attack Crossword Puzzles
tell me like im 5 2022-04-20
Across
- fight against two best friends
- leader of Wisconsin
- started war between us and Russia
- protect our friends freedom
- helped returning wwll veterans
- helps friends of us
- if you attack me i will attack you.
Down
- failed missle attack
- us helps best friends
- 35th president of us
- Built to keep us friends in
- a race against soviet union
12 Clues: leader of Wisconsin • helps friends of us • failed missle attack • 35th president of us • us helps best friends • Built to keep us friends in • a race against soviet union • protect our friends freedom • fight against two best friends • helped returning wwll veterans • started war between us and Russia • if you attack me i will attack you.
Epic Battle Fantasy 5 Puzzle 2021-05-30
Across
- Mermaid enemy
- Edgy fascist
- Fast travel slime
- Skill that shoots a target 6 times
- Weather-affecting elemental enemies
- NoLegs' physical attack steroid
- A loyal block that will defend you in battle
- Legendary gun with no special effects
- Fully heals all party members
- Matt's signature sword
- Evasive flying enemy, typically furry
- Undertale boss
- Multi-slash limit break
- Alcoholic dogs
- Laziest of all bears
- Anna's guardian
- Sexually assaulting tentacle boss
- Anna's village
- Triple headed skeletal dragon
- Heals an ally's status problems
- Crab-like enemies
- Haunted armor
- Lance's magic attack steroid
- Limbless cat
- Pumpkin robot boss
- Flying robot that fires an explosion when killed
Down
- Magical canines resistant to holy and dark
- Healing slime
- Detects gossip in the party
- Small agile warrior
- Very powerful skill that hits a single target multiple times
- Big boobed mage
- Revives a fallen ally with 30% HP
- Lance's giant limit break in space
- Lewd illusion limit break
- Meat shield
- Suicidal rocks
- Anna's HP steroid
- Lance's dad was killed in a _________ing accident
- Skill that blinds enemies with light
- Sword wielding robot boss
- Allows the party to sail
- Matt's physical attack steroid
- Nature girl
- Ghosts that use powerful magic
- Lance's main battle tank
- Natalie's kitchen utensil
- Alien structure that is weak to water and electricity
- Status effect that decreases evade and accuracy over time
- Natalie's physical attack steroid
- Buffs an ally's attack by 60%
- Giant smelly plant boss
- Massive water based limit break
53 Clues: Meat shield • Nature girl • Edgy fascist • Limbless cat • Healing slime • Mermaid enemy • Haunted armor • Suicidal rocks • Undertale boss • Alcoholic dogs • Anna's village • Big boobed mage • Anna's guardian • Fast travel slime • Anna's HP steroid • Crab-like enemies • Pumpkin robot boss • Small agile warrior • Laziest of all bears • Matt's signature sword • Multi-slash limit break • Giant smelly plant boss • ...
Chapter 2 - Cybersecurity Threat Landscape 2025-09-08
Across
- attacks seeking to extort money or other concessions from victims by threatening to release sensitive information or launching further attacks
- the set of activities and resources available to cybersecurity professionals seeking to learn about changes in the threat environment
- attack that attempts to compromise devices, systems, or software before it even reaches the organization
- attacks motivated by organizations seeking to steal secret information from other organizations
- attack that occurs when an employee, contractor, vendor, or other individual with authorized access to information and systems uses that access to wage an attack
- a geographic view of threat intelligence
- an anonymous network created through encryption technology and often used for illicit activity
- attacks by actors hacking into either foreign governments or corporations
- attacks motivated by a desire to get even with an individual or organization by exacting retribution against them
- attacks seeking to take down or interrupt critical systems or networks
- term for attackers who use hacking techniques but have limited skills; aka script kiddie
- threat actor that comes from within our own environment
Down
- attacks motivated by a desire to expose vulnerabilities and improve security
- attack in which access to sensitive information is gained and then removed from an organization
- attacker who uses hacking techniques to accomplish an activist goal
- includes information like the severity, fixes, and other information useful for both attackers and defenders
- the path or means by which an attack can gain access to a target in order to cause harm
- threat actor that exists outside organizations: competitors, criminals, and the curious
- threat intelligence that is acquired from publicly available sources
- attacks on a system that exploits vulnerabilities that are unknown to others, including the vendor
- the study of the methods used by cybersecurity adversaries when engaging in attacks
21 Clues: a geographic view of threat intelligence • threat actor that comes from within our own environment • attacker who uses hacking techniques to accomplish an activist goal • threat intelligence that is acquired from publicly available sources • attacks seeking to take down or interrupt critical systems or networks • ...
Cisco Chapter 3 Vocab! 2023-10-23
Across
- A vulnerability found in web applications that allows criminals to inject scripts into webpages commonly viewed by users; may contain malicious code
- The sending of unauthorized messages to another Bluetooth device
- A document that specifies practices that must be agreed upon before gaining access to the network
- An attack that allows a criminal to execute any command on a target machine after taking advantage of a vulnerability
- A form of fraud using text messaging to impersonate legitimate sources
- Attacks made to boost malicious sites to rank higher in search results
- Code that replicates itself independently; slows down networks
- Malware that alters a computer browser’s settings to redirect to malicious websites; installed without permission
- Malware that displays pop-ups; comes with Spyware
- A form of fraud where the attackers use spoof calls from legitimate sources
- An attack where criminals intercept a network by gaining the encryption key to analyze the network
- A wireless access point that can be installed on a secure network without authorization to pose a risk; Used as a setup for MitM attacks
- An attack that exploits the weaknesses in a program, such as not validating databases properly
- Add-ons to browsers that display content developed for the appropriate software
- A person tags along with authorized individuals for access to a restricted area
- An attacker examines all the network traffic as it passes through various Network cards on devices, regardless of whether it was addressed to them.
- A method in which criminals observe, or pay close attention to a victim to pick up sensitive information
- An attack where the victim’s information, such as contacts, is copied by an attacker
- A form of fraud where customized emails are sent to specific individuals
- An act of deceiving or tricking someone; elicits a user reaction
- Executable code attached to another executable file, usually a legitimate application; requires a host application
- The disruption of the transmission of a radio station so that the signal sent never reaches the receiving stations
Down
- Malware that carries out operations through a legitimate-looking file
- A fraud attack that targets high-profile individuals within organizations
- Traps a criminal between two sets of doors, where an outer door must close before entering the inner door
- A network attack that builds a network of botnets, which are infected users, to overwhelm the network with requests, rendering it unavailable
- A program that bypasses the normal authentication of a device
- -A computer attack that exploits software vulnerabilities that are unknown to the vendor; A fast-moving cyber attack
- A type of network attack that results in the interruption of services to devices; Makes the network unavailable
- A program that uses a trigger to awaken
- An attack that manipulates individuals into performing actions or giving sensitive information; A non-technical means of gathering information
- Applications that act in an undesirable manner, whether there is malware within it or not; Can still pose a risk
- - A program that tracks the keystrokes of a user on the system; Can be malicious and legitimate
- The act of intercepting communications between computers to steal information, or manipulate messages crossing the network.
- Software created to disrupt computer operations or gain access without permissions
- The action of pretending to be someone else to undermine credibility
- A program that exploits vulnerabilities and performs privilege escalation
- Impersonation of legitimate websites to deceive users into entering sensitive credentials.
- An event that occurs when data goes beyond the limits of a buffer, which could lead to system crashes, loss of privileges, or data compromise
- Pop-up windows that persuade the user to act based on fear
- A form of fraud where an attacker steals credentials by acting as a reputable source
- A program that holds a computer captive until the target makes a payment
- The process of going through a target trash to obtain information that is thrown out
- An impersonation attack that takes advantage of a trusted relationship between two systems, such as the acceptance of authentication
- Unsolicited mail containing harmful links, malware, or deceptive content
- Software that tracks a user’s computer activities
46 Clues: A program that uses a trigger to awaken • Malware that displays pop-ups; comes with Spyware • Software that tracks a user’s computer activities • Pop-up windows that persuade the user to act based on fear • A program that bypasses the normal authentication of a device • Code that replicates itself independently; slows down networks • ...
Pokémon Crossword 2025-01-14
Across
- Gen 4, Mono-Ground, Stage 1 of 2, and a BST of 330 with 78 Defense
- Gen 5, Mono-Bug, Stage 1 of 2, and a BST of 315 with 75 Attack
- Gen 1, Normal-Fairy, Stage 3 of 3, and a BST of 435 with 140 HP
- Gen 5, Mono-Bug, Stage 1 of 2, and a BST of 305 with 85 Defense
- Gen 6, Rock-Fairy, No Evo, and a BST of 500 with 150 both Defences
- Gen 5, Mono-Water, No Evo, and a BST of 470 with 165 HP
- Gen 5,Ground-Ghost, Stage 2 of 2, and a BST of 483 with 124 Attack
- Gen 5, Ground-Steel, Stage 2 of 2, and a BST of 508 with 135 Attack
- Gen 8, Mono-Fighting, Stage 2 of 2, and a BST of 507 with 135 Attack
- Gen 4, Mono-Electric, Stage 3 of 3, and a BST of 540 with 123 Attack
- Gen 6, Dark-Psychic, Stage 1 of 2, and a BST of 288 with 54 Attack
- Gen 2, Mono-Rock, Stage 2 of 2, and a BST of 410 with 115 Def
- Gen 5, Mono-Steel, Stage 3 of 3, and a BST of 520 with 115 Defense
- Gen 7, Mono-Normal, Stage 1 of 2, and a BST of 534 with 95 in 4 Stats
- Gen 3, Ice-Water, Stage 1 of 3, and a BST of 290 with 70 HP
- Gen 5, Mono-Dark, Stage 1 of 2, and a BST of 281 with 66 Speed
- Gen 3, Water-Flying, Stage 1 of 2, and a BST of 270 with 85 Speed
- Gen 3, Mono-Grass, Stage 1 of 3, and a BST of 220 with 50 Defense
Down
- Gen 3, Mono-Rock, No Evo, and a BST of 580 with 200 Defense
- Gen 7, Mono-Normal, No Evo, and a BST of 480, with 115 Attack
- Gen 7, Mono-Water, No Evo, and a BST of 410 of 130 both Defences
- Gen 5, Mono-Normal, Stage 2 of 2, and a BST of 420 with 85 Attack
- Gen 4, Steel-Psychic, Stage 2 of 2, and a BST of 500 with 116 both Def
- Gen 5, Ground-Electric, No Evo, and a BST of 471 with 109 HP
- Gen 8, Normal-Psychic, Stage 2 of 2, and a BST of 525 with 105 both Atk’s
- Gen 8, Mono-Dark, Stage 2 of 2, and a BST of 455 with 92 Special Defense
- Gen 7, Water-Bug, Stage 1 of 2, and a BST of 269 with 72 Attack
- Gen 9, Mono-Grass, Stage 1 of 2, and a BST of 304 with 62 both Atk’s
- Gen 6, Bug-Flying, Stage 3 of 3, and a BST of 411 with 90 Special Attack
- Gen 5, Bug-Rock, Stage 2 of 2, and a BST of 475 with 125 Defense
- Gen 1, Mono-Normal, Stage 1 of 2, and a BST of 290 with 90 Speed
- Gen 8, Mono-Flying, Stage 2 of 3, and a BST of 365 with 77 Speed
- Gen 6, Mono-Psychic, Stage 2 of 2, and a BST of 466 with 104 Speed
- Gen 2, Mono-Electric, Stage 1 of 3, and a BST of 280 with 65 Sp. Attack
- Gen 1, Mono-Fire, Stage 2 of 2, and a BST of 505 with 100 Sp.Def&Speed
- Gen 3, Mono-Poison, Stage 2 of 2, and a BST of 467 with 100 HP
- Gen 9, Electric-Flying, Stage 1 of 2, and a BST of 490 with 125 Speed
- Gen 7, Poison-Fire, Stage 1 of 2, and a BST of 320 with 77 Speed
- Gen 1, Mono-Ground, Stage 1 of Split Evo, and a BST of 320 with 95 Def
- Gen 5, Mono-Psychic, Stage 3 of 3, and a BST of 490 with 125 Sp. Atk
40 Clues: Gen 5, Mono-Water, No Evo, and a BST of 470 with 165 HP • Gen 3, Mono-Rock, No Evo, and a BST of 580 with 200 Defense • Gen 3, Ice-Water, Stage 1 of 3, and a BST of 290 with 70 HP • Gen 5, Ground-Electric, No Evo, and a BST of 471 with 109 HP • Gen 7, Mono-Normal, No Evo, and a BST of 480, with 115 Attack • ...
BI416 Case study #1 Crossword 2021-10-06
Across
- A habit that may be linked to panic attacks
- over time panic attack episodes increase in ______
- Avoidance of ____ is typically associated with panic attack disorder
- Repeated episodes of panic attacks accompanied with physical manifestations followed by the fear of another episode and/or the consequences of the panic attack such as death.
