attack Crossword Puzzles
Spelling list 3 2023-09-28
Across
- to smile or laugh with facial contortions that express scorn or contempt
- intended for or restricted to the use of a particular person, group, or class
- make an attack in return from an attack being done to you first.
- protected by interposing material that prevents the loss of heat or the intrusion of sound.
- heat of mind or emotion: proneness to anger
- boldly or brashly self-confident
Down
- To remove or rebuke Beverly, especially in a formal way.
- to look or stare with sullen annoyance or anger
- deceptive, untrustworthy, or unreliable
- say something in a low or barely audible voice, especially in dissatisfaction or irritation.
10 Clues: boldly or brashly self-confident • deceptive, untrustworthy, or unreliable • heat of mind or emotion: proneness to anger • to look or stare with sullen annoyance or anger • To remove or rebuke Beverly, especially in a formal way. • make an attack in return from an attack being done to you first. • ...
Circulatory System Conditions 2025-01-21
Across
- Severe chest apin that arises when the heart does not receive enough oxygen
- The abbreviation for cardiopulmonary resuscitation
- Ballooning out of an artery accompanied by a thinning arterial wall caused by a weakening of the blood vessel
- Deposits of fat form along the walls of arteries, causing the blood vessel to be more narrow
- Hardening of the arteries, generally due to losing elasticity with age causing the blood vessels to be more narrow
- A heart attack symptom
Down
- A gurgling or "whooshing" sound when listening to the heart
- Sudden interruption of blood supply to the brain
- Another term for heart attack
- Laok of blood supply to the myocardium
10 Clues: A heart attack symptom • Another term for heart attack • Laok of blood supply to the myocardium • Sudden interruption of blood supply to the brain • The abbreviation for cardiopulmonary resuscitation • A gurgling or "whooshing" sound when listening to the heart • Severe chest apin that arises when the heart does not receive enough oxygen • ...
Trojan war 6&7 2025-02-21
Across
- a companion or a friend
- take revenge
- make an attack in return for a similar attack
- to hide from view of, cloth used to wrap a dead body before burial
Down
- a small stringed instrument similar to a harp
- damage by cutting, tearing or crushing
- an arrangement of feathers worn by a person for ornament, a long cloud of smoke or vapor resembling a feather
- a very large pot that is used for boiling
8 Clues: take revenge • a companion or a friend • damage by cutting, tearing or crushing • a very large pot that is used for boiling • a small stringed instrument similar to a harp • make an attack in return for a similar attack • to hide from view of, cloth used to wrap a dead body before burial • ...
Dog Awareness 2025-06-15
Across
- Who says the dog is harmless
- It is important to take the proper ______ to protect yourself from a dog attack
- Where do you put a sticker to warn other employees
- Make safety your primary ___________
- What kind of report should be filled out when when you have an interaction with a dog
- When you have a dog attack you, you need to complete this the same day
- _________give dogs treats
- Your______ is of the utmost importance
Down
- What do you indicate on a note when bringing mail back, when a dog is hostile and the owner is not home
- How often do you trust a customers dog
- You should run when a dog is hostile (T or F)
- What to do when an employee is injured by a dog
- What is the name of the dog repellent we use
- Something you can use to deter a dog
- What kind of customer experience is crucial for future success
- Who do you contact when a dog bites
- It is important to compile as much _______ as possible
- You should use your _____ against the door, to stop the dog from getting out
18 Clues: _________give dogs treats • Who says the dog is harmless • Who do you contact when a dog bites • Something you can use to deter a dog • Make safety your primary ___________ • How often do you trust a customers dog • Your______ is of the utmost importance • What is the name of the dog repellent we use • You should run when a dog is hostile (T or F) • ...
Dog Awareness 2025 2025-07-29
Across
- Where do you put a sticker to warn other employees
- When you have a dog attack, you need to complete this the same day
- Who do you contact when a dog bites
- Your ______ is of the utmost importance
- What kind of customer experience is crucial for future success
- Who says the dog is harmless
- What do you indicate on a note, when you bring the mail back to the post office, when a dog is hostile and the owner is not home
Down
- What to do when an employee is injured by a dog
- Make Safety your primary ____________
- What kind of report should be filled out when you have an interaction with a dog
- What is the name of the dog repellent we use
- It is important to compile as much _____________ as possible
- Should you run when a dog is hostile (T or F)
- How often do you trust a customers dog
- Something you can use to deter a dog
- It is important to take the proper__________ to protect yourself from a dog attack
- ____________ give dogs treats
- You should use your ___________ against the door, to stop the dog from getting out
18 Clues: Who says the dog is harmless • ____________ give dogs treats • Who do you contact when a dog bites • Something you can use to deter a dog • Make Safety your primary ____________ • How often do you trust a customers dog • Your ______ is of the utmost importance • What is the name of the dog repellent we use • Should you run when a dog is hostile (T or F) • ...
ICS 133 2017-05-11
Across
- disruption of transmissions
- communications security
- bogus message given to computers
- also known as cutwail
- an attacked system is called ____ system
- automated host configuration
- infer secrets from patterns in encrypted or otherwise protected traffic
- data resides in the ____
- all are cleared, but not for all compartments or code word
- an attack on confidentiality
- dubious stock investment
- keeping systems available and in operation
- the most secure token
- put acoustical and electromagnetic shields around the equipment
- keeping information secret
- applies effort but avoids social stigma
- creates botnet focused on financial fraud
- availability attack again
- interactive DNS resolver
- prevents a sender from sending data faster than the recipient can handle it
- are protected by a boundary
- acceptance incorrectly detects a match with a credential and the database
- unsolicited email often distributes frauds
- _ reading grants read access to a set of files
- protecting information from improper changes
- no special steps ensure availability
Down
- ma'am ron's bebeloves
- cause significant damage to assets or some injury to persons, but not critical injury
- protects information even when it is not under your physical control
- _ law are based on judicial decisions
- _ law are based on legislative enactments
- limited damage to assets
- email that tries to retrieve authentication data
- openings in an asset
- _ names provide memorable names for hosts on the Internet
- communications intelligence
- identifies a special category of information that requires protection
- availability attack
- the most common token
- malicious software
- embed traffic inside a protocol that the firewall always passes, like Web pages
- filters on comm and power lines
- establish a protected area around sensitive devices and block attackers from area
- forge the sender’s IP address in a TCP connection; success requires correct
- protects the assets
- brief description of threat agent
- uses the DNS to look up a name
- also known as conficker
- he process to establish permission for someone to receive classified information
- protects a set of files from access by others
- will expose minor vulnerabilities
51 Clues: malicious software • availability attack • protects the assets • openings in an asset • ma'am ron's bebeloves • also known as cutwail • the most common token • the most secure token • communications security • also known as conficker • limited damage to assets • data resides in the ____ • dubious stock investment • interactive DNS resolver • availability attack again • ...
ASuW NATO BREVITY CODE WORD CROSSWORD 2018-11-09
Across
- A friendly track acting as a HOSTILE for exercise purposes.
- Ships of a Surface Action Group (SAG).
- Anti - Surface Ship Missile state report.
- Helicopter in the ASUW support role. (no weapons).
- Fast moving surface radar contact assumed to be a fast patrol boat or fast attack craft.
- Request unit reply and/or acknowledge my WATCHTOWER
- Friendly Fast Patrol Boat(s).
- Data Link Reference Point (DLRP).
- The collective word used when specifying more than one of the tactical data links (LINK 11/LINK 11B/LINK 16 and/or LINK 22)
- A military IFF transponder.
- Automatic computer controlled digital data link between units equipped with computerised tactical data systems (link 11).
- Digital datalink between units equipped with satellite tactical DATA LINK 16 (STDL)
- Command and Control Information System.
- Surface/Sub-surface Launched Anti Ship Missile.
- A reference number, other than a track number, unique to a class of vessel or an individual vessel of a class used to describe the identity of a contact (also known as personal identifier (PI-code)
- A suspect surface track following a recognised traffic route.
- Simulated missile firing against a surface target
Down
- A surface contact detected by radar.
- Unit transporting contraband.
- Tactical data system computer.
- An individual, unit or weapon system in or near an operational or exercise area, which represents the threat of intelligence gathering or disruptive activity.
- Exchange of LINK 11 information used in conjunction with an adjective to describe the status of LINK 11 operations.
- Visually identified nationality of a contact
- A unit maintaining contact on a target from a position which enables it to pass targeting information to other units.
- A ship stationed for close defense of a marked unit.
- HOSTILE missile firing fast patrol boat or fast attack craft capable of firing missile.
- An unknown contact not associated with action in progress (bearing, range and altitude relative to you).
- HOSTILE fast patrol boat, fast torpedo boat or fast attack craft.
- An ASUW weapon-carrying helicopter.
- Automatic Identification System (AIS).
- A FRIENDLY track acting as a SUSPECT for exercise purposes.
31 Clues: A military IFF transponder. • Unit transporting contraband. • Friendly Fast Patrol Boat(s). • Tactical data system computer. • Data Link Reference Point (DLRP). • An ASUW weapon-carrying helicopter. • A surface contact detected by radar. • Ships of a Surface Action Group (SAG). • Automatic Identification System (AIS). • Command and Control Information System. • ...
Peter Huang 2019-10-30
Across
- Funds, or money that people pay to government
- Terrolist group planned the attack in US
- What is the name of the political party which it ideolgy is keeping traditional values and believes; they don't like to make changes
- Famous terrorism attack in US
- What is the tool Brexit used to spread the fear of globalism to the public.
- Who is Trump's appointment during his campaign?
- What term meant he quality, character or state of being immoral (wickedness, crime)
- What is the name of economic and political union involiving 28 european coutnries.
- What state have the most school shooting.
- What are the association that control guns?
- What is the name of the political party which its ideology is being free and having personal rights and equal rights; they like new idea and changes
- Where did trump born?
- Who is the key figurehead in the brexit party, and support nationalism
- What people planned the attack (Think about their country and religon)
Down
- Which state have the least school shooting4
- What was Trump's slogan during his election campaign? (type without space)
- What are the action of mass shooting in educational site?
- What are the action of killing someone else (murder) call?
- Political party in Britian which it ideology is to leave EU and protect their country on immigrant
- Name one value that both political parties in US view differently
- who is the 45th president of America?
- What Trump wants to build all the time?
- Name one value that both political parties in US view differently
- Gunstock that can turn semi-automatic rifle into automatic rifle
- Buildings that were attacked by terrolist in US
- What political party Trump is in?
- The belief in all countries should work together and make the world a better place.
- The ideology and movement that support its own coutnry.
- How do we call those who doesen't believe in God
- Way of ending of a pregency by removing the embryo or fetus from mother's body before it can survive outside the uterus.
30 Clues: Where did trump born? • Famous terrorism attack in US • What political party Trump is in? • who is the 45th president of America? • What Trump wants to build all the time? • Terrolist group planned the attack in US • What state have the most school shooting. • Which state have the least school shooting4 • What are the association that control guns? • ...
Module 5 vocab words 2022-12-15
10 Clues: aware • suggested • 2nd choice • make smaller • well and kind • deny the truth • ready to attack • produce or provide • being imprisoned or confined • made or produced by human beings
lachy birdys best crossword 2022-12-12
10 Clues: to attack • disbelieve • to be rich • to be lofty • continuence • easy or polite • to be at school • filth or digust • to give up or leave • getting hair twisted
vocab work 2024-02-28
10 Clues: good luck • bad smelling • formed by trees • force or threat • bitter and harsh • a soothing substance • the original pattern • expressing disapproval • peculiar to the individual • attack someone's reputation
Latin Crossword Puzzle 2024-02-09
10 Clues: Nymph • Invader • Used to see • Main Character • Water creature • one eye creature • Used in water to move • Polyphemus' favorite food • Come to attack Polyphemus • Odysseys and his companions
Cyber Crossword 2025-10-21
10 Clues: Attack • Password • Phishing • Data leak • Protection • To encrypt data • To report a scam • Person who breaks into systems • The practice of protecting systems • Protects computers from unauthorized access
Security Quiz 2013-07-09
Across
- With cloud computing they talk about this notorious number of threats
- one of the first antivirus programs, released in 1987
- this hat color is used when referring to professional hackers recruited specifically to find security gaps.
- This famous code was broken or "hacked" during the second world war
- The first convicted computer criminals, called the 414's got the name from their hometown in
- To use a program, site or system disguised as something else to acquire data
- The company behind the largest cyber-attack in history
- Silvertail plugin for real-time cyber detection
- ECAT stands for Enterprise Compromise ... Tool)
- A tactic used in ancient Greece to deceive a defense (one word)
- ... engineering is the human way to breach a company's information security.
- a non-profit organization working for the security within the cloud
- Alan ... invented this test to measure machines ability to be mistaken for a human being.
- A DOS-Attack is a Denial-of- ... what?
- last name of the founder for the laws of robotics, ensuring our security from acts of A.I.
Down
- a security system that controls the incoming and outgoing network traffic
- A part of the attack used when RSA was hacked in 2011
- a small simple program used to monitor a computers keystrokes
- this symbolical relative used complete surveillance in the book 1984
- SecurID runs on this Operative System
- the practice of secure communication
- This solution can Pull a complete live memory dump from a suspect machine
- The physical "key" that RSA use to create an authentication code
- RSA BSAFE provides security products for this IT-division
- The A in RSA
- programmers that find and work with weaknesses in computer systems
- this annoying verification on the web is used to make sure that you are human by twisting a word.
