ball for an attacking player
- - Defensive technique of passing a hard-driven ball
10 Clues: - Skill of placing the ball for an attacking player • - Defensive technique of passing a hard-driven ball • - Defensive specialist who wears a contrasting jersey • - Offensive action of hitting the ball to score a point • - Defensive play to stop the opponent's attack at the net • - Powerful attacking hit downward into the opponent's court • ...
Volleyball 2025-02-24
Across
- The player who sets up the ball for attackers
- action of starting play by hitting the ball over the net.
- A rule violation that happens when a player touches the net
- A move to prevent the ball from hitting the floor
Down
- A defensive move to stop or slow down an attack at the net
- The original name of volleyball.
- The number of players on the court per team
- A point is awarded on every serve, regardless of which team served.
- Jumping and striking the ball forcefully into the opponent’s court.
- A defensive specialist who cannot attack above the net.
10 Clues: The original name of volleyball. • The number of players on the court per team • The player who sets up the ball for attackers • A move to prevent the ball from hitting the floor • A defensive specialist who cannot attack above the net. • action of starting play by hitting the ball over the net. • A defensive move to stop or slow down an attack at the net • ...
Cyber Attackers 2025-03-24
Across
- Emails pretending to be from trusted sources to steal information.
- An attack where criminals demand money to restore access to data.
- Type of hacker paid to test security systems ethically.
- Attack that floods a system with traffic to bring it down.
Down
- A trick where a criminal looks over your shoulder to steal information.
- The unauthorised use of someone’s private information to pretend to be them.
- Software that replicates itself and can damage files or systems.
- Law passed in 1990 to deal with hacking offences.
- Security method requiring both a password and a text code.
- Personal facts and figures collected online.
10 Clues: Personal facts and figures collected online. • Law passed in 1990 to deal with hacking offences. • Type of hacker paid to test security systems ethically. • Security method requiring both a password and a text code. • Attack that floods a system with traffic to bring it down. • Software that replicates itself and can damage files or systems. • ...
Cryptography Techniques 2024-03-05
Across
- : Transposition cipher also called a zigzag cipher
- : Malware that can reproduce itself
- : A monoalphabetic rotation cipher used by Gaius Julius Caesar
- : Data after encryption
- : Scrambles data to prevent unauthorized access
- : Modifying the information in some way by conducting some process on the information
Down
- : This is a relentless attack based on trial and error where the hacker attempts to determine passwords or access encrypted data
- : In this attack the attackers already have a copy of the encrypted message
- : Involves using a single key to encrypt and decrypt data
- : Probably the best-known example of a polyalphabetic cipher
10 Clues: : Data after encryption • : Malware that can reproduce itself • : Scrambles data to prevent unauthorized access • : Transposition cipher also called a zigzag cipher • : Involves using a single key to encrypt and decrypt data • : Probably the best-known example of a polyalphabetic cipher • : A monoalphabetic rotation cipher used by Gaius Julius Caesar • ...
Military Epidemiology 2025-06-02
Across
- Restriction of movement to prevent the spread of infectious disease
- The process of eliminating harmful microorganisms after biological contamination
- Separation of infected individuals to stop transmission of disease
- Recovery process for victims after a biological attack
- A harmful agent like bacteria or virus used intentionally to cause disease
- Use of biological agents to intimidate or harm a population
Down
- Organized removal of people from a danger zone after a biological attack
- Vaccination to protect people against dangerous diseases
- Medicines used to treat infections caused by bacteria
- Protective equipment worn to reduce exposure to biological hazards
10 Clues: Medicines used to treat infections caused by bacteria • Recovery process for victims after a biological attack • Vaccination to protect people against dangerous diseases • Use of biological agents to intimidate or harm a population • Separation of infected individuals to stop transmission of disease • ...
SPELLING WORDS 2022-01-27
Across
- torment or tease with the sight or promise of something that is unobtainable
- preconceived opinion that is not based on reason or actual experience
- musical instrument that supports or partners a solo instrument, voice, or group
- feeling or showing caution about possible dangers or problems
Down
- the state of being awake and aware of one's surroundings
- the quality or state of being multiple
- occurring or done in brief, irregular bursts
- make an attack or assault in return for a similar attack
- without doubt; certainly
- disconnection and lack of continuity between thoughts, memories, surroundings, actions, and identity
10 Clues: without doubt; certainly • the quality or state of being multiple • occurring or done in brief, irregular bursts • the state of being awake and aware of one's surroundings • make an attack or assault in return for a similar attack • feeling or showing caution about possible dangers or problems • preconceived opinion that is not based on reason or actual experience • ...
