attack Crossword Puzzles
Take a Ghost Tour 2025-07-18
Across
- Becomes apparent; shows itself. In this case, when the spirit appears.
- Lasting or existing forever; without end.
- Run away secretly with a lover, especially with the intention of getting married.
- Producing and discharging (something, especially light or sound).
- Kept or restricted within certain limits; imprisoned.
- Strengthened or protected, especially against attack. In this context, it means the castle was made stronger to defend against the Scottish army.
- After something else has happened; afterward.
Down
- Greatly surprised or impressed; amazed.
- A place that has been fortified so as to protect it against attack; a fortress.
- Felt contempt or a deep aversion for; disliked intensely.
- Flowing out; originating from. Here, the cries coming from within the walls.
- A loop with a running knot, tightening as the rope or wire is pulled and used to trap animals or hang people.
- (Of organic matter) make or become rotten; decay.
13 Clues: Greatly surprised or impressed; amazed. • Lasting or existing forever; without end. • After something else has happened; afterward. • (Of organic matter) make or become rotten; decay. • Kept or restricted within certain limits; imprisoned. • Felt contempt or a deep aversion for; disliked intensely. • Producing and discharging (something, especially light or sound). • ...
WWII 2022-12-16
Across
- Clerk who gave top secret Russian information to the Canadian Government
- Garden, Gardens that were grown by Canadian citizens so that they wouldn't have to buy produce
- Gay, Name of plane that dropped the atomic bomb on japan
- When a country forces citizens to serve in the military
- X, Elite and Secret spy training camp in Whitby, Ontario
- Kong, Battle in which Canadian soldiers were defeated
- Type of government between Russia
- of the Atlantic, Ongoing battle in the Atlantic ocean that took 6 years
- Vote held by Mackenzie King to release him of his promise of no Conscription
- war, Period of time at the beginning of the war when there was no fighting
- The Canadian government did this to make sure nobody had too much food
- Battle in which Allies lost, but civilian boats came and saved thousands
- Largest concentration/death camp in Poland
- Beach, The name for the beach that Canadians landed on in the invasion of Normandy
- A ruler with complete power over a country
- Battle named Operation Jubilee
Down
- A method of promoting people to enlist or obstruct the enemy
- Harbour, An attack on a military base that provoked a country to join WWII
- Town where Canadian soldiers mastered a strategy called mouse-holing
- The Country that was invaded by Germany to spark WWII
- First Country to be invaded by Germany just before WWII
- Nickname for Canadians who were conscripted
- Bomb, Weapon of mass destruction used to officially end WWII
- Attack by the allies on 5 beaches in Northern France
- King, Leader who used a plebiscite to bring back conscription
- Camps, Where japanese people were sent after the attack on Pearl Harbour
- President who succeeded Roosevelt
- Overlord, Operation to end the war in Europe
- A minister that Mackenzie King put in charge of analyzing how materials are being produced
- Name of the German Air Force during WWII
- System, A group of ships that sail together for protection
- Program in Canada where men trained to become pilots, navigators, and gunners
- Powers, Name of Alliance between Germany, Italy and Japan
33 Clues: Battle named Operation Jubilee • Type of government between Russia • President who succeeded Roosevelt • Name of the German Air Force during WWII • Largest concentration/death camp in Poland • A ruler with complete power over a country • Nickname for Canadians who were conscripted • Overlord, Operation to end the war in Europe • ...
Security Crossword 2020-05-11
Across
- A system that binds public keys with identities
- CVP of ID PM at MS
- An avid skateboarder started this widely admired security company
- The TF in 17 Across was the architect for this technology
- Where you might specify a number used once
- First name, middle name, and surname, but for computers
- Sneaky character commonly found in discussions about Alice and Bob
- Used in silver ticket attacks: T??
- A security MVP with a popular AAD blog whom the author introduced to 17 across
- AAD researcher you might meet in Finland
- CVP of ID was once a Director of Development for this remote access protocol
- Controversial variable name discovered in Windows in 1999
- Mallory specializes in this kind of attack
- Before you login into Office365, you first interact with this popular service
- You might pass the hash to attack this
- XML oriented standard full of assertions
- I?? Acronym for IT dept most likely to manage AD
Down
- Preauthentication process involving X.509
- Your UPN could be considered to be a form of this
- Known for its utility with SSO
- A container of sorts in AD parlance
- Dir. PM of ID Sec. at MS
- Alan Turing built a bombe to crack this
- To issue X.509 certificates, you'd stand up one of these
- To understand the internals of an unknown protocol, one might do this to it
- The prefix in the flags ??_KEYEXCHANGE and ??_SIGNATURE used in MS CryptoAPI
- Architect behind Microsoft's two most widely used identity systems
- Keeper of secrets in Windows
- SYSKEY was introduced to help encrypt this
- The NTLM hash is sometimes referred to as this
- Container of claims in SAML
- Fill in the missing letters of this cipher known in the 90s for augmented security: 3??S
- One way or Two way
- Alliance determined to replace passwords with stronger alternatives
- One might use this to mitigate a rainbow table attack
- Tina Turner ex-husband that shares a name with IPSEC protocol
- Popular utility for 'handling' Windows credentials
- A salve for password fatigue
38 Clues: CVP of ID PM at MS • One way or Two way • Dir. PM of ID Sec. at MS • Container of claims in SAML • Keeper of secrets in Windows • A salve for password fatigue • Known for its utility with SSO • Used in silver ticket attacks: T?? • A container of sorts in AD parlance • You might pass the hash to attack this • Alan Turing built a bombe to crack this • ...
Term 1 Round-Up! 2023-05-03
Across
- ______ relationships refers to relations that are built between two different countries
- In addition, there was also the _____ of the Singapore Airlines Flight SQ117 by Pakistani terrorists but the situation was eventually brought under control by the Singapore Armed Forces (SAF).
- In order to ensure the safety and security of citizens, governments around the world have stepped up ________ measures
- Conflicts disrupt the _____ in society
- Through the internet, some individuals may be influenced by the extreme beliefs of terrorist groups. These individuals are said to be self- ________
- _________ prepares the community to be vigilant, united and resilient in preparing and dealing with a terror attack
- One way to resolve conflicts is through ______ which refers to the parties involved to discuss the issue in order to find a solution that is acceptable to all
- Brunei, Cambodia, Indonesia, Laos, Malaysia, Myanmar, the Philippines, Singapore, Thailand, and Vietnam are all part of the regional organisation called _______
- Total ______ involves every Singaporean playing a part to maintain peace in Sinapore and there are 6 pillars in it.
- Inidviduals who carry out terror attacks on their own are know as _________ terrorists
- Disagreement between two or more parties
Down
- One of the most famous racial riots that started out as a custody battle was the ____________riots
- ______ defence refers to saving, investing wisely and spending within one’s means
- ______ is the intentional use of force or violence by invidividuals or groups to cause fear and intimidate others.
- ________ refers to the measures by a country to discourage potential aggresors by making it costly for aggressors to attack it
- There was the bombing of the _______ house in 1965 where there where two Indonesian marines decided to carry out an attack in Singapore
- One of the main reasons as to why conflicts may arise is due to ______ resources
- Another way through which conflicts can be mediated is through the prescence of a third party such as the __________ Court of Justice
- ______ refers to the building of good relationships between countries
- ________ relationships refers to relations that are built among more than two countries
20 Clues: Conflicts disrupt the _____ in society • Disagreement between two or more parties • ______ refers to the building of good relationships between countries • One of the main reasons as to why conflicts may arise is due to ______ resources • ______ defence refers to saving, investing wisely and spending within one’s means • ...
Term 1 Round-Up! 2023-05-03
Across
- In order to ensure the safety and security of citizens, governments around the world have stepped up ________ measures
- There was the bombing of the _______ house in 1965 where there where two Indonesian marines decided to carry out an attack in Singapore
- Inidviduals who carry out terror attacks on their own are know as _________ terrorists
- ________ refers to the measures by a country to discourage potential aggresors by making it costly for aggressors to attack it
- ________ relationships refers to relations that are built among more than two countries
- One of the main reasons as to why conflicts may arise is due to ______ resources
- Another way through which conflicts can be mediated is through the prescence of a third party such as the __________ Court of Justice
- Brunei, Cambodia, Indonesia, Laos, Malaysia, Myanmar, the Philippines, Singapore, Thailand, and Vietnam are all part of the regional organisation called _______
- ______ defence refers to saving, investing wisely and spending within one’s means
- ______ relationships refers to relations that are built between two different countries
Down
- _________ prepares the community to be vigilant, united and resilient in preparing and dealing with a terror attack
- One of the most famous racial riots that started out as a custody battle was the ____________riots
- In addition, there was also the _____ of the Singapore Airlines Flight SQ117 by Pakistani terrorists but the situation was eventually brought under control by the Singapore Armed Forces (SAF).
- One way to resolve conflicts is through ______ which refers to the parties involved to discuss the issue in order to find a solution that is acceptable to all
- Total ______ involves every Singaporean playing a part to maintain peace in Sinapore and there are 6 pillars in it.
- Through the internet, some individuals may be influenced by the extreme beliefs of terrorist groups. These individuals are said to be self- ________
- Disagreement between two or more parties
- ______ refers to the building of good relationships between countries
- Conflicts disrupt the _____ in society
- ______ is the intentional use of force or violence by invidividuals or groups to cause fear and intimidate others.
20 Clues: Conflicts disrupt the _____ in society • Disagreement between two or more parties • ______ refers to the building of good relationships between countries • One of the main reasons as to why conflicts may arise is due to ______ resources • ______ defence refers to saving, investing wisely and spending within one’s means • ...
Anne Frank Vocabulary Crossword 2015-01-29
Across
- a violent attack; an especially fierce attack or something resembling such an attack
- the act or power of perceiving or comprehending; seizure by legal process; suspicion of fear especially of future evil
- arousing displeasure, impatience, or anger
- to make ill-humored or discontented
- great happiness or joy
- to cause someone to feel fear, shock, or disgust
- displaying wealth, knowledge, etc., in a way that is meant to attract attention, admiration, or envy
- very bad or unpleasant; too unpleasant to deal with or accept
- to spend time experiencing or enjoying something without making any effort to change your situation, feelings, etc.; to roll about in deep mud or water
- feeling or showing concern for someone who is sick, hurt, poor, etc;
- a natural ability or power that makes it possible to know something without any proof or evidence; a feeling that guides a person to act a certain way without fully understanding why; something that is known or understood without proof or evidence
Down
- quiet and secret in order to avoid being noticed; slow, deliberate, and secret in action or character; intended to escape observation
- a feeling that something bad is going to happen
- extreme anger; a strong feeling of unhappiness because of something bad, hurtful, or morally wrong; something that hurts people or is morally wrong
- not able to express ideas clearly and effectively in speech or writing; not able to speak; not expressed clearly or easily understood
- a wild uproar
- not producing or able to produce the effect you want
- cruel and unfair treatment by people with power over others; a government in which all power belongs to one person; the rule or authority of a tyrant
- to hate someone or something very much
- sad and lonely; empty and in poor condition; not having much chance of success; nearly hopeless
- unjust or cruel exercise of authority or power; a sense of being weighed down in body or mind
- something (such as food) that keeps someone or something alive; something that gives support, help, or strength
- lack of interest in or concern about something
- evil or immoral; very bad or unpleasant
24 Clues: a wild uproar • great happiness or joy • to make ill-humored or discontented • to hate someone or something very much • evil or immoral; very bad or unpleasant • arousing displeasure, impatience, or anger • lack of interest in or concern about something • a feeling that something bad is going to happen • to cause someone to feel fear, shock, or disgust • ...
Cyber Awareness Passwords and MFAs 2025-08-14
Across
- The process of verifying a user's identity.
- These messages are sent to specific people within an organization, often high-privilege account holders, to trick them into divulging sensitive data.
- This attack involves sending fraudulent emails or creating malicious websites to convince individuals to expose their private credentials.
- This type of attack uses a predefined list of common words and phrases to guess passwords.
- A flaw or weakness in a computer system that could be exploited to violate the system's security.
- Changing this immediately is recommended on accounts you suspect may have been compromised.
- Avoid using easily __________ information like names or birthdays in your passwords.
- This type of attack tries out countless password combinations until the correct one is found.
Down
- A strong password should be at least ______ characters long, according to NIST recommendations.
- A method of authentication using unique patterns on an individual's fingertip.
- An unauthorized user who attempts to gain access to an information system.
- A common bad habit where users employ the same credentials across different websites and services.
- The process of converting data into a format unreadable to anyone except those possessing a "key".
- Multi-factor authentication (MFA) requires you to use more than a password to log in. You might use a password plus something you have, like a phone or token, or something you ____, such as a fingerprint.
- A tool that securely stores and helps generate complex, unique passwords for all your online accounts.
- This type of authentication adds an extra layer of security beyond just a password.
- Should be at least 16 characters long and combine random words to be strong.
- A specific form of phishing that targets high-profile business executives.
- A sequence of words or text used to control access to a computer; similar to a password.
