attack Crossword Puzzles

unit 6 - Stefaniak, Monika Wróblewska, Nowecki 2022-01-25

unit 6 - Stefaniak, Monika Wróblewska, Nowecki crossword puzzle
Across
  1. continuous attack with bombs
  2. illegal rapid taking over government power
  3. military staff unit after retirement
  4. an important person in the organisation
  5. a promise carrying no result
  6. people wounded
  7. idea
  8. on the margin (rhymes with grinch)
Down
  1. make progress
  2. accidentaly
  3. under attack
  4. a group of soldiers e.g.fighting on horses
  5. competition
  6. lawful (e.g. from a trusted source)
  7. entities who died by accident
  8. a truce halting violence

16 Clues: ideaaccidentalycompetitionunder attackmake progresspeople woundeda truce halting violencecontinuous attack with bombsa promise carrying no resultentities who died by accidenton the margin (rhymes with grinch)lawful (e.g. from a trusted source)military staff unit after retirementan important person in the organisation...

Chapter 7 Vocab 2021-10-05

Chapter 7 Vocab crossword puzzle
Across
  1. attack a person or place with bombs
  2. the action of reserving something.
  3. northwest the land between the Great Lakes, The Mississippi, and the Ohio River.
  4. scope for freedom of action or thought
Down
  1. in search of stealing or people to attack
  2. restrain limit
  3. without the basic necessities of life.
  4. a brutal slaughter of people
  5. expel and bar someone from there native home
  6. make an attack or assault in return for a similar attack

10 Clues: restrain limita brutal slaughter of peoplethe action of reserving something.attack a person or place with bombswithout the basic necessities of life.scope for freedom of action or thoughtin search of stealing or people to attackexpel and bar someone from there native homemake an attack or assault in return for a similar attack...

260-264 2025-02-07

260-264 crossword puzzle
Across
  1. what was the south smuggling to trade with Europe through blockade runners
  2. where did McClennans troops take position
  3. which direction did the confederacy go to Chattanooga, Tennessee
  4. who became the union general in febuary of 1862
  5. where did grant go to attack when he sent his troops up the tennesee river
  6. what were the two famous confederate war ships
  7. who at first said that the reason for the war was that he wanted to preserve the union
  8. what battle was known as the bloodiest one day battle in American history
  9. the McClennan became known as the what?
  10. where did the confederacy surprise attack the union
  11. who believed that a successful invasion might convince the north to accept southern independence
  12. white men between the age of 18-35 were forced into war which is called what?
  13. lincoln facing a pressure strike against the south of Washington DC
  14. farragut arrived at new orleans at what date?
  15. how long did it take McClellan to capture yorktown
Down
  1. who decided to attack union forces defending Washington
  2. lincoln changed the reason why the civil war was happening to ending slavery so that who wouldn't interfere with the war
  3. what troops attacked and inflicted heavy casualties
  4. money given as an reward
  5. what rivers were both side struggling to take control of
  6. ship that runs through a blockade,usaully to smuggle goods through a protected area
  7. who did lincoln fire because he was upset at how slow he was being to attack Chattanooga
  8. who was the union mad at because they didn't think they should have been making war ships for the south
  9. the south thought they would gain recognition from who if they won on northern soil
  10. what is it called when someone blocks off an area to stop them from trading, getting supplies, and their transport
  11. when did Mcclennen order his troops to attack for the antinetam battle
  12. when did president lincoln put blockades on all confederate ports
  13. McClennen was forced to what and go back to Washington with his troops
  14. how many troops were killed during the war of siloh

29 Clues: money given as an rewardthe McClennan became known as the what?where did McClennans troops take positionfarragut arrived at new orleans at what date?what were the two famous confederate war shipswho became the union general in febuary of 1862how long did it take McClellan to capture yorktownwhat troops attacked and inflicted heavy casualties...

Plaque, Heart Attack, & Blood Pressure 2023-03-23

Plaque, Heart Attack, & Blood Pressure crossword puzzle
Across
  1. vein graft is sewn in to bypass a blockage
  2. a decrease in blood supply to a bodily organ due to occlusion
  3. insufficient levels of oxygen in blood or tissue
  4. an atheromatous plaque that is particularly prone to producing sudden major problems
  5. clot that migrates through the vascular system and causes an occlusion elsewhere
  6. interior space of blood vessel
  7. continuous flow of blood
  8. stent is inserted, expands, & stays in artery
  9. force exerted by the blood on the inner walls
Down
  1. constricting chest or shoulder pain caused by an insufficient blood supply to heart
  2. a blockage
  3. a buildup of plaque
  4. deposit of fatty material on inner arterial wall
  5. death of a bodily organ as a result of a blockage of blood vessels
  6. pressure exerted when ventricles relax
  7. a constriction or narrowing of a blood vessel
  8. clot inside of an artery that blocks blood flow
  9. pressure exerted when ventricles contract

18 Clues: a blockagea buildup of plaquecontinuous flow of bloodinterior space of blood vesselpressure exerted when ventricles relaxpressure exerted when ventricles contractvein graft is sewn in to bypass a blockagea constriction or narrowing of a blood vesselstent is inserted, expands, & stays in arteryforce exerted by the blood on the inner walls...

Argon Attack 2025-05-18

Argon Attack crossword puzzle
Across
  1. what type of gas is argon
  2. Greek word argon is named after
  3. the table of elements
  4. ______ number is 18
Down
  1. the study of elements and chemicals
  2. Argon Attack is the best _________

6 Clues: ______ number is 18the table of elementswhat type of gas is argonGreek word argon is named afterArgon Attack is the best _________the study of elements and chemicals

Encrypting the You Matter Most Cybersecurity Crossword Challenge! 2024-04-11

Encrypting the You Matter Most Cybersecurity Crossword Challenge! crossword puzzle
Across
  1. A method of hiding sensitive data within seemingly harmless files or messages (HARD!!!)
  2. A type of cyberattack that involves gaining access to a system and encrypting its data, then demanding payment for decryption.
  3. The practice of tricking individuals into divulging sensitive information such as passwords or credit card numbers vi e-mail
  4. _____-force attack is a technique used to guess a password by trying many possible combinations
  5. Gain access to someone else’s computer or device without permission
  6. The program you use to access the Internet (such as Chrome, Safari, Firefox, Edge)
  7. Man-In-The-________ attack is an type of attack that intercepts and alters communication between two parties
  8. An attack that floods a system with excessive network traffic, causing it to slow down or become unavailable is called a Denial of _______ attack
  9. Two-Factor ______________ is a security measure that verifies a user's identity based on something they have, such as a security token
  10. A location on the internet where you can save your data (rather than on your computer or device)
Down
  1. A program or device used to detect and prevent unauthorized access to a network
  2. A sequence of characters (or words) used to stop criminals from accessing your accounts
  3. A method of protecting data by converting it into unreadable code that only authorized parties can read
  4. Malicious software that could harm your computer or gadget
  5. What is a form of malware that monitors and records a user's activities without their knowledge?
  6. A simulated cyberattack on a computer system to identify vulnerabilities that could be exploited is called a ___________ test (Hard)
  7. A security incident where sensitive information is leaked to the public is a data ______
  8. ____-Day Vulnerabilities are software vulnerabilities that are unknown to the software vendor

18 Clues: Malicious software that could harm your computer or gadgetGain access to someone else’s computer or device without permissionA program or device used to detect and prevent unauthorized access to a networkThe program you use to access the Internet (such as Chrome, Safari, Firefox, Edge)...

The 9/11 Attacks 2019-11-12

The 9/11 Attacks crossword puzzle
Across
  1. What Chicago suburb was Joe Dittmar from?
  2. What month did they attack?
  3. Where were the suicide bombers from?
  4. How many cities did they attack
Down
  1. How many airliners did they use to attack?
  2. Who came up with the idea of using planes to attack?
  3. What was the name of the terrorist group?
  4. What side of the Pentagon did they hit?
  5. How many suicide bombers were there?
  6. What tower was Joe dittmar in?

10 Clues: What month did they attack?What tower was Joe dittmar in?How many cities did they attackHow many suicide bombers were there?Where were the suicide bombers from?What side of the Pentagon did they hit?What Chicago suburb was Joe Dittmar from?What was the name of the terrorist group?How many airliners did they use to attack?...

Poke X Word : Puzzle # 4 (Normal) 2022-03-25

Poke X Word : Puzzle # 4 (Normal) crossword puzzle
Across
  1. Ability: Shady Dealings
  2. Bonus: 2022 Salt Lake City Regional Champion
  3. Attack: Grass Knot
  4. Ability: Roaring Resolve
  5. Ability: Fleet-Footed
  6. Ability: Mysterious Tail
Down
  1. Attack: Pin Missile
  2. Ability: Dummy Doll
  3. Stadium: Whenever either player plays a Pokémon VMAX from their hand to evolve a Pokémon V during their turn, heal 100 damage from that Pokémon.
  4. Item: Search your deck for a Pokémon with 90 HP or less, reveal it, and put it into your hand. Then, shuffle your deck.
  5. Ability: Chromashift
  6. Ability: Spring Bloom
  7. Attack: Thunderbolt

13 Clues: Attack: Grass KnotAttack: Pin MissileAbility: Dummy DollAttack: ThunderboltAbility: ChromashiftAbility: Spring BloomAbility: Fleet-FootedAbility: Shady DealingsAbility: Roaring ResolveAbility: Mysterious TailBonus: 2022 Salt Lake City Regional Champion...