- Past medical disorder that may increase an individuals chance of developing panic attack disorder
Down
- Manifestation associated with tightening in chest and difficulty breathing
- Sensation of fast beating or pounding heart
- Something that is feared when suffering from panic attack disorder
- Measurements indicating state of vital body functions
- A risk factor associated with panic attack disorder
10 Clues: Sensation of fast beating or pounding heart • A habit that may be linked to panic attacks • over time panic attack episodes increase in ______ • A risk factor associated with panic attack disorder • Measurements indicating state of vital body functions • Something that is feared when suffering from panic attack disorder • ...
Attack on Titan quiz (AOT) 2021-05-18
Across
- Levi but bald and different personaily.
- the flowers that are always in eremika scenes.
- Who does Annie likes.
- The person who is always with Gabi.
- who loves Historia.
- Jean's love interest.
- Monkey.
- has many names.
- Previous attack titan shifter than Grisha.
- Only smiled once.
Down
- has a good smell sense.
- tree hugger.
- Who is the villain in AOT?
- What is Eren to Mikasa? :)
- Best commander.
- Hange's love.
- Historia's baby father.
- Sasha's fav food.
- best trio.
- How many walls there are in AOT?
- Anger issues boy.
- Historia's last name.
22 Clues: Monkey. • best trio. • tree hugger. • Hange's love. • Best commander. • has many names. • Sasha's fav food. • Anger issues boy. • Only smiled once. • who loves Historia. • Who does Annie likes. • Jean's love interest. • Historia's last name. • has a good smell sense. • Historia's baby father. • Who is the villain in AOT? • What is Eren to Mikasa? :) • How many walls there are in AOT? • ...
Attack on Titan (2022 spoilers) 2022-12-14
Across
- Sacrifices himself to save the Warriors from a Titan attack; the original Jaw Titan
- The original Titan, whose death gives way to the Nine
- A forest on Paradis of unnaturally large trees
- Originally Eren's nemesis, this soldier becomes a skilled leader after he's motivated by a friend
- Name given to the strange being that gave the Founder Ymir her power
- A quadruped Titan which can be fitted with different equipment depending on the situation
- The Founder Ymir; becomes the first Titan
- The outermost wall and the first breached; plugged years later by Eren
- Grisha's wife, tragically eaten before her son when Shingashina is broken into
- A young tactical genius who wants nothing more than to explore the outside world
- An Anti-Marleyan Volunteer and devotee to Zeke
- Self-described savior from Marley; the Beast Titan
- Tries to inherit the Armored Titan to save Gabi; becomes the Jaw Titan after Porco
- An Anti-Marleyan Volunteer and a skilled pilot
- The innermost wall, where the rich live; never breached
- King Fritz took his people here and sealed them inside walls to protect them from the outside world
- The War Hammer Titan; eaten by Eren
- Titan passed down through the Tybur family; makes the weapons it needs out of Titan hardening
- Titan which resembles animals; infamous for its deadly throwing ability
- The true name of Christa Lenz
- A "god of destruction"; 60-meters tall
- A violent, warmongering King responsible for the creation of the Nine Titans
- Eccentric drunk whose brazen strategy reclaims the district of Trost
- Reserved soldier; died at Utgard Castle
- Tens of millions of Wall Titans trampling the world flat
- A special branch of ODM Gear built for use against humans instead of Titans
- A military nation which creates Titans and sends them to Paradis
- Younger brother, sacrifices himself to save Falco; the Jaw Titan
- A military genius who throws away his humanity to discover the truth of the world
- Mindless Titans which prey on people instinctively
Down
- Caring soldier with hidden royal blood
- Due to the tragic death of his mother, this boy aims to kill every last Titan
- Eccentric scientist dedicated towards discovering the secret of the Titans
- Titan with claws and jaws strong enough to break through Titan hardening
- Self-described genius from Ragako
- A Warrior Candidate crushed by rubble during Eren's assault on Marley
- A selfish, closed-off soldier with an unmistakable devotion to Christa
- Hunter with a country accent and an insatiable love of food
- This Titan ate Eren's mother and is responsible for awakening the power of the Founding Titan in him
- The middle wall, breached second and plugged with a boulder
- Develops a split personality from his guilt and trauma
- Humanity's strongest soldier; clean freak
- Becomes the world's largest Pure Titan after incorrectly ingesting Titan spinal fluid
- Eren's father, who kills most of the Reiss family and steals the power of the Founding Titan
- An Eldian spy within Marley; possesses the Attack Titan
- Titan with thick skin; has the ability to selectively harden parts of its body
- Garrison soldier who saves Eren and Mikasa during the destruction of Shingashina
- His skill is only second to Levi
- The second district broken into; saved by Eren Jaeger, using a boulder
- Internment zone within Marley
- Unmatched devotion to Eren and incredible natural talent/skill
- One of the Nine; has the power to transcend time through the memories of its past and future users
- Tall and timid; the original Colossal Titan
- The Beast Titan before Zeke; teaches him to throw
- A bright and friendly cadet, dies at the hands of the Warriors
- Wants to become a Warrior before she learns what those on Paradis are really like
- Isolated soldier with a secret caring side; the Female Titan
- A Warrior possessing superior judgement; the Cart Titan
- Becomes a martyr in an effort to declare war on Paradis
- First wife of Grisha Jaeger, later eats Karla Jaeger
- Uncle to Levi, raised him for a time in the underworld
- Grisha's sister, callously devoured by dogs
- Versatile Titan with the ability to mimic other Titan abilities, such as hardening
- Nickname earned by Sasha Braus
- Hometown of Eren and Armin; the first district destroyed by the Warriors
- Equipment that uses hooks, wires, and gas to propel its users through the air
- A Warrior Candidate trampled to death during Eren's assault on Marley
- Right-hand man of Section Commander Hange; tries his best to keep her in line
68 Clues: Internment zone within Marley • The true name of Christa Lenz • Nickname earned by Sasha Braus • His skill is only second to Levi • Self-described genius from Ragako • The War Hammer Titan; eaten by Eren • Caring soldier with hidden royal blood • A "god of destruction"; 60-meters tall • Reserved soldier; died at Utgard Castle • The Founder Ymir; becomes the first Titan • ...
WW2 2023-01-11
Across
- Italy attempted to gain access to the ____
- Where did Hitler decide to attack the Allied lines in the west during the deadly winter
- In 1945 _____ was executed by the Italian resistance fighters
- Japan attempted to attack/ gain control of the ______
- An operation in which Hitler surrounded the city of Leningrad and cut it off from the rest of the Soviet Union
- Hitler attempted to break his ____ with the Soviet Union and invade
- The Japanese launched an ____ attack on the American naval base of Pearl Harbor
- Germany invaded Poland using the new military strategy _____
- Hitler planned to defeat the _____
- German code-making machine _____
Down
- An invasion that started on September 1, 1939
- was the largest land and sea attack in history
- The US dropped a bomb on the Japanese city of _____
- The US and Japanese fought over the ___ islands
- Japanese built an ____ on the island of Guadalcanal
15 Clues: German code-making machine _____ • Hitler planned to defeat the _____ • Italy attempted to gain access to the ____ • An invasion that started on September 1, 1939 • was the largest land and sea attack in history • The US and Japanese fought over the ___ islands • The US dropped a bomb on the Japanese city of _____ • Japanese built an ____ on the island of Guadalcanal • ...
Henle 8 20250303 2025-03-03
13 Clues: we pray • I seize • to pray • we seize • to attack • they seize • she attacks • they praise • they attack • you (pl) praise • you (pl) prepare • you (sing) praise • you (sing) prepare
Vocabulary 7 Word List 1 2025-08-28
13 Clues: attack • dreadful • movement • pondering • to destroy • to decrease • thoughtfully • periodically • large number • to drive away • rapid outpouring • to make a feint or sham attack • to speak with little preparation
Pearl Harbor 2023-10-16
Across
- Country that attacked Pearl Harbor
- On December 8, the U.S. declared ___ on Japan
- Pearl Harbor was the main base in the ___ Ocean
- Hawaii was a ___ not a state on the day of the attack
- The attack lasted about 2 ___
- Hawaiian island where Pearl Harbor is located
- Time of day the attack started
- 2,280 servicemen and women were ___ in the attack
Down
- Leader of the Japanese naval forces (last name only)
- Pearl Harbor provided easy ___ for Japanese aircraft carriers
- Pearl Harbor monument is built above the wreckage of this ship
- President who called it "a date which will live in infamy" (last name only)
- Natural Resource that Japan wanted from SE Asia
13 Clues: The attack lasted about 2 ___ • Time of day the attack started • Country that attacked Pearl Harbor • On December 8, the U.S. declared ___ on Japan • Hawaiian island where Pearl Harbor is located • Pearl Harbor was the main base in the ___ Ocean • Natural Resource that Japan wanted from SE Asia • 2,280 servicemen and women were ___ in the attack • ...
Malware and Social Engineering Key-Terms 2023-11-22
Across
- An attack in which the victim receives an email disguised to look as if it has come from a reputable source, in order to trick them into giving up valuable data.
- The month where the WannaCry attack took place.
- malicious form of self replicating software.
- a software that is designed to gain access to your device with malicious intent.
- A botnet is a large collection of malware-infected devices (zombies).
- an unwanted software that monitors and gathers information on a person and how they use their computer.
- A form of spyware that records every keystroke made by the user.
Down
- A ransomware attack that affected over 200,000 computers.
- infects a computer and downloads or displays malicious adverts/pop-ups when the victim is online.
- An attacker chooses when to wake the zombies to perform an attack.
- An attack designed to steal a victim's password or other sensitive data.
- use up network bandwidth and slow down the network.
- a software that appears to be useful but performs malicious actions.
- demands that a ransom be paid before they decrypt the files and unlock the computer.
- Something that can happen to your files when you're affected by malware.
15 Clues: malicious form of self replicating software. • The month where the WannaCry attack took place. • use up network bandwidth and slow down the network. • A ransomware attack that affected over 200,000 computers. • A form of spyware that records every keystroke made by the user. • An attacker chooses when to wake the zombies to perform an attack. • ...
Army 2019-07-11
Across
- Used to shoot big guns and transport
- Special Forces
- Where troops live
- Comes out of guns
- Vehicle
- Used to transport troops
- Used to bomb and also transport troops
- The Opposition
- To stop things from being destroyed
- To hide soldiers
Down
- Used to shoot
- To attack something
- Where a battle takes place
- Rank
- To destroy buildings
- Rank
- To protect the head
- To train troops
- To put in guns
19 Clues: Rank • Rank • Vehicle • Used to shoot • Special Forces • To put in guns • The Opposition • To train troops • To hide soldiers • Where troops live • Comes out of guns • To attack something • To protect the head • To destroy buildings • Used to transport troops • Where a battle takes place • To stop things from being destroyed • Used to shoot big guns and transport • ...
CHAPTER 14 CROSSWORD 2020-08-27
Across
- programs that ping every port on the target to identify which ports are open
- an attack which the device is damaged and must be replaced. Also attacks the firmware located in many systems.
- a DoS attack that inundates the receiving machines with lots of packets that cause the victim to waste resources by holding connections open.
- a huge invasion at the root level, followed with a DoS attack finale.
- someone intercepts packets intended for one computer and reads the data
- overwrite your boot sector, making it appear as if there is no pointer to your operating systems. The viruses work their way into the master boot record that is essential to the ground-zero sector on your hard disk where applications are not supposed to be.
- attack well-known holes in software that is running on servers
- a major spike in traffic in the network as bots that have been recruited mount the attack
- the process of changing a source IP address so that one computer appears to be a different computer
- paths leading into a computer or network
- hacker captures raw packets of information off the network for analyzing
- someone exploits a trust relationship in your network and the attacker gains control of a host that is outside the firewall and yet trusted by the host that are inside the firewall.
- friendly fire, caused by a spike in activity to a website or a resource that overpowers its ability to respond
- replaces some or all of the target program’s code with their own (i.e. executable application and system program files like those with filename ending in .com and .dll)
- a service attack amplified by recruiting helpers in the attack process
- using a rootkit to probe, scan, then capture data on strategically positioned computers poised to give hackers “eyes” in the entire system automatically.
- (malware) any software that harms a computer, deletes data, or takes actions the user did not authorize.
- attacker sends a large number of management packets called deauthentication frames on the WLAN, causing stations to be disconnected from the access point
- the attacker attempts to refresh or update the record when it expires with a different address than the correct address
- traffic from one VLAN being sent to the wrong VLAN
- malicious employee (adhere to the principal of least privilege).
- gathering all the information you can about a network in order to break into the network
Down
- recruiting bots to aid the attack reflected of the Network Time Protocol servers.
- an attacker takes over a user’s session with a secure server after authentication
- capturing and analyzing leaking emanation of things like radio or electrical signals, sounds, and vibrations.
- little programs that cause a variety of very bad things to happen to your computer. Such as, display a message, delete files, or send huge amounts of meaningless data over a network to block legitimate messages.
- a part of a man-in-the-middle attack. Two computers having a conversation can insert an incorrect IP address
- tunneling by concealing one protocol within another
- password cracking, the attacker attempts every possible combination of numbers and letters that could be in a password
- cloaks the identity of the device before performing the port scan (machine acts as a middleman for the request
- Bomb malware that executes when forensics are being undertaken or when a particular event takes place
- prevents users from accessing the network and/or its resources
- first day the virus has been released and therefore no known fix exists.