- and Clues (Word TAB Clue)
- Passkeys often rely on this type of factor, like a fingerprint or facial scan.
- Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
22 Clues: and Clues (Word TAB Clue) • The process of verifying a user's identity. • An unauthorized user who attempts to gain access to an information system. • A specific form of phishing that targets high-profile business executives. • Should be at least 16 characters long and combine random words to be strong. • ...
vocabulary unit 2 2021-11-03
12 Clues: a plan • to argue • to change • to give up • an evil person • a violent attack • many or very many • to show to be fair • to give a wrong idea • show clever judgement • having a strong effect • capable of making large amounts
Vocabulary p.130 - 132 2018-04-26
12 Clues: >> area • >< plus • >> lovely • >> to make • >> to relax • >< to attack • >> somewhere • > a book of maps • > to give work to somebody • > someone who hunts wild animals • > the line between two countries or areas • > to put flowers, vegetables, etc in the ground to grow
crosswords 2023-02-07
12 Clues: humor • smears • to charm • laid back • moving slow • humming sound • put an end to • time in events • signals the approach of another.mettle • impair the appearance devoid entirely lacking • forceful and bitter verbal attack against someone • obsequiously toward someone important sequitur
crosswords 2023-02-07
12 Clues: humor • smears • to charm • laid back • moving slow • humming sound • put an end to • time in events • signals the approach of another.mettle • impair the appearance devoid entirely lacking • forceful and bitter verbal attack against someone • obsequiously toward someone important sequitur
Unit 4 vocabulary 2023-09-29
12 Clues: to make use • firmly bilt • very exited • to be afraid • to give money • to stretch out • surprise attack • to give in a way • beginning or first • to have upsetting feel • to figure out by reason • the regular or fixed way
Tyler's crossword 2016-02-15
12 Clues: educated • antonym empty • to be snobbish • a parents girl • past tense catch • a vigorous attack • adverb of haughty • to reeducate someone • to do something wrong • to do something by itself • to butcher cattle for food • to write a book about yourself
Vocabulary p.130 - 132 2018-04-26
12 Clues: >> area • >< plus • >> lovely • >> to make • >> to relax • >> somewhere • >< to attack • > a book of maps • > to give work to somebody • > someone who hunts wild animals • > the line between two countries or areas • > to put flowers, vegetables, etc in the ground to grow
Unit 4 vocabulary 2023-09-29
12 Clues: to make use • firmly bilt • very exited • to be afraid • to give money • to stretch out • surprise attack • to give in a way • beginning or first • to have upsetting feel • to figure out by reason • the regular or fixed way
Unit 6 Crossword 2023-02-27
Across
- Plains = nomadic hunters
- Age power = King Of France, England Holy Roman Emperor
- = place of refuge
- rich = trading, tribute, war
- Warfare = destructive
- astronomers = Days In The Year
- attack Incas = refused to become Christians
Down
- = Farming
- native people = clan
- = specialized workers
- Americans = Hunter Gatherers
- = Pueblo and Hopi
- = the coast
13 Clues: = Farming • = the coast • = place of refuge • = Pueblo and Hopi • native people = clan • = specialized workers • Warfare = destructive • Plains = nomadic hunters • Americans = Hunter Gatherers • rich = trading, tribute, war • astronomers = Days In The Year • attack Incas = refused to become Christians • Age power = King Of France, England Holy Roman Emperor
joe 2025-02-14
12 Clues: young person • unsound argument • mixture of sounds • appearing or found • speaking or writing • perceptibly by touch • energy or enthusiasm • a pattern of something • emotional attack or harm • sentimental place or thing • feeling of fear or agitation • showing great attention to detail
CRIME 2024-10-28
12 Clues: Assault • A weapon. • Who steals • Catch and hold • Take unlawfully • Who kills or killed • Male police officer • Flee, run away from • Who presides at trial • Reveal through investigation • Responsible for a crime, etc. • Not guilty of a crime or offence
AP Lang Vocab 2024-04-17
12 Clues: heavenly • rude or cruel • rude in speech • a general truth • showing insight • annoyingly smart • a negative, indirect remark • mixed feelings about someone • language expressing criticism • marked by coarseness/lewdness • contradictory yet true statement • expressing a critical attack on an opinion
5th Grade Vocab #1 2022-02-07
12 Clues: ending • lessen • to persuade • coming before • to get rid of • to like better • to establish the truth • find fault, judgemental • to guard against attack • an item or individual part • the reason something happens • to advise or urge to do something
Fighting Disease with Disease 2025-11-18
12 Clues: disease • sickness • 100 years • difficulty • period of time • a treat,medicine • attack of bacteria • when most people ill • a way of doing something • idea which is not proved • protector of our organism • came from latin word vacca which means cow
Valhiem Gazette Weekend Puzzler 2026-04-04
12 Clues: Losers • Lost vendor • Stamina stew • River lizard • Gabe’s monopoly • Shawman’s attack • Portal ingredient • Next biome’s crop • Metal beyond our skill • Clarice’s copper obsession • mountain raid without a base • Only has a 5% chance of spawning during the day, according to sav
Asthma and Heart Disease 2013-01-31
Across
- asthma is more comman here (5,7)
- nicotine increases your heart rate and blood pressure (7)
- microscopic creatures that feeds of dead skin (4,5)
- this increases the person's and puts extra pressure on their heart (6)
- this swells up and gets narrower during an asthma attack (5,7)
Down
- this rases blood pressure and cholesterol (4,2,8)
- you should not smoke when being (8)
- what on a pet is most likly to cause an asthma attack (4)
8 Clues: asthma is more comman here (5,7) • you should not smoke when being (8) • this rases blood pressure and cholesterol (4,2,8) • microscopic creatures that feeds of dead skin (4,5) • nicotine increases your heart rate and blood pressure (7) • what on a pet is most likly to cause an asthma attack (4) • this swells up and gets narrower during an asthma attack (5,7) • ...
Hope Crossword Puzzle period 1 2021-11-09
Across
- Respecting the privacy of both parties and keeping details secret
- The threatened or actual use of physical force or power to harm another person and to damage property
- The use of communication and, in many cases, compromise To settle a disagreement
- The use of words to mistreat or injure another person
Down
- A pattern of intentionally causing bodily harm or injury to another person
- A pattern of attacking another person's emotional development and sense of worth
- Bringing in a neutral third party to help others resolve their conflicts peacefully
- Become more serious
- Any disagreement, struggle, or fight
- An unlawful physical attack or threat of attack
10 Clues: Become more serious • Any disagreement, struggle, or fight • An unlawful physical attack or threat of attack • The use of words to mistreat or injure another person • Respecting the privacy of both parties and keeping details secret • A pattern of intentionally causing bodily harm or injury to another person • ...
pest management. 2022-05-09
Across
- mites will attack spider mites at any stage of development inside a greenhouse or outside
- both adult and larva, feed on soft bodied insects (aphids), mites, and eggs
- attack caterpillar, butterfly or moth eggs or pupa, beetle egg,s and other insects in the egg, larva, or pupa stage
- is the most effective and environmentally friendly method approach to controlling pests
- kills insects.
- lacewing larvae are predators that feed mainly on soft bodied insects, mites, and eggs
Down
- will eat just about any pest
- kills unwanted plants.
- controls fungi.
- Has a skull and crossbones symbol and the word POISON in red on the label.
10 Clues: kills insects. • controls fungi. • kills unwanted plants. • will eat just about any pest • Has a skull and crossbones symbol and the word POISON in red on the label. • both adult and larva, feed on soft bodied insects (aphids), mites, and eggs • lacewing larvae are predators that feed mainly on soft bodied insects, mites, and eggs • ...
The Pearl-Vocabulary-Signe Halvorson 2023-11-28
Across
- a soft usu. heated and sometimes medicated mass spread on a cloth and applied to sores or other lesions to
- crying out loud in grief
- to deceive, win over, or induce to do something by artful coaxing or shrewd trickery
- feeling abnormally tired or sleepy
- to walk steadily and laboriously
- a solid wall-like structure raised for defense
Down
- marked by outstanding strength and vigor of body, mind, and spirit
- insolent or rude in speech or behavior
- something frightened; a mock blow or attack on or towards one part to distract attention from the intended point of attack
- a secret agreement of cooperation for an illegal or deceitful purpose
10 Clues: crying out loud in grief • to walk steadily and laboriously • feeling abnormally tired or sleepy • insolent or rude in speech or behavior • a solid wall-like structure raised for defense • marked by outstanding strength and vigor of body, mind, and spirit • a secret agreement of cooperation for an illegal or deceitful purpose • ...
The Pearl - Vocabulary - Abbey Dotson 2023-11-28
Across
- the quality or state of being lazy, sluggish, or indifferent
- a soft (usually heated) and sometimes medicated mass spread on a cloth and applied to sores or other lesions
- a loyal hardworking supporter
- insolent or rude in speech or behaivor
- to decieve, win over, or induce to do something by coaxing and wheedling or shrewd trickery
Down
- secret agreement or cooperation especially for an illegal or deceitful purpose
- to mourn aloud
- a solid wall-like structure raised for defense
- a mock blow or attack on or toward one part in order to distract attention from the point one really intends to attack
- a long tiring walk
10 Clues: to mourn aloud • a long tiring walk • a loyal hardworking supporter • insolent or rude in speech or behaivor • a solid wall-like structure raised for defense • the quality or state of being lazy, sluggish, or indifferent • secret agreement or cooperation especially for an illegal or deceitful purpose • ...
David’s Trail 2025-05-12
Across
- The region where Carpenter committed several of his murders.
- The nickname given to Carpenter due to his choice of murder locations.
- The legal outcome for Carpenter after his trial.
- The California prison where Carpenter is currently incarcerated.
- This physical feature of Carpenter was notably absent during his attack on Lois DeAndrade.
- The type of evidence that later linked Carpenter to the 1979 murder of Mary Bennett.
Down
- A weapon Carpenter used in his attacks, notably on Lois DeAndrade.
- A prominent mountain near where many of Carpenter's crimes occurred.
- The first name of Lois DeAndrade, who survived an attack by Carpenter.
- The individuals who fell victim to Carpenter's crimes.
10 Clues: The legal outcome for Carpenter after his trial. • The individuals who fell victim to Carpenter's crimes. • The region where Carpenter committed several of his murders. • The California prison where Carpenter is currently incarcerated. • A weapon Carpenter used in his attacks, notably on Lois DeAndrade. • ...
Module 5 vocab words 2022-12-15
10 Clues: aware • suggested • 2nd choice • make smaller • well and kind • deny the truth • ready to attack • produce or provide • being imprisoned or confined • made or produced by human beings
lachy birdys best crossword 2022-12-12
10 Clues: to attack • disbelieve • to be rich • to be lofty • continuence • easy or polite • to be at school • filth or digust • to give up or leave • getting hair twisted
vocab work 2024-02-28
10 Clues: good luck • bad smelling • formed by trees • force or threat • bitter and harsh • a soothing substance • the original pattern • expressing disapproval • peculiar to the individual • attack someone's reputation
Latin Crossword Puzzle 2024-02-09
10 Clues: Nymph • Invader • Used to see • Main Character • Water creature • one eye creature • Used in water to move • Polyphemus' favorite food • Come to attack Polyphemus • Odysseys and his companions
Cyber Crossword 2025-10-21
10 Clues: Attack • Password • Phishing • Data leak • Protection • To encrypt data • To report a scam • Person who breaks into systems • The practice of protecting systems • Protects computers from unauthorized access
Crossword 3 2015-05-21
Across
- Properly configured firewalls prevent users from accessing resources that are not _________ for business activities
- Server _______ is a technique to assess what services should be running on a server and turn off any unnecessary services
- Users will always let you know if they are ______ to access something they need on the network
- A buffer between two networks containing servers or resources that must be available to the Internet with a different level of security from other internal systems
- ________ provides the ability for internal computers to use a single external IP address for communication on the Internet
- A command line tool that utilizes the echo-request and echo-reply to provide a tool for testing connectivity on a network
- Ports 135-139 and 445 are used in Microsoft networks for the browsing and _________ of files
- The firewall policy should be available for internal ______ to review
- The ________ policy is a high-level document describing acceptable incoming and outgoing network traffic and requires very little understanding of technology to understand.
- A method of file sharing among computers. (Kazaa, Napster, etc)
Down
- A technology whereby users are notified when their friends are online and available to chat
- This tool can be used to determine the ip address of websites
- A common terminal based application used to gain access to servers and network equipment
- ___________ often adopts a more open firewall strategy
- An attack where a large volume of network requests are generated, also called a DOS attack.
- By talking with knowledgeable employees, hackers often use _______ engineering to bypass firewalls
- One of the hardest parts of setting up a firewall policy is determining what services _________ will be able to access
- DNS uses port 53 TCP connections for ___________ which may not need to pass through the firewall
- The corporate _____ server should be allowed to make outgoing port 25 SMTP connections
- The 2 key functions of a firewall are to protect the internet network from attack and controlling access of internal machines to the _________
20 Clues: ___________ often adopts a more open firewall strategy • This tool can be used to determine the ip address of websites • A method of file sharing among computers. (Kazaa, Napster, etc) • The firewall policy should be available for internal ______ to review • The corporate _____ server should be allowed to make outgoing port 25 SMTP connections • ...