- a term to describe a flaw or fault in a computer program or system
- the organizational executive responsible for IT security.
29 Clues: The A in RSA • the practice of secure communication • SecurID runs on this Operative System • A DOS-Attack is a Denial-of- ... what? • Silvertail plugin for real-time cyber detection • ECAT stands for Enterprise Compromise ... Tool) • A part of the attack used when RSA was hacked in 2011 • one of the first antivirus programs, released in 1987 • ...
Anne Frank Vocabulary NSP5 2015-01-29
Across
- great happiness or joy
- to cause someone to feel fear, shock, or disgust
- cruel and unfair treatment by people with power over others; a government in which all power belongs to one person; the rule or authority of a tyrant
- feeling or showing concern for someone who is sick, hurt, poor, etc;
- a wild uproar
- a natural ability or power that makes it possible to know something without any proof or evidence; a feeling that guides a person to act a certain way without fully understanding why; something that is known or understood without proof or evidence
- not producing or able to produce the effect you want
- not able to express ideas clearly and effectively in speech or writing; not able to speak; not expressed clearly or easily understood
- quiet and secret in order to avoid being noticed; slow, deliberate, and secret in action or character; intended to escape observation
- a feeling that something bad is going to happen
- to spend time experiencing or enjoying something without making any effort to change your situation, feelings, etc.; to roll about in deep mud or water
- arousing displeasure, impatience, or anger
Down
- something (such as food) that keeps someone or something alive; something that gives support, help, or strength
- to hate someone or something very much
- unjust or cruel exercise of authority or power; a sense of being weighed down in body or mind
- displaying wealth, knowledge, etc., in a way that is meant to attract attention, admiration, or envy
- lack of interest in or concern about something
- a violent attack; an especially fierce attack or something resembling such an attack
- to make ill-humored or discontented
- very bad or unpleasant; too unpleasant to deal with or accept
- sad and lonely; empty and in poor condition; not having much chance of success; nearly hopeless
- the act or power of perceiving or comprehending; seizure by legal process; suspicion of fear especially of future evil
- extreme anger; a strong feeling of unhappiness because of something bad, hurtful, or morally wrong; something that hurts people or is morally wrong
- evil or immoral; very bad or unpleasant
24 Clues: a wild uproar • great happiness or joy • to make ill-humored or discontented • to hate someone or something very much • evil or immoral; very bad or unpleasant • arousing displeasure, impatience, or anger • lack of interest in or concern about something • a feeling that something bad is going to happen • to cause someone to feel fear, shock, or disgust • ...
Crossword 2024-05-28
Across
- Software that automatically displays or downloads advertising material (often unwanted) when a user is online.
- The process of extracting information and data from computers while preserving its integrity and maintaining a strict chain of custody.
- The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
- A method of trying to gather personal information using deceptive e-mails and websites.
- A simulated cyber attack against your computer system to check for exploitable vulnerabilities.
- A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.
- A device or software application that monitors a network or systems for malicious activity or policy violations.
- A cyber attack that occurs on the same day a vulnerability is discovered in software.
- A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- A service that encrypts your internet traffic and protects your online identity.
Down
- Malicious software designed to harm, exploit, or otherwise compromise a computer system.
- An extra layer of security used to ensure that people trying to gain access to an online account are who they say they are.
- A trial-and-error method used to decode encrypted data such as passwords.
- An attack that aims to make a machine or network resource unavailable to its intended users by overwhelming it with a flood of internet traffic.
- A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
- Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- A code injection technique that might destroy your database.
- The process of converting information or data into a code, especially to prevent unauthorized access.
- management The process of managing a network of computers by regularly performing system updates and deploying software patches to fix vulnerabilities.
- A type of malware that threatens to publish the victim's data or block access to it unless a ransom is paid.
20 Clues: A code injection technique that might destroy your database. • A trial-and-error method used to decode encrypted data such as passwords. • A service that encrypts your internet traffic and protects your online identity. • A cyber attack that occurs on the same day a vulnerability is discovered in software. • ...
Chapter 18 - The Civil War 2023-05-16
Across
- president of the Union
- nickname for Union soldiers
- president of the Confederacy
- Union general who was slow to attack and ran for president against Lincoln in 1864
- Lee's major defeat in Pennsylvania marked a turning point of the war because the South never went into the North again
- Union general who led the March to the Sea in Georgia
- attacking non-military (civilian) targets
- talented Confederate general who was shot and killed by friendly fire at Chancellorsville
- woman who set up a spy network for the Union army and led a military raid (Harriet _____)
- term for slave states that remained with the Union
- assassin of Abraham Lincoln (John Wilkes ______ )
- Union general who led a reckless attack at Fredericksburg
- With heavy losses, Grant’s army survives a brutal surprise attack by the Confederates in Tennessee
- the top Union general who led the Overland Campaign to draw out Lee
Down
- Fast Southern ship that slipped through North's Atlantic sea patrols
- the top Confederate general who fought for his home state of Virginia
- Bloodiest single day battle of the Civil War--Lincoln issued the Emancipation Proclamation following this battle.
- Confederate capital in Virginia captured by Grant at the end of the war
- woman who acted as a valuable nurse during the war and later founded the American Red Cross (Clara ______
- nickname for Confederate soldiers
- Small town in Virginia where Lee surrendered his troops; signaled the end of the war ( ________ Court House)
- number one cause of death during the Civil War
- common surgical proceedure during the Civil War; the removal of limbs to prevent infection
- the worst Confederate prisoner of war camp in the South
- The bombardment of this place in South Carolina signaled the start of the Civil War (Fort _______ )
- Western city whose capture gave the North control of the Mississippi River—Grant led the siege
- When the military has unlimited authority to make and enforce laws, overriding normal laws such as the Bill of Rights
- preventing goods from going in and out of a city
28 Clues: president of the Union • nickname for Union soldiers • president of the Confederacy • nickname for Confederate soldiers • attacking non-military (civilian) targets • number one cause of death during the Civil War • preventing goods from going in and out of a city • assassin of Abraham Lincoln (John Wilkes ______ ) • term for slave states that remained with the Union • ...
Brawl Stars 2024-12-22
Across
- - A martial artist.
- - A pirate who launches cannonballs.
- - A swampy brawler who mind-controls enemies.
- - An electric-powered brawler who upgrades during the match.
- - The sneaky assassin.
- - A cactus brawler.
- - A healer with a tuning fork attack.
- - A brawler who flies.
- - A brawler who heals while attacking.
- - A brawler who deals damage based on enemy health.
- - A janitor.
- - A batter with knock back.
- - The fierce wrestler with flaming punches.
- - A stuntman.
- - A trickster who jumps around.
- - A plant robot.
- - This brawler lobs bottles.
- - A brawler who deals massive damage with her supercharged sting.
- - A money-loving brawler.
- - A fiery brawler.
- - A brawler with a stunning hammer attack.
- - A dramatic star who creates a shadowy clone.
- - Road worker.
- - A shrimp.
- - The first brawler.
- - A guard.
Down
- - A mysterious brawler with a portal super.
- - A sharpshooter that marks targets.
- - Bouncy.
- - A cannon-wielding brawler.
- - A lifeguard brawler.
- - A robot engineer who builds turrets.
- - A cowboy with dual pistols.
- - The genius robot who uses drones to deal damage.
- - A candy-throwing brawler.
- - A tribal archer.
- - A painter.
- - A brawler who uses hatchlings to deal damage.
- - A sharpshooter with an umbrella.
- - Sandstorm super.
- - An old man who pushes enemies.
- - A joker-themed brawler.
- - The icy brawler.
- - A toxic assassin.
- - A brawler who uses a magical lamp to pull enemies.
- - A healer who creates a healing station for allies.
- - A brawler with a shield that protects allies.
- - A spooky ghost-like brawler who heals allies with attacks.
- - A vampire-like brawler with a dash attack.
- - The explosive demolitionist who lobs bombs.
- - A galactic dog.
- - A rolling barrel robot.
- - A brawler who creates shields for teammates.
- - A speedster.
- - This brawler’s super lets them dash forward and stun enemies.
- - A mystic brawler who creates a black hole with her super.
- - A miner.
- - A brawler who pilots a powerful mecha suit.
- - A scrappy brawler with explosive punches.
59 Clues: - Bouncy. • - A miner. • - A guard. • - A shrimp. • - A painter. • - A janitor. • - A stuntman. • - A speedster. • - Road worker. • - A plant robot. • - A galactic dog. • - A tribal archer. • - Sandstorm super. • - The icy brawler. • - A fiery brawler. • - A martial artist. • - A cactus brawler. • - A toxic assassin. • - The first brawler. • - A lifeguard brawler. • - The sneaky assassin. • ...
Fall Sports 2022-09-28
Across
- an act where when a player with the ball passes the goal line and into the end zone
- Passing a spiked or rapidly hit ball. Slang for the art of passing an attacked ball close to the floor
- the illegal restraining of a player who is not in possession of the football in order to gain an advantage
- Used to put the ball into play
- an act of stopping the offense of player with the ball by grabbing them and bringing them to the ground
- An attack that results in an immediate point or side out
- an act which a player loses control of the football
- The clockwise movement of player around the court and through the serving position following a side out
- hitting the ball with your head
- when the goalie blocks a shot
- The offensive action of hitting the ball. The attempt by one team to terminate the play by hitting the ball to the floor on the opponents side
- any attempt to kick the ball into the goal
Down
- a position in soccer with the job of guarding the goal
- Also hit or attack. A ball contacted with force by a player on the offensive team who intends to terminate the ball on the opponent's floor or off the opponent's blocker
- a violation whenever a non goalie touches the ball with their hand or arm
- when the ball is kicked into the net and it counts as a point
- the player who has the 2nd of 3 contacts of the ball who 'sets' the ball with an overhand pass for a teammate to hit
- to tackle the quarter back behind the line of scrimmage
- an act of a defensive player catching a forward pass
- a gathering of the offensive team in a close circle behind the line of scrimmage
- a serve that is not passable and results immediately in a point
- the pass that goes to the player that scores the goal
22 Clues: when the goalie blocks a shot • Used to put the ball into play • hitting the ball with your head • any attempt to kick the ball into the goal • an act which a player loses control of the football • an act of a defensive player catching a forward pass • the pass that goes to the player that scores the goal • a position in soccer with the job of guarding the goal • ...
Hope Crossword Puzzle period 1 2021-11-09
Across
- Respecting the privacy of both parties and keeping details secret
- The threatened or actual use of physical force or power to harm another person and to damage property
- The use of communication and, in many cases, compromise To settle a disagreement
- The use of words to mistreat or injure another person
Down
- A pattern of intentionally causing bodily harm or injury to another person
- A pattern of attacking another person's emotional development and sense of worth
- Bringing in a neutral third party to help others resolve their conflicts peacefully
- Become more serious
- Any disagreement, struggle, or fight
- An unlawful physical attack or threat of attack
10 Clues: Become more serious • Any disagreement, struggle, or fight • An unlawful physical attack or threat of attack • The use of words to mistreat or injure another person • Respecting the privacy of both parties and keeping details secret • A pattern of intentionally causing bodily harm or injury to another person • ...
pest management. 2022-05-09
Across
- mites will attack spider mites at any stage of development inside a greenhouse or outside
- both adult and larva, feed on soft bodied insects (aphids), mites, and eggs
- attack caterpillar, butterfly or moth eggs or pupa, beetle egg,s and other insects in the egg, larva, or pupa stage
- is the most effective and environmentally friendly method approach to controlling pests
- kills insects.
- lacewing larvae are predators that feed mainly on soft bodied insects, mites, and eggs
Down
- will eat just about any pest
- kills unwanted plants.
- controls fungi.
- Has a skull and crossbones symbol and the word POISON in red on the label.
10 Clues: kills insects. • controls fungi. • kills unwanted plants. • will eat just about any pest • Has a skull and crossbones symbol and the word POISON in red on the label. • both adult and larva, feed on soft bodied insects (aphids), mites, and eggs • lacewing larvae are predators that feed mainly on soft bodied insects, mites, and eggs • ...
The Pearl-Vocabulary-Signe Halvorson 2023-11-28
Across
- a soft usu. heated and sometimes medicated mass spread on a cloth and applied to sores or other lesions to
- crying out loud in grief
- to deceive, win over, or induce to do something by artful coaxing or shrewd trickery
- feeling abnormally tired or sleepy
- to walk steadily and laboriously
- a solid wall-like structure raised for defense
Down
- marked by outstanding strength and vigor of body, mind, and spirit
- insolent or rude in speech or behavior
- something frightened; a mock blow or attack on or towards one part to distract attention from the intended point of attack
- a secret agreement of cooperation for an illegal or deceitful purpose
10 Clues: crying out loud in grief • to walk steadily and laboriously • feeling abnormally tired or sleepy • insolent or rude in speech or behavior • a solid wall-like structure raised for defense • marked by outstanding strength and vigor of body, mind, and spirit • a secret agreement of cooperation for an illegal or deceitful purpose • ...
The Pearl - Vocabulary - Abbey Dotson 2023-11-28
Across
- the quality or state of being lazy, sluggish, or indifferent
- a soft (usually heated) and sometimes medicated mass spread on a cloth and applied to sores or other lesions
- a loyal hardworking supporter
- insolent or rude in speech or behaivor
- to decieve, win over, or induce to do something by coaxing and wheedling or shrewd trickery
Down
- secret agreement or cooperation especially for an illegal or deceitful purpose
- to mourn aloud
- a solid wall-like structure raised for defense
- a mock blow or attack on or toward one part in order to distract attention from the point one really intends to attack
- a long tiring walk
10 Clues: to mourn aloud • a long tiring walk • a loyal hardworking supporter • insolent or rude in speech or behaivor • a solid wall-like structure raised for defense • the quality or state of being lazy, sluggish, or indifferent • secret agreement or cooperation especially for an illegal or deceitful purpose • ...