HISTORY 2016-01-21
Dynamic Markings 2017-05-24
10 Clues: loud • soft • very soft • very loud • medium loud • medium soft • suddenly loud • gradually softer • gradually louder • a loud attack followed immediately by soft playing
Sat Crossword by Arjun Mannan 2017-01-10
Unit 1 Vocabulary Grade 6 - 10 Words 2024-09-13
10 Clues: plainly • clothing • profitable • to abandon • to send off • severely hungry • to press together • to condemn openly • to plunge into liquid • to attack by surrounding
random 2021-05-17
Unit 8 Lesson 1 2026-03-24
10 Clues: bad luck • to defeat • an attack • to suppose • to surprise • firm; stubborn • nearly hopeless • to use carefully • to enter by force • to restore confidence
North Korea Crossword 2013-03-18
Across
- Who is their current leader?
- What is another name for North Korea?
- What language do North Koreans speak?
- What kind of missiles are North Korea threatening to attack other countries with?
Down
- What is the capital of North Korea
- Who are North Korea's main enemy?
- Who is setting up anti missile defense's to defend if North Korea do attack?
- What country has the strongest diplomatic ties with North Korea?
- Who is putting extra sanctions on North Korea for their missile tests?
9 Clues: Who is their current leader? • Who are North Korea's main enemy? • What is the capital of North Korea • What is another name for North Korea? • What language do North Koreans speak? • What country has the strongest diplomatic ties with North Korea? • Who is putting extra sanctions on North Korea for their missile tests? • ...
Network Security-1 2025-04-18
Across
- text is transformed using cipher algorithms
- is the first computer virus identified
- The term which denotes that only authorized users are capable of accessing the information
- is the type of symmetric key algorithm which uses a streaming cipher to encrypt information.
- attack refers to the denial of service attack.
Down
- What is the CIA triad also known as?
- Compromising confidential information falls under
- server is used to hide malicious activity on the network
- is used to help users detect viruses and avoid them
- text The information that gets transformed in encryption process
10 Clues: What is the CIA triad also known as? • is the first computer virus identified • text is transformed using cipher algorithms • attack refers to the denial of service attack. • Compromising confidential information falls under • is used to help users detect viruses and avoid them • server is used to hide malicious activity on the network • ...
LEGO Dimensions LEGO Batman Movie Story Pack Minikit Models Made 2020-06-09
6 Clues: From "Arkham Attack" • From "The Phantom Zone" • From "The Energy Plant" • From "The Final Showdown • From "The Fortress of Solitude" • From "Attack of the Uber Villains"
The pearl 2022-09-27
Across
- expressing sorrow
- flower
- clear fluid containing white blood cells
- glowing/light
- wavey
- the mouth of a large river
Down
- a natural medicine concoction
- a wall against starvation
- Alcoholic drink
- a story with meaning
- the natives
- questioning, suspicious
- cold and damp
- A movement as a fake attack.
- a mound the oysters are on
- a small triangular sail
16 Clues: wavey • flower • the natives • cold and damp • glowing/light • Alcoholic drink • expressing sorrow • a story with meaning • questioning, suspicious • a small triangular sail • a wall against starvation • a mound the oysters are on • the mouth of a large river • A movement as a fake attack. • a natural medicine concoction • clear fluid containing white blood cells
Hamlet Act 1 2023-02-27
Across
- spear
- place between earth and heaven
- ghost
- words spoken toward the audience but not intended for other characters to hear
- attack
- warlike
- beg
- who said "to thine own self be true"
- guard
Down
- who said "frailty, they name is woman"
- get to know
- strengthen
- funeral song
- long personal solo speech
- happiness
- place where Shakespeare performed plays
16 Clues: beg • spear • ghost • guard • attack • warlike • happiness • strengthen • get to know • funeral song • long personal solo speech • place between earth and heaven • who said "to thine own self be true" • who said "frailty, they name is woman" • place where Shakespeare performed plays • words spoken toward the audience but not intended for other characters to hear
Data Security Puzzle 2025-03-21
Across
- A weakness in system security procedures, software, hardware, design, implementation, internal controls, technical controls, physical controls, or other controls that could be accidentally triggered or intentionally exploited and result in a violation of the system's security policy
- attack created by a flood of requests from a coordinated large number of distributed nodes to overwhelm a server.