Cyber security 2023-04-28

Cyber security crossword puzzle
Across
  1. Software designed to harm or exploit any device or network it infects.
  2. A type of malware that encrypts a victim's files and demands payment in exchange for the decryption key.
  3. Software designed to detect and remove viruses and other types of malware.
  4. detection system Software that monitors a network or system for signs of unauthorized access or activity.
  5. attack An attack that attempts to make a website or network unavailable to users by overwhelming it with traffic or requests.
  6. authentication A security measure that requires two forms of identification to access an account.
  7. breach The unauthorized access, use, or disclosure of sensitive information.
  8. engineering The use of psychological manipulation to trick people into divulging confidential information or performing actions that are not in their best interest.
  9. force attack A method of guessing a password by trying every possible combination until the correct one is found.
  10. security The practice of securing a network from unauthorized access or attacks.
  11. An update to software that fixes a vulnerability or bug.
  12. Criminal activity that involves the use of digital devices or networks.
  13. testing The process of testing a system or network for vulnerabilities by attempting to exploit them.
Down
  1. exploit An attack that exploits a previously unknown vulnerability in a software application or system.
  2. The process of verifying the identity of a user or system.
  3. A type of social engineering attack that involves sending fraudulent emails or messages to trick people into sharing sensitive information.
  4. Method of converting plain text into a code that can only be read by authorized parties.
  5. A weakness or flaw in a system that can be exploited by attackers.
  6. Network security system that monitors and controls incoming and outgoing network traffic.
  7. The practice of protecting computer systems and networks from digital attacks, theft, and damage.

20 Clues: An update to software that fixes a vulnerability or bug.The process of verifying the identity of a user or system.A weakness or flaw in a system that can be exploited by attackers.Software designed to harm or exploit any device or network it infects.Criminal activity that involves the use of digital devices or networks....

Attack on Pearl Harbor 2025-12-04

Attack on Pearl Harbor crossword puzzle
Across
  1. the United States became upset after Japan invaded and conquered it in 1931
  2. Japan thought they shouldn't be ruled by white imperialist
  3. Japan launched an attack on the United States ___
  4. where did the United States move their Navy from San Diego
  5. what year did Pearl Harbor happen
  6. United States were able to send 31,095 troops in
Down
  1. the Japan placed on the torpedoes to prevent from hitting the bottom of Pearl Harbor
  2. Japan invaded the country and interrupted United States trade
  3. 12 times lost in the past six months
  4. who cut off the trade of oil and metal after Japan conquered French Indochina
  5. No chance of an surprise attack being there
  6. The United Staes wanted to stay _____ to stay out of the war
  7. who was angry with the US rejecting the racial equality proposal

13 Clues: what year did Pearl Harbor happen12 times lost in the past six monthsNo chance of an surprise attack being thereUnited States were able to send 31,095 troops inJapan launched an attack on the United States ___Japan thought they shouldn't be ruled by white imperialistwhere did the United States move their Navy from San Diego...

Pearl Harbor 2025-03-05

Pearl Harbor crossword puzzle
Across
  1. Where is Pearl Harbor?
  2. Which ship that was bombed and sunk is still at Pearl Harbor?
  3. A weapon used by the Japanese for the attack
  4. A hospital ship docked at Pearl Harbor during the attack; this ship was not bombed
  5. What was the date of the Attack?
  6. An underwater bomb used to damage ships from below
Down
  1. The US joined this as a result of Pearl Harbor
  2. Which country bombed Pearl Harbor?
  3. How many total ships were damaged or destroyed
  4. The president of the USA during the attack
  5. How many Americans were killed during Pearl Harbor?

11 Clues: Where is Pearl Harbor?What was the date of the Attack?Which country bombed Pearl Harbor?The president of the USA during the attackA weapon used by the Japanese for the attackThe US joined this as a result of Pearl HarborHow many total ships were damaged or destroyedAn underwater bomb used to damage ships from below...

Crossword cybersecurity 2024-04-17

Crossword cybersecurity crossword puzzle
Across
  1. resolv a fault
  2. fault what developer don't know
  3. attack on link of fish
  4. attack try multiple combination
Down
  1. virus look all you make on your pc
  2. most pc attack server
  3. program hide your IP
  4. program infect you
  5. person hack you
  6. protect to virus

10 Clues: resolv a faultperson hack youprotect to virusprogram infect youprogram hide your IPmost pc attack serverattack on link of fishfault what developer don't knowattack try multiple combinationvirus look all you make on your pc

BI416 Case study #1 Crossword 2021-10-06

BI416 Case study #1 Crossword crossword puzzle
Across
  1. Measurements indicating state of vital body functions
  2. over time panic attack episodes increase in ______
  3. Manifestation associated with tightening in chest and difficulty breathing
  4. Avoidance of ____ is typically associated with panic attack disorder
  5. Sensation of fast beating or pounding heart
Down
  1. Something that is feared when suffering from panic attack disorder
  2. Repeated episodes of panic attacks accompanied with physical manifestations. Also followed by the fear of another episode and/or the consequences such as death.
  3. A habit that may be linked to panic attacks
  4. A risk factor associated with panic attack disorder
  5. Past medical disorder that may increase an individuals chance of developing panic attack disorder

10 Clues: A habit that may be linked to panic attacksSensation of fast beating or pounding heartover time panic attack episodes increase in ______A risk factor associated with panic attack disorderMeasurements indicating state of vital body functionsSomething that is feared when suffering from panic attack disorder...

Legion Crosswords 2021-03-12

Legion Crosswords crossword puzzle
Across
  1. another attack after first attack keyword
  2. Incognito and Detachment
  3. Strong against commanders, weak against fieldcommanders and inspiring presence Padme
  4. 2 open 2 light 1 heavy
  5. only heavy weapon with repair
  6. Team Fortress game mode
  7. blast weapons ____ cover
  8. only unique gear upgrades
  9. Tank weak point 1 sides and rear
  10. Only heavy weapon with inspire
  11. short edge deployment
  12. you gain sentinel
  13. Cunning and Compel
Down
  1. Guardian and Disciplined
  2. First steady unit
  3. dauntless and infiltrate
  4. you gain charge upgrade
  5. Modern GAR standby sharing
  6. Jump and Steady
  7. you gain reliable 1 Corp or ARC unit

20 Clues: Jump and SteadyFirst steady unityou gain sentinelCunning and Compelshort edge deployment2 open 2 light 1 heavyyou gain charge upgradeTeam Fortress game modeGuardian and DisciplinedIncognito and Detachmentdauntless and infiltrateblast weapons ____ coveronly unique gear upgradesModern GAR standby sharingonly heavy weapon with repair...

Crossword Puzzle for Touching Spirit Bear 2024-09-03

Crossword Puzzle for Touching Spirit Bear crossword puzzle
Across
  1. A heavy mammal
  2. dangerously low body temperature
  3. lacking knowledge or awareness in general
  4. the main character
  5. the person who is attacked by cole
  6. cole's parole officer
  7. provoke or challenge
  8. sadness or gloomy
  9. a land mass surrounded by water
  10. the elder
Down
  1. responsibility for an accident
  2. what peter experienced after the beat down he received
  3. expelled
  4. attack
  5. distant
  6. the therapy cole received after he attack peter
  7. punishment for wrong doing
  8. the towel cole had
  9. where cole was sent to be punished
  10. by yourself
  11. People the tribe involved in the book

21 Clues: attackdistantexpelledthe elderby yourselfA heavy mammalsadness or gloomythe main characterthe towel cole hadprovoke or challengecole's parole officerpunishment for wrong doingresponsibility for an accidenta land mass surrounded by waterdangerously low body temperaturethe person who is attacked by colewhere cole was sent to be punished...

Cybersecurity 2023-03-17

Cybersecurity crossword puzzle
Across
  1. cable preventing theft of mobile devices
  2. network virus
  3. unwanted email messages
  4. storing files from hard drive remotely
  5. malicious code stored in files
  6. tricking victim into giving information
  7. bring your own device
  8. verifying a user's identity
  9. sending fake emails to scam
Down
  1. UI redress attack
  2. malicious software
  3. attack that changes devices' address
  4. malware requiring payment to fix
  5. false warning from fake senders
  6. masks user's location
  7. network of hacker computers
  8. website generated file storing info on your computer
  9. scrambling information necessitating a passkey
  10. instructions commanding browser actions
  11. malware hidden within another program

20 Clues: network virusUI redress attackmalicious softwaremasks user's locationbring your own deviceunwanted email messagesnetwork of hacker computersverifying a user's identitysending fake emails to scammalicious code stored in filesfalse warning from fake sendersmalware requiring payment to fixattack that changes devices' address...

WWII 2016-04-15

WWII crossword puzzle
Across
  1. girl that became famous for her diary
  2. Russian leader during WWII
  3. town where 1st atomic bomb was dropped
  4. town in England (air attack)
  5. American troops in Hawaii
  6. concentration camp in Austria
  7. landing of the allied troops in France
  8. end of WWII (year)
  9. Italian leader during WWII
  10. handicapped people were killed there
  11. first country occupied by Hitler
  12. Japanese town
Down
  1. Hitler promised the people .....
  2. killing of the Jews during WWII
  3. Russian town
  4. USA, France, GB,....
  5. beginning of WWII
  6. end of WW2 in Europe (month)
  7. fast attack on a country
  8. neutral state during WWII

20 Clues: Russian townJapanese townbeginning of WWIIend of WWII (year)USA, France, GB,....fast attack on a countryAmerican troops in Hawaiineutral state during WWIIRussian leader during WWIIItalian leader during WWIItown in England (air attack)end of WW2 in Europe (month)concentration camp in Austriakilling of the Jews during WWII...

Part 2 2015-04-17

Part 2 crossword puzzle
Across
  1. Nothing to do
  2. Always checking things out because you are ______
  3. Never change tone of voice
  4. Lack of experience
  5. Really smart and proper
  6. Unprotected
  7. Likely to attack
  8. A trip or journey
  9. Not strike but ______
  10. How deep something is
Down
  1. Being protected
  2. Driving force that causes the object to go forward
  3. Having little knowledge
  4. Take aggressive action
  5. Not guilty
  6. Letting their guard down they are _______
  7. Came across something or someone
  8. Make a physical attack on
  9. Dull
  10. Strength or power
  11. Someone very emotional
  12. Pity
  13. Unhappy

23 Clues: DullPityUnhappyNot guiltyUnprotectedNothing to doBeing protectedLikely to attackStrength or powerA trip or journeyLack of experienceNot strike but ______How deep something isTake aggressive actionSomeone very emotionalHaving little knowledgeReally smart and properMake a physical attack onNever change tone of voiceCame across something or someone...