- the hacker breaks into the host machine and uses it to redirect traffic that normally would not be allowed passage through a firewall
- malware prevents or limits users from accessing their information. The data is encrypted and the decryption key is only made available to the user when the ransom has been paid
- the hacker writes the SSID and security employed near your facility online.
- authentication, authorization, and accounting servers that verify the identity of, grant access to, and track the actions of users
- a DoS that floods its victim with spoofed broadcast ping messages
- attempting to illegally obtain sensitive information by pretending to be a credible source
- reflection attack in that the attacker delivers traffic to the victim by reflecting it off a third party (sends a small DNS message using the victim’s IP address).
- a group of programs connected on the Internet for the purpose of performing a task in a coordinating manner.
- a humongous ICMP packet is sent to the remote host victim, totally flooding the victim’s buffer and causing the system to reboot or helplessly hang there drowning.
- placing a fake VLAN tag into the packet along with the real tag
- increase the effectiveness of a DoS attack
- attacks that cause hardware damage to a device
- a script of commonly enacted commands used to automatically carry out tasks without requiring a user to initiate them.
46 Clues: paths leading into a computer or network • increase the effectiveness of a DoS attack • attacks that cause hardware damage to a device • traffic from one VLAN being sent to the wrong VLAN • tunneling by concealing one protocol within another • prevents users from accessing the network and/or its resources • ...
Cardiac Emergencies and CPR 2024-01-02
Across
- Which finger is used for a finger sweep for adults?
- The first step in the adult chain of survival.
- Cardiac arrest frequently occurs without any what?
- Irregular heart rates can result in stopping what?
- The third step in the adult chain of survival.
- Stoppage of the heart all together.
- Number of rescue breaths given after the object is removed.
Down
- Should be administered first when a heart attack is detected.
- The minimum rate per minute of continuous chest compression.
- Permanent damage to the heart muscle is caused by cells not receiving what?
- A symptom of a heart attack.
- A symptom of a heart attack.
- How should you act in the presence of a heart attack?
- The third step in the pediatric chain of survival.
- Location of plaque buildup, leading to a heart attack.
- The second step in the adult chain of survival.
- If the chest does not rise on the second breath, you can assume the airway is what?
17 Clues: A symptom of a heart attack. • A symptom of a heart attack. • Stoppage of the heart all together. • The first step in the adult chain of survival. • The third step in the adult chain of survival. • The second step in the adult chain of survival. • Cardiac arrest frequently occurs without any what? • Irregular heart rates can result in stopping what? • ...
Asthma 2013-02-01
Across
- Found on heart muscles (12)
- A leading cause in heart attacks (7)
- A way to reduce the chance of a heart attack (10)
- Microscopic bug that can cause a asthma attack (8)
- Where the air comes from and swells up during asthmatic attacks(7)
- comes off animals and can trigger asthmatic attacks (6)
- what type of disease asthma is (8)
Down
- Can cause a heart attack (6)
- too much of it will increase chances of a heart attack (4)
- A person who has asthma (10)
- can fill up your lungs with tar (10)
- clogs up the airways (5)
12 Clues: clogs up the airways (5) • Found on heart muscles (12) • Can cause a heart attack (6) • A person who has asthma (10) • what type of disease asthma is (8) • A leading cause in heart attacks (7) • can fill up your lungs with tar (10) • A way to reduce the chance of a heart attack (10) • Microscopic bug that can cause a asthma attack (8) • ...
Anxiety Disorders 2024-03-28
13 Clues: trauma • experience • hereditary • cant escape • PTSD symptoms • type of anxiety • irrational fear • stress disorder • fight or flight • repeated thoughts • repetitive behaviors • cycles of mood changes • similar to a heart attack
Cycle 11 2016-07-09
11 Clues: heated argument • an aggressive act • deliberate killing • repeating something • causing great damage • an unwelcome intrusion • short for psychoanalysis • the combination of components • able to use both left and right hand • the combination of sounded musical notes • make an attack in return for a similar attack.
Civil war crossword 2024-04-23
15 Clues: attacking • rush-to-army • hard-cracker • rebel-nation • smooth-firearm • unexpected-attack • white-flag-defeat • get-rid-of-slavery • using-african-labor • going-against-people • Freedom-from-slavery • cruel-killing-of-many • unexpected-side-attack • supported-south-but-in-union • strengthen-troops-with-new-soldiers
Crime in the UK 2024-06-12
15 Clues: Worry • Rather • Evidence • Companion • Protection • Deal, Contract • A sharp utensil • "________ spree" • A target of violence • Things not in common • Units of information • In the company of other people • An item used to attack or defend • Use of force against others, attack • An organization that sells products or services
September 11, 2001 Puzzle 2023-05-17
Across
- How many planes went down on 9/11?
- what type of attack was 9/11?
- Founder of al-Qaeda.
- Around how many casualties resulted from this attack?
- Who was president when Osama was killed?
- How many terrorists where involved in 9/11?
- You cannot travel without one.
- Where did they find Osama hiding?
Down
- Where did the first two planes hit?
- Type of plane used in the attacks.
- Flight 93 crashed in this state.
- What airline did the terrorists use?
- Where in Washington D.C did the third plane hit?
- Who was president at the time?
- Where Flight 11 and 175 crashed.
- Name of the terrorist group that carried out this attack?
16 Clues: Founder of al-Qaeda. • what type of attack was 9/11? • Who was president at the time? • You cannot travel without one. • Flight 93 crashed in this state. • Where Flight 11 and 175 crashed. • Where did they find Osama hiding? • How many planes went down on 9/11? • Type of plane used in the attacks. • Where did the first two planes hit? • What airline did the terrorists use? • ...
ENGLISH 1 - VOCABULARY UNIT 3 2020-10-06
Across
- exit from, leave (ex. A building)
- closeness
- exchange, trade
- sb/sth to be monitored, (for people) possibly dangerous
- attack (p.27)
- french police officer
- observation by police
- attack (p.27)
- make hole in a surface
- soldier’s accommodation
- small and unimportant /not serious
- found guilty of a crime
Down
- outlying areas of a city
- restrain, limitation, imprisonment
- clever, (here) secret service
- extremist beliefs
- isolated, secluded, away from others
- end
- violent public disorder
- attack(p.26)
20 Clues: end • closeness • attack(p.26) • attack (p.27) • attack (p.27) • exchange, trade • extremist beliefs • french police officer • observation by police • make hole in a surface • soldier’s accommodation • violent public disorder • found guilty of a crime • outlying areas of a city • clever, (here) secret service • exit from, leave (ex. A building) • restrain, limitation, imprisonment • ...
The Cardiovascular System 2023-11-16
Across
- cardiac rhythm management
- HEART
- Attack
- vessels that return blood to the heart
- vessels that deliver blood to tissues
- a scan used to look at the heart and nearby blood vessels
- failure When the heart fails
- how the heart works during physical activity
- a sudden blockage
- muscle disease
Down
- peripheral vascular disease
- CELL
- are networks of small vessels that perfuse tissues
- cardiovascular disease
- transient ischemic attack
- a problem with the rate of your heartbeat
- BLOOD
- computed tomography scan
- magnetic resonance imaging
- CLOT, LUMP
- Pumps blood through the system
- electrocardiogram
22 Clues: CELL • HEART • BLOOD • Attack • CLOT, LUMP • muscle disease • a sudden blockage • electrocardiogram • cardiovascular disease • computed tomography scan • cardiac rhythm management • transient ischemic attack • magnetic resonance imaging • peripheral vascular disease • failure When the heart fails • Pumps blood through the system • vessels that deliver blood to tissues • ...
heart attack/plaque/blood pressure 2023-03-23
Across
- An area of tissue that undergoes necrosis due to ischemia
- formation of a clot that occludes blood flow
- Term for an event that suffers from hypoxia due to an occlusion resulting in decreased blood flow.
- A clot that travels from one area to another
- chronic high blood pressure
- blood pressure cuff
- Lack of Oxygen due to insufficient blood supply
- A stationary blood clot
- Pressure exerted on the artery wall during ventricular relaxation
- The body's natural response to a trauma (natural healing process)
- The deposit of fatty material in the lining of a wall of an artery
- death of tissue
Down
- narrowing of a vessel
- chronic low blood pressure
- Referring or having to do with the heart
- The "blood space" in a vessel
- An event resulting from a occlusion caused by a "traveling" clot
- Pressure exerted on the artery wall during ventricular contraction
- hardening of the arteries
- blockage of a vessel
- The body's response to trauma as a result of a "condition"
- An x-ray image to look for stenosis of an artery
22 Clues: death of tissue • blood pressure cuff • blockage of a vessel • narrowing of a vessel • A stationary blood clot • hardening of the arteries • chronic low blood pressure • chronic high blood pressure • The "blood space" in a vessel • Referring or having to do with the heart • formation of a clot that occludes blood flow • A clot that travels from one area to another • ...
Pokémon with 130-139 Attack 2024-02-13
Across
- 130 Steel VIII
- 130 Fire/Flying II
- 130 Grass/Fairy VII
- 135 Fighting/Dragon IX
- 130 Fighting/Dark VIII Single-Strike Style
- 130 Ground/Rock I
- 131 Dark/Flying VI
- 135 Dark/Steel IX
- 131 Ground/Fighting IX
- 130 Fighting I
- 130 Grass/Psychic IX
- 135 Bug/Fighting IX
- 130 Fire/Dragon I Mega X
- 137 Psychic/Steel VII
- 134 Dragon/Flying I
- 135 Rock V
- 132 Grass/Ice IV Mega
- 130 Dark III
- 130 Fairy/Fighting IX
- 131 Fairy VI
- 130 Fighting/Poison VIII
Down
- 130 Dragon/Ground IV
- 130 Grass/Fighting III
- 139 Dragon/Dark IX
- 135 Ground/Steel V
- 139 Bug/Fighting VII
- 136 Normal/Fighting IV Mega
- 135 Bug/Steel V
- 130 Normal II
- 130 Dragon/Ice V
- 135 Fighting VIII
- 134 Rock/Dark II
- 130 Dragon/Psychic III Mega
- 130 Fire I
- 134 Rock/Electric IX
- 135 Rock/Flying I Mega
- 130 Bug/Steel II
- 135 Steel/Psychic III
- 130 Ice/Ground IV
- 130 Water I
- 135 Dragon/Flying III
- 131 Ghost/Grass VII
- 132 Fighting/Ice VII
- 137 Bug/Fighting VII
- 130 Ice V
- 130 Bug/Rock VIII
- 131 Rock/Steel VII
- 130 Fighting/Water VIII Rapid-Strike Style
48 Clues: 130 Ice V • 130 Fire I • 135 Rock V • 130 Water I • 130 Dark III • 131 Fairy VI • 130 Normal II • 130 Steel VIII • 130 Fighting I • 135 Bug/Steel V • 130 Dragon/Ice V • 134 Rock/Dark II • 130 Bug/Steel II • 130 Ground/Rock I • 135 Fighting VIII • 135 Dark/Steel IX • 130 Ice/Ground IV • 130 Bug/Rock VIII • 139 Dragon/Dark IX • 135 Ground/Steel V • 130 Fire/Flying II • 131 Dark/Flying VI • 131 Rock/Steel VII • ...
Attack on titan - Easy edition 2025-06-17
Across
- eren's family bloodline
- eats people for fun
- the number one titan killer
- eren's home
- levi's family bloodline
- reffered to as potato girl
- titans who act differently to normal ones
- the armored titan
Down
- eren's father
- eren's adopted sister
- studies titans
- leader of the scouts
- considered a luxury item
- soldier group eren, mikasa and armin joined
- the female titan
- what eren considers everyone inside the walls
- the main protaginist
- eren's titan
- big body of water filled with salt
- eren's smart and strategic friend
20 Clues: eren's home • eren's titan • eren's father • studies titans • the female titan • the armored titan • eats people for fun • leader of the scouts • the main protaginist • eren's adopted sister • eren's family bloodline • levi's family bloodline • considered a luxury item • reffered to as potato girl • the number one titan killer • eren's smart and strategic friend • ...
heart attack, Coranary artery bypass 2025-05-12
Across
- – Measure of deaths in a population.
- – Prefix meaning related to the heart muscle.
- – Fatty buildup that narrows arteries.
- – Surgery that bypasses blocked heart arteries.
- – High cholesterol in the blood.
- Site Body part used to take tissue for surgery.
- Extreme tiredness, often from lack of oxygen.
- The healing period after illness or surgery.
- – A blood clot in a blood vessel.
- – Chest pain from reduced heart blood flow.
- Condition where the heart can't pump well.
- A non-surgical heart artery-opening procedure.
- – Circulatory condition affecting blood vessels outside the heart.
Down
- – Total number of cases in a population.
- Restoring blood flow to the heart.
- – Tissue death due to lack of blood supply.
- Number of new cases in a given time.
- – Buildup of plaques in arteries.
- – Sudden tightening of artery muscles.
- Difficulty or discomfort in breathing.
- – Reduced blood flow, often causing pain.
- – Expected outcome of a disease.
- Molecule that provides energy to cells.
- Spontaneous tear in a heart artery wall.