Cyber Security Words and Terms 2022-09-15
Across
- A secret word or phrase that is used to access a computer system or service.
- Text that can be read by the human eye, like this article!
- A test that distinguishes between robots and humans using a website where you have to “prove you’re human”.
- Creating a fake identity on a social network account, usually a dating website, to target a specific victim for deception.
- A simple form of code for software that can be written in word editors.
- An attack in which a person, or program, disguises themselves as another by falsifying data to gain an advantage or the trust of someone else.
- Short for distributed denial of service, an attack that occurs when multiple systems infiltrate a targeted network. Typically a global attack.
- The deliberate use of someone else's identity, typically for financial gain.
- Short for malicious software, is any kind of software designed to damage, or enable unauthorized access, to computer systems.
- A cyber attacker who uses software and social engineering methods to steal data and information.
- An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
- Also known as a VPN, it allows you to create a secure connection to another network using the internet.
- A technique for protecting computers, networks, programs, and data from unauthorized access or hackers for exploitation.
Down
- When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
- The method of obtaining user information through fraudulent communications targeted directly at people. This is usually done through emails disguised as coming from a legitimate source but delivers the target’s information back to the hacker’s actual source.
- A language used to create and control the content on a website, allowing you to program the behavior of web pages to do a specified action.
- The programs and other operating systems used by a computer.
- An internet traffic filter meant to stop unauthorized incoming and outgoing traffic.
- Software that has their code listed as free to use, share, and modify.
- An error, flaw, failure, or fault in a computer program or system that causes an unintended code interaction.
20 Clues: Text that can be read by the human eye, like this article! • The programs and other operating systems used by a computer. • Software that has their code listed as free to use, share, and modify. • A simple form of code for software that can be written in word editors. • A secret word or phrase that is used to access a computer system or service. • ...
Fall Sports 2022-09-28
Across
- an act where when a player with the ball passes the goal line and into the end zone
- Passing a spiked or rapidly hit ball. Slang for the art of passing an attacked ball close to the floor
- the illegal restraining of a player who is not in possession of the football in order to gain an advantage
- Used to put the ball into play
- an act of stopping the offense of player with the ball by grabbing them and bringing them to the ground
- An attack that results in an immediate point or side out
- an act which a player loses control of the football
- The clockwise movement of player around the court and through the serving position following a side out
- hitting the ball with your head
- when the goalie blocks a shot
- The offensive action of hitting the ball. The attempt by one team to terminate the play by hitting the ball to the floor on the opponents side
- any attempt to kick the ball into the goal
Down
- a position in soccer with the job of guarding the goal
- Also hit or attack. A ball contacted with force by a player on the offensive team who intends to terminate the ball on the opponent's floor or off the opponent's blocker
- a violation whenever a non goalie touches the ball with their hand or arm
- when the ball is kicked into the net and it counts as a point
- the player who has the 2nd of 3 contacts of the ball who 'sets' the ball with an overhand pass for a teammate to hit
- to tackle the quarter back behind the line of scrimmage
- an act of a defensive player catching a forward pass
- a gathering of the offensive team in a close circle behind the line of scrimmage
- a serve that is not passable and results immediately in a point
- the pass that goes to the player that scores the goal
22 Clues: when the goalie blocks a shot • Used to put the ball into play • hitting the ball with your head • any attempt to kick the ball into the goal • an act which a player loses control of the football • an act of a defensive player catching a forward pass • the pass that goes to the player that scores the goal • a position in soccer with the job of guarding the goal • ...
Military Crossword 7 2021-02-11
Across
- A small, fast, military ship that carries weapons.
- A short interruption in a war or argument, or an agreement to stop fighting or arguing for a period of time.
- Any object used in fighting or war, such as a gun, bomb, knife, etc.
- An occasion when a group of people arrive somewhere, usually suddenly or unexpectedly.
- A series of actions intended to produce political or social change
- A device sent up into space to travel around the earth, used for collecting information or communicating by radio, television, etc.
- An agreement, usually between two armies, to stop fighting in order to allow discussions about peace.
- An attack intended to stop or oppose an attack by an enemy.
- A small container for carrying water or another drink, used especially by soldiers or travellers.
- A fast military ship.
- A force that pulls the aircraft downward because of the force of gravity. It opposes lift and acts vertically downward through the aircraft’s center of gravity.
Down
- a weapon whose purpose is to make other countries afraid to attack the country that owns it.
- A soldier trained to be dropped from an aircraft with a parachute.
- An agreement, usually between two armies, to stop fighting in order to allow discussions about peace.
- A prisoner, especially a person held by the enemy during a war.
- - a written agreement between two or more countries, formally approved and signed by their leaders.
- In radio communication: ‘I understand your message.’
- Strong covering that protects something, especially the body.
- The act of taking away or giving up weapons
- Prime Minister of the United Kingdom from 1940 to 1945, during the Second World War, and again from 1951 to 1955.
- A device that is positioned so that it stops the air from flowing around the aircraft and so helps to control it.
- One of the floors of a ship, bus, or aircraft.
- A slight movement of an aircraft or ship, to the side of its intended direction. It is controlled by a rudder.
- A secret.
- Someone who is sent as a representative from one government or organization to another
25 Clues: A secret. • A fast military ship. • The act of taking away or giving up weapons • One of the floors of a ship, bus, or aircraft. • A small, fast, military ship that carries weapons. • In radio communication: ‘I understand your message.’ • An attack intended to stop or oppose an attack by an enemy. • Strong covering that protects something, especially the body. • ...
Information Security 2022-09-29
Across
- A type of malware that records every single press of the keyboard that you make
- A key only used by one individual to decrypt
- A key that can be used by anyone to encrypt messages
- Gaining unauthorised access to or control of a computer system
- A trap for cybersecurity criminals
- Bullying that takes place online
- A hacking attack where multiple systems flood a target computer system with multiple requests, making it impossible for the target to handle all requests and function correctly
- Special viruses that move from computer to computer without human action
- Impersonation of email address or device to gain unauthorized access to information or systems
- Copy of data
- Hacking to try and champion a cause, e.g. climate change, rather than to steal information
- A weaknesses in computers
- scrambled data
- Ethical hacking in order to find any cybersecurity weaknesses
- Raw data that is put into context and has meaning
Down
- core of an operating system
- General term for programs that gains access to your system for unethical reasons
- Email that contains a message with a suspicious link designed to steal personal information
- annoying malware that spams you with ads
- Software that protects computers from virus related harm
- Term used for one of several computers that are infected by a 'master' computer, lying in wait for attack instructions
- A technique used typically to guess a password by trying every single combination in order without much extra thought or effort
- Malicious code typically disguised as a legitimate program
- To take advantage of a system's weakness
- I am not a robot
- Identification method that uses parts of our body, e.g. iris, face, fingerprint etc
- Secretly watches computer activity
- Collection of malware infested computers that form a network to attack
- Electronic messages sent through the internet
- Readable data
- Bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
- An internal security team that defends against both real attackers and Red Teams
32 Clues: Copy of data • Readable data • scrambled data • I am not a robot • A weaknesses in computers • core of an operating system • Bullying that takes place online • A trap for cybersecurity criminals • Secretly watches computer activity • annoying malware that spams you with ads • To take advantage of a system's weakness • A key only used by one individual to decrypt • ...
Chapter 20: Medical Emergencies 2025-07-03
Across
- Condition of profound hemodynamic and metabolic disturbance characterized by failure of the circulatory system to maintain adequate perfusion of vital organs
- Unexpected or sudden occasion; an urgent or pressing need
- External Defibrillators (AEDs) Device used for application of external electrical shock to restore normal cardiac rhythm and rate
- Resuscitation (CPR) Artificial substitution of heart and lung action as indicated for cardiac arrest or apparent sudden death resulting from electric shock, drowning, respiratory arrest, and other causes
- Abnormally increased concentration of glucose in the blood
- Bodily injuries caused by physical means with disruption of the normal continuity of structures
- Arrest Sudden stoppage of cardiac output and effective circulation
- scan Acronym for Focused Assessment with Sonography for Trauma; a bedside sonography exam used to assess trauma patients for internal bleeding
- Illusion of movement; sensation as if the external world were revolving around the patient or as if the patient were revolving in space
- Fibrillation Disorganized cardiac rhythm
- Escape of blood from the vessels; bleeding
Down
- Unpleasant sensation, vaguely referred to the epigastrium and abdomen and often culminating in vomiting
- Abnormally diminished concentration of glucose in the blood
- Abnormal drowsiness or stupor; a condition of indifference
- Vascular reaction, usually transient, involving the upper dermis, representing localized edema caused by dilatation and increased permeability of the capillaries and marked by the development of wheals; also called hives
- An extreme fear of enclosed or tight spaces
- Redness of the skin; typically caused by irritation or injury
- Temporary suspension of consciousness as a result of generalized cerebral ischemia; faint or swoon
- Paleness; absence of skin coloration
- Nosebleed; hemorrhage from the nose
- Subjective sensation or motor phenomenon that precedes and marks the onset of a paroxysmal attack, such as an epileptic attack
- Forcible expulsion of the contents of the stomach through the mouth
- Accident (Stroke or Brain Attack) Condition with sudden onset caused by acute vascular lesions of the brain; often followed by permanent neurologic damage
- Dehiscence Separation of the layers of a surgical wound; may be partial, superficial only, or complete, with disruption of all layers
24 Clues: Nosebleed; hemorrhage from the nose • Paleness; absence of skin coloration • Fibrillation Disorganized cardiac rhythm • Escape of blood from the vessels; bleeding • An extreme fear of enclosed or tight spaces • Unexpected or sudden occasion; an urgent or pressing need • Abnormal drowsiness or stupor; a condition of indifference • ...
12-3 War in Europe 2026-01-20
Across
- German general Erwin ___ was nicknamed the “Desert Fox” , commanding the “Afrika Korps”.
- East coast dimmed ___ so cargo ships were not easy targets for submarines, silhouetted against the night sky.
- Invasion of France was called Operation ___ , and it would force Germany to fight the war on two fronts.
- George Patton led the U.S. invasion of ___ , and a month later all Germans fled the island.
- After the attack on Sicily, the king of Italy and his generals negotiated a ___ with the Allies.
- Battle of Stalingrad, Germans surrendered because they were not ready for ___ and because Soviet reinforcements arrived.
- ___ Beach was four miles long with 100-foot cliffs and concrete bunkers with machine guns.
- To Roosevelt, fighting in Egypt first meant giving the army some ___ , before fighting in europe.
- Normandy invasion began at ___ to hide ships crossing the Channel, but paratroopers needed moonlight.
- At ___ Beach, defenses were weak, so troops captured the beach in 3 hours.
Down
- When America declared war on Japan, Germany declared war on U.S., which prompted German ___ to enter American waters.
- 2,500 U.S. soldiers were ___ or killed on Omaha Beach, but 35,000 had landed by days end.
- Hitler thought the invasion was at ___ , but it was really along the coast of Normandy.
- U.S. ___ system involved warships escorting cargo ships, so it was harder for submarines to torpedo & escape.
- The largest amphibious landing in history needed flat beaches, roads, airports, and the element of ___ .
- Eisenhower’s staff referred to the start day of an operation with a “D” , so the ___ invasion date was known as D-Day.
- The Normandy Invasion was the ___ amphibious landing in history.
- Winston Churchill wanted to attack Africa first, because they were not ready to invade ___ .
- Britain & U.S. bombed Germany, destroying ___ factories, which meant the troops at the Normandy Invasion were safe from bombers.
- The Battle of ___ was the turning point in the European Theater, placing the Germans on the defensive.
- After the attack on Sicily, the king of ___ and his generals arrested Mussolini.
- With George ___ in command, the last German troops in North Africa had surrendered by May 1943.
22 Clues: The Normandy Invasion was the ___ amphibious landing in history. • At ___ Beach, defenses were weak, so troops captured the beach in 3 hours. • After the attack on Sicily, the king of ___ and his generals arrested Mussolini. • Hitler thought the invasion was at ___ , but it was really along the coast of Normandy. • ...