David’s Trail 2025-05-12
Across
- The region where Carpenter committed several of his murders.
- The nickname given to Carpenter due to his choice of murder locations.
- The legal outcome for Carpenter after his trial.
- The California prison where Carpenter is currently incarcerated.
- This physical feature of Carpenter was notably absent during his attack on Lois DeAndrade.
- The type of evidence that later linked Carpenter to the 1979 murder of Mary Bennett.
Down
- A weapon Carpenter used in his attacks, notably on Lois DeAndrade.
- A prominent mountain near where many of Carpenter's crimes occurred.
- The first name of Lois DeAndrade, who survived an attack by Carpenter.
- The individuals who fell victim to Carpenter's crimes.
10 Clues: The legal outcome for Carpenter after his trial. • The individuals who fell victim to Carpenter's crimes. • The region where Carpenter committed several of his murders. • The California prison where Carpenter is currently incarcerated. • A weapon Carpenter used in his attacks, notably on Lois DeAndrade. • ...
russ 2013-07-21
10 Clues: very old • your job • beginning • very special • easy to attack • to keep stored • a fib , not true • opposite of yesterday • someone who teaches you • machine that plays music
Vocab Words 2021-08-25
10 Clues: breaking • get spooked • action sounds • surprise attack • old fancy church • secretly watching • empty living space • killing of prisoner • life as it really is • a member of my activity
Latin Crossword Puzzle 2024-02-09
10 Clues: Nymph • Invader • Used to see • Main Character • Water creature • one eye creature • Used in water to move • Polyphemus' favorite food • Come to attack Polyphemus • Odysseys and his companions
lachy birdys best crossword 2022-12-12
10 Clues: to attack • disbelieve • to be rich • to be lofty • continuence • easy or polite • to be at school • filth or digust • to give up or leave • getting hair twisted
lachy birdys best crossword 2022-12-12
10 Clues: to attack • disbelieve • to be rich • to be lofty • continuence • easy or polite • to be at school • filth or digust • to give up or leave • getting hair twisted
lachy birdys best crossword 2022-12-12
10 Clues: to attack • disbelieve • to be rich • to be lofty • continuence • easy or polite • to be at school • filth or digust • to give up or leave • getting hair twisted
vocabulary unit 2 2021-11-03
12 Clues: a plan • to argue • to change • to give up • an evil person • a violent attack • many or very many • to show to be fair • to give a wrong idea • show clever judgement • having a strong effect • capable of making large amounts
Vocabulary p.130 - 132 2018-04-26
12 Clues: >> area • >< plus • >> lovely • >> to make • >> to relax • >< to attack • >> somewhere • > a book of maps • > to give work to somebody • > someone who hunts wild animals • > the line between two countries or areas • > to put flowers, vegetables, etc in the ground to grow
crosswords 2023-02-07
12 Clues: humor • smears • to charm • laid back • moving slow • humming sound • put an end to • time in events • signals the approach of another.mettle • impair the appearance devoid entirely lacking • forceful and bitter verbal attack against someone • obsequiously toward someone important sequitur
crosswords 2023-02-07
12 Clues: humor • smears • to charm • laid back • moving slow • humming sound • put an end to • time in events • signals the approach of another.mettle • impair the appearance devoid entirely lacking • forceful and bitter verbal attack against someone • obsequiously toward someone important sequitur
Unit 4 vocabulary 2023-09-29
12 Clues: to make use • firmly bilt • very exited • to be afraid • to give money • to stretch out • surprise attack • to give in a way • beginning or first • to have upsetting feel • to figure out by reason • the regular or fixed way
Test 2014-07-06
Across
- Session___ is an attack for stealing user’s session (9)
- Path___ vulnerability allows you to access files and directories directly (9)
- __is used for authenticating a user (8)
- Where is the session ID commonly stored? (6)
- ___ is one of the techniques that can be used for data masking in HSBC (5)
Down
- SQL___ is an attack technique used to exploit backend database using manipulated queries? (9)
- This protocol is widely used to encrypt data in transit (3)
- Where would an attacker look to erase his footprints? (4)
- __is used in websites to prevent malicious users from using bots (7)
- This is the single most critical piece in an encryption infrastructure (3)
10 Clues: __is used for authenticating a user (8) • Where is the session ID commonly stored? (6) • Session___ is an attack for stealing user’s session (9) • Where would an attacker look to erase his footprints? (4) • This protocol is widely used to encrypt data in transit (3) • __is used in websites to prevent malicious users from using bots (7) • ...
pest management. 2022-05-09
Across
- mites will attack spider mites at any stage of development inside a greenhouse or outside
- kills insects.
- both adult and larva, feed on soft bodied insects (aphids), mites, and eggs
- controls fungi.
- kills unwanted plants.
Down
- lacewing larvae are predators that feed mainly on soft bodied insects, mites, and eggs
- will eat just about any pest
- attack caterpillar, butterfly or moth eggs or pupa, beetle egg,s and other insects in the egg, larva, or pupa stage
- is the most effective and environmentally friendly method approach to controlling pests
- Has a skull and crossbones symbol and the word POISON in red on the label.
10 Clues: kills insects. • controls fungi. • kills unwanted plants. • will eat just about any pest • Has a skull and crossbones symbol and the word POISON in red on the label. • both adult and larva, feed on soft bodied insects (aphids), mites, and eggs • lacewing larvae are predators that feed mainly on soft bodied insects, mites, and eggs • ...
The Pearl Vocabulary Ty Schepens 2023-11-27
Across
- to walk or march steadily
- secret agreement or cooperation esp. for an illegal or deceitful purpose
- a soft usu. heated and sometimes medicated mass spread on cloth and applied to sores or other lesions
- to express sorrow or mourning for oftedemonstrativelyly
Down
- marked by outstanding strength and vigor of body, mind, or spirit
- a mock or blow or attack on or toward one part in order to distract attention from the point one really intends to attack
- fortify or safeguard with a bulwark
- insolent or rude in speech and behavior
- to deceive, win over, or induce to do something by artful coaxing and wheedling or shrewd trickery
- abnormal drowsiness
10 Clues: abnormal drowsiness • to walk or march steadily • fortify or safeguard with a bulwark • insolent or rude in speech and behavior • to express sorrow or mourning for oftedemonstrativelyly • marked by outstanding strength and vigor of body, mind, or spirit • secret agreement or cooperation esp. for an illegal or deceitful purpose • ...
League of legends 2024-12-12
Across
- The player controlling a champion in the game.
- A defensive structure that protects lanes and the Nexus.
- A surprise attack on an enemy champion, usually from the jungle.
- The character a player controls in a match.
Down
- A powerful neutral monster that grants a team-wide buff when slain.
- The area between lanes, where neutral monsters spawn and junglers roam.
- The main structure each team must defend or destroy to win.
- Refers to the “Summoner’s Rift,” the main map in the game.
- A neutral monster that gives buffs to the team that kills it.
- Attack Damage Carry, a champion role focused on dealing ranged damage.
10 Clues: The character a player controls in a match. • The player controlling a champion in the game. • A defensive structure that protects lanes and the Nexus. • Refers to the “Summoner’s Rift,” the main map in the game. • The main structure each team must defend or destroy to win. • A neutral monster that gives buffs to the team that kills it. • ...
Health problems 2 - 9.º ano - Finder 132 2024-06-26
Battle of Trenton and Princeton 2021-05-11
Across
- Colonists used these types of boats to get across the icy river
- The second crossing of the Delaware included taking the 1000 captured _________
- Washington leads three major victories in ____ days: Trenton, Assunpink, and Princeton
- After the Battle of Princeton, Gen. Howe asked for more British__________ after being beaten by the colonists.
- This win was a tremendous boost to the Americans'________ after being pushed back from NY
- The Battle of Trenton took place on____ of 1776
- There were actually______ crossings of the Delaware!
- Both battles took place in which colony (now a state)?
Down
- The 5th U.S. President____ was present at the attack on Trenton
- The British, during the Battle of Princeton, tried using_______ as a fort.
- The British had ____ soldiers from Germany fighting with them; 30,000 in all!
- Washington and his troops had to cross the icy___ River to launch a surprise attack
- General Washington referred to going after the British as a ____ at Princeton
13 Clues: The Battle of Trenton took place on____ of 1776 • There were actually______ crossings of the Delaware! • Both battles took place in which colony (now a state)? • The 5th U.S. President____ was present at the attack on Trenton • Colonists used these types of boats to get across the icy river • ...
Martials Arts 2021-04-09
Across
- Is a contry where a lot of martials arts are practicing.
- it's a armed that we use in Judo for attack the adverse. it's with two sticks
- It's a skil in martial art that we need for fighting
- is a type of Martial art with color belt
- it's a thing that arrived often when you do not defend well your self
Down
- is a martial art that we do with gloves
- it's the place where the opponents fight
- it's a martial art that come from Bresil
- it's the name of a very popular movie and a song and a type of martial art
- it's a skill very important to do jumps
- A lot of womans practice that martial art by precotions.
- it'a a price that we can wins when we win a match of martial art
- it's a type of attack
13 Clues: it's a type of attack • is a martial art that we do with gloves • it's a skill very important to do jumps • it's the place where the opponents fight • it's a martial art that come from Bresil • is a type of Martial art with color belt • It's a skil in martial art that we need for fighting • Is a contry where a lot of martials arts are practicing. • ...
Causes of Vietnam War 2023-05-11
Across
- Which President sent a half a million US combat troops to Vietnam?
- Who was the leader of the communist Vietnamese resistance movement?
- What capitalist led South Vietnam?
- Who withheld information about US support of South Vietnamese raids on North Vietnam leading up to the attack?
- Theory What was the belief that if one country fell to communism others would follow?
- On 2nd August 1964, what did North Vietnamese boats attack?
- The conflict in Vietnam that developed following the French defeat can best be described as this type of War.
Down
- Who did the people of South Vietnam rebel against?
- Who was increasingly attacked by communist in 1958?
- Who did Ngo Dinh Diem refuse to give land to?
- Why did people support Ho Chi Minh instead of Ngo Dinh Diem?
- What was the first Asian Nation to fall to Communism?
- What happened to Vietnam in 1945?
- Describe the type of military force President Kennedy sent to Vietnam.
14 Clues: What happened to Vietnam in 1945? • What capitalist led South Vietnam? • Who did Ngo Dinh Diem refuse to give land to? • Who did the people of South Vietnam rebel against? • Who was increasingly attacked by communist in 1958? • What was the first Asian Nation to fall to Communism? • On 2nd August 1964, what did North Vietnamese boats attack? • ...
Take a Ghost Tour 2025-07-18
Across
- Becomes apparent; shows itself. In this case, when the spirit appears.
- Lasting or existing forever; without end.
- Run away secretly with a lover, especially with the intention of getting married.
- Producing and discharging (something, especially light or sound).
- Kept or restricted within certain limits; imprisoned.
- Strengthened or protected, especially against attack. In this context, it means the castle was made stronger to defend against the Scottish army.
- After something else has happened; afterward.
Down
- Greatly surprised or impressed; amazed.
- A place that has been fortified so as to protect it against attack; a fortress.
- Felt contempt or a deep aversion for; disliked intensely.
- Flowing out; originating from. Here, the cries coming from within the walls.
- A loop with a running knot, tightening as the rope or wire is pulled and used to trap animals or hang people.
- (Of organic matter) make or become rotten; decay.
13 Clues: Greatly surprised or impressed; amazed. • Lasting or existing forever; without end. • After something else has happened; afterward. • (Of organic matter) make or become rotten; decay. • Kept or restricted within certain limits; imprisoned. • Felt contempt or a deep aversion for; disliked intensely. • Producing and discharging (something, especially light or sound). • ...