- a piece of code or a technique that takes advantage of a vulnerability or flaw in software or hardware to gain unauthorized access, cause unintended behavior, or disrupt a system
- an adversary sponsored by a country's government that are often well organized and funded
- using a carefully crafted software code that violates the operating systems access control policy and allows the attacker to gain full control of the system
- any method by which an adversary interferes with the traffic on a physical level.
- an attack enabled by leakage of information from a physical cryptosystem including timing, power consumption, and electromagnetic emissions.
- one principle of persuasion that says that people will tend to avoid mistakes by acting according to what others have done
- one principle of persuasion that says they are more likely to respond to messages from people they share similarities with or have a good feeling about
- one principle of persuasion that workers tend to respond to people above them such as their boss or higher ups
- a carefully crafted script in the user input to redirect a user and retrieve their login information (in the form of a cookie) from a legitimate website database.
- an attack where the adversary uses carefully crafted code that sends the users cookie to their computer so they now control the current session
- a document signed in organizations to ensure that technology is used for their intended purposes only.
- a set of changes or updates to a software program or operating system, designed to fix bugs, address security vulnerabilities, or improve functionality or performance
- the idea that users complete tasks with the least amount of cognitive effort
- systems that closely connect hardware, software and networks that often run autonomously
- hiding in a network and collecting all the bits that are being transferred between hosts
- turning long numbers or passwords into smaller pieces of data to help user memory
- type of data that includes social security number, usernames, passwords, etc..
- a law that protects the personal private data for citizens in the European Union.
- an event where confidential, private, protected, or sensitive information is exposed to unauthorized individuals, either through an accidental occurrence or an intentional act to steal information
- one principle of persuasion that says perceived value is greater if they believe it is limited and they must hurry to get it
- the type of data that is stored, transferred, inputted/outputted, or processed
- this is the state we refer to data that is traveling across a network
- this attack uses the amount of time it takes for each part of a cryptographic function to infer information.
- one principle of persuasion that says people tend to repay someone that has provided them something
- measuring the surrounding EM of the hardware to infer cryptographic keys
Down
- type of attack that uses the fact that some data is not fully deleted
- this is the state we refer to data that is currently being stored either on a device, server, cloud, or backup medium
- sending fake information to a network devices, servers, or applications with malicious intent
- one principle of persuasion that says that you can pressure someone by crafting messages to a cause they believe in
- A type of DDoS attack that uses a large number of spoofed IP addresses to send UDP packets to overwhelm a server
- attack intent to deny legitimate network users access to a resource such as a network, server, or website
- carefully crafted command in the user input to execute a malicious command on the website's hosting server.
- Individuals or groups operating domestically or internationally who use violence or threat of violence inflicted through cyber means with the intention of coercing or intimidating governments or societies into succumbing to their demands
- a requiring that hardware respond to tampering by failing in a safe way
- a security requirement for any hardware handling data protection
- a string that says: this user is authenticated already
- federal law that sets the consequences for accessing data or computers that you are not authorized to access in the federal government
- type of data that contains roles and authorized resources to be used for reading, writing, and processing
- type of data that sets rules for how to protect data on all other levels
- carefully crafted SQL syntax in the user input to retrieve information stored in a database
- erasing critical parts of memory in response to tampering
- changing the identifyable information on a computer to be that of another computer. This can be done with MAC addresses or IP addresses
- federal law that protects a person's health records and sets rules for how it can be used or disclosed.
- individual that uses cyberspace to break the law
- a mathematical algorithm that converts an input of any length into a fixed-size output, called a hash or message digest, ensuring data integrity and authenticity
- a type of man-in-the-middle attack that allows an adversary to set up an unsecure connection to the user and establishes a secure connection with the target website gaining complete unencrypted access to user requests.
- an electrical grid that includes central control and monitoring connecting to smart meters, smart appliances, etc..
- a type of DDoS attack that exploits the TCP three way handshake.
- techniques for luring a user to yield their credentials using persuasion, technological manipulation, and carefully crafted messages
- a type of attack that measures the level of electricity needed for each bit of data. 1s use more energy than 0s.