ISCC Chapter 7 2026-03-16
Across
- Safeguards protecting computer systems from attacks
- Self replicating program that spreads through networks
- Illegal activity conducted using the Internet or computer systems
- Fake QR codes used to trick users into scams
- Providing false or incomplete information
- Situation where personal interest conflicts with professional duty
- Person who gains unauthorized access to systems
- Fraudulent emails attempting to steal personal information
- Malicious program disguised as legitimate software
- Small text files stored by websites on a user's computer
- Obtaining goods or services through trickery
- Hidden method allowing bypass of security controls
- Network of infected computers controlled by attackers
- Failure to fulfill agreement terms
- Attack that disrupts access to an Internet service
- Software that displays unwanted advertisements
- Manipulating people to gain confidential information
- Private combination of words used for authentication
- Attacker who uses tools created by others without deep knowledge
- Program that infects files and alters system operation
- Digital record of a user's online activities
Down
- Individual using networks to cause political damage
- Stealing confidential or personal data
- Guidelines defining acceptable and ethical behaviour
- Using a computer system without permission
- Malware that blocks access until payment is made
- Hacker who intentionally destroys or steals data
- Degree to which information reflects true values
- Protection of devices networks and data from threats
- Illegal copying or stealing of software
- Original creations such as inventions writings or logos
- Attack where communication is secretly intercepted
- Event that could damage computer hardware software or data
- Technique where fake websites mimic real ones
- Program that hides deep in a system to allow remote control
- Valuable confidential business information
- Software that secretly collects user information
- Reporting illegal or unethical actions within an organization
- Unauthorized duplication or distribution of software
- Using computer resources for illegal or unapproved activities
- Right to control personal data collection and use
- Stealing physical computer equipment
- Criminal demanding payment to stop attacks
- Attack using many compromised systems to overwhelm a target
- Moral principles governing technology use
- Policy describing acceptable use of computer systems
46 Clues: Failure to fulfill agreement terms • Stealing physical computer equipment • Stealing confidential or personal data • Illegal copying or stealing of software • Providing false or incomplete information • Moral principles governing technology use • Using a computer system without permission • Valuable confidential business information • ...
Health problems 2 - 9.º ano - Finder 132 2024-06-26
Restart Ch 19-21 2024-09-23
Across
- What Dr. Nguyen tells Chase he can do...
- Joel suspects he had something to do with the attack.
- How Bear and Aaron felt after the band attack.
Down
- Smoke What excuse did Bear and Aaron give for running into the music room?
- Extinguisher What was Joel hit with?
- Name of Mr. Solway's movie.
- The name Brandon wants to call his new video (Ch 20).
- How Chase feels when his dad says the "old Chase" is back.
8 Clues: Name of Mr. Solway's movie. • Extinguisher What was Joel hit with? • What Dr. Nguyen tells Chase he can do... • How Bear and Aaron felt after the band attack. • Joel suspects he had something to do with the attack. • The name Brandon wants to call his new video (Ch 20). • How Chase feels when his dad says the "old Chase" is back. • ...
Silas 2024-10-10
Across
- An attack that alters the appearance of a website.
- Malicious software disguised as legitimate to gain access to systems.
- A program that records keystrokes to capture sensitive data.
Down
- A technique using deceptive emails to steal personal information.
- Malicious software that encrypts data and demands payment for decryption.
- Method of guessing passwords by trying many combinations.
- Intercepting and analyzing network traffic to gather information.
- An attack that overwhelms a system with excessive traffic.
8 Clues: An attack that alters the appearance of a website. • Method of guessing passwords by trying many combinations. • An attack that overwhelms a system with excessive traffic. • A program that records keystrokes to capture sensitive data. • A technique using deceptive emails to steal personal information. • ...
Gettysburg Battle 2022-05-18
WW2 Crossword 2021-05-09
Across
- First battle where aircraft carriers engaged each other and the opposing ships did not fire directly on one another was known as the Battle of the ___________
- The last major and bloodiest battle of WW2.
- Allied invasion of French North Africa.
- Air and sea battle that permitted U.S. invasion of the Philippines.
- The codename for the Battle of Normandy.
- Name for early months of WW2 with no major hostilities.
- Means lightning war in German and was a fast attack strategy used in WW2.
Down
- Estimated 2 million deaths from this battle between Germany and the Soviets over this city.
- German offensive campaign launched through the Ardennes region.
- American invasion that was designated as Operation Detachment.
- Planned attack on U.S. naval base near Honolulu Hawaii.
- The successful defense of Great Britain against air raids by the German Luftwaffe.
- This battle was a defense and evacuation of Allied forces against Germany.
- First air operation to strike the Japanese archipelago.
- American B-29 bomber dropped world's first atomic bomb over this city.
- Major naval battle in Pacific that took place in June of 1942.
16 Clues: Allied invasion of French North Africa. • The codename for the Battle of Normandy. • The last major and bloodiest battle of WW2. • Planned attack on U.S. naval base near Honolulu Hawaii. • First air operation to strike the Japanese archipelago. • Name for early months of WW2 with no major hostilities. • American invasion that was designated as Operation Detachment. • ...
Workshop 9 Vocab 2013-09-17
Across
- MLK and peace protesters were completely against using this as they would protest.
- City Police refused to ______ the rules in Montgomery.
- This was the setting of the Freedom Riders attack.
- MLK Jr. was probably the most ______ person in the Civil Rights Movement.
- We have been working on making _______ about things that aren't directly states in the text.
- The FBI, post office, and tax office are _______ organizations.
- I marched at the _________ against segregation.
- MLK was on his way back from a speech ______ when he had to stand on the bus.
- This was the first speaker in "In Their Own Words"
Down
- The _____ on Washington is where MLK gave his famous speech.
- ______ is not a vocabulary word, but it is the opposite of separating groups of people.
- In 1960, a law was passed that ended the _________ of buses.
- He set a goal that was very difficult to _________.
- Some things you ______ for are sports, school, and to vote.
- The Freedom Riders attack was no small fight; it was a ______ brawl.
- They held the rally in a church thinking since it was a ____ place, they would be safe.
16 Clues: I marched at the _________ against segregation. • This was the setting of the Freedom Riders attack. • This was the first speaker in "In Their Own Words" • He set a goal that was very difficult to _________. • City Police refused to ______ the rules in Montgomery. • Some things you ______ for are sports, school, and to vote. • ...
The Iron Curtain 2025-03-07
Across
- strategy that ensured the destruction of both attack & defender in the event of an attack
- intelligence gathering activities during the Cold War
- Soviet politician who led the Soviet Union from 1924-1953
- main power fighting against USSR and communist threats
- proxy war between US & USSR from 1955 to 1975
- American leader who oversaw the beginning of the Cold War
- term used to describe divide between capitalist & communist nations
- Economic system in which the government has complete control over the economy
Down
- a fear and panic for the supposed or real rise of communism during the Cold War
- Economic system in which people can own their own businesses and property
- War instigated by a major power that does not itself become involved
- barrier that separated East & West Berlin to stop people from escaping to the West
- foreign policy of the US during the Cold War to stop the spread of communism
- competition & advancement in the development or accumulation of weapons between USSR & US
- foreign policy to support democratic nations against communist threats
- communist state that existed from 1922 to 1991.
16 Clues: proxy war between US & USSR from 1955 to 1975 • communist state that existed from 1922 to 1991. • intelligence gathering activities during the Cold War • main power fighting against USSR and communist threats • Soviet politician who led the Soviet Union from 1924-1953 • American leader who oversaw the beginning of the Cold War • ...
Crossword very fun 2023-09-26
Across
- to move making the sound of an engine running slowly
- used to express a concession or recognition that something is the case
- a sudden attack or incursion into enemy territory, especially to obtain something; a raid
- to move slowly, quietly and carefully, because you do not want to be seen or heard
- during the course of a journey; on the way
- to move smoothly and quietly, especially as though it takes no effort
- to stop
- to walk along with long steps in a particular direction
- to walk somewhere in a slow relaxed way
Down
- to move very fast in a particular direction
- contribute extra features to (someone or something) in such a way as to improve or emphasize their qualities.
- to move forward towards sb/sth, often in order to attack or threaten them or it
- synonym of unfortunately (used to express apology for or sadness at something)
- to move quietly and carefully around an area, especially with the intention of committing a crime
- To start to go faster
- make a choice from a range of possibilities
16 Clues: to stop • To start to go faster • to walk somewhere in a slow relaxed way • during the course of a journey; on the way • to move very fast in a particular direction • make a choice from a range of possibilities • to move making the sound of an engine running slowly • to walk along with long steps in a particular direction • ...
Black Brother, Black Brother 2025-06-09
Across
- ward off (a weapon or attack) with a countermove.
- A hit to get a point
- A fencing match
- The school that Donte goes to
- The sword being used in a fencing match
- The protagonist in the story
- the sport of fighting with swords, especially foils, épées, or sabers, according to a set of rules, in order to score points against an opponent.
Down
- Foot Position: Both feet are together at the heel, forming a right angle.
- answer to a parry riposte
- Another word for a fencing strip
- prejudice, discrimination, or antagonism by an individual, community, or institution against a person or people on the basis of their membership in a particular racial or ethnic group, typically one that is a minority or marginalized
- The playing area where bouts take place
- To take a step towards the opponent in a fencing match
- a basic attacking movement where a fencer moves forward towards their opponent by extending their front leg and keeping their back leg straight
- The antagonist in the story
- Donte's brother
16 Clues: A fencing match • Donte's brother • A hit to get a point • answer to a parry riposte • The antagonist in the story • The protagonist in the story • The school that Donte goes to • Another word for a fencing strip • The playing area where bouts take place • The sword being used in a fencing match • ward off (a weapon or attack) with a countermove. • ...
World Order 2024-05-28
Across
- order the activities and relationships between the world’s states, and other significant non-state global actors, that occur within a legal, political and economic framework; an international set of arrangements for promoting stability and peace
- a widespread or systematic attack against any civilian population
- undertaken by one state or body
- the activity of creating conditions for sustainable peace in countries affected by conflict, through the use of force, quite often provided by a number of countries and consisting of soldiers, civilian police and civilian personnel
- can direct a carefully engineered packet of data towards systems that control essential infrastructure, such as power stations, dams, airports, hospitals, schools, transport systems, electricity grids and financial systems.
- having unrestricted authority or power
- sovereignty the authority of an independent state to govern itself (for example, to make and apply laws; impose and collect taxes; make war and peace; and form treaties with foreign states)
- War the state of hostility, without actual warfare, between the USSR and its satellites and the United States and its allies in the Western world, which lasted from just after World War II until about 1991
- a semi-autonomous political entity that was nominally under the sovereignty of the British Empire
- dominance of one nation over others
- acts of violence against a population, intended to cause terror and thereby influence a government
- action carried out during a time of war that violates accepted international rules of war
- a Latin term meaning ‘compelling law’, also called a ‘peremptory norm’:
- the ongoing integration of regional economies, societies and cultures brought about by the removal of restrictions on international trade, and advances in travel and mass communication
- security a principle based on the agreement of a group of states not to attack one another and to defend each other from attack by others; the idea is that an attack on one is an attack on all
- an organised group of two or more states, set up to pursue mutual interests in one or more areas
Down
- violence and killing within communities
- another term for a treaty: an international agreement between parties who are subject to international law (states and international organisations such as the UN and its bodies)
- military intervention in a state in order to stop serious human suffering and/or human rights violations
- the deliberate extermination of a national, ethnic, racial or religious group
- compulsory enlistment in the military force of a state
- involves the use of hit-and-run tactics and the element of surprise
- the use of large, well-organised military forces.
- an independent, non-profit group that often plays an important role in advocating, analysing and reporting on human rights worldwide
- a group of unofficial soldiers who act outside international law and are often secretly used and funded by governments
- a euphemism for genocide
- involves the use of atomic or hydrogen bombs
- atrocity crimes (mass atrocities) a broad term for crimes that fall into the categories of genocide, war crimes, ‘ethnic cleansing’ and crimes against humanity; this is the term favoured by the United Nations, because it avoids making distinctions on the basis of whether the crimes were committed in war or peace, or as part of an intrastate or interstate conflict
- the interconnection of two or more states to such an extent that they are mutually dependent on each other for survival and mutually vulnerable to crises
- cooperation between multiple states for mutual benefit or protection from common threats
- a conflict between two or more parties within one country.
31 Clues: a euphemism for genocide • undertaken by one state or body • dominance of one nation over others • having unrestricted authority or power • violence and killing within communities • involves the use of atomic or hydrogen bombs • the use of large, well-organised military forces. • compulsory enlistment in the military force of a state • ...
Video & Sound 2022-09-22
Across
- a type of social engineering attack used to steal user data
- the ability to evaluate the content of visual media by understanding the way in which it is recorded and presented
- where you actual make the video
- production where you add subtitles, music, special effects, etc.
- one of the last phases of the finished product
- an audiovisual medium that records on digital storage media by electronic means
Down
- not able to access data for daily operation unless a payment is made...attack used to extort money
- an appliance intended solely for capturing sound and motion pictures and storing them on disc or media recorder
- all the groundwork is put into make your media product
- a series of still photographs projected onto a screen using light in rapid succession
- to record video
- to record images and sound as numerical data
- development decide what you want to accomplish with the video, along with target audience
13 Clues: to record video • where you actual make the video • to record images and sound as numerical data • one of the last phases of the finished product • all the groundwork is put into make your media product • a type of social engineering attack used to steal user data • production where you add subtitles, music, special effects, etc. • ...