Tyler's crossword 2016-02-15
12 Clues: educated • antonym empty • to be snobbish • a parents girl • past tense catch • a vigorous attack • adverb of haughty • to reeducate someone • to do something wrong • to do something by itself • to butcher cattle for food • to write a book about yourself
Vocabulary p.130 - 132 2018-04-26
12 Clues: >> area • >< plus • >> lovely • >> to make • >> to relax • >> somewhere • >< to attack • > a book of maps • > to give work to somebody • > someone who hunts wild animals • > the line between two countries or areas • > to put flowers, vegetables, etc in the ground to grow
Unit 4 vocabulary 2023-09-29
12 Clues: to make use • firmly bilt • very exited • to be afraid • to give money • to stretch out • surprise attack • to give in a way • beginning or first • to have upsetting feel • to figure out by reason • the regular or fixed way
Unit 6 Crossword 2023-02-27
Across
- Plains = nomadic hunters
- Age power = King Of France, England Holy Roman Emperor
- = place of refuge
- rich = trading, tribute, war
- Warfare = destructive
- astronomers = Days In The Year
- attack Incas = refused to become Christians
Down
- = Farming
- native people = clan
- = specialized workers
- Americans = Hunter Gatherers
- = Pueblo and Hopi
- = the coast
13 Clues: = Farming • = the coast • = place of refuge • = Pueblo and Hopi • native people = clan • = specialized workers • Warfare = destructive • Plains = nomadic hunters • Americans = Hunter Gatherers • rich = trading, tribute, war • astronomers = Days In The Year • attack Incas = refused to become Christians • Age power = King Of France, England Holy Roman Emperor
joe 2025-02-14
12 Clues: young person • unsound argument • mixture of sounds • appearing or found • speaking or writing • perceptibly by touch • energy or enthusiasm • a pattern of something • emotional attack or harm • sentimental place or thing • feeling of fear or agitation • showing great attention to detail
CRIME 2024-10-28
12 Clues: Assault • A weapon. • Who steals • Catch and hold • Take unlawfully • Who kills or killed • Male police officer • Flee, run away from • Who presides at trial • Reveal through investigation • Responsible for a crime, etc. • Not guilty of a crime or offence
AP Lang Vocab 2024-04-17
12 Clues: heavenly • rude or cruel • rude in speech • a general truth • showing insight • annoyingly smart • a negative, indirect remark • mixed feelings about someone • language expressing criticism • marked by coarseness/lewdness • contradictory yet true statement • expressing a critical attack on an opinion
5th Grade Vocab #1 2022-02-07
12 Clues: ending • lessen • to persuade • coming before • to get rid of • to like better • to establish the truth • find fault, judgemental • to guard against attack • an item or individual part • the reason something happens • to advise or urge to do something
Fighting Disease with Disease 2025-11-18
12 Clues: disease • sickness • 100 years • difficulty • period of time • a treat,medicine • attack of bacteria • when most people ill • a way of doing something • idea which is not proved • protector of our organism • came from latin word vacca which means cow
Asthma and Heart Disease 2013-01-31
Across
- asthma is more comman here (5,7)
- nicotine increases your heart rate and blood pressure (7)
- microscopic creatures that feeds of dead skin (4,5)
- this increases the person's and puts extra pressure on their heart (6)
- this swells up and gets narrower during an asthma attack (5,7)
Down
- this rases blood pressure and cholesterol (4,2,8)
- you should not smoke when being (8)
- what on a pet is most likly to cause an asthma attack (4)
8 Clues: asthma is more comman here (5,7) • you should not smoke when being (8) • this rases blood pressure and cholesterol (4,2,8) • microscopic creatures that feeds of dead skin (4,5) • nicotine increases your heart rate and blood pressure (7) • what on a pet is most likly to cause an asthma attack (4) • this swells up and gets narrower during an asthma attack (5,7) • ...
civil war 2021-10-18
Attack On Titan - Key Terms/Good Words 2025-06-14
Across
- To utter a low-pitched, harsh cry, as the sound of a frog or a raven.
- To avoid/go around something.
- Someone who takes advantage of people's generosity without giving anything in return.
- Someone who suffers for their beliefs.
- Exchanging information and opinions about something in order to reach a better understanding.
- The foremost part of an advancing army.
- A military branch focused on maintaining order, force laws and serving the king.
- Having good manners.
- A natural skill or ability.
Down
- Allows user to attach to surfaces, propel themselves forward with gas powered motors and hooks.
- A military branch focused on protecting and maintaining order within the walls.
- A military branch focused on exploring the world beyond the walls.
- A tendency to do nothing or to remain unchanged.
- A giant humanoid
- To behave in a strange way and have opinions different from most peoples.
15 Clues: A giant humanoid • Having good manners. • A natural skill or ability. • To avoid/go around something. • Someone who suffers for their beliefs. • The foremost part of an advancing army. • A tendency to do nothing or to remain unchanged. • A military branch focused on exploring the world beyond the walls. • ...
WWII 2022-12-16
Across
- Clerk who gave top secret Russian information to the Canadian Government
- Garden, Gardens that were grown by Canadian citizens so that they wouldn't have to buy produce
- Gay, Name of plane that dropped the atomic bomb on japan
- When a country forces citizens to serve in the military
- X, Elite and Secret spy training camp in Whitby, Ontario
- Kong, Battle in which Canadian soldiers were defeated
- Type of government between Russia
- of the Atlantic, Ongoing battle in the Atlantic ocean that took 6 years
- Vote held by Mackenzie King to release him of his promise of no Conscription
- war, Period of time at the beginning of the war when there was no fighting
- The Canadian government did this to make sure nobody had too much food
- Battle in which Allies lost, but civilian boats came and saved thousands
- Largest concentration/death camp in Poland
- Beach, The name for the beach that Canadians landed on in the invasion of Normandy
- A ruler with complete power over a country
- Battle named Operation Jubilee
Down
- A method of promoting people to enlist or obstruct the enemy
- Harbour, An attack on a military base that provoked a country to join WWII
- Town where Canadian soldiers mastered a strategy called mouse-holing
- The Country that was invaded by Germany to spark WWII
- First Country to be invaded by Germany just before WWII
- Nickname for Canadians who were conscripted
- Bomb, Weapon of mass destruction used to officially end WWII
- Attack by the allies on 5 beaches in Northern France
- King, Leader who used a plebiscite to bring back conscription
- Camps, Where japanese people were sent after the attack on Pearl Harbour
- President who succeeded Roosevelt
- Overlord, Operation to end the war in Europe
- A minister that Mackenzie King put in charge of analyzing how materials are being produced
- Name of the German Air Force during WWII
- System, A group of ships that sail together for protection
- Program in Canada where men trained to become pilots, navigators, and gunners
- Powers, Name of Alliance between Germany, Italy and Japan
33 Clues: Battle named Operation Jubilee • Type of government between Russia • President who succeeded Roosevelt • Name of the German Air Force during WWII • Largest concentration/death camp in Poland • A ruler with complete power over a country • Nickname for Canadians who were conscripted • Overlord, Operation to end the war in Europe • ...
Security Crossword 2020-05-11
Across
- A system that binds public keys with identities
- CVP of ID PM at MS
- An avid skateboarder started this widely admired security company
- The TF in 17 Across was the architect for this technology
- Where you might specify a number used once
- First name, middle name, and surname, but for computers
- Sneaky character commonly found in discussions about Alice and Bob
- Used in silver ticket attacks: T??
- A security MVP with a popular AAD blog whom the author introduced to 17 across
- AAD researcher you might meet in Finland
- CVP of ID was once a Director of Development for this remote access protocol
- Controversial variable name discovered in Windows in 1999
- Mallory specializes in this kind of attack
- Before you login into Office365, you first interact with this popular service
- You might pass the hash to attack this
- XML oriented standard full of assertions
- I?? Acronym for IT dept most likely to manage AD
Down
- Preauthentication process involving X.509
- Your UPN could be considered to be a form of this
- Known for its utility with SSO
- A container of sorts in AD parlance
- Dir. PM of ID Sec. at MS
- Alan Turing built a bombe to crack this
- To issue X.509 certificates, you'd stand up one of these
- To understand the internals of an unknown protocol, one might do this to it
- The prefix in the flags ??_KEYEXCHANGE and ??_SIGNATURE used in MS CryptoAPI
- Architect behind Microsoft's two most widely used identity systems
- Keeper of secrets in Windows
- SYSKEY was introduced to help encrypt this
- The NTLM hash is sometimes referred to as this
- Container of claims in SAML
- Fill in the missing letters of this cipher known in the 90s for augmented security: 3??S
- One way or Two way
- Alliance determined to replace passwords with stronger alternatives
- One might use this to mitigate a rainbow table attack
- Tina Turner ex-husband that shares a name with IPSEC protocol
- Popular utility for 'handling' Windows credentials
- A salve for password fatigue
38 Clues: CVP of ID PM at MS • One way or Two way • Dir. PM of ID Sec. at MS • Container of claims in SAML • Keeper of secrets in Windows • A salve for password fatigue • Known for its utility with SSO • Used in silver ticket attacks: T?? • A container of sorts in AD parlance • You might pass the hash to attack this • Alan Turing built a bombe to crack this • ...
Term 1 Round-Up! 2023-05-03
Across
- ______ relationships refers to relations that are built between two different countries
- In addition, there was also the _____ of the Singapore Airlines Flight SQ117 by Pakistani terrorists but the situation was eventually brought under control by the Singapore Armed Forces (SAF).
- In order to ensure the safety and security of citizens, governments around the world have stepped up ________ measures
- Conflicts disrupt the _____ in society
- Through the internet, some individuals may be influenced by the extreme beliefs of terrorist groups. These individuals are said to be self- ________
- _________ prepares the community to be vigilant, united and resilient in preparing and dealing with a terror attack
- One way to resolve conflicts is through ______ which refers to the parties involved to discuss the issue in order to find a solution that is acceptable to all
- Brunei, Cambodia, Indonesia, Laos, Malaysia, Myanmar, the Philippines, Singapore, Thailand, and Vietnam are all part of the regional organisation called _______
- Total ______ involves every Singaporean playing a part to maintain peace in Sinapore and there are 6 pillars in it.
- Inidviduals who carry out terror attacks on their own are know as _________ terrorists
- Disagreement between two or more parties
Down
- One of the most famous racial riots that started out as a custody battle was the ____________riots
- ______ defence refers to saving, investing wisely and spending within one’s means
- ______ is the intentional use of force or violence by invidividuals or groups to cause fear and intimidate others.
- ________ refers to the measures by a country to discourage potential aggresors by making it costly for aggressors to attack it
- There was the bombing of the _______ house in 1965 where there where two Indonesian marines decided to carry out an attack in Singapore
- One of the main reasons as to why conflicts may arise is due to ______ resources
- Another way through which conflicts can be mediated is through the prescence of a third party such as the __________ Court of Justice
- ______ refers to the building of good relationships between countries
- ________ relationships refers to relations that are built among more than two countries
20 Clues: Conflicts disrupt the _____ in society • Disagreement between two or more parties • ______ refers to the building of good relationships between countries • One of the main reasons as to why conflicts may arise is due to ______ resources • ______ defence refers to saving, investing wisely and spending within one’s means • ...
Term 1 Round-Up! 2023-05-03
Across
- In order to ensure the safety and security of citizens, governments around the world have stepped up ________ measures
- There was the bombing of the _______ house in 1965 where there where two Indonesian marines decided to carry out an attack in Singapore
- Inidviduals who carry out terror attacks on their own are know as _________ terrorists
- ________ refers to the measures by a country to discourage potential aggresors by making it costly for aggressors to attack it
- ________ relationships refers to relations that are built among more than two countries
- One of the main reasons as to why conflicts may arise is due to ______ resources
- Another way through which conflicts can be mediated is through the prescence of a third party such as the __________ Court of Justice
- Brunei, Cambodia, Indonesia, Laos, Malaysia, Myanmar, the Philippines, Singapore, Thailand, and Vietnam are all part of the regional organisation called _______
- ______ defence refers to saving, investing wisely and spending within one’s means
- ______ relationships refers to relations that are built between two different countries
Down
- _________ prepares the community to be vigilant, united and resilient in preparing and dealing with a terror attack
- One of the most famous racial riots that started out as a custody battle was the ____________riots
- In addition, there was also the _____ of the Singapore Airlines Flight SQ117 by Pakistani terrorists but the situation was eventually brought under control by the Singapore Armed Forces (SAF).
- One way to resolve conflicts is through ______ which refers to the parties involved to discuss the issue in order to find a solution that is acceptable to all
- Total ______ involves every Singaporean playing a part to maintain peace in Sinapore and there are 6 pillars in it.
- Through the internet, some individuals may be influenced by the extreme beliefs of terrorist groups. These individuals are said to be self- ________
- Disagreement between two or more parties
- ______ refers to the building of good relationships between countries
- Conflicts disrupt the _____ in society
- ______ is the intentional use of force or violence by invidividuals or groups to cause fear and intimidate others.
20 Clues: Conflicts disrupt the _____ in society • Disagreement between two or more parties • ______ refers to the building of good relationships between countries • One of the main reasons as to why conflicts may arise is due to ______ resources • ______ defence refers to saving, investing wisely and spending within one’s means • ...
Anne Frank Vocabulary Crossword 2015-01-29
Across
- a violent attack; an especially fierce attack or something resembling such an attack
- the act or power of perceiving or comprehending; seizure by legal process; suspicion of fear especially of future evil
- arousing displeasure, impatience, or anger
- to make ill-humored or discontented
- great happiness or joy
- to cause someone to feel fear, shock, or disgust
- displaying wealth, knowledge, etc., in a way that is meant to attract attention, admiration, or envy
- very bad or unpleasant; too unpleasant to deal with or accept
- to spend time experiencing or enjoying something without making any effort to change your situation, feelings, etc.; to roll about in deep mud or water
- feeling or showing concern for someone who is sick, hurt, poor, etc;
- a natural ability or power that makes it possible to know something without any proof or evidence; a feeling that guides a person to act a certain way without fully understanding why; something that is known or understood without proof or evidence
Down
- quiet and secret in order to avoid being noticed; slow, deliberate, and secret in action or character; intended to escape observation
- a feeling that something bad is going to happen
- extreme anger; a strong feeling of unhappiness because of something bad, hurtful, or morally wrong; something that hurts people or is morally wrong
- not able to express ideas clearly and effectively in speech or writing; not able to speak; not expressed clearly or easily understood
- a wild uproar
- not producing or able to produce the effect you want
- cruel and unfair treatment by people with power over others; a government in which all power belongs to one person; the rule or authority of a tyrant
- to hate someone or something very much
- sad and lonely; empty and in poor condition; not having much chance of success; nearly hopeless
- unjust or cruel exercise of authority or power; a sense of being weighed down in body or mind
- something (such as food) that keeps someone or something alive; something that gives support, help, or strength
- lack of interest in or concern about something
- evil or immoral; very bad or unpleasant
24 Clues: a wild uproar • great happiness or joy • to make ill-humored or discontented • to hate someone or something very much • evil or immoral; very bad or unpleasant • arousing displeasure, impatience, or anger • lack of interest in or concern about something • a feeling that something bad is going to happen • to cause someone to feel fear, shock, or disgust • ...