Chapter 6 and 7 Vocab 2016-01-10

Chapter 6 and 7 Vocab crossword puzzle
Across
  1. more money to buy same amount
  2. sharing power between federal and state gov.
  3. two house legislative
  4. approve
  5. freeing of enslaved individuals
  6. each branch has roles that check or limit others
  7. plan of government
  8. undercover sudden attack
  9. gov. where citizens rule
  10. enlist
  11. law
  12. prevented trade
  13. fallen in value
  14. hired soldiers
  15. apply to
Down
  1. corresponding in size
  2. left without permission
  3. agreement
  4. period of economic activity slowed
  5. surprise attack
  6. made up of presidential electors
  7. privately owned merchant ships
  8. something added to a document
  9. parts in the constitution
  10. taking neither side

25 Clues: lawenlistapproveapply toagreementhired soldierssurprise attackprevented tradefallen in valueplan of governmenttaking neither sidecorresponding in sizetwo house legislativeleft without permissionundercover sudden attackgov. where citizens ruleparts in the constitutionmore money to buy same amountsomething added to a document...

Walk two moons vocab 2023-01-22

Walk two moons vocab crossword puzzle
Across
  1. One taken or held prisoner
  2. Quarrelsome
  3. Given or written by a person whose name is unknown
  4. Harassing
  5. Huge; gigantic
  6. Pranced
  7. Partial or total loss of memory caused by brain injury or shock
  8. In a state of violent or destructive rage or frenzy
  9. Lot; group
  10. Hand tool with a sharp, wedged blade
  11. Feeling under attack and hence quick to justify one's actions
Down
  1. Dead body
  2. Deceived
  3. Collected or gathered together
  4. Surprise attack from hidden assailants
  5. arteries
  6. White sterol found in animal fats which can cause
  7. Pestered
  8. Of supreme importance
  9. Plentiful
  10. Comfort

21 Clues: PrancedComfortDeceivedarteriesPesteredDead bodyHarassingPlentifulLot; groupQuarrelsomeHuge; giganticOf supreme importanceOne taken or held prisonerCollected or gathered togetherHand tool with a sharp, wedged bladeSurprise attack from hidden assailantsWhite sterol found in animal fats which can causeGiven or written by a person whose name is unknown...

WW1 2022-10-03

WW1 crossword puzzle
Across
  1. Tripple Alliance
  2. years
  3. battle
  4. fever
  5. of Verdun, French land
  6. boat that killed lots of people
  7. safe and comfortable trenches
  8. Frank Ferdinand, who was assassinated
  9. a deadliest weapon
  10. a system
  11. black hand, the group that was planning the attack
  12. Shock, PTSD
  13. muddy wet and unsafe
Down
  1. ww1 years
  2. no mans land
  3. the acronym for the longest term causes of WW1
  4. Empire, tripple alliance
  5. first gas attack
  6. flu
  7. ran out of
  8. Foot, wet and muddy
  9. a country
  10. Days offensive
  11. Hungary, declared war on Serbia

24 Clues: fluyearsfeverbattlea systemww1 yearsa countryran out ofShock, PTSDno mans landDays offensiveTripple Alliancefirst gas attacka deadliest weaponFoot, wet and muddymuddy wet and unsafeof Verdun, French landEmpire, tripple alliancesafe and comfortable trenchesboat that killed lots of peopleHungary, declared war on Serbia...

AI-Driven Cybersecurity 2026-04-04

AI-Driven Cybersecurity crossword puzzle
Across
  1. Fake email based cyber attack
  2. Controls user permissions
  3. Harmful software in systems
  4. AI program that interacts with users
  5. Locks data and demands money
  6. Detects unusual system behavior
  7. User identity verification process
  8. Login using fingerprint or face
  9. Secures data using coding
  10. AI based security protection system
Down
  1. Safeguarding sensitive data
  2. Protects network from threats
  3. Software that secretly collects data
  4. Unauthorized system entry attempt
  5. Digital attack on systems
  6. Machine learning based model
  7. Advanced neural learning method
  8. AI based threat detection process
  9. AI system used for predictions
  10. Protecting computer networks

20 Clues: Controls user permissionsDigital attack on systemsSecures data using codingSafeguarding sensitive dataHarmful software in systemsMachine learning based modelLocks data and demands moneyProtecting computer networksProtects network from threatsFake email based cyber attackAI system used for predictionsAdvanced neural learning method...

AI-Driven Cybersecurity 2026-04-04

AI-Driven Cybersecurity crossword puzzle
Across
  1. AI based security protection system
  2. Software that secretly collects data
  3. AI system used for predictions
  4. Controls user permissions
  5. Protecting computer networks
  6. Advanced neural learning method
  7. User identity verification process
  8. Unauthorized system entry attempt
  9. Protects network from threats
Down
  1. AI based threat detection process
  2. Safeguarding sensitive data
  3. Detects unusual system behavior
  4. Machine learning based model
  5. Digital attack on systems
  6. Locks data and demands money
  7. Secures data using coding
  8. AI program that interacts with users
  9. Fake email based cyber attack
  10. Login using fingerprint or face
  11. Harmful software in systems

20 Clues: Digital attack on systemsControls user permissionsSecures data using codingSafeguarding sensitive dataHarmful software in systemsMachine learning based modelLocks data and demands moneyProtecting computer networksFake email based cyber attackProtects network from threatsAI system used for predictionsDetects unusual system behavior...

Attack 2020-10-30

Attack crossword puzzle
Across
  1. Where we need our back up
  2. We must have this to draw defenders
  3. We all need it
Down
  1. Make the ball do the work

4 Clues: We all need itMake the ball do the workWhere we need our back upWe must have this to draw defenders

Attack 2020-10-30

Attack crossword puzzle
Across
  1. We must have at least 2
  2. Make the ball do the work
  3. Where we need our backup
Down
  1. Must have this to draw defenders

4 Clues: We must have at least 2Where we need our backupMake the ball do the workMust have this to draw defenders

Soul Surfer 2022-05-17

Soul Surfer crossword puzzle
Across
  1. What did Bethany lose?
  2. What was Bethany’s dad about to have done during the attack?
  3. What did Bethany use to surf?
  4. What is Bethany dressed in 90% of the time?
  5. who was Bethany’s best friend?
  6. What day did the attack happened?
Down
  1. Who was Bethany sponsored by?
  2. What did Bethany name what’s left of her arm?
  3. Where was Bethany attacked?
  4. What attacked Bethany?
  5. Bethany has a lot of this after the attack.
  6. Where did Bethany live?

12 Clues: What did Bethany lose?What attacked Bethany?Where did Bethany live?Where was Bethany attacked?Who was Bethany sponsored by?What did Bethany use to surf?who was Bethany’s best friend?What day did the attack happened?Bethany has a lot of this after the attack.What is Bethany dressed in 90% of the time?What did Bethany name what’s left of her arm?...

UNIT 6 BOOK 2 PART 2 2022-10-01

UNIT 6 BOOK 2 PART 2 crossword puzzle
Across
  1. obvious
  2. shapely figured
  3. belief system
  4. look for
  5. attack with sth sharp
  6. government funding
  7. very large
  8. hopelessness
  9. with melting
  10. practically
  11. progress, development
  12. on purpose
  13. vitamin C deficiency
  14. lack of legal status
  15. not straight
  16. disease caused by vitamin deficiency
  17. sth additional
  18. praised
Down
  1. disease of lungs
  2. decomposition
  3. obligatory
  4. severe malnutrition of children
  5. sore rotting open skin infection
  6. indulge in negative thoughts
  7. with feel uncomfortably hot
  8. making sth void or invalid
  9. obtain
  10. intervention
  11. restrict
  12. love
  13. impede progress
  14. attack hitting sb brutally

32 Clues: loveobtainobviouspraisedlook forrestrictobligatoryvery largeon purposepracticallyhopelessnesswith meltinginterventionnot straightdecompositionbelief systemsth additionalshapely figuredimpede progressdisease of lungsgovernment fundingvitamin C deficiencylack of legal statusattack with sth sharpprogress, developmentmaking sth void or invalid...

Ronaldinho the King 2013-11-11

Ronaldinho the King crossword puzzle
Across
  1. lack of interest or concern
  2. to deceive with charm
  3. harden and intensive
  4. cautious; watchful
  5. from a much earlier time
  6. to express strong disapproval
  7. unpleasantly sharp
  8. shamelessly bold
  9. one who gives
  10. to alter or modify
  11. quarrelsome
  12. selfless
  13. respect
  14. to criticise severely
  15. lavish; plentiful
  16. to follow the rules or customs groups\
Down
  1. ability;capability
  2. disagreeable to deal with
  3. to reduce in degree or intensity
  4. to reprimand severely
  5. a bitter, sharply abusive attack
  6. friendly;east to talk to
  7. to attack
  8. a reduction in number or strength
  9. excessively sweet or rich

25 Clues: respectselflessto attackquarrelsomeone who givesshamelessly boldlavish; plentifulability;capabilitycautious; watchfulunpleasantly sharpto alter or modifyharden and intensiveto deceive with charmto reprimand severelyto criticise severelyfrom a much earlier timefriendly;east to talk todisagreeable to deal withexcessively sweet or rich...

WWII 2016-04-15

WWII crossword puzzle
Across
  1. Hitler promised the people .....
  2. end of WWII (year)
  3. Russian leader during WWII
  4. fast attack on a country
  5. neutral state during WWII
  6. town where 1st atomic bomb was dropped
  7. Russian town
  8. town in England (air attack)
  9. concentration camp in Austria
  10. USA, France, GB,....
  11. first country occupied by Hitler
Down
  1. handicapped people were killed there
  2. American troops in Hawaii
  3. landing of the allied troops in France
  4. girl that became famous for her diary
  5. killing of the Jews during WWII
  6. beginning of WWII
  7. Japanese town
  8. end of WW2 in Europe (month)
  9. Italian leader during WWII

20 Clues: Russian townJapanese townbeginning of WWIIend of WWII (year)USA, France, GB,....fast attack on a countryAmerican troops in Hawaiineutral state during WWIIRussian leader during WWIIItalian leader during WWIIend of WW2 in Europe (month)town in England (air attack)concentration camp in Austriakilling of the Jews during WWII...