Castles 2023-02-23
Across
- A ditch around the castle; sometimes filled with water, often filled with trash
- Narrow castle “windows” used for defense
- Private home of a lord; military fort in hostile territory
- Heavy iron and wood gate, could be raised and lowered with chains
- Gaps in the battlement to attack through
- Wooden bridge that could be raised or lowered over a moat; connected the gatehouse to a ramp
- Top of the castle wall, staging area for defense
Down
- Wall walk; platform for knights to walk on at the top of the castle walls; mentioned in our national anthem
- A yard inside of the castle curtain wall
- Holes in the ceiling from which boiling water, rocks, etc. could be dropped on the enemy
- Attack on a castle (noun); type of machine to break castle walls (adjective)
- Solid part of the battlement to hide behind
- The strongest and safest part of a castle; housed the water supply and lord’s quarters
13 Clues: Narrow castle “windows” used for defense • A yard inside of the castle curtain wall • Gaps in the battlement to attack through • Solid part of the battlement to hide behind • Top of the castle wall, staging area for defense • Private home of a lord; military fort in hostile territory • Heavy iron and wood gate, could be raised and lowered with chains • ...
More Power to You 2023-03-10
Across
- to make someone or something stronger; to strengthen a place against military attack; to improve the quality of something by adding something to it
- a place that is protected against attack; a fortified place
- very effective or strong; having a very powerful effect or influence on someone
- (root) strong
- having complete or unlimited power
- (root) power
- a family of rulers who rule over a country for a long period of time; a family, team, etc that is very powerful or successful for a long period of time
Down
- mental strength and courage that allows someone to face danger, pain, etc.
- (root) powerful
- a machine that produces electricity; someone who has a lot of energy
- capable of becoming real
- something that someone does very well
- always active or changing; having or showing a lot of energy; of or relating to energy, motion, or physical force
13 Clues: (root) power • (root) strong • (root) powerful • capable of becoming real • having complete or unlimited power • something that someone does very well • a place that is protected against attack; a fortified place • a machine that produces electricity; someone who has a lot of energy • mental strength and courage that allows someone to face danger, pain, etc. • ...
CNN 10 2022-02-25
Across
- What virus did the queen of England catch
- What happened to the sun
- Who was the first president to meet the china
- What animal was found looking sick
- What are people trying to do to some land in Portugal
- What country had the most gold medals in the olympics
Down
- What was found when a guy used a medical detector in the snow to find something for a woman
- What are other countries putting on Russia
- How many presidents out of the 13 U.S. presidents did she meet
- Who is the leader of Russia and claims that they were not going to attack Ukraine
- What did the Chinese call Mars
- What country was getting closer and closer to the Ukraine border making people they were going to attack.
- What country crossed the border to get into Ukraine
- A boat was released from New Hampshire and found where
- Who race women does Joe Biden want to be in the supreme court
15 Clues: What happened to the sun • What did the Chinese call Mars • What animal was found looking sick • What virus did the queen of England catch • What are other countries putting on Russia • Who was the first president to meet the china • What country crossed the border to get into Ukraine • What are people trying to do to some land in Portugal • ...
Immunity, disease, and disorder 2022-05-13
Across
- the ability to resist or recover from an infectious disease.
- an organism, a virus, or a protein that causes disease.
- Diseases that are caused by hereditary or environmental factors are called
- attack infected body cells by attaching to specific antigens
- disease A disease that is caused by a pathogen is called an
- is a drug that destroys viruses or prevents their replication.
Down
- made up of tissues and specialized white blood cells that recognize and attack foreign substances in the body.
- a specialized protein that binds to a specific antigen to tag it for destruction.
- a white blood cell that destroys pathogens by engulfing and digesting them.
- that is introduced into the body to produce immunity.
- make antibodies that attach to specific
- a medicine used to kill or slow the growth of bacteria and other microorganisms, such as fungi.
- a substance prepared from killed or weakened
13 Clues: make antibodies that attach to specific • a substance prepared from killed or weakened • that is introduced into the body to produce immunity. • an organism, a virus, or a protein that causes disease. • the ability to resist or recover from an infectious disease. • attack infected body cells by attaching to specific antigens • ...
Causes Of The Vietnam War 2024-05-06
Across
- Which President sent a half a million US combat troops to Vietnam?
- The conflict in Vietnam that developed following the French defeat can best be described as this type of War.
- What leader did much of the Southern Vietnamese support?
- What religion did Diem not like and treated unfairly?
- On 2nd August 1964, what did the North Vietnamese boats attack?
- Who withheld information about US support of South Vietnamese raids on North Vietnamese radar stations and other targets in the period leading up to the attack?
- Describe the type of military force President Kennedy sent to Vietnam.
Down
- Who was the leader of the communist Vietnamese resistance movement?
- Who was Southern Vietnam lead by?
- What Country was the US afraid that communism would spread to?
- What did Diem refuse to not give to the pheasants?
- What political party was in control of North Vietnam?
- What was the first Asian Nation to fall to Communism?
- Who were the majority of the Southern Vietnamese unhappy with?
- What Country was Vietnam invaded by during WW2?
15 Clues: Who was Southern Vietnam lead by? • What Country was Vietnam invaded by during WW2? • What political party was in control of North Vietnam? • What religion did Diem not like and treated unfairly? • What leader did much of the Southern Vietnamese support? • What did Diem refuse to not give to the pheasants? • ...
SS Civil War: Ch 9 - The War Begins 2025-03-26
Across
- Fort Sumter was running out of _____, so they asked Lincoln to send more.
- The Union president promised, "We are not _____, but friends."
- Major that refused to give up Fort Sumter to the South.
- The first president of the Confederate States of America
- a continuous attack with bombs and other ammunition
- The type of war that began with the attack on Fort Sumter.
- the separate republic formed by the 11 states that seceded from the Union
- In this address that Lincoln promised not to touch the right to slavery
- Number of forts in the South that the US had control of
Down
- Lincoln's duty to save the Union and keep it together
- war that Confederate president fought in before the Civil War
- Even though there was no ____ on the supply ship headed to Sumter, the Confederate army fired on it.
- Lincoln knew he had to make the seceding states _______ to the Union.
13 Clues: a continuous attack with bombs and other ammunition • Lincoln's duty to save the Union and keep it together • Major that refused to give up Fort Sumter to the South. • Number of forts in the South that the US had control of • The first president of the Confederate States of America • The type of war that began with the attack on Fort Sumter. • ...
Vocabulary p.130 - 132 2018-04-26
12 Clues: >< plus • >> area • >> lovely • >> to make • >> to relax • >> somewhere • >< to attack • > a book of maps • > to give work to somebody • > someone who hunts wild animals • > the line between two countries or areas • > to put flowers, vegetables, etc in the ground to grow
Greece Crossword Puzzle #1 2023-12-15
Across
- Athenian leader who convinced the Athenians to build a navy and then led the Athenians in the Battle of Salamis.
- Athenian general who was the leading figure in Athenian politics for more than 30 years between the Persian Wars and the Peloponnesian War
- Non-voluntary league that evolved from the Delian League, as the Athenians took control over the other city-states in the league
- Naval battle in the Second Persian War in which the Greeks tricked the Persians into entering a narrow straight, where their ships were ambushed
- Final battle of the Second Persian War in which the Greeks defeated the remainder of the tired and hungry Persian army
- The Athenian general who used the "weak center plan" to defeat the Persians at the Battle of Marathon
- King of Persia who launched the first attack on Greece (1st Persian Invasion), but was defeated at the Battle of Marathon
- A war between Athens and its allies and Sparta
- Important Phoenician colony in North Africa that built a large trading empire
- The island where the headquarters of the Delian League was located
- Female commander in the Persian navy who advised Xerxes not to send his ships into the straight of Salamis, but he ignored her advice
- Greek writer known as the "Father of History."
- a system in which citizens gather at mass meetings to decide on government matters.
Down
- Battle in the Second Persian War in which the Greeks, led by 300 Spartans, fought to the death against a much larger Persian army
- Traders who spread Mesopotamian culture and ideas and their alphabet throughout the Mediterranean world.
- Son of Darius who launched the second attack on Greece (2nd Persian Invasion)
- the type of democracy in which citizens choose elected representatives to make their laws and governmental decisions
- An alliance of Athens and other city-states (not including Sparta) after the Persian Wars to defend against another possible Persian attack
- Excessive pride or self-confidence, which ultimately leads to a downfall
- An alliance of Greek poleis to defend against Persian attack, with the army led by the Spartans and the navy led by the Athenians
- Temple dedicated to Athena on the Acropolis in Athens
- Battle in the First Persian Invasion in which the Athenians defeated a much larger Persian army by using the weak center plan
- The simplest type of Greek column - plain on top
- A kingdom north of Greece that was growing in power after the Peloponnesian War
- Warships with three rows of oars on each side
- Greeks living in Ionia (along the coast of Asia Minor) revolted against Persian rule in 499 BCE
- Spartan king who led the army of the Greek League and led the Greek forces in the Battle of Thermopylae
27 Clues: Warships with three rows of oars on each side • A war between Athens and its allies and Sparta • Greek writer known as the "Father of History." • The simplest type of Greek column - plain on top • Temple dedicated to Athena on the Acropolis in Athens • The island where the headquarters of the Delian League was located • ...
Road to Revolution 2023-11-14
Across
- ______ duties are import taxes placed on US goods to increase trade with Mexico.
- _______ Rebellion that happened in 1826 due to land disputes in Nacodoches.
- Haden _________ led a rebellion against Mexico after cancellation of his contract.
- ________ Report that was written after he was sent to Texas to investigate.
- Is the name of the convention in 1835 to determine war or peace.
- Law of ______ 6 was Mexico's response to Teran's recommendations.
- Mier y Teran had 3 __________ for Mexico after investigating Texas.
Down
- ______ Decree ended slavery in 1829.
- was an attack on the fort due to tensions between Texans and Mexico.
- _______ of 1832 & 1833 is where Texas representatives met and made demands to Mexico.
- Stephen F. Austin was ______ for treason against Mexico.
- ______ Anna goes back on his word and creates a central government.
- Turtle ______ Resolution stated Texas' attack was in support of the Constitution on 1824 and not a rebellion.
13 Clues: ______ Decree ended slavery in 1829. • Stephen F. Austin was ______ for treason against Mexico. • Is the name of the convention in 1835 to determine war or peace. • Law of ______ 6 was Mexico's response to Teran's recommendations. • ______ Anna goes back on his word and creates a central government. • ...
Volleyball 2020-03-30
Across
- To move to the next position on the floor in a clockwise manner.
- To smash the ball overarm into opponents court.
- To block an opposing player from spiking the ball by jumping at the net with arms in the air.
- To let the ball settle into the hands briefly on a shot instead of releasing it immediately.
- There are _____ players on a team.
- The server needs to serve _______ seconds
- A player who excels in setting up teammates to attack.
- What is the original name of volleyball?
Down
- Team of six, high net, spiking, serving
- An attempt by a player to win a point by hitting the ball over the net.
- line A line three meters from the net which marks the limit for where a back row player may advance to hit the ball from above the net.
- Each set is played to ________ points, except the last set which is played to fifteen points
- How many times can a team touch a ball before it needs to go to the other side?
- An ______ is a un-returnable serve, with one or less hits.
- The block does not count as one of the three hits.
15 Clues: There are _____ players on a team. • Team of six, high net, spiking, serving • What is the original name of volleyball? • The server needs to serve _______ seconds • To smash the ball overarm into opponents court. • The block does not count as one of the three hits. • A player who excels in setting up teammates to attack. • ...
Brayden Kufel Causes of Vietnam War 2024-05-07
Across
- What was the first Asian Nation to fall to Communism?
- The conflict in Vietnam that developed following the French defeat can best be described as this type of War?
- Who was the leader of the communist Vietnamese resistance movement?
- Which President sent a half a million US combat troops to Vietnam?
- What did they call communism spreading from one country to the next?
- What country was afraid of the spread of communism?
- Who did many of the Vietnamese people support?
- What agreement was made when Vietnam was split at the 17th parallel?
- Who was causing the attack on the South?
Down
- Who was the US secretary of defense during the Gulf of Tonkin incident?
- In which attack did the US have an excuse to escalate a war?
- Describe the type of military force President Kennedy sent to Vietnam?
- Who led the capitalist republic in south vietnam?
- What type of government did the peasants want?
- What Vietnamese leader hated buddhism?
15 Clues: What Vietnamese leader hated buddhism? • Who was causing the attack on the South? • Who did many of the Vietnamese people support? • What type of government did the peasants want? • Who led the capitalist republic in south vietnam? • What country was afraid of the spread of communism? • What was the first Asian Nation to fall to Communism? • ...
Trenches 2023-04-24
Across
- Rodents found in the trenches. Known for carrying diseases and stealing food
- An infection that causes diarrhea with blood and mucus
- face covering used to protect soldiers against gas attacks
- Soldiers did this to help prevent casualties from enemy invasions. Sometimes would do it while their comrades slept
- A long narrow ditched used during war time
- Location of first successful gas attack
Down
- A new method of attack that involved using and throwing poisonous gas
- A small bomb that is thrown at the opposing force during battle
- An infection from standing in murky,deep water in the trenches, can lead to foot amputation if untreated.
- A way soldiers documented what happend at war.
- a disease caused by lice, symptoms include headache, dizziness,and achiness
- A way to get rest during downtime. Soldiers did it whenever they could get time to rest.