- this is the state we refer to data that is currently being processed by an application
- 3D model used to represent design aspects for securing data at every level
- an accidental or non malicious individual that makes a mistake with sharing or triggering malicious software by not following standard cyber safety protocols
- a temporary place to put data to help predict possible next processes. This is often used to do side channel attacks as it takes a different amount of time to process compared to RAM.
- any method by which authorized or unauthorized users are able to get around a security policy in systems.
- a vulnerability discovered and exploited by adversaries but never reported to the software vendor, NVD, or CERT
- federal law that affords parents the right to have access to their children's records, the right to change records, and the right to have some control over disclosure.
- a law passed in California that protects the personal data for citizens of California.
60 Clues: individual that uses cyberspace to break the law • a string that says: this user is authenticated already • erasing critical parts of memory in response to tampering • a security requirement for any hardware handling data protection • a type of DDoS attack that exploits the TCP three way handshake. • ...
The Anfal Campaign Crosswords 2025-05-28
Across
- Human rights organization that documented Anfal atrocities
- Town where a notorious chemical attack killed thousands
- Chemical weapon used in the Halabja attack
- Country where the Kurdish victims lived
Down
- A minority ethnic group targeted in the campaign
- Last name of the Iraqi leader responsible for the Anfal Campaign
- International body often criticized for not stopping the campaign
- The name of the genocidal campaign against the Kurds
8 Clues: Country where the Kurdish victims lived • Chemical weapon used in the Halabja attack • A minority ethnic group targeted in the campaign • The name of the genocidal campaign against the Kurds • Town where a notorious chemical attack killed thousands • Human rights organization that documented Anfal atrocities • ...
Battles of World War II 2021-05-10
Across
- Japanese city where the first atomic bomb was dropped by the U.S and between 70000 to 80000 people died.
- Battle in which the Allies went toward Germany, American defenses were off guard, but they pushed the Germans back.
- Code name of the Germany’s invasion to the Soviet Union.
- Several aircraft battles fought for getting Britain, between Germany and Britain.
- Battle between U.S. and Japanese using sea/air forces and turned back the Japanese invasion of Port Moresby.
- A forced walk more than 50 miles up the peninsula that the Japanese used for their captives.
- Sea and air forces battle between U.S. and Japan, in which Yamamoto’s forces lost.
Down
- Strategy, to attack in surprise using tanks and airplanes, first used in the invasion of Poland.
- Japanese attack to the U.S. which damaged sea forces also killed and wounded many Americans.
- French and British armies declared war to Germany there was no attack on either side and it got called the “sitting war.”
- Battle between U.S. and Japanese lost with their combined fleet’s permitted the U.S. invade the Philippines and reinforce the Allies control of the Pacific.
- Battle between France and Germany, France/ British soldiers got trapped and France surrenders.
- Battle between the Allies and the Japanese to stop the building a huge air base and drove the Japanese out.
- Battle between Soviet Union and Germany in which Germany surrendered to the Soviets and cost one million soldiers to the Soviets.
- Battle of Germany and Finnish against The Soviet Union also called the 900-day siege.
15 Clues: Code name of the Germany’s invasion to the Soviet Union. • Several aircraft battles fought for getting Britain, between Germany and Britain. • Sea and air forces battle between U.S. and Japan, in which Yamamoto’s forces lost. • Battle of Germany and Finnish against The Soviet Union also called the 900-day siege. • ...
Battles of World War II 2021-05-10
Across
- Japanese attack to the U.S. which damaged sea forces also killed and wounded many Americans.
- Battle between the Allies and the Japanese to stop the building a huge air base and drove the Japanese out.
- A forced walk more than 50 miles up the peninsula that the Japanese used for their captives.
- Battle between Soviet Union and Germany in which Germany surrendered to the Soviets and cost one million soldiers to the Soviets.
- Japanese city where the first atomic bomb was dropped by the U.S and between 70000 to 80000 people died.
- French and British armies declared war to Germany no attack on either side and it got called the “sitting war.”
- Battle between U.S. and Japanese using sea/air forces and turned back the Japanese invasion of Port Moresby.
Down
- Battle of Germany and Finnish against The Soviet Union also called the 900-day siege.
- Several aircraft battles fought for getting Britain, between Germany and Britain.
- Code name of the Germany’s invasion to the Soviet Union.
- Battle between U.S. and Japanese lost with their combined fleet’s permitted the U.S. invade the Philippines and reinforce the Allies control of the Pacific.