Birds 2024-02-27

Birds crossword puzzle
Across
  1. cookies in Britain
  2. location of the first bird attack
  3. English word from stroller
  4. nat gets jill off the _______
  5. British baked pastry
  6. what mrs.trigg tried to fight the birds with
  7. led the second attack
  8. Nat's job title
  9. setting of the story
Down
  1. Dinner for the family
  2. fatal to birds
  3. found lying by the hedges
  4. bird that almost cracked Nat's scull
  5. Nat's daughter
  6. farmer that Nat worked for
  7. Winter Kind of winter in the story
  8. where the birds first start tapping
  9. Kitchen
  10. Director the birds come from
  11. English word for diaper

20 Clues: Kitchenfatal to birdsNat's daughterNat's job titlecookies in BritainBritish baked pastrysetting of the storyDinner for the familyled the second attackEnglish word for diaperfound lying by the hedgesEnglish word from strollerfarmer that Nat worked forDirector the birds come fromnat gets jill off the _______location of the first bird attack...

Cyber Security 2024-03-15

Cyber Security crossword puzzle
Across
  1. Internet protocol
  2. Physical Components of a pc
  3. collective network of devices
  4. only numbers combined t
  5. social engineering attack involving email
  6. picture puzzles are common security
  7. several security methods is called
  8. Distributed Denial of service
  9. Controls and monitors traffic
  10. malware, that replicates inside files
Down
  1. process of proving you are
  2. an intentional harmful file
  3. global network of remote servers
  4. pretends to be something else
  5. in the middle attack
  6. Process of protecting information
  7. letters, numbers,special characters combined
  8. group of interconnected computing devices
  9. Programs, operating systems
  10. virtual private network

20 Clues: Internet protocolin the middle attackonly numbers combined tvirtual private networkprocess of proving you arean intentional harmful filePhysical Components of a pcPrograms, operating systemspretends to be something elsecollective network of devicesDistributed Denial of serviceControls and monitors trafficglobal network of remote servers...

Spelling & Vocabulary Test (Term 1 2024) 2024-11-19

Spelling & Vocabulary Test (Term 1 2024) crossword puzzle
Across
  1. an overhead covering
  2. honesty
  3. real or truthful
  4. restore friendly relations
  5. cover or envelop so as to conceal from view
  6. promise
  7. drunk
  8. make an attack in return for a similar attack
  9. to shake with fright
  10. not affected by alcohol; not drunk
  11. intensely irritated and frustrated
  12. deep sincerity
Down
  1. the main character in a story, the good character
  2. very tiny
  3. done consciously and intentionally
  4. strange and frightening
  5. excessive pride or self-confidence
  6. understand
  7. so frightened that one is unable to move; terrified
  8. deciding what’s most important and doing that first

20 Clues: drunkhonestypromisevery tinyunderstanddeep sincerityreal or truthfulan overhead coveringto shake with frightstrange and frighteningrestore friendly relationsdone consciously and intentionallyexcessive pride or self-confidencenot affected by alcohol; not drunkintensely irritated and frustratedcover or envelop so as to conceal from view...

COMPUTER CRIMES 2024-11-10

COMPUTER CRIMES crossword puzzle
Across
  1. (Denial of Service attack)
  2. (Harassment online)
  3. (Intentional damage to computer systems)
  4. (Illegal copying of copyrighted material)
  5. (Network of infected computers)
  6. (Illegal activities committed online)
  7. (Extortion using sexually explicit material)
  8. (Unsolicited email)
  9. Theft (Stealing personal information)
  10. (Unauthorized access to computer systems)
  11. (Self-replicating malware)
Down
  1. (Malicious software)
  2. Injection (Cyberattack targeting databases)
  3. (Tricking users into clicking malicious links)
  4. (Software that monitors user activity)
  5. (Malware that encrypts data)
  6. (Harassment online)
  7. (Fraudulent emails to trick users)
  8. (Redirecting users to fake websites)
  9. Horse (Malicious software disguised as legitimate)
  10. (Distributed Denial of Service attack)

21 Clues: (Harassment online)(Harassment online)(Unsolicited email)(Malicious software)(Denial of Service attack)(Self-replicating malware)(Malware that encrypts data)(Network of infected computers)(Fraudulent emails to trick users)(Redirecting users to fake websites)(Illegal activities committed online)Theft (Stealing personal information)...

CHESS GAME 2021-04-10

CHESS GAME crossword puzzle
Across
  1. king on attack
  2. 2.5 movement
  3. type of double attack
  4. 3 points piece s
Down
  1. 9 points pieces
  2. Attack on any pieces
  3. most imp
  4. 5 point pieces

8 Clues: most imp2.5 movementking on attack5 point pieces9 points pieces3 points piece sAttack on any piecestype of double attack

the blitz 2025-06-19

the blitz crossword puzzle
Across
  1. what the attack was
  2. tactic
  3. name of battle
  4. county that attacked
  5. what the germans used to attack london
Down
  1. what germany did to london
  2. attacker
  3. city
  4. country

9 Clues: citytacticcountryattackername of battlewhat the attack wascounty that attackedwhat germany did to londonwhat the germans used to attack london

Hooligan history 2018-03-19

Hooligan history crossword puzzle
Across
  1. start of football game
  2. spiteful, bitter, nasty
  3. something that makes you remember
  4. ending without a winner
  5. dealing with an issue in the media
  6. very basic
  7. stadium, arena, pitch
  8. match, sporting event
  9. period of ten years
  10. big group, gang
  11. disorder, disturbance
  12. seldom, not often
Down
  1. infrequent, irregular, on and off
  2. attack
  3. a win
  4. person who watches a game
  5. violent uprising
  6. bad reputation, ill fame
  7. opponent, challenger, enemy
  8. hooligan gang
  9. prohibited,excluded
  10. accidentally, by mistake
  11. bringing strong images
  12. accidental, unsystematic
  13. focus of public attention
  14. surprise attack
  15. violent

27 Clues: a winattackviolentvery basichooligan gangsurprise attackbig group, gangviolent uprisingseldom, not oftenprohibited,excludedperiod of ten yearsstadium, arena, pitchmatch, sporting eventdisorder, disturbancestart of football gamebringing strong imagesspiteful, bitter, nastyending without a winnerbad reputation, ill fameaccidentally, by mistake...

WWII crossword 2021-05-03

WWII crossword crossword puzzle
Across
  1. American troops in Hawaii
  2. Russian town
  3. USA, France, GB,....
  4. Italian leader during WWII
  5. Hitler promised the people .....
  6. Russian leader during WWII
  7. girl that became famous for her diary
  8. Japanese town
  9. town in England (air attack)
  10. concentration camp in Austria
Down
  1. end of WW2 in Europe (month)
  2. killing of the Jews during WWII
  3. neutral state during WWII
  4. fast attack on a country
  5. end of WWII (year)
  6. town where 1st atomic bomb was dropped
  7. beginning of WWII
  8. first country occupied by Hitler
  9. landing of the allied troops in France
  10. handicapped people were killed there

20 Clues: Russian townJapanese townbeginning of WWIIend of WWII (year)USA, France, GB,....fast attack on a countryAmerican troops in Hawaiineutral state during WWIIItalian leader during WWIIRussian leader during WWIIend of WW2 in Europe (month)town in England (air attack)concentration camp in Austriakilling of the Jews during WWII...

Cybersecurity 2023-09-13

Cybersecurity crossword puzzle
Across
  1. cable preventing theft of mobile devices
  2. network virus
  3. unwanted email messages
  4. storing files from hard drive remotely
  5. malicious code stored in files
  6. tricking victim into giving information
  7. bring your own device
  8. verifying a user's identity
  9. sending fake emails to scam
Down
  1. UI redress attack
  2. malicious software
  3. attack that changes devices' address
  4. malware requiring payment to fix
  5. false warning from fake senders
  6. masks user's location
  7. network of hacker computers
  8. website generated file storing info on your computer
  9. scrambling information necessitating a passkey
  10. instructions commanding browser actions
  11. malware hidden within another program

20 Clues: network virusUI redress attackmalicious softwaremasks user's locationbring your own deviceunwanted email messagesnetwork of hacker computersverifying a user's identitysending fake emails to scammalicious code stored in filesfalse warning from fake sendersmalware requiring payment to fixattack that changes devices' address...

Diary of a Wimpy Kid: Meltdown 2019-01-22

Diary of a Wimpy Kid: Meltdown crossword puzzle
Across
  1. To protect something
  2. Greg's last name
  3. Argument or battle
  4. Youngest brother's oldest brother
  5. What people ride, on snowy hills
  6. Something you throw, made out of snow
  7. Fighting with others
  8. Rain below freezing
  9. Journal of private thoughts
Down
  1. First name of main character
  2. A season where it snows
  3. Mom and Dad's youngest child
  4. Extreme tantrum
  5. Used in a cars, cooking and salads
  6. To strongly dislike
  7. Greg's Best friend
  8. Samurai, Highlanders, or snowball teams in the book
  9. Soggy snow
  10. Shelter for protection against attack
  11. To invade violently

20 Clues: Soggy snowExtreme tantrumGreg's last nameArgument or battleGreg's Best friendTo strongly dislikeTo invade violentlyRain below freezingTo protect somethingFighting with othersA season where it snowsJournal of private thoughtsFirst name of main characterMom and Dad's youngest childWhat people ride, on snowy hillsYoungest brother's oldest brother...

A2 German vocab 3.3 2020-03-03

A2 German vocab 3.3 crossword puzzle
Across
  1. to react
  2. eye contact
  3. to intimidate
  4. to resist, fight against
  5. solidarity
  6. civil courage
  7. critical of a regime
  8. to execute
  9. bomb attack
  10. takeover
  11. peaceful
  12. demonstration
  13. to protest
  14. to participate
  15. to attack
  16. society
  17. to kill
  18. to fight
  19. tolerance
  20. exploitation
  21. fall
  22. to act
  23. to pester
Down
  1. to kill
  2. self-confident
  3. to touch
  4. to rise up
  5. death
  6. to insult
  7. helpfulness
  8. resistance
  9. responsibility
  10. to provoke
  11. brave
  12. dictatorship
  13. racial hatred
  14. hero
  15. prison
  16. to request
  17. fan
  18. to emigrate
  19. conscience

42 Clues: fanherofalldeathbraveprisonto actto killsocietyto killto touchto reacttakeoverpeacefulto fightto insultto attacktoleranceto pesterto rise upresistancesolidarityto executeto provoketo protestto requestconscienceeye contacthelpfulnessbomb attackto emigratedictatorshipexploitationto intimidatecivil couragedemonstrationracial hatredself-confident...