- Insects that live in your hair and spread rapidly.
13 Clues: Location of first successful gas attack • A long narrow ditched used during war time • A way soldiers documented what happend at war. • Insects that live in your hair and spread rapidly. • An infection that causes diarrhea with blood and mucus • face covering used to protect soldiers against gas attacks • ...
TAKE A GHOST TOUR 2025-07-18
Across
- Producing and discharging (something, especially light or sound).
- A place that has been fortified so as to protect it against attack; a fortress.
- Run away secretly with a lover, especially with the intention of getting married.
- Greatly surprised or impressed; amazed.
- (Of organic matter) make or become rotten; decay.
- Flowing out; originating from. Here, the cries coming from within the walls.
- Lasting or existing forever; without end.
Down
- Felt contempt or a deep aversion for; disliked intensely.
- After something else has happened; afterward.
- Becomes apparent; shows itself. In this case, when the spirit appears.
- or restricted within certain limits; imprisoned.
- Strengthened or protected, especially against attack. In this context, it means the castle was made stronger to defend against the Scottish army.
- : A loop with a running knot, tightening as the rope or wire is pulled and used to trap animals or hang people.
13 Clues: Greatly surprised or impressed; amazed. • Lasting or existing forever; without end. • After something else has happened; afterward. • or restricted within certain limits; imprisoned. • (Of organic matter) make or become rotten; decay. • Felt contempt or a deep aversion for; disliked intensely. • Producing and discharging (something, especially light or sound). • ...
Learning New Words at the Cottage 2026-01-07
Across
- a dessert of sweet sauce made with milk, eggs, and sugar.
- whether someone is a male or a female.
- a combination of two things, especially companies, into one.
- to put things in a neat or required order.
- the remains or impression of a prehistoric organism preserved as a mold or cast in rock.
Down
- a person, object, or place selected as the aim of an attack.
- a small, simple house, typically one near a lake or beach.
- a gesture, action, or sound that is used to convey information or instructions.
- to follow someone or something in order to catch or attack them
- each of the parts into which something is or may be divided.
- a fancy drinking glass with a foot and a stem.
- a large, organized group of singers.
- a burrowing, plant-eating mammal with long ears, long hind legs, and a short tail.
13 Clues: a large, organized group of singers. • whether someone is a male or a female. • to put things in a neat or required order. • a fancy drinking glass with a foot and a stem. • a dessert of sweet sauce made with milk, eggs, and sugar. • a small, simple house, typically one near a lake or beach. • a person, object, or place selected as the aim of an attack. • ...
NATURE ATTACKS 2023-04-17
10 Clues: State • Everywhere • A Character • Eats People • What Sharks Do • Surrounds Earth • You Prolly Have One • Characters Last Name • Characters Last Name • Happens To old people
Language Arts 8th Grade Vocab Puzzle 2025-09-07
9 Clues: Happiness • Trade offer • Drawn towards • Comfort someone • Recurring trait • Irritate someone • Making and attack • Disapproval of someone • Coming in possession of something
Cold War Vocabulary 2022-03-28
Across
- Economic theory in which the government owns the means of production
- U.S. foreign policy during the Cold War in which the U.S. tried to contain Communism by preventing it from spreading to other countries
- Soviet Union policy that means restructuring
- military alliance between the Western Countries
- First man-made satellite launched into Space by the USSR
- the international group whose goal was to prevent future wars
- the relaxing of tension between the superpowers
- The trio of Stalin, Churchill, and Roosevelt (or Truman)
- economic system where the people own the means of production
- US theory that if one country falls to communism, many more would follow
- Leader of USSR in 80s
- the imaginary dividing line between Western Democracies and Soviet-influenced nations
- Witch hunt of suspected communists in the US
- military alliance between the Soviet-influenced nations
- Line that divided North & South Korea
- Soviet Union policy that means openness. It discouraged government secrecy
- Competition between US and USSR the prove their superiority in technology in order to accomplish getting to outer space
Down
- "MAD" - the guarantee that if one nation launched a nuclear attack, the other country would attack back, leaving them both destroyed
- Code name for President Reagan's plan of developing technology that could shoot down potential nuclear weapons
- US attempt to defeat Fidel Castro of Cuba
- massive military build-up of nuclear weapons, by the USSR and US in order to gain military bragging rights
- "Intercontinental Ballistic Missiles"
- Underground structures, stocked with food and other supplies, that were intended to keep people safe from radioactive fallout following a nuclear attack
- a extremely powerful and influential country
- Soviet Union plan to keep West Germany from getting supplies to West Berlin
- The response to the Blockade in order to get supplies to West Berlin by the Western nations, including the US
- the physical divider of the city of Berlin
- The closest the US & USSR ever got to War. USSR missiles in Cuba
- US policy that gave aid to countries torn apart during WWII
- US policy that gave aid to countries threatened by communism
30 Clues: Leader of USSR in 80s • "Intercontinental Ballistic Missiles" • Line that divided North & South Korea • US attempt to defeat Fidel Castro of Cuba • the physical divider of the city of Berlin • Soviet Union policy that means restructuring • a extremely powerful and influential country • Witch hunt of suspected communists in the US • ...
Vietnam War Crossword Puzzle - Gionna Kinchen 2016-05-20
Across
- The play about Vietnam that set records while on Broadway
- an alleged attack by North Vietnamese Navy on US destroyers which led President Johnson to order a direct bombing attack on North Vietnam (most historians now believe there was no attack)
- A military base in northwestern South Vietnam that was attacked by communist troops. There was an increased traffic on the Ho Chi Minh Trail right before the assault.
- As the longest armed conflict in US History, involvement in Vietnam lasted ___ years
- line of latitude that separated North and South Vietnam
- The General in charge of Vietcong military operations during most of the conflict
- Missions during which US patrols searched for hidden enemy camps then destroyed them with massive fire power and air raids
- American military slang for communist forces, especially the Vietcong
- South Vietnamese president that was catholic and strongly opposed communism. His poor leadership and corrupt government spelled doom
Down
- Network of paths along the borders of Vietnam, Laos, and Cambodia
- Demilitarized zone. The dividing line between North and South Vietnam established in 1954 at the Geneva Convention.
- A 7,000-page top-secret United States government report on the history of the internal planning and policy-making process within the government itself concerning the Vietnam War.
- an organization of Vietnamese Communists and other nationalist groups that between 1946 and 1954 fought for Vietnamese independence from the French
- A joint resolution of the U.S. Congress passed on August 7, 1964 in direct response to a minor naval engagement. It is of historical significance because it gave U.S. President Lyndon B. Johnson authorization, without a formal declaration of war by Congress, for the use of military force in Southeast Asia.
- Accords Peace agreement that temporarily divided Vietnam along the 17th parallel
- U.S. ally country that sent troops to Vietnam
- The growing political youth movement in the 1960s
- 35th President of the United States
- President who authorized Operation Rolling Thunder
- ___ Hilton (nickname of a Vietnam War prison)
20 Clues: 35th President of the United States • U.S. ally country that sent troops to Vietnam • ___ Hilton (nickname of a Vietnam War prison) • The growing political youth movement in the 1960s • President who authorized Operation Rolling Thunder • line of latitude that separated North and South Vietnam • The play about Vietnam that set records while on Broadway • ...
ICS 133 2017-05-11
Across
- ma'am ron's bebeloves
- communications intelligence
- will expose minor vulnerabilities
- uses the DNS to look up a name
- dubious stock investment
- bogus message given to computers
- communications security
- an attack on confidentiality
- keeping information secret
- protecting information from improper changes
- openings in an asset
- are protected by a boundary
- keeping systems available and in operation
- put acoustical and electromagnetic shields around the equipment
- disruption of transmissions
- malicious software
- applies effort but avoids social stigma
- also known as cutwail
- availability attack
- establish a protected area around sensitive devices and block attackers from area
- forge the sender’s IP address in a TCP connection; success requires correct
- prevents a sender from sending data faster than the recipient can handle it
- protects the assets
- unsolicited email often distributes frauds
- data resides in the ____
- automated host configuration
- the most secure token
Down
- the most common token
- he process to establish permission for someone to receive classified information
- protects a set of files from access by others
- _ names provide memorable names for hosts on the Internet
- no special steps ensure availability
- email that tries to retrieve authentication data
- protects information even when it is not under your physical control
- availability attack again
- _ law are based on legislative enactments
- _ reading grants read access to a set of files
- identifies a special category of information that requires protection
- infer secrets from patterns in encrypted or otherwise protected traffic
- acceptance incorrectly detects a match with a credential and the database
- filters on comm and power lines
- interactive DNS resolver
- creates botnet focused on financial fraud
- brief description of threat agent
- embed traffic inside a protocol that the firewall always passes, like Web pages
- an attacked system is called ____ system
- limited damage to assets
- _ law are based on judicial decisions
- also known as conficker
- cause significant damage to assets or some injury to persons, but not critical injury
50 Clues: malicious software • availability attack • protects the assets • openings in an asset • the most common token • ma'am ron's bebeloves • also known as cutwail • the most secure token • communications security • also known as conficker • dubious stock investment • interactive DNS resolver • limited damage to assets • data resides in the ____ • availability attack again • ...
Immune System 2021-03-30
Across
- harmless variant or derivative of a pathogen that stimulates a host's immune system to mount defenses against the pathogen
- cells that develop from B cells and produce antibodies
- the ability to recognize and remember specific antigens and mount an attack on them
- a type of cell within the body capable of engulfing and absorbing bacteria and other small cells and particles
- the short-term immunity that results from the introduction of antibodies from another person or animal
- proteins (cytokines) secreted by T cells and other cells to aid and regulate the immune response
- type of lymphocyte that kills infected body cells and cancer cells
- the body's specific recognition, response, and memory to a pathogen attack
- cells manufactured in the bone marrow that create antibodies for isolating and destroying invading bacteria and viruses
- watery fluid within lymphatic vessels
- having a hypersensitivity to a substance that does not normally cause a reaction.
Down
- a localized response to an injury or to the destruction of tissues
- organisms that cause disease
- the ability of an organism to resist a particular infection or toxin by the action of specific antibodies or sensitized white blood cells
- activate macrophages, B cells and T cells.
- immunity that is present before exposure and effective from birth; responds to a broad range of pathogens
- a form of acquired immunity in which the body produces its own antibodies against disease-causing antigens
- the two types of white blood cells that are part of the body's immune system
- produced during a B cell response, but are not involved in antibody producing during the initial infection; are held in reserve for the rest of your life in case you encounter that pathogen again
- proteins that are produced by B lymphocytes and that attaches to a specific antigen keeping them from harming the body
- cells created in the thymus that produce substances that attack infected cells in the body
- recognize pathogens they have encountered before, allowing for a quicker immune response in a second exposure
22 Clues: organisms that cause disease • watery fluid within lymphatic vessels • activate macrophages, B cells and T cells. • cells that develop from B cells and produce antibodies • a localized response to an injury or to the destruction of tissues • type of lymphocyte that kills infected body cells and cancer cells • ...
Final Crossword Security Plus 2024-06-04
Across
- inserts statements to manipulate a database server
- hiding data within an ordinary, nonsecret file
- Removing user accounts
- ensuring that an organization adheres to laws and regulations
- It only goes off after certain conditions are met
- Subset of the board that manages governance issues
- bruteforce collision attack that exploits the probability theory
- Threat actors who are strongly motivated by philosophical or political beliefs.
- involves isolating sensitive enterprise data
- pose a threat from the position of a trusted entity
- refers to integrating security into the application
- A device that distributes work across a network
- An attack that copies data and then uses it
- The entity that is responsible for digital certificates
- Individual or entity who is responsible for attacks
- is a finite sequence of rigorous instructions
- Data that is encapsulated within a secure outer shell
- Threat actors who are employed by their own government to carry out attacks
Down
- Vulnerability for which there are no days of advanced warning
- The rapid detection and elevation of a threat incident
- A downgrade attack
- server within the DMZ that is used to connect two dissimilar security zones
- features and characteristics of the individual
- two or more different messages that produce the same hash value
- Standard preconfigured passwords
- decentralized, distributed and public digital ledger
- An AP set up by an attacker to mimic an authorized AP
- A malicious program that uses a computer network to replicate
- Closing unused ports and disabling unnecessary protocols
- resource that is not possible due to geography
- An unauthorized AP that allows an attacker to bypass many of the network security
- denial of the truth or validity of something
- validate a main domain along with all subdomains
- evidence or proof of something
- A product that consolidates real-time security monitoring and management
- performs a real-time lookup of a certificate’s status
- unauthorized copying of data
- object whose state cannot be modified after it is created
- Identifying and mitigating risks brought on by a third party
- retains historical documents
40 Clues: A downgrade attack • Removing user accounts • unauthorized copying of data • retains historical documents • evidence or proof of something • Standard preconfigured passwords • An attack that copies data and then uses it • denial of the truth or validity of something • involves isolating sensitive enterprise data • is a finite sequence of rigorous instructions • ...