- Strategy, to attack in surprise using tanks and airplanes, first used in the invasion of Poland.
- Battle in which the Allies went toward Germany, American defenses were off guard but they pushed the Germans back.
- Battle between France and Germany, France/ British soldiers got trapped and France surrenders.
- Sea and air forces battle between U.S. and Japan, in which Japanese forces lost.
15 Clues: Code name of the Germany’s invasion to the Soviet Union. • Sea and air forces battle between U.S. and Japan, in which Japanese forces lost. • Several aircraft battles fought for getting Britain, between Germany and Britain. • Battle of Germany and Finnish against The Soviet Union also called the 900-day siege. • ...
Fall Final Trivia 2023-12-18
Across
- The second R of th New Deal that refers to getting the economy back to where it was
- The ship that was blown in half during the attack on Pearl Harbor that now serves as a memorial site to honor those lost in the attack
- The process of developing industries in a country called
- What dance became popular during the 1920s, symbolizing the carefree and rebellious spirit of the era?
- Musical genre that emerged in the late 1920s, characterized by its improvisation and expression, often associated with African American communities
- This conflict, fought in the United States from 1861 to 1865, was primarily centered around issues of slavery, states' rights, and sectional tensions, ultimately resulting in the preservation of the Union
- The term for moving to a new country
- environmental disaster, exacerbated by poor farming practices and severe drought, affected the Great Plains of the United States in the 1930s?
- The belief in the 19th-century United States that American settlers were destined by God's will to expand across North America
Down
- The part of the United States Constitution can you find the introductory statement that begins with the words, "We the People of the United States, in Order to form a more perfect Union..."
- The country that launched a surprise attack against the US 1941
- What invention did Americans use to access "Fireside Chats"
- Which ideology advocated for government intervention to address economic issues during the Great Depression?
- The term used to describe tent cities and towns built out of cardboard boxes in the 1920s
- Franklin Delano Roosevelt
15 Clues: Franklin Delano Roosevelt • The term for moving to a new country • The process of developing industries in a country called • What invention did Americans use to access "Fireside Chats" • The country that launched a surprise attack against the US 1941 • The second R of th New Deal that refers to getting the economy back to where it was • ...
The Moon 2022-06-08
Across
- any object in the shape of a sphere
- the distance from one side to the opposite side of a circle,
- used to emphasize that something is not large or important
- at a greater distance
- a dance step in which you walk backwards in a smooth movement
Down
- to continue to exercise gently to prevent injury after you have done more difficult exercises
- to follow a curved path around a planet or star
- a holiday taken by a couple immediately after their marriage
- to attack a place with continuous shooting or bombs
- to attack someone violently
10 Clues: at a greater distance • to attack someone violently • any object in the shape of a sphere • to follow a curved path around a planet or star • to attack a place with continuous shooting or bombs • used to emphasize that something is not large or important • a holiday taken by a couple immediately after their marriage • ...
Body Systems 2022-01-25
Across
- The __________ system is made up of the heart, blood, veins and arteries.
- _______ blood pressure increases someone’s risk for a heart attack or stroke.
- Living ___________ free can help keep your circulatory system healthy.
- Too much salt can increase a person’s _______ pressure.
- Being physically ______ can keep your circulatory system healthy.
Down
- Maintaining a healthy ________ can keep your heart healthy.
- Consuming saturated fats and ____ fat increases a person’s risk for heart attacks or strokes.
- Eating a variety of ________ food can keep your heart healthy.
- Being physically active can ________ a person’s risk for heart attack and stroke.
- The circulatory system is also known as the _____________ system.
10 Clues: Too much salt can increase a person’s _______ pressure. • Maintaining a healthy ________ can keep your heart healthy. • Eating a variety of ________ food can keep your heart healthy. • The circulatory system is also known as the _____________ system. • Being physically ______ can keep your circulatory system healthy. • ...
Vocabulary - The Pearl (Bridger Ligon) 2023-11-28
Across
- a long tiring walk
- a solid wall-like structure raised for defense
- abnormal drowsiness
- a soft usually heated and sometimes medicated mass spread on cloth and applied to sores or other lesions
- a mock blow or attack on or toward one part in order to distract attention from the point one really intends to attack
Down
- to deceive, win over, induce to do something by artful coaxing and wheedling or shrewd trickery
- an unwavering partisan
- secret agreement or cooperation for an illegal or deceitful purpose
- a crying out in grief
- insolent rude in speech or behavior
10 Clues: a long tiring walk • abnormal drowsiness • a crying out in grief • an unwavering partisan • insolent rude in speech or behavior • a solid wall-like structure raised for defense • secret agreement or cooperation for an illegal or deceitful purpose • to deceive, win over, induce to do something by artful coaxing and wheedling or shrewd trickery • ...