Cyber Awareness Passwords and MFAs 2025-08-14
Across
- The process of verifying a user's identity.
- These messages are sent to specific people within an organization, often high-privilege account holders, to trick them into divulging sensitive data.
- This attack involves sending fraudulent emails or creating malicious websites to convince individuals to expose their private credentials.
- This type of attack uses a predefined list of common words and phrases to guess passwords.
- A flaw or weakness in a computer system that could be exploited to violate the system's security.
- Changing this immediately is recommended on accounts you suspect may have been compromised.
- Avoid using easily __________ information like names or birthdays in your passwords.
- This type of attack tries out countless password combinations until the correct one is found.
Down
- A strong password should be at least ______ characters long, according to NIST recommendations.
- A method of authentication using unique patterns on an individual's fingertip.
- An unauthorized user who attempts to gain access to an information system.
- A common bad habit where users employ the same credentials across different websites and services.
- The process of converting data into a format unreadable to anyone except those possessing a "key".
- Multi-factor authentication (MFA) requires you to use more than a password to log in. You might use a password plus something you have, like a phone or token, or something you ____, such as a fingerprint.
- A tool that securely stores and helps generate complex, unique passwords for all your online accounts.
- This type of authentication adds an extra layer of security beyond just a password.
- Should be at least 16 characters long and combine random words to be strong.
- A specific form of phishing that targets high-profile business executives.
- A sequence of words or text used to control access to a computer; similar to a password.
- and Clues (Word TAB Clue)
- Passkeys often rely on this type of factor, like a fingerprint or facial scan.
- Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
22 Clues: and Clues (Word TAB Clue) • The process of verifying a user's identity. • An unauthorized user who attempts to gain access to an information system. • A specific form of phishing that targets high-profile business executives. • Should be at least 16 characters long and combine random words to be strong. • ...
Gettysburg Battle 2022-05-18
Restart Ch 19-21 2024-09-23
Across
- What Dr. Nguyen tells Chase he can do...
- Joel suspects he had something to do with the attack.
- How Bear and Aaron felt after the band attack.
Down
- Smoke What excuse did Bear and Aaron give for running into the music room?
- Extinguisher What was Joel hit with?
- Name of Mr. Solway's movie.
- The name Brandon wants to call his new video (Ch 20).
- How Chase feels when his dad says the "old Chase" is back.
8 Clues: Name of Mr. Solway's movie. • Extinguisher What was Joel hit with? • What Dr. Nguyen tells Chase he can do... • How Bear and Aaron felt after the band attack. • Joel suspects he had something to do with the attack. • The name Brandon wants to call his new video (Ch 20). • How Chase feels when his dad says the "old Chase" is back. • ...
Silas 2024-10-10
Across
- An attack that alters the appearance of a website.
- Malicious software disguised as legitimate to gain access to systems.
- A program that records keystrokes to capture sensitive data.
Down
- A technique using deceptive emails to steal personal information.
- Malicious software that encrypts data and demands payment for decryption.
- Method of guessing passwords by trying many combinations.
- Intercepting and analyzing network traffic to gather information.
- An attack that overwhelms a system with excessive traffic.
8 Clues: An attack that alters the appearance of a website. • Method of guessing passwords by trying many combinations. • An attack that overwhelms a system with excessive traffic. • A program that records keystrokes to capture sensitive data. • A technique using deceptive emails to steal personal information. • ...
NATURE ATTACKS 2023-04-17
10 Clues: State • Everywhere • A Character • Eats People • What Sharks Do • Surrounds Earth • You Prolly Have One • Characters Last Name • Characters Last Name • Happens To old people
Language Arts 8th Grade Vocab Puzzle 2025-09-07
9 Clues: Happiness • Trade offer • Drawn towards • Comfort someone • Recurring trait • Irritate someone • Making and attack • Disapproval of someone • Coming in possession of something
Vocabulary p.130 - 132 2018-04-26
12 Clues: >< plus • >> area • >> lovely • >> to make • >> to relax • >> somewhere • >< to attack • > a book of maps • > to give work to somebody • > someone who hunts wild animals • > the line between two countries or areas • > to put flowers, vegetables, etc in the ground to grow
WW2 Crossword 2021-05-09
Across
- First battle where aircraft carriers engaged each other and the opposing ships did not fire directly on one another was known as the Battle of the ___________
- The last major and bloodiest battle of WW2.
- Allied invasion of French North Africa.
- Air and sea battle that permitted U.S. invasion of the Philippines.
- The codename for the Battle of Normandy.
- Name for early months of WW2 with no major hostilities.
- Means lightning war in German and was a fast attack strategy used in WW2.
Down
- Estimated 2 million deaths from this battle between Germany and the Soviets over this city.
- German offensive campaign launched through the Ardennes region.
- American invasion that was designated as Operation Detachment.
- Planned attack on U.S. naval base near Honolulu Hawaii.
- The successful defense of Great Britain against air raids by the German Luftwaffe.
- This battle was a defense and evacuation of Allied forces against Germany.
- First air operation to strike the Japanese archipelago.
- American B-29 bomber dropped world's first atomic bomb over this city.
- Major naval battle in Pacific that took place in June of 1942.
16 Clues: Allied invasion of French North Africa. • The codename for the Battle of Normandy. • The last major and bloodiest battle of WW2. • Planned attack on U.S. naval base near Honolulu Hawaii. • First air operation to strike the Japanese archipelago. • Name for early months of WW2 with no major hostilities. • American invasion that was designated as Operation Detachment. • ...
Workshop 9 Vocab 2013-09-17
Across
- MLK and peace protesters were completely against using this as they would protest.
- City Police refused to ______ the rules in Montgomery.
- This was the setting of the Freedom Riders attack.
- MLK Jr. was probably the most ______ person in the Civil Rights Movement.
- We have been working on making _______ about things that aren't directly states in the text.
- The FBI, post office, and tax office are _______ organizations.
- I marched at the _________ against segregation.
- MLK was on his way back from a speech ______ when he had to stand on the bus.
- This was the first speaker in "In Their Own Words"
Down
- The _____ on Washington is where MLK gave his famous speech.
- ______ is not a vocabulary word, but it is the opposite of separating groups of people.
- In 1960, a law was passed that ended the _________ of buses.
- He set a goal that was very difficult to _________.
- Some things you ______ for are sports, school, and to vote.
- The Freedom Riders attack was no small fight; it was a ______ brawl.
- They held the rally in a church thinking since it was a ____ place, they would be safe.
16 Clues: I marched at the _________ against segregation. • This was the setting of the Freedom Riders attack. • This was the first speaker in "In Their Own Words" • He set a goal that was very difficult to _________. • City Police refused to ______ the rules in Montgomery. • Some things you ______ for are sports, school, and to vote. • ...
The Iron Curtain 2025-03-07
Across
- strategy that ensured the destruction of both attack & defender in the event of an attack
- intelligence gathering activities during the Cold War
- Soviet politician who led the Soviet Union from 1924-1953
- main power fighting against USSR and communist threats
- proxy war between US & USSR from 1955 to 1975
- American leader who oversaw the beginning of the Cold War
- term used to describe divide between capitalist & communist nations
- Economic system in which the government has complete control over the economy
Down
- a fear and panic for the supposed or real rise of communism during the Cold War
- Economic system in which people can own their own businesses and property
- War instigated by a major power that does not itself become involved
- barrier that separated East & West Berlin to stop people from escaping to the West
- foreign policy of the US during the Cold War to stop the spread of communism
- competition & advancement in the development or accumulation of weapons between USSR & US
- foreign policy to support democratic nations against communist threats
- communist state that existed from 1922 to 1991.
16 Clues: proxy war between US & USSR from 1955 to 1975 • communist state that existed from 1922 to 1991. • intelligence gathering activities during the Cold War • main power fighting against USSR and communist threats • Soviet politician who led the Soviet Union from 1924-1953 • American leader who oversaw the beginning of the Cold War • ...
Video & Sound 2022-09-22
Across
- a type of social engineering attack used to steal user data
- the ability to evaluate the content of visual media by understanding the way in which it is recorded and presented
- where you actual make the video
- production where you add subtitles, music, special effects, etc.
- one of the last phases of the finished product
- an audiovisual medium that records on digital storage media by electronic means
Down
- not able to access data for daily operation unless a payment is made...attack used to extort money
- an appliance intended solely for capturing sound and motion pictures and storing them on disc or media recorder
- all the groundwork is put into make your media product
- a series of still photographs projected onto a screen using light in rapid succession
- to record video
- to record images and sound as numerical data
- development decide what you want to accomplish with the video, along with target audience
13 Clues: to record video • where you actual make the video • to record images and sound as numerical data • one of the last phases of the finished product • all the groundwork is put into make your media product • a type of social engineering attack used to steal user data • production where you add subtitles, music, special effects, etc. • ...
Castles 2023-02-23
Across
- A ditch around the castle; sometimes filled with water, often filled with trash
- Narrow castle “windows” used for defense
- Private home of a lord; military fort in hostile territory
- Heavy iron and wood gate, could be raised and lowered with chains
- Gaps in the battlement to attack through
- Wooden bridge that could be raised or lowered over a moat; connected the gatehouse to a ramp
- Top of the castle wall, staging area for defense
Down
- Wall walk; platform for knights to walk on at the top of the castle walls; mentioned in our national anthem
- A yard inside of the castle curtain wall
- Holes in the ceiling from which boiling water, rocks, etc. could be dropped on the enemy
- Attack on a castle (noun); type of machine to break castle walls (adjective)
- Solid part of the battlement to hide behind
- The strongest and safest part of a castle; housed the water supply and lord’s quarters
13 Clues: Narrow castle “windows” used for defense • A yard inside of the castle curtain wall • Gaps in the battlement to attack through • Solid part of the battlement to hide behind • Top of the castle wall, staging area for defense • Private home of a lord; military fort in hostile territory • Heavy iron and wood gate, could be raised and lowered with chains • ...
More Power to You 2023-03-10
Across
- to make someone or something stronger; to strengthen a place against military attack; to improve the quality of something by adding something to it
- a place that is protected against attack; a fortified place
- very effective or strong; having a very powerful effect or influence on someone
- (root) strong
- having complete or unlimited power
- (root) power
- a family of rulers who rule over a country for a long period of time; a family, team, etc that is very powerful or successful for a long period of time
Down
- mental strength and courage that allows someone to face danger, pain, etc.
- (root) powerful
- a machine that produces electricity; someone who has a lot of energy
- capable of becoming real
- something that someone does very well
- always active or changing; having or showing a lot of energy; of or relating to energy, motion, or physical force
13 Clues: (root) power • (root) strong • (root) powerful • capable of becoming real • having complete or unlimited power • something that someone does very well • a place that is protected against attack; a fortified place • a machine that produces electricity; someone who has a lot of energy • mental strength and courage that allows someone to face danger, pain, etc. • ...
CNN 10 2022-02-25
Across
- What virus did the queen of England catch
- What happened to the sun
- Who was the first president to meet the china
- What animal was found looking sick
- What are people trying to do to some land in Portugal
- What country had the most gold medals in the olympics
Down
- What was found when a guy used a medical detector in the snow to find something for a woman
- What are other countries putting on Russia
- How many presidents out of the 13 U.S. presidents did she meet
- Who is the leader of Russia and claims that they were not going to attack Ukraine
- What did the Chinese call Mars
- What country was getting closer and closer to the Ukraine border making people they were going to attack.
- What country crossed the border to get into Ukraine
- A boat was released from New Hampshire and found where
- Who race women does Joe Biden want to be in the supreme court
15 Clues: What happened to the sun • What did the Chinese call Mars • What animal was found looking sick • What virus did the queen of England catch • What are other countries putting on Russia • Who was the first president to meet the china • What country crossed the border to get into Ukraine • What are people trying to do to some land in Portugal • ...
Immunity, disease, and disorder 2022-05-13
Across
- the ability to resist or recover from an infectious disease.
- an organism, a virus, or a protein that causes disease.
- Diseases that are caused by hereditary or environmental factors are called
- attack infected body cells by attaching to specific antigens
- disease A disease that is caused by a pathogen is called an
- is a drug that destroys viruses or prevents their replication.
Down
- made up of tissues and specialized white blood cells that recognize and attack foreign substances in the body.
- a specialized protein that binds to a specific antigen to tag it for destruction.
- a white blood cell that destroys pathogens by engulfing and digesting them.
- that is introduced into the body to produce immunity.
- make antibodies that attach to specific
- a medicine used to kill or slow the growth of bacteria and other microorganisms, such as fungi.
- a substance prepared from killed or weakened
13 Clues: make antibodies that attach to specific • a substance prepared from killed or weakened • that is introduced into the body to produce immunity. • an organism, a virus, or a protein that causes disease. • the ability to resist or recover from an infectious disease. • attack infected body cells by attaching to specific antigens • ...
Causes Of The Vietnam War 2024-05-06
Across
- Which President sent a half a million US combat troops to Vietnam?
- The conflict in Vietnam that developed following the French defeat can best be described as this type of War.
- What leader did much of the Southern Vietnamese support?
- What religion did Diem not like and treated unfairly?
- On 2nd August 1964, what did the North Vietnamese boats attack?