Cryptic Hunt Set - 3 2024-03-01
Across
- A technique used in file systems to improve performance by delaying the writing of data to disk until it is necessary.
- In cybersecurity, what is the term for a security mechanism that monitors and controls the flow of network traffic based on predetermined rules?
- What cryptographic protocol secures email communication by providing authentication and encryption?
- A term used to describe the state where two or more threads are attempting to modify shared data concurrently.
- What term describes the process of ensuring that data transmitted across a network is secure from eavesdropping or tampering?
- Which cipher involves using a series of rotating disks or cylinders to scramble the alphabet?
- What type of attack targets the domain name system (DNS) to redirect users to malicious websites?
- A tool used to automatically generate code from a given set of rules or templates.
- Which type of attack involves capturing and analyzing network traffic to steal sensitive information, such as login credentials?
Down
- A technique used in operating systems to protect critical sections of code by allowing only one thread to execute them at a time.
- A technique used in file systems to ensure data integrity by recording changes to disk structures before making them.
- What security measure restricts access to a network based on the physical address of a device?
- A class that allows multiple threads to read from or write to a shared resource without interference.
- What type of attack floods a network with excessive traffic to overwhelm its capacity?
- A feature introduced in Java 8 that allows for the concise representation of anonymous functions or methods as instances of functional interfaces.
- What is the name of the method for generating round keys from the original cryptographic key?
- In the Vigenère cipher, what is the key used for encrypting the message?
- A tool used for continuous integration and continuous delivery in Java projects.
- A C library function used for finding the smallest integer that is greater than or equal to a floating-point number.
- What is the name of the mathematical process used to reverse encryption?
20 Clues: In the Vigenère cipher, what is the key used for encrypting the message? • What is the name of the mathematical process used to reverse encryption? • A tool used for continuous integration and continuous delivery in Java projects. • A tool used to automatically generate code from a given set of rules or templates. • ...
CyF Chapter 1 2023-10-08
Across
- What is the acronym for the intermediate level certification offered by EC-Council that the cybersecurity specialists holding this credential possess the skills and knowledge for various hacking practices.
- Attacks that originate from within an organization are known as ___________ security threats.
- Which type of cyber attack can track system self-reporting data, like how much energy a computer is using, and use that information to select targets or trigger false alerts.
- Script _____ are teenagers or hobbyists mostly limited to pranks and vandalism, have little or no skill.
- DDoS in cyber security means "Distributed ______-of-Service.
- The acronym of this technology which enable people to connect billions of devices to the Internet.
- Criminals can also use rogue devices, such as _____ Wi-Fi access points.
- Information _______ Management Standards provide a framework for implementing cybersecurity measures within an organization.
- Cybersecurity ______ possess the insight to recognize the influence of data and harness that power to build great organizations, provide services and protect people from cyberattacks.
Down
- Criminals use this tool to capture data streams over a network.
- Federated identity management refers to ______ enterprises that let their users use the same identification credentials gaining access to the networks of all enterprises in the group.
- What is another word used to describe the speed of data.
- A group of grey hat hackers who rally and protest against different political and social ideas.
- At which level are the employees responsible to protect the organization’s reputation, data, and customers.
- Cyber ______ is a weakness that makes a target susceptible to an attack
- The acronym of the practice where people used their own devices to access enterprise information.
- This group of criminals breaks into computers or networks to gain access for various reasons.
- A cybersecurity ______ is the possibility that a harmful event, such as an attack, will occur.
- State _____ Hackers are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks.
- _____ hat attackers are unethical criminals who violate computer and network security for personal gain.
20 Clues: What is another word used to describe the speed of data. • DDoS in cyber security means "Distributed ______-of-Service. • Criminals use this tool to capture data streams over a network. • Cyber ______ is a weakness that makes a target susceptible to an attack • Criminals can also use rogue devices, such as _____ Wi-Fi access points. • ...
100 Turning Points 2024-10-03
Across
- The first slaves were sold in this state
- Seneca Falls was the first women's rights ______ and was organized by a group of five women
- The Indian Removal Act allowed the president to grant lands west of this state in exchange for Indian lands
- John C. Calhoun wrote an anonymously published a pamphlet which criticized the tariff and laid the groundwork for _____ theory
- This is the power that Supreme Court seized in Marbury vs Madison 1803
- Columbus first landed here when looking for the East Indies
- This person invented the Erie Canal
- The time of when more than 300,000 people came to California to find gold
- More than 200 people were being accused of ________ in colonial Massachusetts from 1692-1693
- President Jefferson purchased Louisiana from Napoleon for ___ million
- Washington’s surprise attack upon a small French force at _________
- Three of his men were killed by colonists which led to the start of King Phillip's War
- John ______ signed the Declaration of Independence first
Down
- These people arrived on the Mayflower in 1620
- This many men were killed at Lexington and Concord when someone shot a bullet known as "The Shot Heard 'Round the World"
- It took this many months for congress to agree on the final list of the Bill of Rights
- The Supreme Court ruled that Americans of African descent, whether free or enslaved, were not American _______ and could not sue in federal court
- The end of this battle was the start to our nation's _______
- The British were urged to attack the former colonies after American troops attacked this country
- Andrew Jackson vetoes the government's effort to _____ the Second Bank of the United States
- Boys were throwing these at British soldiers which caused the soldiers to attack back
- This was the first state to ratify the competition
- This crop saved Jamestown
- This Native saved the pilgrims by teaching them how to acclimate to life in the "New World"
- Samuel Morse had extended his telegraph line all the way to this state
25 Clues: This crop saved Jamestown • This person invented the Erie Canal • The first slaves were sold in this state • These people arrived on the Mayflower in 1620 • This was the first state to ratify the competition • John ______ signed the Declaration of Independence first • Columbus first landed here when looking for the East Indies • ...
Vocabulary 9-13 2025-04-02
Across
- (v) To fail to do something required
- (adj) Unable to speak in an orderly, logical way
- (n) Close inspection; careful examination
- (v) To be good enough
- (v) To unite into a single whole; combine
- (v) To give in; stop resisting
- (adj) Evil; wicked
- (v) to mix up or confuse (as a story or message); scramble
- (v) To make up; be the parts of
- (adj) Most common or most noticeable
- (adj) Very obvious, often offensively so
- (adj) Having many parts arranged in a complicated way
- (n) Using someone else's writings or ideas as your own
- (v) To feel or express delight or self-satisfaction; often spitefully
- (n) an uneasy feeling about how right or proper a particular action is
- (adj) Starting and stopping from time to time; off-and-on
- (v) To make a request or plead on behalf of someone else
- (adj) Necessary; cannot go without
- (adj) Perfectly clean
- (n) Something that moves one to take action or work harder; a motivation
Down
- (n) Something that weakens, damages, or destroys
- (v) To seize with authority; legally take possession of
- (n) A temporary decline in business
- (adj) Happening or existing at the same time; simultaneous
- (v) To plan cleverly; think up
- (adj) Supposed for the sake of argument or examination; imaginary; theoretical
- (v) To turn aside, or stray, especially from the main topic in speaking or writing
- (v) To upset deeply; overwhelm
- (v) To waste; spend or use foolishly
- (v) To worsen; deteriorate
- (n) A place of safety, protection, or relief
- (v) To interpret or read (something confusing or hard to make out)
- (adj) Open to damage or attack; susceptible
- (adj) Difficult to believe; unlikely
- (v) To cut short or reduce
- (adj) Thin and bony
- (n) Great hardship or difficulty; harshness; severity
- (adj) Slight; very small compared with what might be expected
- (v) To return an attack for an attack (verbal or physical); pay back
- (n) Something required beforehand
40 Clues: (adj) Evil; wicked • (adj) Thin and bony • (v) To be good enough • (adj) Perfectly clean • (v) To worsen; deteriorate • (v) To cut short or reduce • (v) To plan cleverly; think up • (v) To upset deeply; overwhelm • (v) To give in; stop resisting • (v) To make up; be the parts of • (n) Something required beforehand • (adj) Necessary; cannot go without • ...
Pokémon Crossword 2025-09-16
Across
- Berry that confuses pokémon who dislike spicy food
- Real life inspiration for Ben 5's bug/steel type
- Can change form via a catalog
- Berry that confuses pokémon who dislike sour food
- Used to fuse calyrex
- First ride pokémon obtained in Legends: Arceus
- Word following "Energy" or "Feather"
- Number 748, the brutal star pokémon
- Nature that raises special attack and lowers defense
- Fire pokémon whose gender difference is a single pixel
- Nature that raises defense and lowers special defense
- If used in a contest, causes Smokescreen to score double appeal points next turn
- Collection of items in Legends: Arceus that function like X items from the main series
- Aaron's type specialty
- Rugged type known for physical defense
- Shuts down Professor Sada's Time Machine
- Allows the use of Guardian of Alola
- Word preceding "Malasada" or "Mushroom"
- Gen 7 pokémon that learns Tail Glow
Down
- Where your seventh party member goes
- Evolves from a dragon-type with a gigantamax form
- What fissure might do to an opposing pokémon
- Berry that reduces the damage from super-effective flying moves
- Has a from only obtainable in Egypt in Pokémon Go
- Collection of items in Legends: Arceus that raise effort levels
- Steel pokémon that evolves with a dusk stone
- Word preceding "incense" or "restore"
- Type of bike that lets you do tricks
- Second half of a flying type move boosted by sharpness
- Nature that raises defense and lowers attack
- Type of bike fast enough to go up muddy slopes
- Number 178, the mystic pokémon
- The first primary flying-type pokémon
- The official competitive format
- Number 953, the rolling pokémon
- Word before "Soup" or "Geyser"
- Palkia's globe and orb
- What you might do to a useless Pokémon in a Nuzlocke
- Poison/Dark type if found in Alola
- Word following "Hammer" or "Needle"
- Nature that raises special defense and lowers attack
- Research report key items exclusive to pokémon colosseum
- Word preceding "Amber" or "Sea Map"
- Needed to level up
44 Clues: Needed to level up • Used to fuse calyrex • Palkia's globe and orb • Aaron's type specialty • Can change form via a catalog • Number 178, the mystic pokémon • Word before "Soup" or "Geyser" • The official competitive format • Number 953, the rolling pokémon • Poison/Dark type if found in Alola • Number 748, the brutal star pokémon • Word following "Hammer" or "Needle" • ...
Popcorn by Rob Harrell 2025-10-20
Across
- What is the name of Andrew’s best friend?
- What class does Andrew have his panic attack in?
- Does Andrew get a good school picture?
- What did Andrew’s mom gave him for picture day?
- What gave Andrew a panic attack in school?
- How would some people describe Andrew’s family?
- How many times does Andrew tap things with his finger to help him when he is anxious?
- What does his grandma have?
- What techniques help Andrew calm down?
- What was Andrew so worried about all day?
- What do both the author and Andrew hate these and think they're gross?
- Why isn’t Andrew mad about his school picture?
- What condiment got in Andrew’s hair during lunchtime because of the class clown?
- What did Andrew do to prepare for picture day?
- What does Andrew’s bully break at school?
- What does the nurse give Andrew to try to make his day better?
- What is Andrew’s grandmas favorite snack?
Down
- Where is Andrew’s mom during his day at school?
- Who is Andrew’s bully?
- What day is it at school that Andrew’s family get excited about?
- What is the main setting of the book Popcorn?
- Where does Andrew spend a lot of time at school?
- What is one of the things that happens to Andrew during his panic attack?
- Andrew’s goal in the book is to get a good what?
- What did Andrew called himself when it came to math?
- The color of juice does Andrew get on his new shirt that ruins it for his picture?
- What is helping Andrew feel better and deal with his Anxiety?
- Where is Andrew’s grandma during most of the book?
- What is the main reason Andrew is having a terrible day?
- How did Andrew express his anxiety?
- What sport is Andrew’s best friend good at?
- What is the title of the book?
- Who abandons Andrew and moves far away?
- What is Andrew’s biggest fear that happens at school?