The Pearl Vocabulary (MaKaylan O.) 2023-11-28
Across
- a wall-like structure raised for defense
- a soft usually heated and sometimes medicated mass spread on cloth and applied to sores or other lesions
- a moun blow or an attack on or toward one part in order to distract attention from the point one really in tends to attack
- insolent or rude in speech or behavior
- to mourn aloud
Down
- is a secret agreement or cooperation for an illegal or deceitful purpose
- an unwavering partisan
- abnormal drowsiness
- to deceive, win over, or induce to do something by coaxing and wheedling or shrewd trickery
- a long tiring walk
10 Clues: to mourn aloud • a long tiring walk • abnormal drowsiness • an unwavering partisan • insolent or rude in speech or behavior • a wall-like structure raised for defense • is a secret agreement or cooperation for an illegal or deceitful purpose • to deceive, win over, or induce to do something by coaxing and wheedling or shrewd trickery • ...
Age of Exploration (Creamy) 2023-12-14
Across
- a is or sttlement area for from the country that rules it.
- had triangular sails to better control the wind.
- much more effective then the traditional weapons of knights.
- always points to north so sailors could know their diretion inrelation to north.
- allowed sailors to attack and defend also were used on ships for and attack.
Down
- helped sailors tell how far north or south of the equator they had sailed.
- the first machine was inventeol in eanly 1300s.
- led an empire is a group of nation .
- monument of the discoverers is in Lisbon.
- organized journey.
10 Clues: organized journey. • led an empire is a group of nation . • monument of the discoverers is in Lisbon. • the first machine was inventeol in eanly 1300s. • had triangular sails to better control the wind. • a is or sttlement area for from the country that rules it. • much more effective then the traditional weapons of knights. • ...
Chapter 4,5,6 of the Bernardo Investigation Review 2024-02-08
Across
- Name of the drug in Tammy Homolka's system?
- The coroner who performed the first autopsy on Tammy Homolka.
- Who decided to release the scene before post-mortem results were available?
- What’s the detective’s name who initiated the C.P.I.C. Zone Alert?
- What was the investigator's name who identified that the description of the Henley attack was similar to Bernardo's Scarborough victims?
Down
- The license plate of Bernardo’s car
- Metro police produced a ___________ sketch of the description told by the witness.
- Make of Bernardo’s car
- The colour of Bernardo’s car
- What was the island that called where the attack took place in St. Catherines?
10 Clues: Make of Bernardo’s car • The colour of Bernardo’s car • The license plate of Bernardo’s car • Name of the drug in Tammy Homolka's system? • The coroner who performed the first autopsy on Tammy Homolka. • What’s the detective’s name who initiated the C.P.I.C. Zone Alert? • Who decided to release the scene before post-mortem results were available? • ...
10.6 Health Issues Related to Blood Circulatory System 2025-01-08
Across
- Mineral deposited on the plaque that causes artery to become hard and less elastic
- Another name for high blood pressure
- Severe chest pain
- Brain tissues die due to lack of oxygen supply to brain cells
- Bad cholesterol
- Medical procedure of inserting catheter with balloon and stent into narrow or blocked blood vessel
- Name of the blocked artery that causes heart attack
Down
- Medical procedure of creating alternative pathway for blood flow in blocked heart blood vessels using leg blood vessel
- Plaque formation and deposition on the artery walls
- Another name for heart attack
10 Clues: Bad cholesterol • Severe chest pain • Another name for heart attack • Another name for high blood pressure • Plaque formation and deposition on the artery walls • Name of the blocked artery that causes heart attack • Brain tissues die due to lack of oxygen supply to brain cells • Mineral deposited on the plaque that causes artery to become hard and less elastic • ...