24 Clues: – High cholesterol in the blood. • – Expected outcome of a disease. • – Buildup of plaques in arteries. • – A blood clot in a blood vessel. • Restoring blood flow to the heart. • – Measure of deaths in a population. • Number of new cases in a given time. • – Sudden tightening of artery muscles. • – Fatty buildup that narrows arteries. • Difficulty or discomfort in breathing. • ...
safe computing assignment 2025-08-06
Across
- Attack traffic to take servers down
- scrambles data for protection
- network of infected computers
- manipulating into confidential info
- hides malware
- records keynotes
- hides IP
- identity check
- stealing data from emails
Down
- watches and sends information to others
- malware disguised as program
- fix for volnurability
- attack targeting vulnerabilities of software
- blocks unauthorized access
- knowledge about cyber threats
- hacking to find flaws
- providing identity
- tries everything to gain access
- locks data until paid for
19 Clues: hides IP • hides malware • identity check • records keynotes • providing identity • fix for volnurability • hacking to find flaws • locks data until paid for • stealing data from emails • blocks unauthorized access • malware disguised as program • scrambles data for protection • network of infected computers • knowledge about cyber threats • tries everything to gain access • ...
Minecraft Mobs. 2022-11-22
Across
- Drops ink.
- An animal with horns.
- Lake food.
- Uses a bow.
- Little Enderman.
- Exploding mob.
- Doesn't attack until awaken.
- Green,brain-eating mob.
Down
- Scared until tamed.
- Sea monument guard.
- Ridable pet.
- Drops wool.
- Drops leather.
- This animal oinks.
- Has the ability to teleport.
- Mob that doesn't attack you but makes a speaking sound in caves.
16 Clues: Drops ink. • Lake food. • Drops wool. • Uses a bow. • Ridable pet. • Drops leather. • Exploding mob. • Little Enderman. • This animal oinks. • Scared until tamed. • Sea monument guard. • An animal with horns. • Green,brain-eating mob. • Has the ability to teleport. • Doesn't attack until awaken. • Mob that doesn't attack you but makes a speaking sound in caves.
Poke X Word : Puzzle # 14 (Hard) 2022-06-04
Across
- Attack: Swarming Sting
- Pokedex Entry: It is the world’s most slothful Pokémon. However, it can exert horrifying power by releasing pent-up energy all at once.
- Ability: Ancient Wisdom
- Pokedex Entry: From its spikes, it launches powerful blasts of electricity. Its red core contains an enormous amount of energy.
- Supporter: Choose a card in your hand, and discard the other cards. If you do, draw 4 cards. (If you have no other cards in your hand, you can’t use this card.)
- Attack: Desert Pillar
Down
- Attack: Max Lance
- Attack: Explosive Bolt
- Supporter: You can use this card only if you discard 2 {M} Energy cards from your hand. Search your deck for up to 2 cards and put them into your hand. Then, shuffle your deck.
- Ability: Giga Magnet
- Attack: Rogue Fangs
- Ability: Slimy Room
12 Clues: Attack: Max Lance • Attack: Rogue Fangs • Ability: Slimy Room • Ability: Giga Magnet • Attack: Desert Pillar • Attack: Explosive Bolt • Attack: Swarming Sting • Ability: Ancient Wisdom • Pokedex Entry: From its spikes, it launches powerful blasts of electricity. Its red core contains an enormous amount of energy. • ...
Poke X Word : Puzzle # 16 (Normal) 2022-06-16
Across
- Attack: Gigaton Break
- Item: Heal 120 damage from 1 of your Pokémon that has at least 2 Energy attached. If you healed any damage in this way, discard 2 Energy from it.
- Ability: Big Match
- Pokédex Entry: It eats snow that piles up on the ground. The more snow it eats, the bigger and more impressive the spikes on its back grow.
- Ability: Skyscraper
- Attack: Cry of Destruction
- Ability: Phantom Transformation
Down
- Item: Look at the top 7 cards of your deck. You may reveal an Energy card you find there and put it into your hand. Shuffle the other cards back into your deck.
- Pokédex Entry: The light that streams out from the holes in the pumpkin can hypnotize and control the people and Pokémon that see it.
- Attack: G-Max Swallow Up
- Attack: Bull Dash
- Attack: Mean Look
12 Clues: Attack: Bull Dash • Attack: Mean Look • Ability: Big Match • Ability: Skyscraper • Attack: Gigaton Break • Attack: G-Max Swallow Up • Attack: Cry of Destruction • Ability: Phantom Transformation • Pokédex Entry: The light that streams out from the holes in the pumpkin can hypnotize and control the people and Pokémon that see it. • ...
League of Legends and Heartstone 2015-04-15
Across
- adds a random ______ to your hand
- Gain 2 mana crystals this turn
- places wards
- 120 ap +30% ap
- the blind monk
- gains 80 attck and 20% crit
- the masters of shadows
- firelord
Down
- cards, spells, legendary?
- the void burrower
- give 2 attack to a minion
- the loose cannon
- gains a dream card into your hand
- adjacent minions gain 1 attack
- the serpents embrace
- active is a slow to all enemy
- Champions, spells, items?
- the chain warden
- jungling?
19 Clues: firelord • jungling? • places wards • 120 ap +30% ap • the blind monk • the loose cannon • the chain warden • the void burrower • the serpents embrace • the masters of shadows • cards, spells, legendary? • give 2 attack to a minion • Champions, spells, items? • gains 80 attck and 20% crit • active is a slow to all enemy • Gain 2 mana crystals this turn • adjacent minions gain 1 attack • ...
A is for anime 2020-02-12
Across
- Who did All Might give his quirk to?
- Animes started in what country?
- White _____ ____ attack germs
- Omae wa, mou shindeiru. _____?!
- Anime that introduces quirks
- All _____
- Manga is the ____ form of anime
- Most Titans are _____ feet tall
- Anime that teaches about the body
- Attack on ______
- Kame ____ ha!
Down
- A show known as anime in memes
- Deku's real name is _____
- These blood cells wear red hats
- Anime is short for _________
- Na____
- In Cells at Work, rockets are ______
- A Titan's body is super ____
- Naruto's son is named ______
- Eraser ____
20 Clues: Na____ • All _____ • Eraser ____ • Kame ____ ha! • Attack on ______ • Deku's real name is _____ • Anime is short for _________ • Anime that introduces quirks • A Titan's body is super ____ • Naruto's son is named ______ • White _____ ____ attack germs • A show known as anime in memes • These blood cells wear red hats • Animes started in what country? • Omae wa, mou shindeiru. _____?! • ...
ENGLISH 1 - VOCABULARY UNIT 3 2020-10-06
Across
- outlying areas of a city
- exit from, leave (ex. a building)
- isolated, secluded, away from others
- violent public disorder
- make hole in a surface
- french police officer
- attack (p.27)
- extremist beliefs
- observation by police
Down
- sb/sth to be monitored, (for people) possibly dangerous
- soldier’s accommodation
- closeness
- small and unimportant /not serious
- clever, (here) secret service
- attack (p.27)
- end
- restrain, limitation, imprisonment
- attack (p.26)
- found guilty of a crime
- exchange, trade
20 Clues: end • closeness • attack (p.27) • attack (p.26) • attack (p.27) • exchange, trade • extremist beliefs • french police officer • observation by police • make hole in a surface • soldier’s accommodation • violent public disorder • found guilty of a crime • outlying areas of a city • clever, (here) secret service • exit from, leave (ex. a building) • small and unimportant /not serious • ...
Pearl Harbor Remembrance Day 2024-11-04
Across
- What did America declare after the attack?
- What country attacked us?
- Who was president during the attack?
- What island did the attack take place on?
- row Where 8 battleships were anchored
Down
- Where is the Pearl Harbor Memorial located?
- Ship sunk during the attack
- What month did the attack on Pearl Harbor happen?
- United States Ship
9 Clues: United States Ship • What country attacked us? • Ship sunk during the attack • Who was president during the attack? • row Where 8 battleships were anchored • What island did the attack take place on? • What did America declare after the attack? • Where is the Pearl Harbor Memorial located? • What month did the attack on Pearl Harbor happen?
Basketball CrossWord 25 2024-06-08
12 Clues: Last shot • Foot turn • Twirl move • Attack play • Player swap • Denver team • Stop offense • Basket attack • One-hand shot • Sharp shooter • Backward shot • Playmaking center
Processor 2025-10-21
11 Clues: data • error • Hacking • hacking • permission • engineering • force attack • authentication • generator attacks • of Service attack • Denial of Service attack
CySec 2025-06-05
Across
- Attack exploiting built-in processors in hardware to execute malicious code
- Preferred framework for IP level security analysis
- Attack technique doesn't physically alter the chip but changes behavior through environmental stress
- Security impact leading to loss of core vehicle function
- Speculative execution attack targeting x86-64 processors
- Security Property most impacted by Denial of Service attack
Down
- Attack that adds hidden functionality during chip design
- Measurement setup often used in side-channel analysis
- Security Property ensuring information is accessible to only authorized agents
- Hardware protection that can be bypassed by repeatedly accessing memory
10 Clues: Preferred framework for IP level security analysis • Measurement setup often used in side-channel analysis • Attack that adds hidden functionality during chip design • Security impact leading to loss of core vehicle function • Speculative execution attack targeting x86-64 processors • Security Property most impacted by Denial of Service attack • ...
Soul Surfer 2025-11-15
Across
- Bethany's father's first name
- Bethany's best friend
- Bethany's home island in Hawaii
- Bethany had to show this after the attack
- This is a movie about
- Bethany's left arm was severed below the
- Is this story True or False
Down
- Where Bethany travels to help victims, giving her a new perspective
- The name of the youth leader who helps Bethany rediscover her purpose
- Bethany's primary sport
- Bethany's faith is a source of strength, specifically the _________ faith
- Bethany's mother's first name
- Bethany's first name
- The large fish responsible for the attack
- The body part Bethany had to use more to paddle after the attack
15 Clues: Bethany's first name • Bethany's best friend • This is a movie about • Bethany's primary sport • Is this story True or False • Bethany's father's first name • Bethany's mother's first name • Bethany's home island in Hawaii • Bethany's left arm was severed below the • Bethany had to show this after the attack • The large fish responsible for the attack • ...
Crime 2023-04-30
Across
- to steal something
- to attack someone with a knife
- to attack someone
- to steal something out of another person's pocket
- to lie to someone to get money off them
- to kill someone
Down
- to use a gun on someone
- to physically attack someone
- to take something from someone illegally
- to hit someone with your fists
- to threaten to hit someone in order to steal something off them
- to drive too fast in a car
- up to steal something using a gun
- to say bad things about someone
- to lie to someone so that you get money off them
15 Clues: to kill someone • to attack someone • to steal something • to use a gun on someone • to drive too fast in a car • to physically attack someone • to attack someone with a knife • to hit someone with your fists • to say bad things about someone • up to steal something using a gun • to lie to someone to get money off them • to take something from someone illegally • ...
Nastia and Dafna definition 2024-04-04
Across
- not smart
- a group of soliders in the military
- a group of people
- Something that happens unintentionally
- try to harm someone
- something that you don't find
- terrible
- something you can do well
- a shape with five sides and is on the walls of our classroom
- something with a lot of power
- to attack someone
Down
- something hard
- to rescue
- something you do when you sleep
- not strong
- not good
- not light
- not fully believe in something
- yell something loud
- not dead
- not common
21 Clues: not good • terrible • not dead • not smart • to rescue • not light • not strong • not common • something hard • a group of people • to attack someone • try to harm someone • yell something loud • something you can do well • something that you don't find • something with a lot of power • not fully believe in something • something you do when you sleep • a group of soliders in the military • ...
All Star Martial Arts Crossword 2023-01-26
Across
- Attack with fists
- What do you train?
- Attack with your feet
- Difference between soccer and taekwondo
- Strong woman
- All Star's money
- Keeps everyone safe
- Snack on Fridays
- Handsome man
- Practice fighting
- What should you wear every time you do class?
Down
- Name of your Martial Arts school
- First belt earned
- Orange ninja turtle's weapon
- Blue ninja turtle's weapon
- Summer, Spring, Fall, and ...?
- 4th dan and higher black belt
- Name of your training space
- Yellow thunder mouse
- You are the _ _ _ _
20 Clues: Strong woman • Handsome man • All Star's money • Snack on Fridays • First belt earned • Attack with fists • Practice fighting • What do you train? • Keeps everyone safe • You are the _ _ _ _ • Yellow thunder mouse • Attack with your feet • Blue ninja turtle's weapon • Name of your training space • Orange ninja turtle's weapon • 4th dan and higher black belt • Summer, Spring, Fall, and ...? • ...
global 10 2023-05-28
Across
- Adopt to modern needs and technology
- To westernize
- condor where people disappeared
- of Afghanistan U.S allies invade to remove the taliban
- of the plaza de mayo mothers of missing peoples trying to find their missing ones
- peaceful protest against the government
- war united states invaded and occupied Nicaragua for the bananas
- influenza a disease during world war 1
- To develop industry
Down
- states bring connected
- violent revolt that lead to a bloody civil war
- of iraq Result of the attack of 9/11 terrorist attack
- movement The push for Indians to give up buying British textiles and to make their own cloth
- A government that is based on religion
- infectious disease that is spreading
- Palestine uprising/ attack on the Israelis
- salt march Gandhi marched to ocean to collect salt
- spring A sense of pro democracy protest around the Arab world
- Satya and Agraha fighting without violence. Methods including protecting and hit cooperating
- When something is being desperately needed
20 Clues: To westernize • To develop industry • states bring connected • condor where people disappeared • Adopt to modern needs and technology • infectious disease that is spreading • A government that is based on religion • peaceful protest against the government • Palestine uprising/ attack on the Israelis • When something is being desperately needed • ...