34 Clues: Who is Andrew’s bully? • What does his grandma have? • What is the title of the book? • How did Andrew express his anxiety? • Does Andrew get a good school picture? • What techniques help Andrew calm down? • Who abandons Andrew and moves far away? • What is the name of Andrew’s best friend? • What was Andrew so worried about all day? • ...
naruto 2013-02-28
12 Clues: raps alot • naruto's biju • all biju mixed • obito loved her • naruto's village • mirror wheel eye • sasuke's brother • the fifth kazekage • biju's strongest attack • hoshigaki kisame's sword • who gave kakashi his sharringan • the first hogkage invented this jutsu
crosswords 2023-02-07
12 Clues: humor • smears • to charm • laid back • moving slow • humming sound • put an end to • time in events • signals the approach of another.mettle • impair the appearance devoid entirely lacking • forceful and bitter verbal attack against someone • obsequiously toward someone important sequitur
crosswords 2023-02-07
12 Clues: humor • smears • to charm • laid back • moving slow • humming sound • put an end to • time in events • signals the approach of another.mettle • impair the appearance devoid entirely lacking • forceful and bitter verbal attack against someone • obsequiously toward someone important sequitur
crosswords 2023-02-07
12 Clues: humor • smears • to charm • laid back • moving slow • humming sound • put an end to • time in events • signals the approach of another.mettle • impair the appearance devoid entirely lacking • forceful and bitter verbal attack against someone • obsequiously toward someone important sequitur
20250409 2025-04-08
12 Clues: to hit • to fight • to attack • the harbour • to hand over • the civil war • I've had lunch • fellow countrymen • they've decided that • to strengthen, to reinforce • start working after I call you • I want my parents to bring me to school
civil war 2021-10-18
Voc. p.129/ 130 2018-02-07
14 Clues: >> free • >> drive • >> to say • >< defense • >> to repair • >> railway BE • >> police car • > to be a prisoner • >> Have a good time! • > to give work to somebody • > to pay someone to work for you • > someone who hunts wild animals • > the place you are traveling (AE) to • > the rights that every person in a country has
Voc. p.129/ 130 2018-02-07
14 Clues: >> free • >> drive • >> to say • >< defense • >> to repair • >> police car • >> railway BE • > to be a prisoner • >> Have a good time! • > to give work to somebody • > to pay someone to work for you • > someone who hunts wild animals • > the place you are traveling (AE) to • > the rights that every person in a country has
Pokémon with 20-28 Defense 2024-02-13
14 Clues: 20 Bug VIII • 25 Ground I • 28 Fairy II • 25 Water IX • 20 Water III • 28 Dark VIII • 23 Normal III • 20 Electric IX • 20 Normal/Fairy I • 20 Water/Dark III • 25 Psychic/Fairy III • 20 Water VII Solo Form • 25 Ghost IX Roaming Form • 20 Psychic III Attack Forme
Cardiovascular System 2015-07-16
Across
- swelling
- low blood pressure
- slow heart rate
- known as a heart attack
- Largest blood vessel in the body
- blood clot
- Carry blood to the heart
Down
- Carry Blood away from the heart
- signs and symptoms of: sweating,cyanosis,chest pain
- Abnormal heart beat
- high blood pressure
- Hypertension
- Temporary chest pain
- fast heart rate
14 Clues: swelling • blood clot • Hypertension • slow heart rate • fast heart rate • low blood pressure • Abnormal heart beat • high blood pressure • Temporary chest pain • known as a heart attack • Carry blood to the heart • Carry Blood away from the heart • Largest blood vessel in the body • signs and symptoms of: sweating,cyanosis,chest pain
Voc. p.129/ 130 2018-02-07
14 Clues: >> free • >> drive • >> to say • >< defense • >> to repair • >> railway BE • >> police car • > to be a prisoner • >> Have a good time! • > to give work to somebody • > someone who hunts wild animals • > to pay someone to work for you • > the place you are traveling (AE) to • > the rights that every person in a country has
THE SEA OF MONSTERS BY KAI 2020-11-12
14 Clues: WITH CANNIBALS • PIGEONS ATTACK • PLAYS WITH FIRE • gets the fleece • A NEW CABIN MATE • tries to swim home • blow up everything • FOR A WEDDING DRESS • in to ccs spa resort • GIFTS FROM A STRANGER • the princes' andromeda • THE TAXI OF ETERNAL TORMENT • the worst family reunion ever • a ride with dead confederates
Group 1, Thomas, Diana, Nathan, Mackenzie, Aiden 2021-09-09
Across
- Half pitch higher
- Loud sudden attack
- Hold full value of every note
- German composer
- Gradually getting softer
- sliding between notes on a trombone
- Half pitch lower
- Very fast
Down
- the notes of a chord played in succession
- Moderately slow
- Gradually getting louder
- 5 people playing together
- Played very slowly
- Austrian composer
14 Clues: Very fast • Moderately slow • German composer • Half pitch lower • Half pitch higher • Austrian composer • Loud sudden attack • Played very slowly • Gradually getting louder • Gradually getting softer • 5 people playing together • Hold full value of every note • sliding between notes on a trombone • the notes of a chord played in succession
Group 1, Thomas, Diana, Nathan, Mackenzie, Aiden 2021-09-09
Across
- Half pitch higher
- Loud sudden attack
- Hold full value of every note
- German composer
- Gradually getting softer
- sliding between notes on a trombone
- Half pitch lower
- Very fast
Down
- the notes of a chord played in succession
- Moderately slow
- Gradually getting louder
- 5 people playing together
- Played very slowly
- Austrian composer
14 Clues: Very fast • Moderately slow • German composer • Half pitch lower • Half pitch higher • Austrian composer • Loud sudden attack • Played very slowly • Gradually getting louder • Gradually getting softer • 5 people playing together • Hold full value of every note • sliding between notes on a trombone • the notes of a chord played in succession
lomvbardo 2022-05-01
14 Clues: LBJ was this • jamon??...jamon • Lombardos buddy • lucky mf in KOTM • you hate this game • Lombardos adiction • best teacher no cap • spicy game decision • epic 7 grade teacher • Boss of Tammany Hall • BRO THIS IS THE HOMIE • 18th amendment banned this • Lombardo hates this decision • I have an affair with this mf
The End of the American Revolution 2022-06-02
Across
- which general's slow-moving tactics
- what would the british not stray away from after the battle of saratoga
- type of attack commonly used by general george washington
- what is something the colonies had that the british didn't
- what type of atttack was used to catch the british off gaurd in the battle of trenton and princeton
- Britain's military supplies
- in which battle did the british change their strategy to staying near naval bases and supply bases
- in what battle did the continental army capture 900 British soldiers
- in which battle did the british capture Philadelphia
Down
- which general led soldiers into the delaware river on December 25,1776
- in which battle did 1500 soldiers of the Continental Army leave or die during battle?
- where did the british tend to stay as a better military strategy
- which advantage led to the ability to convey messages through newspapers,etc.
- in what treaty did France decide to help the colonies until the war was over
- in which battle did British General Thomas Gage attack militiamen?
- which advantage was created by patriotism
16 Clues: Britain's military supplies • which general's slow-moving tactics • which advantage was created by patriotism • in which battle did the british capture Philadelphia • type of attack commonly used by general george washington • what is something the colonies had that the british didn't • where did the british tend to stay as a better military strategy • ...
Battles of World War II and other military terms 2020-04-30
Across
- 1942-1943, allied troops drove Japanese forces from this Pacific island
- marines took this island off Tokyo, bloodiest land battle
- bombed Tokyo for revenge of Pearl Harbor raised American moral and showed weakness for Japan
- German and British air force, 1940-1941 fought over Britain
- naval warfare using airplanes taking off form air craft carriers
- 1944-1945, allied forces turned back the last major German offensive
- US dropped atomic bomb, city in Japan
Down
- lightning war, surprise attacks with fast moving airplanes and massive attacks with infantry forces
- 1941 attack of US in Hawaii by the Japanese
- battle on the beaches of France, Allied troops were recued by Great Britain
- 1942, sea and air battle, American forces defeated Japanese forces in Central Pacific
- 4 days, the Japanese navy had lost, eliminating it as a fighting force in the war
- forced captives to March 50 miles up peninsula of Japan, terrible cruelties
- Allied and German armies sat and waited for the other to attack
- Hitler’s plan to invade Soviet Union June 22,1941
- 1942-1943, Germany was defeated in attempt to capture Stalingrad
16 Clues: US dropped atomic bomb, city in Japan • 1941 attack of US in Hawaii by the Japanese • Hitler’s plan to invade Soviet Union June 22,1941 • marines took this island off Tokyo, bloodiest land battle • German and British air force, 1940-1941 fought over Britain • Allied and German armies sat and waited for the other to attack • ...
RCE 073 UNIT 1 - CROSSWORD-PUZZLE 2021-04-01
Across
- / maintenance can be classified based ______ duration or frequency.
- / repairs and rehabilitation calls for skills and abilities _______ design and construction engineering.
- /_______ causes the corrosion of reinforcing bars
- of materials, to be used in construction, should be ensured by means various ______ as specified in the IS codes
- /maintenance are also on the basis of climatic _________
- / is preventive in nature.
- / In aggressive environment ______ structure will severely reduces
- Alkali-aggregate reaction and sulphate attack results in _____ deterioration.
Down
- repair and maintenance to ______ the level of deterioration in a structure.
- / ageing infrastructures need
- Maintenance improves the _______ life of the structure
- / is the process of restoring something good that is damaged.
- / is the process of returning a building to its previous good conditions
- /Micro cracks present in the concrete are the ________ of ingress of moistures atmospheric carbon di-oxide into the concrete which attack reinforcement and with various ingredients of concrete
- / The flow chart of activities is useful for assessing the structural work health involved spans two distinct ______.
- / Inadequate concrete _____ may lead to carbonation depth up to the reinforcement
16 Clues: / is preventive in nature. • / ageing infrastructures need • /_______ causes the corrosion of reinforcing bars • Maintenance improves the _______ life of the structure • /maintenance are also on the basis of climatic _________ • / is the process of restoring something good that is damaged. • / In aggressive environment ______ structure will severely reduces • ...
Pathogens 2023-04-25
Across
- phagocytes attack the pathogens in that area
- a condition in which an individual has a large amount of fat for his or her height
- is caused by the human immunodeficiency virus(HIV)
- is caused by a pathogen and can be spread among organisms
- an infectious agent that can replicate only inside the living cells of other organisms
- are caused by rhinoviruses
Down
- are microscopic unicellular eukaryotes that have a relatively complex internal structure
- can be found in soil, plants, on moist surfaces, and on human skin and nails
- is an organism that lives in or on another organism and harms it
- is a disease caused by a fungus from the genes trichophyton.
- is a type of protein that can trigger normal proteins in the brain to fold abnormally
- is caused by a parasite from the genes plasmodium
- antibodies bind to antigens allowing phagocytes to attack the pathogens
- may destroy the cells of a organism and/or release toxins
- is caused by the bacteria streptococcus pyogenes
- is caused by the influenza virus
16 Clues: are caused by rhinoviruses • is caused by the influenza virus • phagocytes attack the pathogens in that area • is caused by the bacteria streptococcus pyogenes • is caused by a parasite from the genes plasmodium • is caused by the human immunodeficiency virus(HIV) • may destroy the cells of a organism and/or release toxins • ...
Black Brother, Black Brother 2025-06-12
Across
- the sport of fighting with swords, especially foils, épées, or sabers, according to a set of rules, in order to score points against an opponent.
- A hit to get a point
- answer to a parry riposte
- The school that Donte goes to
- The antagonist in the story
- A fencing match
- Another word for a fencing strip
- The sword being used in a fencing match
Down
- prejudice, discrimination, or antagonism by an individual, community, or institution against a person or people on the basis of their membership in a particular racial or ethnic group, typically one that is a minority or marginalized
- The playing area where bouts take place
- a basic attacking movement where a fencer moves forward towards their opponent by extending their front leg and keeping their back leg straight
- Foot Position: Both feet are together at the heel, forming a right angle.
- Donte's brother
- To take a step towards the opponent in a fencing match
- The protagonist in the story
- ward off (a weapon or attack) with a countermove.
16 Clues: Donte's brother • A fencing match • A hit to get a point • answer to a parry riposte • The antagonist in the story • The protagonist in the story • The school that Donte goes to • Another word for a fencing strip • The playing area where bouts take place • The sword being used in a fencing match • ward off (a weapon or attack) with a countermove. • ...
Chapter 30 Vocab and People 2015-04-13
Across
- service industries such as government, education, trade, or health care
- pure theoretical science and practical technology
- a poet who wrote Doctor Zhivago, a powerful challenge to communism about a pre-Revolutionary intellectual who rejects the violence and brutality of the revolution of 1917 and the Stalinist years
- celebrated nonconformist and author of One Day in the Life of Ivan Denisovich, a novel about the life of a man in a Stalinist concentration camp
- the “liberation” of Soviet Union
- author of The Double Helix which tells how humanoid an Englishman discovered the structure of DNA in 1953
- the resistance leader and communist chief of Yugoslavia; successfully resisted Soviet domination
- a period during which Europeans filled their house with new, modern technologies
- the leader of the reformers who launched an attack on Stalin and his crimes; began as an uneducated coal miner in 1918 and later earned a high-level position in the 1930s and became the new ruler in 1955
Down
- ruler after Khrushchev who spoke of Stalin’s “good points” and ignored his crimes; launched a massive arms buildup
- the rebirth of dictatorship in the USSR; a return of Stalin’s more restrictive policies under Brezhnev’s rule
- a very expensive new model for science inspired by the results o directed research in WWII; combined theoretical work with sophisticated engineering to attack difficult problems
- gave the Soviet Union and its allies had the right to intervene in any socialist country whenever they saw the need to do so
- an educated communist voted into power by the Czechoslovak communist party; believed he could restore authentic socialism with personal freedom and party democracy
- the top-secret project resulting in the first atomic bomb attack that ended WWII
15 Clues: the “liberation” of Soviet Union • pure theoretical science and practical technology • service industries such as government, education, trade, or health care • the top-secret project resulting in the first atomic bomb attack that ended WWII • a period during which Europeans filled their house with new, modern technologies • ...