UNIT 6 2024-12-11
Across
- attack A pre-emptive attack is a war that is commenced in an attempt to repel
- the act of uniting or bringing together, especially people of different races
- a political and economic theory of social organization that advocates that the means of production,
- pride in one's country
- Involvement in world affairs
Down
- A person who has been forced to leave their country in order to escape war,
- a large-scale destruction, especially by fire; a vast slaughter; a burnt offering
- Prejudice against Jews
- camp a camp where prisoners of war, political prisoners,
- A ban on trade
10 Clues: A ban on trade • Prejudice against Jews • pride in one's country • Involvement in world affairs • camp a camp where prisoners of war, political prisoners, • A person who has been forced to leave their country in order to escape war, • the act of uniting or bringing together, especially people of different races • ...
Unit 7 lesson 6 vocab 2026-03-19
Across
- to move back or away from danger or attack
- a possible effect or result that may take place in the future
- to make a place safe from attack by building defenses (walls, trenches,
- an official statement of something
- to use legal authority to demand and collect a fine or tax
Down
- the person who represents the government of their country in another country
- a person killed or injured during battle
- bullets, shells, and other objects used as weapons shot from guns
- to choose not to vote
- another term for 20; a group of 20 things
10 Clues: to choose not to vote • an official statement of something • a person killed or injured during battle • another term for 20; a group of 20 things • to move back or away from danger or attack • to use legal authority to demand and collect a fine or tax • a possible effect or result that may take place in the future • ...
Touching Spirit Bear 2021-05-26
15 Clues: fire • cast out • West Side • tear apart • small boat • fishing boat • jump, beat up • a place to live • to injure terribly • those who come before us • small body of ocean water • things you need to survive • healing instead of punishment • punishment instead of healing • white bear with healing properties
Roman Challenges 2021-10-18
Across
- carthage must be destroyed
- biggest threat
- Third thing needed to be done
- poor and slave
- terrorized the Roman countryside
- 6000 men
- second thing needed to be done
- Army Changes
Down
- First thing needed to be done
- Reform attempts
- spartacus
- carthage
- Romans attack and burn carthage
- Hannibal
- Problems in the Republic
- Carthage
16 Clues: carthage • Hannibal • Carthage • 6000 men • spartacus • Army Changes • biggest threat • poor and slave • Reform attempts • Problems in the Republic • carthage must be destroyed • First thing needed to be done • Third thing needed to be done • second thing needed to be done • Romans attack and burn carthage • terrorized the Roman countryside
RRC 2022-03-08
Across
- group of men who cultivated small landed estates
- carelessly lazy
- ghost or ghostlike
- too great or extreme
- not showing respect
- injurious to health
Down
- pleasant to taste
- noticeable or marked or conspicuous
- associated with wood
- a verbal attack
- offspring
- sleepy
- important or famous
- burn the skin or flesh
- produce or discharge gasses
15 Clues: sleepy • offspring • a verbal attack • carelessly lazy • pleasant to taste • ghost or ghostlike • important or famous • not showing respect • injurious to health • associated with wood • too great or extreme • burn the skin or flesh • produce or discharge gasses • noticeable or marked or conspicuous • group of men who cultivated small landed estates
Las islas despobladas (pero estratégicas) que enfrentan a Japón y China 2013-01-01
15 Clues: Ensure (10) • Although (6) • To attack (8) • Deposits (11) • Outskirts (9) • Petroleum (8) • Is such (2, 3) • Sovereignty (9) • Unpopulated (10) • Patrol boats (6, 11) • Early hours; dawn (9) • Rich potential (4, 8) • He was accused (3, 7) • They belong to them (2, 10) • Both China and Japan (5, 5, 4, 5)
Word log crossword. 2023-11-13
15 Clues: put on • prisoner • overgrown • a wise person • expensive style • an alcoholic drink • copper turns green • effect with paralisis • a thing that motivates • a disorderly collection • ending,stopping,scraping • a cloudy area in your eye • make an attack on something • the act of one who forebodes • not exceeded by anything else
Worldly Wise Lesson 2 2024-09-19
Across
- open to attack
- clumsy
- made up in the mind
- condition of being alone
- living by killing and eating other animals
- coming earlier
- wise and clever
- eat hungrily
- imaginary
Down
- to search through and look for something
- bird's feathers
- genuine
- kill to get meat
- opinions intending to hurt someone's reputation
- choice item of food
15 Clues: clumsy • genuine • imaginary • eat hungrily • open to attack • coming earlier • bird's feathers • wise and clever • kill to get meat • made up in the mind • choice item of food • condition of being alone • to search through and look for something • living by killing and eating other animals • opinions intending to hurt someone's reputation