Finns ANZAC crossword 2016-05-20
Across
- leader
- attack
- people who died in the war
- fall back
- water attack
- a Turkish strait
- India,s fighting troops
- dropping bombs on enemy's from above
- ottoman empire
Down
- take charge
- team mates
- high ground
- people who come to help you
- corporation
- Australia New Zealand Army Corps
- locating the enemy
- water force
- a time of peace to bury dead
- arriving
- no one is winning
- surrounding the enemy
- people in the army
- doing damage to someone
23 Clues: leader • attack • arriving • fall back • team mates • take charge • high ground • corporation • water force • water attack • ottoman empire • a Turkish strait • no one is winning • locating the enemy • people in the army • surrounding the enemy • India,s fighting troops • doing damage to someone • people who died in the war • people who come to help you • a time of peace to bury dead • ...
WW1 2022-10-03
Across
- Frank Ferdinand, who was assassinated
- muddy wet and unsafe
- Foot, wet and muddy
- no mans land
- of Verdun, French land
- Hungary, declared war on Serbia
- country
- ran out of
- system
- Days offensive
- fever
- flu
- Shock, PTSD
Down
- black hand, the group that was planning the attack
- boat that killed lots of people
- battle
- safe and comfortable trenches
- acronym for the longest term causes of WW1
- Empire, tripple alliance
- Alliance
- a deadliest weapon
- first gas attack
- ww1 years
23 Clues: flu • fever • battle • system • country • Alliance • ww1 years • ran out of • Shock, PTSD • no mans land • Days offensive • first gas attack • a deadliest weapon • Foot, wet and muddy • muddy wet and unsafe • of Verdun, French land • Empire, tripple alliance • safe and comfortable trenches • boat that killed lots of people • Hungary, declared war on Serbia • Frank Ferdinand, who was assassinated • ...
Pearl Harbor 2025-11-13
Across
- (White Flag from France)
- (Another word for a plane)
- (Art of ___ - Sun Tzu)
- (_________ of Independence)
- (The Country that was attacked)
- (Congress)
- (Large amount of combat vessels)
- (The ____ on Pearl Harbor)
- (Water bomb)
- (Large combat vessel)
- (One of our military branches [Water!])
Down
- (George Washington was the first _____)
- (_______ Birthday party)
- (Another word for invade)
- (The side of enemies of the Allies)
- (Synonym for deaths)
- (The people who created anime)
- (Free one: Bombing)
- (Opposite of the Axis)
- (The Attack on Pearl _____)
20 Clues: (Congress) • (Water bomb) • (Free one: Bombing) • (Synonym for deaths) • (Large combat vessel) • (Art of ___ - Sun Tzu) • (Opposite of the Axis) • (White Flag from France) • (_______ Birthday party) • (Another word for invade) • (Another word for a plane) • (The ____ on Pearl Harbor) • (_________ of Independence) • (The Attack on Pearl _____) • (The people who created anime) • ...
Zodiac Puzzle 2025-06-03
Across
- People targeted and killed by the Zodiac
- FERRIN Victim shot at Blue Rock Springs
- FRANCISCO City where Zodiac killed a taxi driver
- What Zodiac instilled in the public
- Another word for a coded message
- BERRYESSA Location where two victims were stabbed
- Zodiac’s symbol resembles this part of a gun sight
- HERMAN ROAD Scene of Zodiac’s first known attack
- A coded message Zodiac sent to the newspapers
Down
- Zodiac’s circle with a cross is called this
- Zodiac’s primary motive in his crimes
- STINE Taxi driver shot and killed by the Zodiac
- Zodiac often targeted couples
- Zodiac’s communications to newspapers and police
- Zodiac sent many to police and press
- HARTNELL Survived Zodiac's attack at Lake Berryessa
- MAGEAU Survivor of the Blue Rock Springs attack
- The infamous serial killer’s nickname
- ROCK SPRINGS Site of a Zodiac shooting attack
19 Clues: Zodiac often targeted couples • Another word for a coded message • What Zodiac instilled in the public • Zodiac sent many to police and press • Zodiac’s primary motive in his crimes • The infamous serial killer’s nickname • People targeted and killed by the Zodiac • FERRIN Victim shot at Blue Rock Springs • Zodiac’s circle with a cross is called this • ...
CIS 101 Cybersecurity Crossword puzzle 2025-03-14
Across
- Protocol for secure email
- Method to authenticate users
- Scrambles data for privacy
- Protects systems from malware
- Scanning for vulnerabilities
- Prevents unwanted emails
- Remote monitoring of devices
- Standard for network encryption
Down
- Attack on website servers
- Secure file sharing protocol
- Fake website for phishing
- Unauthorized access to data
- Denial of Service attack
- Security for wireless networks
- A breach of security
- Malicious software program
- Unauthorized user access point
- Attack on network resources
- Software to block threats
19 Clues: A breach of security • Denial of Service attack • Prevents unwanted emails • Attack on website servers • Protocol for secure email • Fake website for phishing • Software to block threats • Scrambles data for privacy • Malicious software program • Unauthorized access to data • Attack on network resources • Secure file sharing protocol • Method to authenticate users • ...
Extraordinary Animal Heroes (from WW1) vocabulary 2025-08-13
Across
- alloted amounts
- badge
- not helpful or supportive of either side in a conflict
- unplanned
- being prepared to attack or defend
- plunder
- area closest to the conflict
- removing from a place of danger
- easy targets
Down
- job he had taken on himself
- attack
- subdivision of an army
- persons injured in war
- withdraw
- stop
- soldier's metal identity tags
- have made an informed guess
- soldier stationed to keep guard
18 Clues: stop • badge • attack • plunder • withdraw • unplanned • easy targets • alloted amounts • subdivision of an army • persons injured in war • job he had taken on himself • have made an informed guess • area closest to the conflict • soldier's metal identity tags • removing from a place of danger • soldier stationed to keep guard • being prepared to attack or defend • ...
List2 2022-01-25
Across
- The highest point; peak
- an act of hitting; larg amount of things
- a small inexpesive trinket
- silly; stupid
- a group of animals
- to make or become greater
- to make ammends
- uproar and confusion
- threataning; ominous; malignant
- to trade
- military supplies
- To stop short; refuse to proceed
Down
- a gradual reduction
- to soothe; relieve
- ignorant; unenlightened
- to attack violently
- dull; lacking flavor
- to attribute to (a cause)
- somthing left to someone in a will
- over whelming attack (attacks, words)
20 Clues: to trade • silly; stupid • to make ammends • military supplies • to soothe; relieve • a group of animals • a gradual reduction • to attack violently • uproar and confusion • dull; lacking flavor • The highest point; peak • ignorant; unenlightened • to make or become greater • to attribute to (a cause) • a small inexpesive trinket • threataning; ominous; malignant • ...
Jacob’s 1915 crossword 2022-05-11
Across
- A famous Australian Medic
- Initials of Clarence Jeremiah
- Where the 11th trained at
- Greek island close to Gallipoli
- Capital of Turkey
- A Greek island
- Stan’s cousin
- A friend from teachers college
- The youngest allied soldier
Down
- Stan’s battalion
- Title of the August allies attack
- A Victorian soldier
- A diversionary allied attack
- Australia’s official correspondent
- Pyramid a photograph was taken here
- A ship that transported 21st
- Stan’s most mature friend
- Commander of the 4th brigade
- Stan’s red headed friend
- A miss planned battle
20 Clues: Stan’s cousin • A Greek island • Stan’s battalion • Capital of Turkey • A Victorian soldier • A miss planned battle • Stan’s red headed friend • A famous Australian Medic • Stan’s most mature friend • Where the 11th trained at • The youngest allied soldier • A diversionary allied attack • A ship that transported 21st • Commander of the 4th brigade • Initials of Clarence Jeremiah • ...
Opposite word 2023-10-03
50 Clues: Go • Hot • Wet • End • Dim • Ugly • Late • Warm • Open • Slow • Dead • Exit • Easy • Sell • Idle • Fail • Calm • Thin • Full • Cheap • Light • Begin • Never • Small • Clean • Doubt • Build • Below • White • Night • Depart • Arrive • Attack • Reject • Defend • Destroy • Destroy • Retreat • Fearful • Succeed • Inactive • Cowardly • Increase • Together • Careless • Subtract • Surrender • Confident • Embrace, Keep • Uncomfortable
Treasure Island Vocabulary 2024-04-15
Across
- a length of 6 feet
- to explore an area
- horse drawn carriage
- to shock or amaze
- to make dirty
- a dock
- to tease or make fun of
- telescope
- to abandon someone on an island
- an agreement between enemies
Down
- a rounded hill or mound
- a surprise attack
- stolen items
- to search and cause damage
- an attack
- a pirate
- a rebellion of those in charge
- sword with a curved edge
- ship or boat
- mean, not worthy of respect
20 Clues: a dock • a pirate • an attack • telescope • stolen items • ship or boat • to make dirty • a surprise attack • to shock or amaze • a length of 6 feet • to explore an area • horse drawn carriage • a rounded hill or mound • to tease or make fun of • sword with a curved edge • to search and cause damage • mean, not worthy of respect • an agreement between enemies • a rebellion of those in charge • ...
Electrocardiogram / Tests the electrical activity of the heart. Echocardiogram/ ultrasound of the heart. Astethoscope / tool used to listen to heart. Holter monitor / worn to monitor heart rate. EKG / electrocardiogram. CABG / coronary artery bypass graft 2025-05-01
Across
- irregular heartbeat.
- coronary artery bypass graft.
- electrocardiogram.
- ultrasound of the heart.
- carries blood away from heart.
- tool used to listen to heart.
- blood condition.
- infarction heart attack.
- high blood pressure
- Tests the electrical activity of the heart.
Down
- Large vein returning blood to heart.
- heart cannot pump properly.
- worn to monitor heart rate.
- vessel.
- Pumps blood throught body.
- congestive heart failure.
- heart.
- Hardening of arteries.
- removal.
- heart attack.
- / smallest blood vessel.
- Largest artery.
- slow.
23 Clues: slow. • heart. • vessel. • removal. • heart attack. • Largest artery. • blood condition. • electrocardiogram. • high blood pressure • irregular heartbeat. • Hardening of arteries. • ultrasound of the heart. • infarction heart attack. • / smallest blood vessel. • congestive heart failure. • Pumps blood throught body. • heart cannot pump properly. • worn to monitor heart rate. • ...
32 2024-08-28
Across
- Attack on Titan’s wings
- Fate’s guiding light
- Nisekoi’s youthful promise
- Bunny Girl Senpai’s fault
- Darker than Black’s theme
- Madoka’s bond
- Your Lie in April’s light
- Your Lie in April’s memory
- Gurren Lagann’s miracle
- Inuyasha’s deep forest
- Noragami’s frenzy
- Attack on Titan’s anthem
- Noragami’s shout
- Clannad’s time
Down
- Ghost in the Shell
- Deadman Wonderland’s reason
- Steins;Gate’s song
- Promare’s fire
- One Piece’s journey
- Fullmetal’s second opening
- Bleach’s star
- Naruto’s fight
- Sword Art’s spark
- JoJo’s blood
- Sailor Moon’s night
25 Clues: JoJo’s blood • Madoka’s bond • Bleach’s star • Promare’s fire • Naruto’s fight • Clannad’s time • Noragami’s shout • Sword Art’s spark • Noragami’s frenzy • Ghost in the Shell • Steins;Gate’s song • One Piece’s journey • Sailor Moon’s night • Fate’s guiding light • Inuyasha’s deep forest • Attack on Titan’s wings • Gurren Lagann’s miracle • Attack on Titan’s anthem • Bunny Girl Senpai’s fault • ...
I Survived the Attack of September 11, 2001 By Isaac Hummel 2017-01-24
Across
- Two _______ were taken over and crashed into the towers.
- The _______ fell down after the attacks.
- This book happens in the United States of _______.
- ______ rushed with the firemen into the towers to save people.
- The month that this happened.
- This was seen from far away coming from the buildings.
Down
- The main character's name is _______.
- The towers caught on _______.
- After the attack, the city was covered with ______.
- Bad men wanted to ______ the USA.
- Lucas _______ the attack in New York City.
- The towers_______ after the planes hit them.
- Lucas's father worked with _______.
- The towers were in _______ City.
- Many people felt _____ after the attacks.
15 Clues: The towers caught on _______. • The month that this happened. • The towers were in _______ City. • Bad men wanted to ______ the USA. • Lucas's father worked with _______. • The main character's name is _______. • The _______ fell down after the attacks. • Many people felt _____ after the attacks. • Lucas _______ the attack in New York City. • ...