WWII 2016-04-15

WWII crossword puzzle
Across
  1. beginning of WWII
  2. town in England (air attack)
  3. Russian leader during WWII
  4. neutral state during WWII
  5. killing of the Jews during WWII
  6. end of WW2 in Europe (month)
  7. American troops in Hawaii
  8. handicapped people were killed there
Down
  1. concentration camp in Austria
  2. girl that became famous for her diary
  3. USA, France, GB,....
  4. landing of the allied troops in France
  5. Italian leader during WWII
  6. end of WWII (year)
  7. Russian town
  8. first country occupied by Hitler
  9. fast attack on a country
  10. town where 1st atomic bomb was dropped
  11. Japanese town
  12. Hitler promised the people .....

20 Clues: Russian townJapanese townbeginning of WWIIend of WWII (year)USA, France, GB,....fast attack on a countryneutral state during WWIIAmerican troops in HawaiiItalian leader during WWIIRussian leader during WWIItown in England (air attack)end of WW2 in Europe (month)concentration camp in Austriakilling of the Jews during WWII...

CyberSecurity Terms (Participation 3) 2023-01-28

CyberSecurity Terms (Participation 3) crossword puzzle
Across
  1. Lots of attackers preventing users
  2. Tricking users to click an image
  3. Malware disguised as normal software
  4. Public internet access
  5. Malware that tracks you
  6. Bring your own device
  7. Attack seeking out personal info
  8. Malware that makes you pay
  9. Attack that exploits unknown vulnerability
  10. Making data unreadable by scrambling
  11. Shield for data
  12. Network pro learning hacking techniques
Down
  1. Malicious hackers
  2. Security keeping internet users safe
  3. Software that is harmful
  4. Software that checks for malware
  5. Malware that displays ads
  6. Media altered realistically
  7. Virtual private network
  8. Unauthorized access to sensitive info

20 Clues: Shield for dataMalicious hackersBring your own devicePublic internet accessMalware that tracks youVirtual private networkSoftware that is harmfulMalware that displays adsMalware that makes you payMedia altered realisticallySoftware that checks for malwareTricking users to click an imageAttack seeking out personal info...

COMPUTER CRIMES 2024-11-10

COMPUTER CRIMES crossword puzzle
Across
  1. (Denial of Service attack)
  2. (Fraudulent emails to trick users)
  3. Theft (Stealing personal information)
  4. (Network of infected computers)
  5. Horse (Malicious software disguised as legitimate)
  6. (Illegal copying of copyrighted material)
  7. (Malicious software)
  8. (Redirecting users to fake websites)
  9. (Unauthorized access to computer systems)
  10. (Distributed Denial of Service attack)
  11. (Illegal activities committed online)
  12. (Unsolicited email)
Down
  1. (Extortion using sexually explicit material)
  2. (Software that monitors user activity)
  3. Injection (Cyberattack targeting databases)
  4. (Harassment online)
  5. (Intentional damage to computer systems)
  6. (Tricking users into clicking malicious links)
  7. (Self-replicating malware)
  8. (Malware that encrypts data)

20 Clues: (Harassment online)(Unsolicited email)(Malicious software)(Denial of Service attack)(Self-replicating malware)(Malware that encrypts data)(Network of infected computers)(Fraudulent emails to trick users)(Redirecting users to fake websites)Theft (Stealing personal information)(Illegal activities committed online)...

COMPUTER CRIMES 2024-11-10

COMPUTER CRIMES crossword puzzle
Across
  1. (Illegal copying of copyrighted material)
  2. (Self-replicating malware)
  3. (Denial of Service attack)
  4. (Tricking users into clicking malicious links)
  5. (Malicious software)
  6. (Harassment online)
  7. (Unsolicited email)
  8. (Illegal activities committed online)
  9. (Software that monitors user activity)
  10. (Intentional damage to computer systems)
Down
  1. (Redirecting users to fake websites)
  2. (Unauthorized access to computer systems)
  3. Horse (Malicious software disguised as legitimate)
  4. (Malware that encrypts data)
  5. Injection (Cyberattack targeting databases)
  6. (Distributed Denial of Service attack)
  7. Theft (Stealing personal information)
  8. (Extortion using sexually explicit material)
  9. (Network of infected computers)
  10. (Fraudulent emails to trick users)

20 Clues: (Harassment online)(Unsolicited email)(Malicious software)(Self-replicating malware)(Denial of Service attack)(Malware that encrypts data)(Network of infected computers)(Fraudulent emails to trick users)(Redirecting users to fake websites)Theft (Stealing personal information)(Illegal activities committed online)...

COMPUTER CRIMES 2024-11-10

COMPUTER CRIMES crossword puzzle
Across
  1. (Malware that encrypts data)
  2. Injection (Cyberattack targeting databases)
  3. (Harassment online)
  4. (Denial of Service attack)
  5. (Software that monitors user activity)
  6. (Unauthorized access to computer systems)
  7. Horse (Malicious software disguised as legitimate)
  8. (Redirecting users to fake websites)
  9. (Fraudulent emails to trick users)
  10. (Unsolicited email)
Down
  1. (Harassment online)
  2. (Network of infected computers)
  3. (Distributed Denial of Service attack)
  4. (Illegal copying of copyrighted material)
  5. (Extortion using sexually explicit material)
  6. (Self-replicating malware)
  7. (Malicious software)
  8. (Tricking users into clicking malicious links)
  9. (Illegal activities committed online)
  10. Theft (Stealing personal information)
  11. (Intentional damage to computer systems)

21 Clues: (Harassment online)(Harassment online)(Unsolicited email)(Malicious software)(Self-replicating malware)(Denial of Service attack)(Malware that encrypts data)(Network of infected computers)(Fraudulent emails to trick users)(Redirecting users to fake websites)(Illegal activities committed online)Theft (Stealing personal information)...

Walk two moons vocab 2023-01-22

Walk two moons vocab crossword puzzle
Across
  1. Surprise attack from hidden assailants
  2. In a state of violent or destructive rage or frenzy
  3. Of supreme importance
  4. Quarrelsome
  5. Pestered
  6. Pranced
  7. Harassing
  8. Comfort
  9. Huge; gigantic
  10. Plentiful
Down
  1. One taken or held prisoner
  2. arteries
  3. White sterol found in animal fats which can cause
  4. Given or written by a person whose name is unknown
  5. Feeling under attack and hence quick to justify one's actions
  6. Partial or total loss of memory caused by brain injury or shock
  7. Deceived
  8. Collected or gathered together
  9. Hand tool with a sharp, wedged blade
  10. Lot; group
  11. Dead body

21 Clues: PrancedComfortarteriesPesteredDeceivedHarassingDead bodyPlentifulLot; groupQuarrelsomeHuge; giganticOf supreme importanceOne taken or held prisonerCollected or gathered togetherHand tool with a sharp, wedged bladeSurprise attack from hidden assailantsWhite sterol found in animal fats which can causeGiven or written by a person whose name is unknown...

Myocardial Infarction 2022-04-25

Myocardial Infarction crossword puzzle
Across
  1. main test for a heart attack
  2. the substance that is built up by fatty deposits
  3. common symptom of a heart attack
  4. medication to help treat a heart attack
Down
  1. medical term for a heart attack
  2. main way to prevent a heart attack
  3. what to do first if you think you're having a heart attack
  4. majority of cardiac deaths occur in this gender

8 Clues: main test for a heart attackmedical term for a heart attackcommon symptom of a heart attackmain way to prevent a heart attackmedication to help treat a heart attackmajority of cardiac deaths occur in this genderthe substance that is built up by fatty depositswhat to do first if you think you're having a heart attack

BI416 Case study #1 Crossword 2021-10-06

BI416 Case study #1 Crossword crossword puzzle
Across
  1. Something that is feared when suffering from panic attack disorder
  2. Repeated episodes of panic attacks accompanied with physical manifestations. Also followed by the fear of another episode and/or the consequences such as death.
  3. Sensation of fast beating or pounding heart
  4. Avoidance of ____ is typically associated with panic attack disorder
Down
  1. over time panic attack episodes increase in ______
  2. A risk factor associated with panic attack disorder
  3. Past medical disorder that may increase an individuals chance of developing panic attack disorder
  4. A habit that may be linked to panic attacks
  5. Manifestation associated with tightening in chest and difficulty breathing
  6. Measurements indicating state of vital body functions

10 Clues: A habit that may be linked to panic attacksSensation of fast beating or pounding heartover time panic attack episodes increase in ______A risk factor associated with panic attack disorderMeasurements indicating state of vital body functionsSomething that is feared when suffering from panic attack disorder...

Poke X Word : Puzzle # 19 (Normal) 2022-07-02

Poke X Word : Puzzle # 19 (Normal) crossword puzzle
Across
  1. Ability: Malevolent Charge
  2. Supporter: Your opponent reveals their hand. Discard up to 2 in any combination of Pokémon Tool cards, Special Energy cards, and Stadium cards from it.
  3. Item: Look at your face-down Prize cards. You may reveal a Basic Pokémon you find there, put it into your hand, and put this card in its place as a face-down Prize card. (If you don’t reveal a Basic Pokémon, put this card in the discard pile.) Then, shuffle your face-down Prize cards.
  4. Attack: Rainbow Flavor
  5. Attack: Vengeful Cut
Down
  1. Attack: Ominous Numbers
  2. Ability: Ancient Wisdom
  3. Ability: Reassuring Dam
  4. Attack: Raging Fin
  5. Attack: Star Raid

10 Clues: Attack: Star RaidAttack: Raging FinAttack: Vengeful CutAttack: Rainbow FlavorAttack: Ominous NumbersAbility: Ancient WisdomAbility: Reassuring DamAbility: Malevolent ChargeSupporter: Your opponent reveals their hand. Discard up to 2 in any combination of Pokémon Tool cards, Special Energy cards, and Stadium cards from it....