- Who withheld information about US support of South Vietnamese raids on North Vietnamese radar stations and other targets in the period leading up to the attack?
- Describe the type of military force President Kennedy sent to Vietnam.
Down
- Who was the leader of the communist Vietnamese resistance movement?
- Who was Southern Vietnam lead by?
- What Country was the US afraid that communism would spread to?
- What did Diem refuse to not give to the pheasants?
- What political party was in control of North Vietnam?
- What was the first Asian Nation to fall to Communism?
- Who were the majority of the Southern Vietnamese unhappy with?
- What Country was Vietnam invaded by during WW2?
15 Clues: Who was Southern Vietnam lead by? • What Country was Vietnam invaded by during WW2? • What political party was in control of North Vietnam? • What religion did Diem not like and treated unfairly? • What leader did much of the Southern Vietnamese support? • What did Diem refuse to not give to the pheasants? • ...
SS Civil War: Ch 9 - The War Begins 2025-03-26
Across
- Fort Sumter was running out of _____, so they asked Lincoln to send more.
- The Union president promised, "We are not _____, but friends."
- Major that refused to give up Fort Sumter to the South.
- The first president of the Confederate States of America
- a continuous attack with bombs and other ammunition
- The type of war that began with the attack on Fort Sumter.
- the separate republic formed by the 11 states that seceded from the Union
- In this address that Lincoln promised not to touch the right to slavery
- Number of forts in the South that the US had control of
Down
- Lincoln's duty to save the Union and keep it together
- war that Confederate president fought in before the Civil War
- Even though there was no ____ on the supply ship headed to Sumter, the Confederate army fired on it.
- Lincoln knew he had to make the seceding states _______ to the Union.
13 Clues: a continuous attack with bombs and other ammunition • Lincoln's duty to save the Union and keep it together • Major that refused to give up Fort Sumter to the South. • Number of forts in the South that the US had control of • The first president of the Confederate States of America • The type of war that began with the attack on Fort Sumter. • ...
Crossword very fun 2023-09-26
Across
- to move making the sound of an engine running slowly
- used to express a concession or recognition that something is the case
- a sudden attack or incursion into enemy territory, especially to obtain something; a raid
- to move slowly, quietly and carefully, because you do not want to be seen or heard
- during the course of a journey; on the way
- to move smoothly and quietly, especially as though it takes no effort
- to stop
- to walk along with long steps in a particular direction
- to walk somewhere in a slow relaxed way
Down
- to move very fast in a particular direction
- contribute extra features to (someone or something) in such a way as to improve or emphasize their qualities.
- to move forward towards sb/sth, often in order to attack or threaten them or it
- synonym of unfortunately (used to express apology for or sadness at something)
- to move quietly and carefully around an area, especially with the intention of committing a crime
- To start to go faster
- make a choice from a range of possibilities
16 Clues: to stop • To start to go faster • to walk somewhere in a slow relaxed way • during the course of a journey; on the way • to move very fast in a particular direction • make a choice from a range of possibilities • to move making the sound of an engine running slowly • to walk along with long steps in a particular direction • ...
Black Brother, Black Brother 2025-06-09
Across
- ward off (a weapon or attack) with a countermove.
- A hit to get a point
- A fencing match
- The school that Donte goes to
- The sword being used in a fencing match
- The protagonist in the story
- the sport of fighting with swords, especially foils, épées, or sabers, according to a set of rules, in order to score points against an opponent.
Down
- Foot Position: Both feet are together at the heel, forming a right angle.
- answer to a parry riposte
- Another word for a fencing strip
- prejudice, discrimination, or antagonism by an individual, community, or institution against a person or people on the basis of their membership in a particular racial or ethnic group, typically one that is a minority or marginalized
- The playing area where bouts take place
- To take a step towards the opponent in a fencing match
- a basic attacking movement where a fencer moves forward towards their opponent by extending their front leg and keeping their back leg straight
- The antagonist in the story
- Donte's brother
16 Clues: A fencing match • Donte's brother • A hit to get a point • answer to a parry riposte • The antagonist in the story • The protagonist in the story • The school that Donte goes to • Another word for a fencing strip • The playing area where bouts take place • The sword being used in a fencing match • ward off (a weapon or attack) with a countermove. • ...
Cold War Vocabulary 2022-03-28
Across
- Economic theory in which the government owns the means of production
- U.S. foreign policy during the Cold War in which the U.S. tried to contain Communism by preventing it from spreading to other countries
- Soviet Union policy that means restructuring
- military alliance between the Western Countries
- First man-made satellite launched into Space by the USSR
- the international group whose goal was to prevent future wars
- the relaxing of tension between the superpowers
- The trio of Stalin, Churchill, and Roosevelt (or Truman)
- economic system where the people own the means of production
- US theory that if one country falls to communism, many more would follow
- Leader of USSR in 80s
- the imaginary dividing line between Western Democracies and Soviet-influenced nations
- Witch hunt of suspected communists in the US
- military alliance between the Soviet-influenced nations
- Line that divided North & South Korea
- Soviet Union policy that means openness. It discouraged government secrecy
- Competition between US and USSR the prove their superiority in technology in order to accomplish getting to outer space
Down
- "MAD" - the guarantee that if one nation launched a nuclear attack, the other country would attack back, leaving them both destroyed
- Code name for President Reagan's plan of developing technology that could shoot down potential nuclear weapons
- US attempt to defeat Fidel Castro of Cuba
- massive military build-up of nuclear weapons, by the USSR and US in order to gain military bragging rights
- "Intercontinental Ballistic Missiles"
- Underground structures, stocked with food and other supplies, that were intended to keep people safe from radioactive fallout following a nuclear attack
- a extremely powerful and influential country
- Soviet Union plan to keep West Germany from getting supplies to West Berlin
- The response to the Blockade in order to get supplies to West Berlin by the Western nations, including the US
- the physical divider of the city of Berlin
- The closest the US & USSR ever got to War. USSR missiles in Cuba
- US policy that gave aid to countries torn apart during WWII
- US policy that gave aid to countries threatened by communism
30 Clues: Leader of USSR in 80s • "Intercontinental Ballistic Missiles" • Line that divided North & South Korea • US attempt to defeat Fidel Castro of Cuba • the physical divider of the city of Berlin • Soviet Union policy that means restructuring • a extremely powerful and influential country • Witch hunt of suspected communists in the US • ...
Vietnam War Crossword Puzzle - Gionna Kinchen 2016-05-20
Across
- The play about Vietnam that set records while on Broadway
- an alleged attack by North Vietnamese Navy on US destroyers which led President Johnson to order a direct bombing attack on North Vietnam (most historians now believe there was no attack)
- A military base in northwestern South Vietnam that was attacked by communist troops. There was an increased traffic on the Ho Chi Minh Trail right before the assault.
- As the longest armed conflict in US History, involvement in Vietnam lasted ___ years
- line of latitude that separated North and South Vietnam
- The General in charge of Vietcong military operations during most of the conflict
- Missions during which US patrols searched for hidden enemy camps then destroyed them with massive fire power and air raids
- American military slang for communist forces, especially the Vietcong
- South Vietnamese president that was catholic and strongly opposed communism. His poor leadership and corrupt government spelled doom
Down
- Network of paths along the borders of Vietnam, Laos, and Cambodia
- Demilitarized zone. The dividing line between North and South Vietnam established in 1954 at the Geneva Convention.
- A 7,000-page top-secret United States government report on the history of the internal planning and policy-making process within the government itself concerning the Vietnam War.
- an organization of Vietnamese Communists and other nationalist groups that between 1946 and 1954 fought for Vietnamese independence from the French
- A joint resolution of the U.S. Congress passed on August 7, 1964 in direct response to a minor naval engagement. It is of historical significance because it gave U.S. President Lyndon B. Johnson authorization, without a formal declaration of war by Congress, for the use of military force in Southeast Asia.
- Accords Peace agreement that temporarily divided Vietnam along the 17th parallel
- U.S. ally country that sent troops to Vietnam
- The growing political youth movement in the 1960s
- 35th President of the United States
- President who authorized Operation Rolling Thunder
- ___ Hilton (nickname of a Vietnam War prison)
20 Clues: 35th President of the United States • U.S. ally country that sent troops to Vietnam • ___ Hilton (nickname of a Vietnam War prison) • The growing political youth movement in the 1960s • President who authorized Operation Rolling Thunder • line of latitude that separated North and South Vietnam • The play about Vietnam that set records while on Broadway • ...
ICS 133 2017-05-11
Across
- ma'am ron's bebeloves
- communications intelligence
- will expose minor vulnerabilities
- uses the DNS to look up a name
- dubious stock investment
- bogus message given to computers
- communications security
- an attack on confidentiality
- keeping information secret
- protecting information from improper changes
- openings in an asset
- are protected by a boundary
- keeping systems available and in operation
- put acoustical and electromagnetic shields around the equipment
- disruption of transmissions
- malicious software
- applies effort but avoids social stigma
- also known as cutwail
- availability attack
- establish a protected area around sensitive devices and block attackers from area
- forge the sender’s IP address in a TCP connection; success requires correct
- prevents a sender from sending data faster than the recipient can handle it
- protects the assets
- unsolicited email often distributes frauds
- data resides in the ____
- automated host configuration
- the most secure token
Down
- the most common token
- he process to establish permission for someone to receive classified information
- protects a set of files from access by others
- _ names provide memorable names for hosts on the Internet
- no special steps ensure availability
- email that tries to retrieve authentication data
- protects information even when it is not under your physical control
- availability attack again
- _ law are based on legislative enactments
- _ reading grants read access to a set of files
- identifies a special category of information that requires protection
- infer secrets from patterns in encrypted or otherwise protected traffic
- acceptance incorrectly detects a match with a credential and the database
- filters on comm and power lines
- interactive DNS resolver
- creates botnet focused on financial fraud
- brief description of threat agent
- embed traffic inside a protocol that the firewall always passes, like Web pages
- an attacked system is called ____ system
- limited damage to assets
- _ law are based on judicial decisions
- also known as conficker
- cause significant damage to assets or some injury to persons, but not critical injury
50 Clues: malicious software • availability attack • protects the assets • openings in an asset • the most common token • ma'am ron's bebeloves • also known as cutwail • the most secure token • communications security • also known as conficker • dubious stock investment • interactive DNS resolver • limited damage to assets • data resides in the ____ • availability attack again • ...
Immune System 2021-03-30
Across
- harmless variant or derivative of a pathogen that stimulates a host's immune system to mount defenses against the pathogen
- cells that develop from B cells and produce antibodies
- the ability to recognize and remember specific antigens and mount an attack on them
- a type of cell within the body capable of engulfing and absorbing bacteria and other small cells and particles
- the short-term immunity that results from the introduction of antibodies from another person or animal
- proteins (cytokines) secreted by T cells and other cells to aid and regulate the immune response
- type of lymphocyte that kills infected body cells and cancer cells
- the body's specific recognition, response, and memory to a pathogen attack
- cells manufactured in the bone marrow that create antibodies for isolating and destroying invading bacteria and viruses
- watery fluid within lymphatic vessels
- having a hypersensitivity to a substance that does not normally cause a reaction.
Down
- a localized response to an injury or to the destruction of tissues
- organisms that cause disease
- the ability of an organism to resist a particular infection or toxin by the action of specific antibodies or sensitized white blood cells
- activate macrophages, B cells and T cells.
- immunity that is present before exposure and effective from birth; responds to a broad range of pathogens
- a form of acquired immunity in which the body produces its own antibodies against disease-causing antigens
- the two types of white blood cells that are part of the body's immune system
- produced during a B cell response, but are not involved in antibody producing during the initial infection; are held in reserve for the rest of your life in case you encounter that pathogen again
- proteins that are produced by B lymphocytes and that attaches to a specific antigen keeping them from harming the body
- cells created in the thymus that produce substances that attack infected cells in the body
- recognize pathogens they have encountered before, allowing for a quicker immune response in a second exposure
22 Clues: organisms that cause disease • watery fluid within lymphatic vessels • activate macrophages, B cells and T cells. • cells that develop from B cells and produce antibodies • a localized response to an injury or to the destruction of tissues • type of lymphocyte that kills infected body cells and cancer cells • ...
Final Crossword Security Plus 2024-06-04
Across
- inserts statements to manipulate a database server
- hiding data within an ordinary, nonsecret file
- Removing user accounts
- ensuring that an organization adheres to laws and regulations
- It only goes off after certain conditions are met
- Subset of the board that manages governance issues
- bruteforce collision attack that exploits the probability theory
- Threat actors who are strongly motivated by philosophical or political beliefs.
- involves isolating sensitive enterprise data
- pose a threat from the position of a trusted entity
- refers to integrating security into the application
- A device that distributes work across a network
- An attack that copies data and then uses it
- The entity that is responsible for digital certificates
- Individual or entity who is responsible for attacks
- is a finite sequence of rigorous instructions
- Data that is encapsulated within a secure outer shell
- Threat actors who are employed by their own government to carry out attacks
Down
- Vulnerability for which there are no days of advanced warning
- The rapid detection and elevation of a threat incident
- A downgrade attack
- server within the DMZ that is used to connect two dissimilar security zones
- features and characteristics of the individual
- two or more different messages that produce the same hash value
- Standard preconfigured passwords
- decentralized, distributed and public digital ledger
- An AP set up by an attacker to mimic an authorized AP
- A malicious program that uses a computer network to replicate
- Closing unused ports and disabling unnecessary protocols
- resource that is not possible due to geography
- An unauthorized AP that allows an attacker to bypass many of the network security
- denial of the truth or validity of something
- validate a main domain along with all subdomains
- evidence or proof of something
- A product that consolidates real-time security monitoring and management
- performs a real-time lookup of a certificate’s status
- unauthorized copying of data
- object whose state cannot be modified after it is created
- Identifying and mitigating risks brought on by a third party
- retains historical documents
40 Clues: A downgrade attack • Removing user accounts • unauthorized copying of data • retains historical documents • evidence or proof of something • Standard preconfigured passwords • An attack that copies data and then uses it • denial of the truth or validity of something • involves isolating sensitive enterprise data • is a finite sequence of rigorous instructions • ...