WWII crisscross puzzle 2022-05-20
Across
- a German submarine
- german air force
- prime minister during WWII
- leader of Nazis
- people who carried out Hitler way to cleanse Germany of threats
- worked by sending radio waves and receiving the waves bounce back of objects surrounding
- attack on US Navy's base located on oahu hawaii
- names of france after hilter took over
Down
- the time WWII occurred
- when a country starts preparing for war grabbing supplies and people
- first atomic bombing attack during WW2 accrued here
- great Britain,united states,soviet union
- suprise attack to overwhelm and tire out opposing defenses
- Germany, Italy, Japan
- day of important operations and military attacks
15 Clues: leader of Nazis • german air force • a German submarine • Germany, Italy, Japan • the time WWII occurred • prime minister during WWII • names of france after hilter took over • great Britain,united states,soviet union • attack on US Navy's base located on oahu hawaii • day of important operations and military attacks • first atomic bombing attack during WW2 accrued here • ...
Mobile Legends -Heroes 2024-10-23
Across
- The Moonlight Archer
- Best equipped by Physical heroes to reduce enemies' Regen effects (Heal, Shields or Lifesteal).
- Best equipped by Physical Basic Attack heroes that rely on Attack Speed and Movement Speed.
- The Bunnylove
- The Scarlet Raven
- The Ms. Violet
- The Astrologer
Down
- The Wings of Holiness
- Best equipped by Markmen that need to fight Physical Assassins or other Physical Marksmen. Requires accurate control.
- The Time Traveler
- Best equipped by Marksmen to increase their Attack Range for kiting.
- The Little Witch
- The Lord Lava
- The Spear of Dragon
- You can get CC reduction so you won't get stunned etc. for a long time.
15 Clues: The Lord Lava • The Bunnylove • The Ms. Violet • The Astrologer • The Little Witch • The Time Traveler • The Scarlet Raven • The Spear of Dragon • The Moonlight Archer • The Wings of Holiness • Best equipped by Marksmen to increase their Attack Range for kiting. • You can get CC reduction so you won't get stunned etc. for a long time. • ...
9/11 2021-12-15
Data Security & Privacy Crossword Puzzle 2025-02-02
Across
- A type of attack where an attacker pretends to be a trusted entity
- A process of converting data into a code to prevent unauthorized access
- A legal framework that protects personal data in the European Union
- A weakness in a system that can be exploited by attackers
- A method of verifying someone's identity using two forms of verification
- A secure method of transmitting data over the internet
- A person who attempts to gain unauthorized access to systems or data
- A type of software update designed to fix security vulnerabilities
- A type of malware that encrypts files and demands payment for decryption
- A type of attack where an attacker inserts malicious code into a legitimate website
Down
- A type of attack where hackers trick individuals into revealing sensitive information
- A legal requirement to protect sensitive customer information
- A policy that ensures data is accessible only to authorized users
- A process of regularly backing up data to prevent loss
- A type of security breach where data is accessed without authorization
- A method of disguising communication to hide its content
- The practice of protecting systems, networks, and data from digital attacks
- A type of software designed to detect and remove malicious programs
- A type of attack that floods a network with traffic to disrupt service
19 Clues: A process of regularly backing up data to prevent loss • A secure method of transmitting data over the internet • A method of disguising communication to hide its content • A weakness in a system that can be exploited by attackers • A legal requirement to protect sensitive customer information • A policy that ensures data is accessible only to authorized users • ...
Spelling Words 2017-02-14
Across
- a muscle in your arm
- a tool for a certain task
- lacking of population
- when something relates
- leader of an attack
- a slip of permission
- old fashioned gun
- not bad
- a material used for figures
- underground caves
- freaking out
Down
- attack
- a picture of the side of your head
- outlaw
- result of a bad action
- take apart
- happened not to long ago
- a famous bear cub
- tiredness
- the male part of a flower
- a streak of light
21 Clues: attack • outlaw • not bad • tiredness • take apart • freaking out • a famous bear cub • old fashioned gun • underground caves • a streak of light • leader of an attack • a muscle in your arm • a slip of permission • lacking of population • result of a bad action • when something relates • happened not to long ago • a tool for a certain task • the male part of a flower • a material used for figures • ...
The Bully- Chapter 1-3 Vocabulary 2017-10-03
Across
- run at full speed
- hold closely in one's arm
- envy
- irritated
- fall slowly in drops
- distorted shape
- completely remove
- speak or treat with disrespect
- an absurd imitation
- lacking physical strength
Down
- threatening
- physical or mental suffering
- not filled
- make an attack or assault in return for a similar attack
- guide or control the movement
- shake or quiver
- silent,gloomy
- a long speech by one actor in a play or movie
- eat quickly
- flow in a gradual way
20 Clues: envy • irritated • not filled • threatening • eat quickly • silent,gloomy • shake or quiver • distorted shape • run at full speed • completely remove • an absurd imitation • fall slowly in drops • flow in a gradual way • hold closely in one's arm • lacking physical strength • physical or mental suffering • guide or control the movement • speak or treat with disrespect • ...
Chapter 20 2021-05-29
Across
- Expulsion of contents of the stomach
- Localized edema caused by dilatation of the capillaries
- Bodily injuries
- Abnormal drowsiness
- Stroke or brain attack
- Nosebleed
- Escape of blood from vessels
- CPR
- AED
- Separation of the layers of a surgical wound
Down
- Paleness
- Stoppage of cardiac output
- Increased glucose in the blood
- Suspension of consciousness
- Disorganized cardiac rhythm
- Unpleasent sensation, leads to vomiting
- Failure of the circulatory system
- Paroxysmal attack
- Illusion of movement
- Diminished concentration of glucose in the Blood
- Pressing need
21 Clues: CPR • AED • Paleness • Nosebleed • Pressing need • Bodily injuries • Paroxysmal attack • Abnormal drowsiness • Illusion of movement • Stroke or brain attack • Stoppage of cardiac output • Suspension of consciousness • Disorganized cardiac rhythm • Escape of blood from vessels • Increased glucose in the blood • Failure of the circulatory system • Expulsion of contents of the stomach • ...
AP US History crossword puzzle 2022-05-16
Across
- US Attack Germany
- Supreme court judicial
- We out
- Machine
- Economic revolution
- Don't mess with the US
- No Food
- Germany contacting Mexico
- Transport system
- attempt at consitution
Down
- Nixon is Bad
- counting of slaves as part
- Terrible state of the US
- Transfer of Slaves
- separate unconstitutional
- war over slavery
- 1930s programs
- Worst US president ever
- Japanese attack on US
- Cool air
20 Clues: We out • Machine • No Food • Cool air • Nixon is Bad • 1930s programs • war over slavery • Transport system • US Attack Germany • Transfer of Slaves • Economic revolution • Japanese attack on US • Supreme court judicial • Don't mess with the US • attempt at consitution • Worst US president ever • Terrible state of the US • separate unconstitutional • Germany contacting Mexico • counting of slaves as part
AP US history crossword puzzle 2022-05-16
Across
- US Attack Germany
- Supreme court judicial
- We out
- Machine
- Economic revolution
- Don't mess with the US
- No Food
- Germany contacting Mexico
- Transport system
- attempt at consitution
Down
- Nixon is Bad
- counting of slaves as part
- Terrible state of the US
- Transfer of Slaves
- separate unconstitutional
- war over slavery
- 1930s programs
- Worst US president ever
- Japanese attack on US
- Cool air
20 Clues: We out • Machine • No Food • Cool air • Nixon is Bad • 1930s programs • war over slavery • Transport system • US Attack Germany • Transfer of Slaves • Economic revolution • Japanese attack on US • Supreme court judicial • Don't mess with the US • attempt at consitution • Worst US president ever • Terrible state of the US • separate unconstitutional • Germany contacting Mexico • counting of slaves as part
Diary of a Wimpy Kid: Meltdown 2019-01-22
Across
- Journal of private thoughts
- Samurai or Highlanders groups; snowball teams in the book
- Argument or battle
- A season when it snows
- Mr. and Mrs. Heffley's youngest child
- Extreme tantrum
- Greg's Best friend
- Used in a cars, and cooking
- To invade violently
- Rodrick's last name
Down
- To protect something
- What people ride down snowy hills
- Something you throw, made out of snow
- Wimpy Kid
- Fighting with others
- Manny's oldest brother
- Rain below freezing
- Shelter for protection against attack
- Soggy snow
- To strongly dislike
20 Clues: Wimpy Kid • Soggy snow • Extreme tantrum • Argument or battle • Greg's Best friend • Rain below freezing • To strongly dislike • To invade violently • Rodrick's last name • To protect something • Fighting with others • A season when it snows • Manny's oldest brother • Journal of private thoughts • Used in a cars, and cooking • What people ride down snowy hills • ...
The Birds 2025-02-07
Across
- How many birds attack Nat?
- Why does he only work 3 days a week?
- Where does Nat eat his lunch?
- Who is the main character?
- How many children does Nat have?
- Where do they attack Johnny?
Down
- Who does Nat work for?
- Where does the story take place?
- How do the Birds get in?
- When do the Birds attack Nat?
- How many birds are dead in the morning?
- What does Nat's wife pack him for lunch?
- Does Mrs.Trigg believe Nat
13 Clues: Who does Nat work for? • How do the Birds get in? • How many birds attack Nat? • Who is the main character? • Does Mrs.Trigg believe Nat • Where do they attack Johnny? • When do the Birds attack Nat? • Where does Nat eat his lunch? • Where does the story take place? • How many children does Nat have? • Why does he only work 3 days a week? • How many birds are dead in the morning? • ...
Volleyball 2017-11-27
Across
- an aggressive attack used by the first line to hit the ball directly to the floor on opposing side
- a common term for forearm passing
- ERROR an unsuccessful attack
- to stop an opposing attacker hitting the ball over the net
- hitting the ball with your hands together usually used for a deep pass and long shot over the net \
- a player who will will play offensively and go for points
- the 2 or 3 players that play at the back of the court
- the offensive player’s (spiker) quick footwork toward the net before he jumps in the air to spike the ball
- Serving the ball and striking it with the hand above the shoulder
- a serve that the opposition does not successfully return giving the other team a point
Down
- the direct middle of the court
- to dig or spike the ball to a team mate allowing them to hit it over the net or give it off to another team mate
- a player approaching the setter for a quick inside hit
- setting up the ball with a pass to an allied offensive player
- a serve or dig that does not spin or go off in any directions sitting in the air for a excessive amount of time
- SERVE a serve in which the ball is given a slight under toss from about waist high and then struck with the opposite closed fist
- the area from the endline to the attack line
- SIDE When a right-handed player is hitting from right-front position or when a left-handed player is hitting from the left-front position.
- an attack by an offensive player in attempt to make the ball hit the floor on their opponent’s side. Also called a spike
19 Clues: ERROR an unsuccessful attack • the direct middle of the court • a common term for forearm passing • the area from the endline to the attack line • the 2 or 3 players that play at the back of the court • a player approaching the setter for a quick inside hit • a player who will will play offensively and go for points • ...
Pokémon with 140-147 Attack 2024-02-13
Across
- 140 Steel III Mega
- 147 Dragon V
- 145 Water/Dark VI Ash
- 143 Steel VII
- 140 Fighting/Electric IX
- 145 Fighting/Steel IV Mega
- 140 Ice V Galarian Standard Mode
- 145 Ground/Flying V Therian Forme
- 145 Steel/Psychic III Mega
- 140 Steel/Ghost VI Blade Forme
- 140 Fighting V
Down
- 140 Rock/Flying V
- 145 Dragon/Flying III Mega
- 140 Water VII School Form
- 145 Dragon/Ice IX
- 140 Ground/Normal VIII
- 140 Water/Dark III Mega
- 140 Fire V Standard Mode
- 140 Ground/Rock IV
- 145 Ice VIII
20 Clues: 147 Dragon V • 145 Ice VIII • 143 Steel VII • 140 Fighting V • 140 Rock/Flying V • 145 Dragon/Ice IX • 140 Steel III Mega • 140 Ground/Rock IV • 145 Water/Dark VI Ash • 140 Ground/Normal VIII • 140 Water/Dark III Mega • 140 Fighting/Electric IX • 140 Fire V Standard Mode • 140 Water VII School Form • 145 Dragon/Flying III Mega • 145 Fighting/Steel IV Mega • 145 Steel/Psychic III Mega • ...
Social Engineering 2024-07-31
Across
- A high-profile company that fell victim to a whaling attack in 2016, resulting in significant financial losses.
- A phishing attack that targets high-profile individuals such as executives.
- Engineering The manipulation of people into performing actions or divulging confidential information through psychological tactics.
- The act of attackers creating a fabricated scenario to steal information.
- A physical security breach method where an attacker follows someone into a restricted area without authorization.
- A psychological principle exploited in social engineering where individuals fear missing out.
- A type of social engineering attack conducted over the phone.
- When an authorized person allows an unauthorized person to enter a restricted area.
- Pro Quo A method where attackers offer something in exchange for information.