WWII 2016-04-15

WWII crossword puzzle
Across
  1. town in England (air attack)
  2. Japanese town
  3. town where 1st atomic bomb was dropped
  4. killing of the Jews during WWII
  5. beginning of WWII
  6. Russian leader during WWII
  7. handicapped people were killed there
Down
  1. Italian leader during WWII
  2. first country occupied by Hitler
  3. landing of the allied troops in France
  4. concentration camp in Austria
  5. neutral state during WWII
  6. Hitler promised the people .....
  7. girl that became famous for her diary
  8. USA, France, GB,....
  9. end of WWII (year)
  10. Russian town
  11. fast attack on a country
  12. American troops in Hawaii
  13. end of WW2 in Europe (month)

20 Clues: Russian townJapanese townbeginning of WWIIend of WWII (year)USA, France, GB,....fast attack on a countryneutral state during WWIIAmerican troops in HawaiiItalian leader during WWIIRussian leader during WWIItown in England (air attack)end of WW2 in Europe (month)concentration camp in Austriakilling of the Jews during WWII...

Word Gen review 10-12 Portuguese 2023-05-02

Word Gen review 10-12 Portuguese crossword puzzle
Across
  1. harmful treatment
  2. of or involving the body
  3. to influence, control, or persuade with skill and often dishonesty
  4. to show; to display
  5. huge
  6. unavoidable
  7. to inflict harm
  8. to argue against; to deny
  9. a causa de something that makes something else happen
  10. large; important
  11. honesty; morality
  12. to persuade
Down
  1. to attack suddenly or violently
  2. an attack
  3. enough; adequate
  4. buildup; collection
  5. to misrepresent or give false meaning to
  6. to make something happen
  7. to add to
  8. unwilling; hesitant
  9. an object or collection of objects put on display
  10. to show; to display
  11. continuing despite difficulty; relentless; continuing longer than expected
  12. defensible; true

24 Clues: hugean attackto add tounavoidableto persuadeto inflict harmenough; adequatelarge; importantdefensible; trueharmful treatmenthonesty; moralitybuildup; collectionto show; to displayunwilling; hesitantto show; to displayof or involving the bodyto make something happento argue against; to denyto attack suddenly or violently...

COMPUTER CRIMES 2024-11-10

COMPUTER CRIMES crossword puzzle
Across
  1. (Harassment online)
  2. Injection (Cyberattack targeting databases)
  3. (Software that monitors user activity)
  4. (Distributed Denial of Service attack)
  5. (Malware that encrypts data)
  6. (Unauthorized access to computer systems)
  7. (Fraudulent emails to trick users)
  8. Horse (Malicious software disguised as legitimate)
  9. (Malicious software)
  10. (Extortion using sexually explicit material)
Down
  1. (Denial of Service attack)
  2. (Illegal copying of copyrighted material)
  3. (Tricking users into clicking malicious links)
  4. (Illegal activities committed online)
  5. Theft (Stealing personal information)
  6. (Self-replicating malware)
  7. (Intentional damage to computer systems)
  8. (Redirecting users to fake websites)
  9. (Unsolicited email)
  10. (Network of infected computers)

20 Clues: (Harassment online)(Unsolicited email)(Malicious software)(Denial of Service attack)(Self-replicating malware)(Malware that encrypts data)(Network of infected computers)(Fraudulent emails to trick users)(Redirecting users to fake websites)(Illegal activities committed online)Theft (Stealing personal information)...

week 5 2025-12-17

week 5 crossword puzzle
Across
  1. coming friday
  2. shot up a beach
  3. had a long gun
  4. in browns university
  5. parents i love you
  6. when boat caught on fire
  7. are happenings a lot this year
  8. attack one of the shooters
  9. largest snow fall
  10. is very cold
  11. as a school gets shoot up
Down
  1. might attack on new years eve
  2. people under flood watch
  3. ruining holidays
  4. at a beach in australia
  5. safed fisherman
  6. lost there parents at a shoot out
  7. found her parents dead
  8. lawmakers fight
  9. did a candle light
  10. is off to a fast start

21 Clues: is very coldcoming fridayhad a long gunshot up a beachsafed fishermanlawmakers fightruining holidayslargest snow fallparents i love youdid a candle lightin browns universityfound her parents deadis off to a fast startat a beach in australiapeople under flood watchwhen boat caught on fireas a school gets shoot upattack one of the shooters...

Types of Social Engineering Tactics 2022-05-11

Types of Social Engineering Tactics crossword puzzle
Across
  1. A security exploit that compromises a site that a targeted victim visits to gain access to the victim's computer and network.
  2. The perpetrator usually promises a victim a reward in return for sensitive information or knowledge of its whereabouts.
  3. This attack centers around an exchange of information or service to convince the victim to act.
  4. An attack in which the attacker creates a scenario to try and convince the victim to give up valuable information, such as a password.
  5. The fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
  6. A type of monitoring software designed to record keystrokes made by a user.
  7. Thieves trick victims into sending sensitive data to the wrong person, this is usually achieved through spoofing an email address of someone within the victim's company.
  8. A category of attacks that includes ransomware, victims are sent an urgently-worded message and tricked into installing malware on their device(s).
  9. A type of romance scam in which scammers create fake online dating and social media profiles using attractive stolen photos.
Down
  1. A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email.
  2. Occurs when a cyber criminal tries to trick victims into disclosing their information or even giving them direct access to the victim's computer via telephone.
  3. This attack targets individuals who can give the criminal physical access to a secure building or area.
  4. When a scammer inserts a malicious code into a webpage, causing a pop-up window that has flashing colours and alarming sounds.

13 Clues: A type of monitoring software designed to record keystrokes made by a user.This attack centers around an exchange of information or service to convince the victim to act.A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email....

9/11 CrossWord. 2014-09-25

9/11 CrossWord. crossword puzzle
Across
  1. The site of the world.
  2. Who abuses a power of a high leadership and has a very high violent rate against other countries.
  3. The God of the Islamic religion in which case many people thought that they,d have to die for Alla to get into Heaven.
  4. The year of 9/11 was.
  5. The ring leader of 9/11
  6. Tried to help guard and try to pick up evidence from the crime scene.
  7. Helping with the FBI investigation with the 9/11 attack.
  8. The height of 1,368 and 1,362 feet tall and over 110 stories tall.
  9. When many people had perished and two towers attacked.
  10. What was held almost within days after the 9/11 attack to help the family/friends/ and loved ones cope with many people pershing.
Down
  1. Who takes a vehicle or that is moving.
  2. An organizational approach to protecting us from terrorists.
  3. The council who had plotted 9/11.
  4. What religion was mostly made up of ____________ which helped with 9/11 attack.
  5. Who had tried to take credit for the attack.
  6. An organized fundamentalist group formed by the Islamic people.
  7. Who was the president when 9/11 had happened.
  8. The news coverage doubled and it was all over the what.
  9. When many loved ones/family members/friends and etc died unexpectedly.

19 Clues: The year of 9/11 was.The site of the world.The ring leader of 9/11The council who had plotted 9/11.Who takes a vehicle or that is moving.Who had tried to take credit for the attack.Who was the president when 9/11 had happened.When many people had perished and two towers attacked.The news coverage doubled and it was all over the what....

Volleyball 2023-10-25

Volleyball crossword puzzle
Across
  1. the person assigned to run the team
  2. the way a rally is started
  3. Backrow player who also has the opportunity to hit
  4. attack made by front row player
  5. The person who makes subs and assists order
  6. a part of volleyball off the court, helps the team with organization
  7. Amateur level of highschool volleyball
Down
  1. The main net defense focusing on quick and drawing attacks
  2. Wing spiker that gives a third opportunity for attack
  3. Main point of attack, the ace plays this position
  4. The highest highschool level of play
  5. The person who makes all final calls
  6. the name of a non-touched spike
  7. another word for 'bump' or 'pass'
  8. defensive specialist who only plays in the back row
  9. defensive touch from a spike

16 Clues: the way a rally is starteddefensive touch from a spikethe name of a non-touched spikeattack made by front row playeranother word for 'bump' or 'pass'the person assigned to run the teamThe highest highschool level of playThe person who makes all final callsAmateur level of highschool volleyballThe person who makes subs and assists order...

9/11 Facts 2022-10-11

9/11 Facts crossword puzzle
Across
  1. - The "one world trade center" was the ___ of the memorial
  2. - Admitted that the terrorists were "always seemed to be one step ahead"
  3. A company in the South Tower (Network)
  4. - The one tree that survived the attack (type)
  5. The day before the attack
  6. - The one world trade center serves as an ___
  7. The group responsible for 9/11
  8. - Daniel Libeskind was this nationality
  9. - Were Al Qaeda was headquartered
Down
  1. - what the survivor tree represents
  2. - Was in charge of looking for the missing planes
  3. - Built in the same place as the towers
  4. - Invited multiple architects to come up with designs
  5. - dedicated to the people that died from exposure to toxins
  6. - First name of person responsible for the attack
  7. The day of the week 9/11 occurred

16 Clues: The day before the attackThe group responsible for 9/11The day of the week 9/11 occurred- Were Al Qaeda was headquartered- what the survivor tree representsA company in the South Tower (Network)- Built in the same place as the towers- Daniel Libeskind was this nationality- The one world trade center serves as an ___...