Cryptic Hunt Set - 3 2024-03-01
Across
- A technique used in file systems to improve performance by delaying the writing of data to disk until it is necessary.
- In cybersecurity, what is the term for a security mechanism that monitors and controls the flow of network traffic based on predetermined rules?
- What cryptographic protocol secures email communication by providing authentication and encryption?
- A term used to describe the state where two or more threads are attempting to modify shared data concurrently.
- What term describes the process of ensuring that data transmitted across a network is secure from eavesdropping or tampering?
- Which cipher involves using a series of rotating disks or cylinders to scramble the alphabet?
- What type of attack targets the domain name system (DNS) to redirect users to malicious websites?
- A tool used to automatically generate code from a given set of rules or templates.
- Which type of attack involves capturing and analyzing network traffic to steal sensitive information, such as login credentials?
Down
- A technique used in operating systems to protect critical sections of code by allowing only one thread to execute them at a time.
- A technique used in file systems to ensure data integrity by recording changes to disk structures before making them.
- What security measure restricts access to a network based on the physical address of a device?
- A class that allows multiple threads to read from or write to a shared resource without interference.
- What type of attack floods a network with excessive traffic to overwhelm its capacity?
- A feature introduced in Java 8 that allows for the concise representation of anonymous functions or methods as instances of functional interfaces.
- What is the name of the method for generating round keys from the original cryptographic key?
- In the Vigenère cipher, what is the key used for encrypting the message?
- A tool used for continuous integration and continuous delivery in Java projects.
- A C library function used for finding the smallest integer that is greater than or equal to a floating-point number.
- What is the name of the mathematical process used to reverse encryption?
20 Clues: In the Vigenère cipher, what is the key used for encrypting the message? • What is the name of the mathematical process used to reverse encryption? • A tool used for continuous integration and continuous delivery in Java projects. • A tool used to automatically generate code from a given set of rules or templates. • ...
CyF Chapter 1 2023-10-08
Across
- What is the acronym for the intermediate level certification offered by EC-Council that the cybersecurity specialists holding this credential possess the skills and knowledge for various hacking practices.
- Attacks that originate from within an organization are known as ___________ security threats.
- Which type of cyber attack can track system self-reporting data, like how much energy a computer is using, and use that information to select targets or trigger false alerts.
- Script _____ are teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill.
- DDoS in cyber security means "Distributed ______-of-Service.
- The acronym of this technology which enable people to connect billions of devices to the Internet.
- Criminals can also use rogue devices, such as _____ Wi-Fi access points.
- Information _______ Management Standards provide a framework for implementing cybersecurity measures within an organization.
- Cybersecurity ______ possess the insight to recognize the influence of data and harness that power to build great organizations, provide services and protect people from cyberattacks.
Down
- Criminals use this tool to capture data streams over a network.
- Federated identity management refers to ______ enterprises that let their users use the same identification credentials gaining access to the networks of all enterprises in the group.
- What is another word used to describe the speed of data.
- A group of grey hat hackers who rally and protest against different political and social ideas.
- At which level are the employees responsible to protect the organization’s reputation, data, and customers.
- Cyber ______ is a weakness that makes a target susceptible to an attack
- The acronym of the practice where people used their own devices to access enterprise information.
- This group of criminals breaks into computers or networks to gain access for various reasons.
- A cybersecurity ______ is the possibility that a harmful event, such as an attack, will occur.
- State _____ Hackers are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
- _____ hat attackers are unethical criminals who violate computer and network security for personal gain.
20 Clues: What is another word used to describe the speed of data. • DDoS in cyber security means "Distributed ______-of-Service. • Criminals use this tool to capture data streams over a network. • Cyber ______ is a weakness that makes a target susceptible to an attack • Criminals can also use rogue devices, such as _____ Wi-Fi access points. • ...
100 Turning Points 2024-10-03
Across
- The first slaves were sold in this state
- Seneca Falls was the first women's rights ______ and was organized by a group of five women
- The Indian Removal Act allowed the president to grant lands west of this state in exchange for Indian lands
- John C. Calhoun wrote an anonymously published a pamphlet which criticized the tariff and laid the groundwork for _____ theory
- This is the power that Supreme Court seized in Marbury vs Madison 1803
- Columbus first landed here when looking for the East Indies
- This person invented the Erie Canal
- The time of when more than 300,000 people came to California to find gold
- More than 200 people were being accused of ________ in colonial Massachusetts from 1692-1693
- President Jefferson purchased Louisiana from Napoleon for ___ million
- Washington’s surprise attack upon a small French force at _________
- Three of his men were killed by colonists which led to the start of King Phillip's War
- John ______ signed the Declaration of Independence first
Down
- These people arrived on the Mayflower in 1620
- This many men were killed at Lexington and Concord when someone shot a bullet known as "The Shot Heard 'Round the World"
- It took this many months for congress to agree on the final list of the Bill of Rights
- The Supreme Court ruled that Americans of African descent, whether free or enslaved, were not American _______ and could not sue in federal court
- The end of this battle was the start to our nation's _______
- The British were urged to attack the former colonies after American troops attacked this country
- Andrew Jackson vetoes the government's effort to _____ the Second Bank of the United States
- Boys were throwing these at British soldiers which caused the soldiers to attack back
- This was the first state to ratify the competition
- This crop saved Jamestown
- This Native saved the pilgrims by teaching them how to acclimate to life in the "New World"
- Samuel Morse had extended his telegraph line all the way to this state
25 Clues: This crop saved Jamestown • This person invented the Erie Canal • The first slaves were sold in this state • These people arrived on the Mayflower in 1620 • This was the first state to ratify the competition • John ______ signed the Declaration of Independence first • Columbus first landed here when looking for the East Indies • ...
Vocabulary 9-13 2025-04-02
Across
- (v) To fail to do something required
- (adj) Unable to speak in an orderly, logical way
- (n) Close inspection; careful examination
- (v) To be good enough
- (v) To unite into a single whole; combine
- (v) To give in; stop resisting
- (adj) Evil; wicked
- (v) to mix up or confuse (as a story or message); scramble
- (v) To make up; be the parts of
- (adj) Most common or most noticeable
- (adj) Very obvious, often offensively so
- (adj) Having many parts arranged in a complicated way
- (n) Using someone else's writings or ideas as your own
- (v) To feel or express delight or self-satisfaction; often spitefully
- (n) an uneasy feeling about how right or proper a particular action is
- (adj) Starting and stopping from time to time; off-and-on
- (v) To make a request or plead on behalf of someone else
- (adj) Necessary; cannot go without
- (adj) Perfectly clean
- (n) Something that moves one to take action or work harder; a motivation
Down
- (n) Something that weakens, damages, or destroys
- (v) To seize with authority; legally take possession of
- (n) A temporary decline in business
- (adj) Happening or existing at the same time; simultaneous
- (v) To plan cleverly; think up
- (adj) Supposed for the sake of argument or examination; imaginary; theoretical
- (v) To turn aside, or stray, especially from the main topic in speaking or writing
- (v) To upset deeply; overwhelm
- (v) To waste; spend or use foolishly
- (v) To worsen; deteriorate
- (n) A place of safety, protection, or relief
- (v) To interpret or read (something confusing or hard to make out)
- (adj) Open to damage or attack; susceptible
- (adj) Difficult to believe; unlikely
- (v) To cut short or reduce
- (adj) Thin and bony
- (n) Great hardship or difficulty; harshness; severity
- (adj) Slight; very small compared with what might be expected
- (v) To return an attack for an attack (verbal or physical); pay back
- (n) Something required beforehand
40 Clues: (adj) Evil; wicked • (adj) Thin and bony • (v) To be good enough • (adj) Perfectly clean • (v) To worsen; deteriorate • (v) To cut short or reduce • (v) To plan cleverly; think up • (v) To upset deeply; overwhelm • (v) To give in; stop resisting • (v) To make up; be the parts of • (n) Something required beforehand • (adj) Necessary; cannot go without • ...
Pokémon Crossword 2025-09-16
Across
- Berry that confuses pokémon who dislike spicy food
- Real life inspiration for Ben 5's bug/steel type
- Can change form via a catalog
- Berry that confuses pokémon who dislike sour food
- Used to fuse calyrex
- First ride pokémon obtained in Legends: Arceus
- Word following "Energy" or "Feather"
- Number 748, the brutal star pokémon
- Nature that raises special attack and lowers defense
- Fire pokémon whose gender difference is a single pixel
- Nature that raises defense and lowers special defense
- If used in a contest, causes Smokescreen to score double appeal points next turn
- Collection of items in Legends: Arceus that function like X items from the main series
- Aaron's type specialty
- Rugged type known for physical defense
- Shuts down Professor Sada's Time Machine
- Allows the use of Guardian of Alola
- Word preceding "Malasada" or "Mushroom"
- Gen 7 pokémon that learns Tail Glow
Down
- Where your seventh party member goes
- Evolves from a dragon-type with a gigantamax form
- What fissure might do to an opposing pokémon
- Berry that reduces the damage from super-effective flying moves
- Has a from only obtainable in Egypt in Pokémon Go
- Collection of items in Legends: Arceus that raise effort levels
- Steel pokémon that evolves with a dusk stone
- Word preceding "incense" or "restore"
- Type of bike that lets you do tricks
- Second half of a flying type move boosted by sharpness
- Nature that raises defense and lowers attack
- Type of bike fast enough to go up muddy slopes
- Number 178, the mystic pokémon
- The first primary flying-type pokémon
- The official competitive format
- Number 953, the rolling pokémon
- Word before "Soup" or "Geyser"
- Palkia's globe and orb
- What you might do to a useless Pokémon in a Nuzlocke
- Poison/Dark type if found in Alola
- Word following "Hammer" or "Needle"
- Nature that raises special defense and lowers attack
- Research report key items exclusive to pokémon colosseum
- Word preceding "Amber" or "Sea Map"
- Needed to level up
44 Clues: Needed to level up • Used to fuse calyrex • Palkia's globe and orb • Aaron's type specialty • Can change form via a catalog • Number 178, the mystic pokémon • Word before "Soup" or "Geyser" • The official competitive format • Number 953, the rolling pokémon • Poison/Dark type if found in Alola • Number 748, the brutal star pokémon • Word following "Hammer" or "Needle" • ...
Popcorn by Rob Harrell 2025-10-20
Across
- What is the name of Andrew’s best friend?
- What class does Andrew have his panic attack in?
- Does Andrew get a good school picture?
- What did Andrew’s mom gave him for picture day?
- What gave Andrew a panic attack in school?
- How would some people describe Andrew’s family?
- How many times does Andrew tap things with his finger to help him when he is anxious?
- What does his grandma have?
- What techniques help Andrew calm down?
- What was Andrew so worried about all day?
- What do both the author and Andrew hate these and think they're gross?
- Why isn’t Andrew mad about his school picture?
- What condiment got in Andrew’s hair during lunchtime because of the class clown?
- What did Andrew do to prepare for picture day?
- What does Andrew’s bully break at school?
- What does the nurse give Andrew to try to make his day better?
- What is Andrew’s grandmas favorite snack?
Down
- Where is Andrew’s mom during his day at school?
- Who is Andrew’s bully?
- What day is it at school that Andrew’s family get excited about?
- What is the main setting of the book Popcorn?
- Where does Andrew spend a lot of time at school?
- What is one of the things that happens to Andrew during his panic attack?
- Andrew’s goal in the book is to get a good what?
- What did Andrew called himself when it came to math?
- The color of juice does Andrew get on his new shirt that ruins it for his picture?
- What is helping Andrew feel better and deal with his Anxiety?
- Where is Andrew’s grandma during most of the book?
- What is the main reason Andrew is having a terrible day?
- How did Andrew express his anxiety?
- What sport is Andrew’s best friend good at?
- What is the title of the book?
- Who abandons Andrew and moves far away?
- What is Andrew’s biggest fear that happens at school?
34 Clues: Who is Andrew’s bully? • What does his grandma have? • What is the title of the book? • How did Andrew express his anxiety? • Does Andrew get a good school picture? • What techniques help Andrew calm down? • Who abandons Andrew and moves far away? • What is the name of Andrew’s best friend? • What was Andrew so worried about all day? • ...
Crossword 3 2015-05-21
Across
- Properly configured firewalls prevent users from accessing resources that are not _________ for business activities
- Server _______ is a technique to assess what services should be running on a server and turn off any unnecessary services
- Users will always let you know if they are ______ to access something they need on the network
- A buffer between two networks containing servers or resources that must be available to the Internet with a different level of security from other internal systems
- ________ provides the ability for internal computers to use a single external IP address for communication on the Internet
- A command line tool that utilizes the echo-request and echo-reply to provide a tool for testing connectivity on a network
- Ports 135-139 and 445 are used in Microsoft networks for the browsing and _________ of files
- The firewall policy should be available for internal ______ to review
- The ________ policy is a high-level document describing acceptable incoming and outgoing network traffic and requires very little understanding of technology to understand.