Down
- Manipulation Techniques Methods used in social engineering such as urgency, fear, and flattery to influence behavior.
- Phishing Attackers create fake profiles and send connection requests to gather information and send phishing messages.
- Leaving infected USB drives in public places to lure victims.
- A social engineering attack that involves sending fraudulent text messages.
- A type of social engineering attack that involves sending fraudulent messages designed to trick individuals into revealing sensitive information.
- Phishing A form of phishing that uses personalized messages to target a specific individual or organization.
- The act of pretending to be a trusted individual or organization to deceive someone.
16 Clues: Leaving infected USB drives in public places to lure victims. • A type of social engineering attack conducted over the phone. • The act of attackers creating a fabricated scenario to steal information. • A phishing attack that targets high-profile individuals such as executives. • A social engineering attack that involves sending fraudulent text messages. • ...
Hitler's Lightning War according to Daniele 2019-05-19
Across
- Germany didn't conquer Moscow because it was too...
- What was the surname of the American president who decided to attack Germany?
- Who crashed the Luftwaffe even if it was outnumbered?
- This country could make the war in Russia really difficult to win.
- Even if he failed in WW1, he had been chosen to be the British prime minister in WW2.
- Which country decided to help Germany during the invasion of Poland?
- The British and the French soldiers retreated to... hoping to be rescued.
- Russia had a massive infantry, but it wasn't well...
- Hitler first tested this new type of war on Poland.
Down
- France and England declared war on Germany after Hitler attacked...
- Rommel's success in North Africa was nicknamed... (hard)
- Where did the Germany decide to begin the attack to Russia? (three words)
- Hitler sent tanks and troops here to enter France without being attacked.
- What did the axis decide to attack in the Mediterranean? (two words)
- He set up a government-in-exile in London.
- Which country had been able to defend itself from a massive Russian attack?
- Who signed the nonaggression pact with Germany?
- Which Russian city did the Axis decide to siege first?
- What was the most important technology that made Great Britain more capable of defending from German Airplanes?
- How was it called the German Airforce?
20 Clues: How was it called the German Airforce? • He set up a government-in-exile in London. • Who signed the nonaggression pact with Germany? • Germany didn't conquer Moscow because it was too... • Hitler first tested this new type of war on Poland. • Russia had a massive infantry, but it wasn't well... • Who crashed the Luftwaffe even if it was outnumbered? • ...
fundamental securiy 2013-02-06
Across
- uses zombies to make tracking the origins of the DoS attack more difficult to locate
- data being transported on a network
- a data file containing known characterstics of an individual
- changes to the DNS records on a system to point to false servers where data is recorded
- compares physical characteristics against stored profiles to authenticate people
- technology created by Microsoft to control interactivity on web pages
- a software program that displayes advertising on your computer
- a file or program other then a virus that is potentially harmful
- also known as secure erase
Down
- denial of service
- a comprehensive update application containing patches and upgrades by the manufacturer
- code updates that manufacturers provide to prevent a newly discovered virus or worm from making a successful attack
- gains access to resources and devices by pretending to be a trusted computer
- events or attacks that steal, damage, or destroy equipment
- form of attack that uses many infected computer to launch an attack
- a worm that doesn't need to be attached to other software
- a program that runs on a computer to allow or deny traffic between the computer and the network
- programming language that allows applets to run within a web browser
- a program written with malicious intent and sent out by attackers
- network sniffers used to exact usernames and passwords to be used at a later date
20 Clues: denial of service • also known as secure erase • data being transported on a network • a worm that doesn't need to be attached to other software • events or attacks that steal, damage, or destroy equipment • a data file containing known characterstics of an individual • a software program that displayes advertising on your computer • ...
RU ITEC411 Crime and Security 2023-11-30
Across
- a space in which computers communicate
- wrongdoing for financial gain
- program that produces duplicates of itself on other computers
- something that is fake or fraudulent
- person who gets access to a computer for political or social ends
- the act of swaying people to a website to get personal information
- software that damages or gains unauthorized access to another computer
- attack over an email trying to gain sensitive information
- software to gain access to a computer in a nontraditional way
- large number of messages sent over the internet
Down
- communicating on a distance through cable or broadcasting system
- a virus attack with a multipart worm that traveled on a USB stick that was carried out by the US and Isreal
- a number of computers that have a virus or malware that communicates to a host
- attack over text message trying to gain personal information
- a type of software that adheres itself to other software
- an attack by a hacker to damage a computer network
- encrypted malware that displays a message wanting payment for the key to gain the personal information back from the user
- malware that can watch and record a users activities on a computer
- breaking into something you do not have access to
- is shown as a not-bad application but then carries a bad component
20 Clues: wrongdoing for financial gain • something that is fake or fraudulent • a space in which computers communicate • large number of messages sent over the internet • breaking into something you do not have access to • an attack by a hacker to damage a computer network • a type of software that adheres itself to other software • ...
Poke X Word : Puzzle # 6 (Normal) 2022-04-09
Across
- Ability: Industrious Incisors
- Pokedex Entry: The songs they sing are totally different depending on the region they live in. Some even sound like they’re shouting!
- Pokedex Entry: Due to its short wings, it can’t fly long distances. It wanders about restlessly and pecks at bug Pokémon.
- Supporter: Draw cards until you have 5 cards in your hand. If any of your Pokémon were Knocked Out during your opponent’s last turn, draw cards until you have 8 cards in your hand instead.
- Attack: Ride of the High King
- Ability: Buzzap Generator
- Attack: Rogue Fangs
Down
- Item: If the Pokémon this card is attached to uses an attack, if you flip any coins for the damage or effect of that attack, and if any of them are tails, draw 3 cards at the end of your turn.
- Ability: Starbirth
- Attack: Max Bullet
- Ability: Dark Asset
- Ability: Trade
12 Clues: Ability: Trade • Ability: Starbirth • Attack: Max Bullet • Ability: Dark Asset • Attack: Rogue Fangs • Ability: Buzzap Generator • Ability: Industrious Incisors • Attack: Ride of the High King • Pokedex Entry: Due to its short wings, it can’t fly long distances. It wanders about restlessly and pecks at bug Pokémon. • ...
Cyber Security at ESDC 2023-08-15
Across
- Person with malicious intentions.
- A trap for threat actors.
- Method used to secure your data.
- Software that infects a device.
- Attack that looks at/steals your data.
- Attack that locks your data and demands money.
Down
- Device used to work.
- Cyber attack meant to trick you.
- Faking an email address, phone number, etc.
- Software meant to protect your device.
- Unsolicited emails.
- Used to prevent unwanted network access.
12 Clues: Unsolicited emails. • Device used to work. • A trap for threat actors. • Software that infects a device. • Cyber attack meant to trick you. • Method used to secure your data. • Person with malicious intentions. • Software meant to protect your device. • Attack that looks at/steals your data. • Used to prevent unwanted network access. • ...
fundamental securiy 2013-02-06
Across
- technology created by Microsoft to control interactivity on web pages
- form of attack that uses many infected computer to launch an attack
- uses zombies to make tracking the origins of the DoS attack more difficult to locate
- network sniffers used to exact usernames and passwords to be used at a later date
- denial of service
- a program that runs on a computer to allow or deny traffic between the computer and the network
- gains access to resources and devices by pretending to be a trusted computer
- a program written with malicious intent and sent out by attackers
- events or attacks that steal, damage, or destroy equipment
- a worm that doesn't need to be attached to other software
- a file or program other then a virus that is potentially harmful
- a data file containing known characterstics of an individual
Down
- compares physical characteristics against stored profiles to authenticate people
- a software program that displayes advertising on your computer
- also known as secure erase
- changes to the DNS records on a system to point to false servers where data is recorded
- a comprehensive update application containing patches and upgrades by the manufacturer
- data being transported on a network
- code updates that manufacturers provide to prevent a newly discovered virus or worm from making a successful attack
- programming language that allows applets to run within a web browser
20 Clues: denial of service • also known as secure erase • data being transported on a network • a worm that doesn't need to be attached to other software • events or attacks that steal, damage, or destroy equipment • a data file containing known characterstics of an individual • a software program that displayes advertising on your computer • ...
Latin Review Week 13 2022-11-15
12 Clues: We pray • I praise • We attack • He seizes • They pray • They seize • To prepare • You attack • He praises • You all pray • They get ready • You (sing) prepare
May 2022-04-14
Across
- Attack type which will brute force logins against many accounts with a single password
- The color represented by #0000FF
- If the user clicks on "Add to Favorites", their resulting favorites page title will be ______ (use file: html01.txt)
- What service does this website use for visitor analytics (use file: html01.txt)
- RFC1918 discusses Address Allocation for ______ ______
- In Python, it is used to store multiple, unchangeable items in a single variable
- A Knight and iInventor of the WWW
- MAC address of thermostat device (use file: Nmap.docx)
- Password attack by trying all permutations
- Amount in a mebibyte
- IEEE protocol for virtual LAN on Ethernet
- Common format of SSL certificates
- What is the value of the custom property named "CROSSWORD" (use file: Nmap.docx)
Down
- Script language used (use file: sample01.txt)
- Company that patented Ethernet in 1977
- An attack type where the attacker inserts themself between communicating parties
- What brand of printer is on this network (use file: Nmap.docx)
- Protocol to obtain certificate status (abbreviation)
- All three TCP handshake packets (no spaces, no hyphens)
- A sequence of characters that defines a search pattern
- 40.747605788950715, -73.98520391072319 It’s a Woori America Bank, it used to be a
- Its what the first D in "DDOS attack" means
- IP address of Network Attached Storage (NAS) device (use file: Nmap.docx)
- The vulnerability of writing data that exceeds the defined boundary
24 Clues: Amount in a mebibyte • The color represented by #0000FF • A Knight and iInventor of the WWW • Common format of SSL certificates • Company that patented Ethernet in 1977 • IEEE protocol for virtual LAN on Ethernet • Password attack by trying all permutations • Its what the first D in "DDOS attack" means • Script language used (use file: sample01.txt) • ...
Intro Cybersecurity Puzzle 1 2021-09-08
Across
- Hacker with a political agenda
- The 'A' in the CIA Triade
- Psychological control discouraging an attack
- Acronym for information that is freely available
- Vulnerability + Threat
- A control such as a gateway or fence
Down
- Organization that publishes cybersecurity frameworks
- The 'C' in the CIA Triade
- Using a voice channel to conduct phishing
- The 'I' in the CIA Triade
- an attack type that can be polymorphic and is usually memory resident
- Acronym for a group with lot of resources to attack
- Alternative access to a system for malware
- A regulation only found in Canada
14 Clues: Vulnerability + Threat • The 'C' in the CIA Triade • The 'I' in the CIA Triade • The 'A' in the CIA Triade • Hacker with a political agenda • A regulation only found in Canada • A control such as a gateway or fence • Using a voice channel to conduct phishing • Alternative access to a system for malware • Psychological control discouraging an attack • ...
Poke X Word : Puzzle # 8 (Hard) 2022-04-22
Across
- Attack: Hard Times Slash
- Attack: Surprise Attack
- Pokedex Entry: They say that it stays still and quiet because it is seeing both the past and future at the same time.
- Ability: Ninja Body
- Pokedex Entry: It acts as a caretaker for it's basic form, putting them inside its bubble and letting them eat any leftover food.
- Supporter: You can play this card only if you discard 2 other cards from your hand. Your opponent reveals their hand. Put a Trainer card you find there on the bottom of their deck.
Down
- Attack: Max Take Down
- Supporter: Search your deck for up to 3 Basic Pokémon that don’t have a Rule Box and put them onto your Bench. Then, shuffle your deck. (Pokémon V, Pokémon-GX, etc. have Rule Boxes.)