Early Battles of WWII 2020-04-22

Early Battles of WWII crossword puzzle
Across
  1. Canal that was vitally important for the Allies
  2. German Submarines used in Battle of the Atlantic
  3. Japanese General Hideki _______ helped plan the attack on U.S
  4. German and Italian forces fighting in Africa
  5. German code system broken by the British
  6. December 7th, 1941 attack on U.S.
  7. Operation _______, name for invasion of North Africa
  8. U.S. joined the ____________ powers.
Down
  1. Key battle in Egypt-British Won
  2. Tactic used by the U-boats to attack Convoys
  3. General for the U.S. in North Africa
  4. boats traveled together in these for protection
  5. German General known as the "Desert Fox"
  6. Technology used to detect u-boats

14 Clues: Key battle in Egypt-British WonDecember 7th, 1941 attack on U.S.Technology used to detect u-boatsGeneral for the U.S. in North AfricaU.S. joined the ____________ powers.German code system broken by the BritishGerman General known as the "Desert Fox"Tactic used by the U-boats to attack ConvoysGerman and Italian forces fighting in Africa...

DO NOW: CH15 WW2 L1-4 2025-04-07

DO NOW: CH15 WW2 L1-4 crossword puzzle
Across
  1. giving up military weapons
  2. a camp where Japanese Americans were held during WW2
  3. across the ocean
  4. seeking to control all aspects of life through dictatorial control
  5. money
  6. object of an attack
Down
  1. protective measures taken by civilians in case of attack
  2. fast sudden attack by massed forces
  3. hostility toward or discrimination against Jews
  4. a leader who has absolute power and rules a nation by force
  5. the policy of giving in to the demands of others in an effort to keep peace
  6. not siding with either party in a disagreement
  7. to make scarce items available to people on a limited basis
  8. to join together

14 Clues: moneyto join togetheracross the oceanobject of an attackgiving up military weaponsfast sudden attack by massed forcesnot siding with either party in a disagreementhostility toward or discrimination against Jewsa camp where Japanese Americans were held during WW2protective measures taken by civilians in case of attack...

Volleyball Game 2024-12-17

Volleyball Game crossword puzzle
Across
  1. Saving a ball from hitting the court
  2. Receiving and directing the ball
  3. Powerful strike over the net
  4. Unreturnable serve
  5. Stopping an opponent's attack
  6. Starting the play with a hit
Down
  1. Setter’s surprise attack
  2. Sets the ball for attackers
  3. Offensive play to score
  4. Defensive back-row specialist

10 Clues: Unreturnable serveOffensive play to scoreSetter’s surprise attackSets the ball for attackersPowerful strike over the netStarting the play with a hitDefensive back-row specialistStopping an opponent's attackReceiving and directing the ballSaving a ball from hitting the court

Types of Social Engineering Tactics 2022-05-11

Types of Social Engineering Tactics crossword puzzle
Across
  1. A security exploit that compromises a site that a targeted victim visits to gain access to the victim's computer and network.
  2. The perpetrator usually promises a victim a reward in return for sensitive information or knowledge of its whereabouts.
  3. This attack centers around an exchange of information or service to convince the victim to act.
  4. An attack in which the attacker creates a scenario to try and convince the victim to give up valuable information, such as a password.
  5. The fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
  6. A type of monitoring software designed to record keystrokes made by a user.
  7. Thieves trick victims into sending sensitive data to the wrong person, this is usually achieved through spoofing an email address of someone within the victim's company.
  8. A category of attacks that includes ransomware, victims are sent an urgently-worded message and tricked into installing malware on their device(s).
  9. A type of romance scam in which scammers create fake online dating and social media profiles using attractive stolen photos.
Down
  1. A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email.
  2. Occurs when a cyber criminal tries to trick victims into disclosing their information or even giving them direct access to the victim's computer via telephone.
  3. This attack targets individuals who can give the criminal physical access to a secure building or area.
  4. When a scammer inserts a malicious code into a webpage, causing a pop-up window that has flashing colours and alarming sounds.

13 Clues: A type of monitoring software designed to record keystrokes made by a user.This attack centers around an exchange of information or service to convince the victim to act.A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email....

Cybersecurity Unit 8 2026-02-13

Cybersecurity Unit 8 crossword puzzle
Across
  1. multiple systems under the control of the attacker are used in a coordinated attack
  2. this type of hacker does not have permission and hacking in a criminal manner
  3. opens a secure connection with another computer
  4. An attack that prevents a system or server from functioning normally
  5. opens a port to listen to incoming connections
  6. this type of access point is installed on a secure network without explicit authorization
  7. displays the IP address for the device
  8. sends packets to another device to test connectivity
  9. testing the effectiveness of security controls or find vulnerabilities in software
  10. this type of attack is where the victim connects to a rogue access point instead of the legitimate one
  11. does defensive pentesting
  12. this hacker often has good intentions, but they don't have permission to hack
  13. a tool that disguises your actual IP address and encrypts internet traffic between a device and a server
Down
  1. this type of hacker has good intentions and received permission to hack
  2. pulling email, contacts, passwords and other data off the device
  3. an attack where the attacker poses as another by falsifying data to gain access to target systems
  4. a technology that allows computers to remember IP addresses with their corresponding domain names
  5. eavesdropping on messages
  6. tool to monitor incoming and outgoing network connections
  7. does offensive pentesting
  8. spying on your device by gaining access and then installing a backdoor for future access
  9. pushing unsolicited messages onto a device using Bluetooth

22 Clues: eavesdropping on messagesdoes offensive pentestingdoes defensive pentestingdisplays the IP address for the deviceopens a port to listen to incoming connectionsopens a secure connection with another computersends packets to another device to test connectivitytool to monitor incoming and outgoing network connections...

Vocabulary Final Exam #1-5 2023-10-29

Vocabulary Final Exam #1-5 crossword puzzle
Across
  1. Being disappointed or angry by a failure or mistake.
  2. Paying too much attention to small details.
  3. To continue or go on for too long.
  4. To put yourself between two things in order to stop something.
  5. The moving/migration of a big group from a place to another.
  6. An action in a situation that is intended to achieve an advantage.
  7. A large group of people standing close together for the purpose of defense or an attack.
  8. Of a son or daughter.
  9. To show or state that someone is not guilty of something.
  10. Not wanting or not able to believe something.
  11. A person who is in charge to guard something.
  12. A small and quick attack from a military force.
  13. An unpleasant situation that you can't get out of.
Down
  1. Being confident and positive.
  2. The ability get back up after something difficult or bad happened.
  3. To attack or hurt someone violently.
  4. To be happy or without worry.
  5. To get or earn something, often with difficulty.
  6. The full force of something like an attack.
  7. To argue or disagree.
  8. To help something or someone that is suffering or in need.
  9. The combining of different groups for a reason.
  10. An arrangement to meet up at a particular place and time.
  11. Expecting something to be obeyed without any questions.
  12. A person who suffers or died due to their religion or beliefs.

25 Clues: To argue or disagree.Of a son or daughter.Being confident and positive.To be happy or without worry.To continue or go on for too long.To attack or hurt someone violently.Paying too much attention to small details.The full force of something like an attack.Not wanting or not able to believe something.A person who is in charge to guard something....

Types of Social Engineering Tactics 2022-05-11

Types of Social Engineering Tactics crossword puzzle
Across
  1. A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email.
  2. The perpetrator usually promises a victim a reward in return for sensitive information or knowledge of its whereabouts.
  3. A category of attacks that includes ransomware, victims are sent an urgently-worded message and tricked into installing malware on their device(s).
  4. A type of romance scam in which scammers create fake online dating and social media profiles using attractive stolen photos.
  5. A security exploit that compromises a site that a targeted victim visits to gain access to the victim's computer and network.
Down
  1. This attack targets individuals who can give the criminal physical access to a secure building or area.
  2. Thieves trick victims into sending sensitive data to the wrong person, this is usually achieved through spoofing an email address of someone within the victim's company.
  3. An attack in which the attacker creates a scenario to try and convince the victim to give up valuable information, such as a password.
  4. This attack centers around an exchange of information or service to convince the victim to act.
  5. Occurs when a cyber criminal tries to trick victims into disclosing their information or even giving them direct access to the victim's computer via telephone.
  6. A type of monitoring software designed to record keystrokes made by a user.
  7. The fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
  8. When a scammer inserts a malicious code into a webpage, causing a pop-up window that has flashing colours and alarming sounds.

13 Clues: A type of monitoring software designed to record keystrokes made by a user.This attack centers around an exchange of information or service to convince the victim to act.A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email....

Chapter 8 Security Plus 2024-03-20

Chapter 8 Security Plus crossword puzzle
Across
  1. examines the current state of an endpoint before it can connect
  2. Removing or dismantling a technology
  3. A device that distributes resources and services to devices connected to the network
  4. Designed to limit the spread of malware
  5. Automatically blocking an attack when it occurs
  6. Fake data that has been added to live production systems
  7. A physically separated network
  8. Known attack patterns
  9. A network set up with intentional vulnerabilities
Down
  1. A device that distributes work across a network
  2. The means for communication in a zero-trust architecture
  3. Verification of a user in a zero-trust architecture
  4. Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
  5. server within the DMZ that is used to connect two dissimilar security zones
  6. A user in a zero-trust architecture
  7. Criteria for which a website is inaccessible to users
  8. A network device that can forward packets across different computer networks
  9. Keeping multiple instances of an attack surface separate
  10. filtering entire domains

19 Clues: Known attack patternsfiltering entire domainsA physically separated networkA user in a zero-trust architectureRemoving or dismantling a technologyDesigned to limit the spread of malwareA device that distributes work across a networkAutomatically blocking an attack when it occursA network set up with intentional vulnerabilities...

Persuasive techniques 2026-02-25

Persuasive techniques crossword puzzle
Across
  1. Hominem Attack, An ad hominem attack criticises the person making the argument instead of the argument itself.
  2. An allusion is a brief reference to a well-known person, story, event, or text to support an idea.
  3. establishes credibility and authority
  4. to Fear and Insecurity, This appeal persuades by creating worry or fear about what might happen if action is not taken.
  5. An attack is when language is used to strongly criticise or blame a person, group, or idea.
  6. to Justice, An appeal to justice persuades by arguing that something is fair, right, or morally correct.
  7. A rebuttal is when you respond to an opposing argument and explain why it is wrong or weak.
  8. to the Hip Pocket, This appeal tries to persuade by focusing on money, costs, or savings.
  9. Hyperbole is deliberate exaggeration used to emphasise a point or create a strong reaction.
  10. Man Argument, A straw man argument twists or oversimplifies someone else’s argument to make it easier to attack.
  11. appeals to emotions and values
Down
  1. to Arms, A call to arms encourages people to take action or get involved in a cause.
  2. An anecdote is a short personal story used to make an argument more relatable or convincing.
  3. to Loyalty and Patriotism, This appeal persuades by encouraging pride, loyalty, or duty to a country or group.
  4. Generalisations make broad statements about a group or situation without considering exceptions.
  5. appeals to logic, facts, and reason
  6. An analogy explains an idea by comparing it to something else that is familiar or easy to understand.
  7. A fallacy is a mistake in reasoning where an argument sounds convincing but is not logical or true.