- A method of file sharing among computers. (Kazaa, Napster, etc)
Down
- A technology whereby users are notified when their friends are online and available to chat
- This tool can be used to determine the ip address of websites
- A common terminal based application used to gain access to servers and network equipment
- ___________ often adopts a more open firewall strategy
- An attack where a large volume of network requests are generated, also called a DOS attack.
- By talking with knowledgeable employees, hackers often use _______ engineering to bypass firewalls
- One of the hardest parts of setting up a firewall policy is determining what services _________ will be able to access
- DNS uses port 53 TCP connections for ___________ which may not need to pass through the firewall
- The corporate _____ server should be allowed to make outgoing port 25 SMTP connections
- The 2 key functions of a firewall are to protect the internet network from attack and controlling access of internal machines to the _________
20 Clues: ___________ often adopts a more open firewall strategy • This tool can be used to determine the ip address of websites • A method of file sharing among computers. (Kazaa, Napster, etc) • The firewall policy should be available for internal ______ to review • The corporate _____ server should be allowed to make outgoing port 25 SMTP connections • ...
Cyber Security Words and Terms 2022-09-15
Across
- A secret word or phrase that is used to access a computer system or service.
- Text that can be read by the human eye, like this article!
- A test that distinguishes between robots and humans using a website where you have to “prove you’re human”.
- Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- A simple form of code for software that can be written in word editors.
- An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
- Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
- The deliberate use of someone else's identity, typically for financial gain.
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
- Also known as a VPN, it allows you to create a secure connection to another network using the internet.
- A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
Down
- When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
- The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
- A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- The programs and other operating systems used by a computer.
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- Software that has their code listed as free to use, share, and modify.
- An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
20 Clues: Text that can be read by the human eye, like this article! • The programs and other operating systems used by a computer. • Software that has their code listed as free to use, share, and modify. • A simple form of code for software that can be written in word editors. • A secret word or phrase that is used to access a computer system or service. • ...
Fall Sports 2022-09-28
Across
- an act where when a player with the ball passes the goal line and into the end zone
- Passing a spiked or rapidly hit ball. Slang for the art of passing an attacked ball close to the floor
- the illegal restraining of a player who is not in possession of the football in order to gain an advantage
- Used to put the ball into play
- an act of stopping the offense of player with the ball by grabbing them and bringing them to the ground
- An attack that results in an immediate point or side out
- an act which a player loses control of the football
- The clockwise movement of player around the court and through the serving position following a side out
- hitting the ball with your head
- when the goalie blocks a shot
- The offensive action of hitting the ball. The attempt by one team to terminate the play by hitting the ball to the floor on the opponents side
- any attempt to kick the ball into the goal
Down
- a position in soccer with the job of guarding the goal
- Also hit or attack. A ball contacted with force by a player on the offensive team who intends to terminate the ball on the opponent's floor or off the opponent's blocker
- a violation whenever a non goalie touches the ball with their hand or arm
- when the ball is kicked into the net and it counts as a point
- the player who has the 2nd of 3 contacts of the ball who 'sets' the ball with an overhand pass for a teammate to hit
- to tackle the quarter back behind the line of scrimmage
- an act of a defensive player catching a forward pass
- a gathering of the offensive team in a close circle behind the line of scrimmage
- a serve that is not passable and results immediately in a point
- the pass that goes to the player that scores the goal
22 Clues: when the goalie blocks a shot • Used to put the ball into play • hitting the ball with your head • any attempt to kick the ball into the goal • an act which a player loses control of the football • an act of a defensive player catching a forward pass • the pass that goes to the player that scores the goal • a position in soccer with the job of guarding the goal • ...
Military Crossword 7 2021-02-11
Across
- A small, fast, military ship that carries weapons.
- A short interruption in a war or argument, or an agreement to stop fighting or arguing for a period of time.
- Any object used in fighting or war, such as a gun, bomb, knife, etc.
- An occasion when a group of people arrive somewhere, usually suddenly or unexpectedly.
- A series of actions intended to produce political or social change
- A device sent up into space to travel around the earth, used for collecting information or communicating by radio, television, etc.
- An agreement, usually between two armies, to stop fighting in order to allow discussions about peace.
- An attack intended to stop or oppose an attack by an enemy.
- A small container for carrying water or another drink, used especially by soldiers or travellers.
- A fast military ship.
- A force that pulls the aircraft downward because of the force of gravity. It opposes lift and acts vertically downward through the aircraft’s center of gravity.
Down
- a weapon whose purpose is to make other countries afraid to attack the country that owns it.
- A soldier trained to be dropped from an aircraft with a parachute.
- An agreement, usually between two armies, to stop fighting in order to allow discussions about peace.
- A prisoner, especially a person held by the enemy during a war.
- - a written agreement between two or more countries, formally approved and signed by their leaders.
- In radio communication: ‘I understand your message.’
- Strong covering that protects something, especially the body.
- The act of taking away or giving up weapons
- Prime Minister of the United Kingdom from 1940 to 1945, during the Second World War, and again from 1951 to 1955.
- A device that is positioned so that it stops the air from flowing around the aircraft and so helps to control it.
- One of the floors of a ship, bus, or aircraft.
- A slight movement of an aircraft or ship, to the side of its intended direction. It is controlled by a rudder.
- A secret.
- Someone who is sent as a representative from one government or organization to another
25 Clues: A secret. • A fast military ship. • The act of taking away or giving up weapons • One of the floors of a ship, bus, or aircraft. • A small, fast, military ship that carries weapons. • In radio communication: ‘I understand your message.’ • An attack intended to stop or oppose an attack by an enemy. • Strong covering that protects something, especially the body. • ...
Information Security 2022-09-29
Across
- A type of malware that records every single press of the keyboard that you make
- A key only used by one individual to decrypt
- A key that can be used by anyone to encrypt messages
- Gaining unauthorised access to or control of a computer system
- A trap for cybersecurity criminals
- Bullying that takes place online
- A hacking attack where multiple systems flood a target computer system with multiple requests, making it impossible for the target to handle all requests and function correctly
- Special viruses that move from computer to computer without human action
- Impersonation of email address or device to gain unauthorized access to information or systems
- Copy of data
- Hacking to try and champion a cause, e.g. climate change, rather than to steal information
- A weaknesses in computers
- scrambled data
- Ethical hacking in order to find any cybersecurity weaknesses
- Raw data that is put into context and has meaning
Down
- core of an operating system
- General term for programs that gains access to your system for unethical reasons
- Email that contains a message with a suspicious link designed to steal personal information
- annoying malware that spams you with ads
- Software that protects computers from virus related harm
- Term used for one of several computers that are infected by a 'master' computer, lying in wait for attack instructions
- A technique used typically to guess a password by trying every single combination in order without much extra thought or effort
- Malicious code typically disguised as a legitimate program
- To take advantage of a system's weakness
- I am not a robot
- Identification method that uses parts of our body, e.g. iris, face, fingerprint etc
- Secretly watches computer activity
- Collection of malware infested computers that form a network to attack
- Electronic messages sent through the internet
- Readable data
- Bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
- An internal security team that defends against both real attackers and Red Teams
32 Clues: Copy of data • Readable data • scrambled data • I am not a robot • A weaknesses in computers • core of an operating system • Bullying that takes place online • A trap for cybersecurity criminals • Secretly watches computer activity • annoying malware that spams you with ads • To take advantage of a system's weakness • A key only used by one individual to decrypt • ...
Chapter 20: Medical Emergencies 2025-07-03
Across
- Condition of profound hemodynamic and metabolic disturbance characterized by failure of the circulatory system to maintain adequate perfusion of vital organs
- Unexpected or sudden occasion; an urgent or pressing need
- External Defibrillators (AEDs) Device used for application of external electrical shock to restore normal cardiac rhythm and rate
- Resuscitation (CPR) Artificial substitution of heart and lung action as indicated for cardiac arrest or apparent sudden death resulting from electric shock, drowning, respiratory arrest, and other causes
- Abnormally increased concentration of glucose in the blood
- Bodily injuries caused by physical means with disruption of the normal continuity of structures
- Arrest Sudden stoppage of cardiac output and effective circulation
- scan Acronym for Focused Assessment with Sonography for Trauma; a bedside sonography exam used to assess trauma patients for internal bleeding
- Illusion of movement; sensation as if the external world were revolving around the patient or as if the patient were revolving in space
- Fibrillation Disorganized cardiac rhythm
- Escape of blood from the vessels; bleeding
Down
- Unpleasant sensation, vaguely referred to the epigastrium and abdomen and often culminating in vomiting
- Abnormally diminished concentration of glucose in the blood
- Abnormal drowsiness or stupor; a condition of indifference
- Vascular reaction, usually transient, involving the upper dermis, representing localized edema caused by dilatation and increased permeability of the capillaries and marked by the development of wheals; also called hives
- An extreme fear of enclosed or tight spaces
- Redness of the skin; typically caused by irritation or injury
- Temporary suspension of consciousness as a result of generalized cerebral ischemia; faint or swoon
- Paleness; absence of skin coloration
- Nosebleed; hemorrhage from the nose
- Subjective sensation or motor phenomenon that precedes and marks the onset of a paroxysmal attack, such as an epileptic attack
- Forcible expulsion of the contents of the stomach through the mouth
- Accident (Stroke or Brain Attack) Condition with sudden onset caused by acute vascular lesions of the brain; often followed by permanent neurologic damage
- Dehiscence Separation of the layers of a surgical wound; may be partial, superficial only, or complete, with disruption of all layers
24 Clues: Nosebleed; hemorrhage from the nose • Paleness; absence of skin coloration • Fibrillation Disorganized cardiac rhythm • Escape of blood from the vessels; bleeding • An extreme fear of enclosed or tight spaces • Unexpected or sudden occasion; an urgent or pressing need • Abnormal drowsiness or stupor; a condition of indifference • ...
World Order 2024-05-28
Across
- order the activities and relationships between the world’s states, and other significant non-state global actors, that occur within a legal, political and economic framework; an international set of arrangements for promoting stability and peace
- a widespread or systematic attack against any civilian population
- undertaken by one state or body
- the activity of creating conditions for sustainable peace in countries affected by conflict, through the use of force, quite often provided by a number of countries and consisting of soldiers, civilian police and civilian personnel
- can direct a carefully engineered packet of data towards systems that control essential infrastructure, such as power stations, dams, airports, hospitals, schools, transport systems, electricity grids and financial systems.
- having unrestricted authority or power
- sovereignty the authority of an independent state to govern itself (for example, to make and apply laws; impose and collect taxes; make war and peace; and form treaties with foreign states)
- War the state of hostility, without actual warfare, between the USSR and its satellites and the United States and its allies in the Western world, which lasted from just after World War II until about 1991
- a semi-autonomous political entity that was nominally under the sovereignty of the British Empire
- dominance of one nation over others
- acts of violence against a population, intended to cause terror and thereby influence a government
- action carried out during a time of war that violates accepted international rules of war
- a Latin term meaning ‘compelling law’, also called a ‘peremptory norm’:
- the ongoing integration of regional economies, societies and cultures brought about by the removal of restrictions on international trade, and advances in travel and mass communication
- security a principle based on the agreement of a group of states not to attack one another and to defend each other from attack by others; the idea is that an attack on one is an attack on all
- an organised group of two or more states, set up to pursue mutual interests in one or more areas
Down
- violence and killing within communities
- another term for a treaty: an international agreement between parties who are subject to international law (states and international organisations such as the UN and its bodies)
- military intervention in a state in order to stop serious human suffering and/or human rights violations
- the deliberate extermination of a national, ethnic, racial or religious group
- compulsory enlistment in the military force of a state
- involves the use of hit-and-run tactics and the element of surprise
- the use of large, well-organised military forces.
- an independent, non-profit group that often plays an important role in advocating, analysing and reporting on human rights worldwide
- a group of unofficial soldiers who act outside international law and are often secretly used and funded by governments
- a euphemism for genocide
- involves the use of atomic or hydrogen bombs
- atrocity crimes (mass atrocities) a broad term for crimes that fall into the categories of genocide, war crimes, ‘ethnic cleansing’ and crimes against humanity; this is the term favoured by the United Nations, because it avoids making distinctions on the basis of whether the crimes were committed in war or peace, or as part of an intrastate or interstate conflict
- the interconnection of two or more states to such an extent that they are mutually dependent on each other for survival and mutually vulnerable to crises
- cooperation between multiple states for mutual benefit or protection from common threats
- a conflict between two or more parties within one country.
31 Clues: a euphemism for genocide • undertaken by one state or body • dominance of one nation over others • having unrestricted authority or power • violence and killing within communities • involves the use of atomic or hydrogen bombs • the use of large, well-organised military forces. • compulsory enlistment in the military force of a state • ...
Voc. p.129/ 130 2018-02-07
14 Clues: >> free • >> drive • >> to say • >< defense • >> to repair • >> railway BE • >> police car • > to be a prisoner • >> Have a good time! • > to give work to somebody • > to pay someone to work for you • > someone who hunts wild animals • > the place you are traveling (AE) to • > the rights that every person in a country has
Voc. p.129/ 130 2018-02-07
14 Clues: >> free • >> drive • >> to say • >< defense • >> to repair • >> police car • >> railway BE • > to be a prisoner • >> Have a good time! • > to give work to somebody • > to pay someone to work for you • > someone who hunts wild animals • > the place you are traveling (AE) to • > the rights that every person in a country has