- Attack: Precious Touch
- Ability: Miraculous Armor
- Ability: Additional Order
- Ability: Lucky Match
12 Clues: Ability: Ninja Body • Ability: Lucky Match • Attack: Max Take Down • Attack: Precious Touch • Attack: Surprise Attack • Attack: Hard Times Slash • Ability: Miraculous Armor • Ability: Additional Order • Pokedex Entry: They say that it stays still and quiet because it is seeing both the past and future at the same time. • ...
undertale 2023-04-06
Across
- soul mode where gravity can affect you
- Normally associated with Bravery
- Normally associated with Kindness
- a secret lab behind sans and papyrus' house only available by resetiing and going to the final corridor over and over again
- the in-game avatar of Temmie Chang
- an attack where asriel uses lightning
- the fourth area of the game the core is here as is the lab
- an attack asriel uses between phases
- one of the most loved characters in the game
- A secret boss found by moving around in a room for 3 minutes
- a mode where you have a shield
- Naming yourself "frisk activates this"
- an attack where you have to move
- an attack where asriel shoots at you
- A secret area in Papyrus' house under the sink
- A mysterious sprite in the game assumed to be Gaster
- the first area of the game you meet "your best friend" here
- the weapon you start with
- The first boss you fight
- Source of power for the underground and a subarea of hotland
- the attack sans is most known for
- a weapon only found at the end of genocide route
- Normally associated with Patience
Down
- a mode you can shoot attacks with
- The first character you encounter... YOUR BEST FRIEND
- a armour found at the end of the genocide route
- a button to attack a monster
- a button to use items to heal
- A secret fight found in the Nintendo Switch version
- Normally associated with Justice
- known mainly for his jokes he is still very serious at times
- the armor you start with
- the final area in the game
- The king of the underground
- Normally associated with Perseverance
- an attack where you have to stay still
- the location of the final fight in genocide or where you are judged in pacifist or neutral
- The only tv star the underground has
- the new royal scientist after Wd Gaster
- the second area of the game you meet the "skeletons" here
- The final boss of the pacifist route
- a secret area in waterfall where the team shop is found
- the third area of the game you meet the "Guard" here
- Normally associated with Determination
- an attack asriel uses in phase 1
- the first fallen human
- a secret area only found in true pacifist
- captain of the royal guard
- a button to flee a fight or spare a monster
- a button to either check or interact with monsters
- A secret boss found by going to a secret area at a certain time
- Normally associated with Integrity
- A Way Toby Fox put himself in the game
- the name of the character you play as
- ☞︎⚐︎☼︎💣︎☜︎☼︎ ☼︎⚐︎✡︎✌︎☹︎ 💧︎👍︎✋︎☜︎☠︎❄︎✋︎💧︎❄︎ ❄︎☟︎✌︎❄︎ ☞︎☜︎☹︎☹︎ ✋︎☠︎ ☟︎✋︎💧︎ 👍︎☼︎☜︎✌︎❄︎✋︎⚐︎☠︎
55 Clues: the first fallen human • the armor you start with • The first boss you fight • the weapon you start with • the final area in the game • captain of the royal guard • The king of the underground • a button to attack a monster • a button to use items to heal • a mode where you have a shield • Normally associated with Bravery • Normally associated with Justice • ...
Attack (lines 1-4) 2023-04-11
13 Clues: le jet • l'aube • sauvage • la pente • la crête • rougeoyer • à travers • se consumer • de couleur fauve • masquer, couvrir • couvert de cicatrices • qui se déplace lentement • regarder d'un air menaçant
Attack on Titan 2025-09-30
Letters on the Pitch 2024-11-25
Across
- A move to transfer the ball to a teammate.
- An unfair or illegal play.
- Being beyond the second-last defender before the ball is passed.
- A player focused on stopping the opposition's attack.
- A challenge to dispossess an opponent.
- The only player allowed to use hands during play.
- The horizontal part of the goal.
- The forward who leads the attack.
- Kicked from the arc near the corner flag.
Down
- The interval between two halves.
- The link between defense and attack.
- Close control of the ball with feet.
- Chosen for leadership and decision-making skills.
- Awarded for a foul inside the box.
- Awarded for a foul outside the box.
- The match begins with a ...
16 Clues: An unfair or illegal play. • The match begins with a ... • The interval between two halves. • The horizontal part of the goal. • The forward who leads the attack. • Awarded for a foul inside the box. • Awarded for a foul outside the box. • The link between defense and attack. • Close control of the ball with feet. • A challenge to dispossess an opponent. • ...
Pearl Harbor Crossword 2014-11-12
Across
- How Many Major Aims Did Japan Want?
- What's Another Name For The Japanese Shallow Water Torpedo?
- Where Was The Original Place Japan Was Gonna Plan An Air Attack?
- How Many Casualties Were There Of The Attack On Pearl Harbor? (Round By Thousand)
- What Did The U.S Advance In Between The Fight Against Japan?
Down
- What Under Water Vehicle Was Used By The Japanese?
- What Country Attacked Pearl Harbor?
- Who Was Japan's Commander-In-Chief Of Japan's Fleet?
- How Many Years Was WW2 In During The Attack?
- What Does Japan Need That Will Help Them Continue To Fight In The War?
- What Month Did The Attack On Pearl Harbor Occur?
- What Supply Was Cut-Off Between Japan And The U.S By President Roosevelt In The July Of 1941?
- What Type Of Weapons Were Used To Bomb The Cities; Hiroshima And Nagasaki?
- What Side Was Canada On? (Allied / Axis)
14 Clues: How Many Major Aims Did Japan Want? • What Country Attacked Pearl Harbor? • What Side Was Canada On? (Allied / Axis) • How Many Years Was WW2 In During The Attack? • What Month Did The Attack On Pearl Harbor Occur? • What Under Water Vehicle Was Used By The Japanese? • Who Was Japan's Commander-In-Chief Of Japan's Fleet? • ...
1941 Pearl Harbor Attack 2023-02-02
Across
- is a political system headed by a dictator that calls for extreme nationalism and often racism and no tolerance of opposition
- a farm
- who tried to keep neutrality
- Where japan attacked the U.S.A
- An intense armed conflict
- to be in a state or position of command and control over all others
Down
- Doris Miller was stationed here
- Roosevelt's speech to declare war
- to take unfair advantage of
- to be in control of;to have full power
- Japan, Italy, and Germany
- is giving in to the unjust demands of a belligerent leader in order to avoid war
- Who wrote the Day of Infamy Speech
13 Clues: a farm • Japan, Italy, and Germany • An intense armed conflict • to take unfair advantage of • who tried to keep neutrality • Where japan attacked the U.S.A • Doris Miller was stationed here • Roosevelt's speech to declare war • Who wrote the Day of Infamy Speech • to be in control of;to have full power • to be in a state or position of command and control over all others • ...
attack on titan 2022-03-15
9 Clues: inim spinner • idioot titanid • Eren titan form • relv argpüksidele • relv titanite vastu • titan kes lõi augu seina • titan kes sõi ereni ema ära • sõiaväe osa kes käib väljaspool seinu • titan kes on suur ja ründab ainult suures koguses inimesi
Attack on Titan 2021-04-12
Across
- where Reiner and the other warriors grew up
- the shortest man in the survey corps
- what you feel towrds gabi
- Queen Of the walls
- Person who currently holds the beast titan
- The person wo killed sasha
Down
- founder of the titans (her first name and last name are together no spaces)
- a genocidal murder
- loves titans, also lost an eye
9 Clues: a genocidal murder • Queen Of the walls • what you feel towrds gabi • The person wo killed sasha • loves titans, also lost an eye • the shortest man in the survey corps • Person who currently holds the beast titan • where Reiner and the other warriors grew up • founder of the titans (her first name and last name are together no spaces)
Attack On Titan 2024-12-02
Across
- The titan that has the most protection
- The biggest type of titan
- The weapon that the Survey Corps use
- The thing that protects the humans from the titans
- The human-eatinging giants
Down
- The military in the book
- A noun often used to describe Eren's actions
- The thing that the military uses for transportation
- Who the corps are trying to protect
9 Clues: The military in the book • The biggest type of titan • The human-eatinging giants • Who the corps are trying to protect • The weapon that the Survey Corps use • The titan that has the most protection • A noun often used to describe Eren's actions • The thing that protects the humans from the titans • The thing that the military uses for transportation
ISec Terminology 2022-12-01
Across
- Confirming the correctness of the claimed identity
- Attack on Confidentiality
- Unintentional risk
- Easy access to the compromised system
- Gathering information about the target
- Technique to estaplish attack
Down
- Approval,permission, or empowerment for someone or something to do something
- Attack on Availability
- Weakness in the information system
- first line of defense
- Strong symmetric cipher
11 Clues: Unintentional risk • first line of defense • Attack on Availability • Strong symmetric cipher • Attack on Confidentiality • Technique to estaplish attack • Weakness in the information system • Easy access to the compromised system • Gathering information about the target • Confirming the correctness of the claimed identity • ...
Volleyball 2023-09-14
Across
- ball is caught
- ball falls on floor with 2 people
- wild game with no rules
- a pass leading to a score
- no serve win
- serve with ball not spinning
- attack was not possible
- offensive player
- defensive specialist
Down
- volleyball original name
- one hand defense
- ball hits net
- run team’s offense
- block opponent serve
- serve that is not returned
- not returned attack
- stopping the ball from falling
17 Clues: no serve win • ball hits net • ball is caught • one hand defense • offensive player • run team’s offense • not returned attack • block opponent serve • defensive specialist • wild game with no rules • attack was not possible • volleyball original name • a pass leading to a score • serve that is not returned • serve with ball not spinning • stopping the ball from falling • ...
Video Games 2014-10-07
10 Clues: it is a lie • Lugis brother • Star fox qote • Marios brother • Hero in Legend of Zelda • First home gaming system • Microsofts gaming system • Call of dutys meele attack • Halos second strongest attack • A main attack in assasins creed
Pearl Harbor Review 2024-02-15
Across
- The attack lasted this many hours
- This word mean "famous for a bad reason"
- There were 181 Japanese fighter _______________ used in the attack
- Americans had no idea this attack was happening, so it was a ___________.
- The attack was on a _____________, which meant many sailors were resting (day of the week)
Down
- Pearl Harbor is located in this US state
- Americans thought the ___________ were good protection against an enemy invasion
- Nearly half the deaths were on the USS ____________ (name of ship)
- The attack occurred on ______________ 7th, 1941 (month)
- Japan wanted to destroy important US _________ on the naval base
10 Clues: The attack lasted this many hours • Pearl Harbor is located in this US state • This word mean "famous for a bad reason" • The attack occurred on ______________ 7th, 1941 (month) • Japan wanted to destroy important US _________ on the naval base • There were 181 Japanese fighter _______________ used in the attack • ...
Attack on Words 2013-11-05
9 Clues: awake • be reused • information • toilet water • word for puberty • repeated pattern • marks in a sentence • be wanted to do something • school for kids that finished kindergarten
Attack on Titan 2021-12-09
9 Clues: main character • erens hometown • erens moms name • outter most wall • erens best friend • erens father figure • leader of the scouts • wall that was invaded • what they fight against
Attack on Titan 2025-09-30
PREPARING TO ATTACK TROY 2016-11-12
Across
- Agamemnon __________ his daughter to come to the woods
- Menelaus' brother
- Achilles would achieve glory if he fought at ________
- Needed if the Greeks were to win
- Achilles wanted __________ for himself
- Goddess that was punishing Agamemnon
- Iphigenia thought she was to __________ Achilles
Down
- Agamemnon's wife
- Agamemnon's daughter
- Achilles would ________ at Troy
- Agamemnon wanted to _____________ Achilles
- Agamemnon had to sacrifice his ___________
- Was blowing the wrong way
13 Clues: Agamemnon's wife • Menelaus' brother • Agamemnon's daughter • Was blowing the wrong way • Achilles would ________ at Troy • Needed if the Greeks were to win • Goddess that was punishing Agamemnon • Achilles wanted __________ for himself • Agamemnon wanted to _____________ Achilles • Agamemnon had to sacrifice his ___________ • Iphigenia thought she was to __________ Achilles • ...
9/11 2022-07-07
Across
- to avoid
- to be caught
- to protect from terrorists
- home of the terrorists in 9/11
- people who attack countries
- place were twin towers are
- terrorists group
- a group of people in Afghanistan
- place attacked in 9/11
- a captial in Pakistan
- failed attack of 9/11
- president during 9/11
- to die
- to do something against war law
Down
- to be against terrorism
- taking over
- place of pentagon
- main focus of 9/11
- 2nd place got attacked because of 9/11
- 1st place got attacked because of 9/11
- where one of the plane crashed
- Bin Laden owner of terrorists group
- to know how to fly
- country in middle east
- to breakdown by pressure
- guaranteeing safety for military reason
- a group of people who attack countries
- to escape
- were involved in 9/11
- to avoid being seen and to hide
30 Clues: to die • to avoid • to escape • taking over • to be caught • terrorists group • place of pentagon • main focus of 9/11 • to know how to fly • were involved in 9/11 • a captial in Pakistan • failed attack of 9/11 • president during 9/11 • country in middle east • place attacked in 9/11 • to be against terrorism • to breakdown by pressure • to protect from terrorists • place were twin towers are • ...
Japan’s Pacific Campaign 2023-04-14
Across
- Leader of Germany
- Leader of Britain
- Countries will not attack or invade one another
- Leader of Italy
- Desert Fox
- British navy and civilians rescued Allied forces at Dunkirk after the Germans had trapped them there
- An attack by several U.S Marines and Australian support
- Germany’s Air Force (RAF)
- Seized by Japan in 1931
- US/GB Alliance
- Begging someone to not do something
- The president could lend or lease arms and other supplies to any country vital to the US
- Leader of the French government-in-exile
- Battle of British and German air forces
Down
- Makes war illegal as a tool of diplomacy
- Political movement that promotes an extreme form of nationalism and militarism
- 1939-1945
- Hiter’s plan to break the nonaggression pact and invade the Soviet Union
- Lightning War
- Protests Japanese aggression
- The commander of the Allied land forces in the Pacific
- Japan’s greatest naval strategist
- A Japanese attack
- location of a key American airfield
- Leader of Russia
25 Clues: 1939-1945 • Desert Fox • Lightning War • US/GB Alliance • Leader of Italy • Leader of Russia • Leader of Germany • Leader of Britain • A Japanese attack • Seized by Japan in 1931 • Germany’s Air Force (RAF) • Protests Japanese aggression • Japan’s greatest naval strategist • Begging someone to not do something • location of a key American airfield • Battle of British and German air forces • ...