18 Clues: appeals to emotions and valuesappeals to logic, facts, and reasonestablishes credibility and authorityto Arms, A call to arms encourages people to take action or get involved in a cause.to the Hip Pocket, This appeal tries to persuade by focusing on money, costs, or savings....

Poke X Word : Puzzle # 13 (Hard) 2022-05-28

Poke X Word : Puzzle # 13 (Hard) crossword puzzle
Across
  1. Item: When applying Weakness to damage from the attacks of the Pokémon this card is attached to done to your opponent’s Active Pokémon, apply it as x3.
  2. Ability: Blue Assist
  3. Item: Choose 1 of your Pokémon, and then flip a coin until you get tails. For each heads, heal 40 damage from that Pokémon.
  4. Attack: Wide Wing
  5. Pokedex Entry: It stores static electricity in its fur for discharging. It gives off sparks if a storm approaches.
  6. Ability: Voltage Beat
Down
  1. Attack: Honey Rush
  2. Ability: Happy Match
  3. Attack: Cheerful Charge
  4. Attack: Dancing Shuriken
  5. Pokedex Entry: Its cry leaves a lasting headache if heard for too long. It moves so quickly that it is almost invisible.
  6. Ability: Thunderous Awakening

12 Clues: Attack: Wide WingAttack: Honey RushAbility: Happy MatchAbility: Blue AssistAbility: Voltage BeatAttack: Cheerful ChargeAttack: Dancing ShurikenAbility: Thunderous AwakeningPokedex Entry: It stores static electricity in its fur for discharging. It gives off sparks if a storm approaches....

Cardi/Resp Crossword - Anthony Garcia 2024-04-29

Cardi/Resp Crossword - Anthony Garcia crossword puzzle
Across
  1. - pollen, dust, pet dander
  2. - high arterial blood pressure
  3. - pulse in neck
  4. - determines severity of asthma attack
  5. - hardened arteries
  6. - infection of alveoli and bronchioles
Down
  1. infarction - heart attack
  2. - shortness of breath
  3. pulse in foot
  4. - body temperature being over 102 degrees F
  5. - chest pain
  6. - pulse in wrist
  7. - Upper Respiratory Tract Infections
  8. - constricted bronchi

14 Clues: - chest painpulse in foot- pulse in neck- pulse in wrist- hardened arteries- shortness of breath- constricted bronchiinfarction - heart attack- pollen, dust, pet dander- high arterial blood pressure- Upper Respiratory Tract Infections- determines severity of asthma attack- infection of alveoli and bronchioles...

Pearl Harbor 2013-09-18

Pearl Harbor crossword puzzle
Across
  1. Also known as the United States.
  2. Pearl Habour was a day remembered in ________.
  3. People who were killed or injured in the war.
  4. 7th________1941.
  5. Number of Japanese aircraft carriers.
Down
  1. Launched attacks against America.
  2. Japan lost 29 of these.
  3. President at the time of the attack
  4. The attack on Pearl ________.
  5. Location of Pearl Harbour.
  6. War II The attack on Pearl Harbour forced America into_______.

11 Clues: 7th________1941.Japan lost 29 of these.Location of Pearl Harbour.The attack on Pearl ________.Also known as the United States.Launched attacks against America.President at the time of the attackNumber of Japanese aircraft carriers.People who were killed or injured in the war.Pearl Habour was a day remembered in ________....

Pearl Harbor 2013-09-18

Pearl Harbor crossword puzzle
Across
  1. Location of Pearl Harbour.
  2. Also known as the United States.
  3. Pearl Habour was a day remembered in ________.
  4. President at the time of the attack
  5. Launched attacks against America.
  6. 7th________1941.
  7. War II The attack on Pearl Harbour forced America into_______.
Down
  1. The attack on Pearl ________.
  2. People who were killed or injured in the war.
  3. Number of Japanese aircraft carriers.
  4. Japan lost 29 of these.

11 Clues: 7th________1941.Japan lost 29 of these.Location of Pearl Harbour.The attack on Pearl ________.Also known as the United States.Launched attacks against America.President at the time of the attackNumber of Japanese aircraft carriers.People who were killed or injured in the war.Pearl Habour was a day remembered in ________....

Dragon Ball Z/S: Attacks, Characters and More 2022-10-06

Dragon Ball Z/S: Attacks, Characters and More crossword puzzle
Across
  1. Back to the future
  2. Bald Dude Two
  3. Purple Skinny Cat
  4. Protagonist
  5. Grower of the beans(cat)
  6. final__ (Vegeta Attack)
  7. What is Goku's power level over?
  8. Their version of "chi"
  9. Vegeta's Wife
  10. Krillin's Wife's Number
  11. Goku+Vegeta Dancing
  12. BIG SAIYAN
  13. Little green real name?
  14. Probably Racist Genie
  15. what species is goku?
  16. Dude Piccolo Fused with
  17. Obvi gay Angel
  18. Goku reaches this level when Krillin dies
  19. Product of Dr.Gero
  20. Namekian Friend
  21. who keeps dying all the time
  22. Yass queen angel
  23. Bald Dude Three
  24. King Kai's monkey
  25. Gohan reaches this against Cell
  26. Also Known as room of space and time
  27. Potara Earring Fusion
  28. Great Lord
  29. Goku's brother
  30. Goku's Second Born
Down
  1. Goku's "real name"
  2. Magic Dragon
  3. ___Gun (Vegeta's Attack)
  4. Goku Reaches this in the Majin Buu Saga
  5. Goku's First Born
  6. Goku's Rival
  7. Turns people into candy
  8. Goku's classic attack
  9. Other dude piccolo fused with
  10. King Kai's Cricket
  11. Goten+Trunks
  12. currency?
  13. Lil saiyan
  14. Learned from King Kai
  15. Doctor Gero's Invention
  16. Goku's Wife
  17. Bald Dude One
  18. what does trunks' ship say
  19. Vegeta's Daughter
  20. first saga
  21. Bulma's Company
  22. Healing bean?
  23. OmniKing/Grand Who?
  24. Goku's other attack
  25. Pervy Bald Dude
  26. second saga
  27. Assassin
  28. How many dragon balls
  29. in TFS, What crime does Krillin Commit
  30. Device that reads power levels

60 Clues: Assassincurrency?Lil saiyanBIG SAIYANfirst sagaGreat LordProtagonistGoku's Wifesecond sagaMagic DragonGoku's RivalGoten+TrunksBald Dude TwoVegeta's WifeBald Dude OneHealing bean?Obvi gay AngelGoku's brotherNamekian FriendBulma's CompanyBald Dude ThreePervy Bald DudeYass queen angelGoku's First BornPurple Skinny CatVegeta's DaughterKing Kai's monkey...

Human conflict - agb 2020-12-09

Human conflict - agb crossword puzzle
Across
  1. the P in POW
  2. war between factions without a country: _____ war
  3. unintended destruction: ___________ damage
  4. a temporary cessation of hostilities
  5. a small, irregular force of combatants
  6. missiles, shells, and land mines
  7. a person who has been forced to flee from hostilities
  8. soldiers who fight on foot
  9. a robotic aircraft
  10. weapons that fire explosive shells over distances
  11. soldiers whose job it is to maintain the peace by keeping combatants apart
  12. an attack on a city in which the city is surrounded and bombarded over a period of time
  13. the place where two armies face each other: the _____ line
Down
  1. the destruction of bridges, railroads, or communication by agents behind enemy lines
  2. a short attack with limited objectives
  3. a person who is engaged in fighting
  4. an attack made by soldiers who are hiding
  5. an explosive that blows up when stepped on
  6. the branch of the military responsible for guarding a nation's air space
  7. an attack meant to prevent another country from attacking first: _____ strike
  8. tanks and other mobile weapons
  9. the act of spying or intelligence gathering
  10. a branch of the military responsible for protecting a nation's seas
  11. using force to prevent people or materials from going into an area
  12. a permanent cessation of hostilities
  13. the number of people killed in fighting: death ____
  14. a person who is killed or injured during hostilities
  15. hostile or aggressive
  16. lay down your arms and quit fighting

29 Clues: the P in POWa robotic aircrafthostile or aggressivesoldiers who fight on foottanks and other mobile weaponsmissiles, shells, and land minesa person who is engaged in fightinga temporary cessation of hostilitiesa permanent cessation of hostilitieslay down your arms and quit fightinga short attack with limited objectives...

Soal PJOK M.Haris Al Fatih 2025-11-30

Soal PJOK M.Haris Al Fatih crossword puzzle
Across
  1. coach strategy talk
  2. jump to start the game
  3. action of stopping opponent's spike
  4. soft attack over the blockers
  5. basic silat stance
  6. when both teams hit ball many times
  7. high ball for spiker
  8. throwing technique
  9. the net violation
  10. a shot made close to the basket
  11. competition arena
  12. line seperating front and back zone
  13. penalty for illegal contact
  14. long pass to setter
  15. half court defensive sytem
  16. the action of bouncing ball while moving
  17. shot taken from free throw line
  18. point obtained from strike
  19. kick technique
  20. when a player grabs the ball after a missed shot
  21. player wearing different jersey
  22. movement pattern
  23. toucing ball twice in a row
  24. quick offensive attack
Down
  1. back row attack
  2. attack using hand in silat
  3. five set match sytem
  4. scoring shot worth three points
  5. defensive save using forearms
  6. line between two halves
  7. server mistake
  8. blocking with the foot
  9. losing the ball to the opponent
  10. rotation direction
  11. hard downward hit
  12. out of bound area
  13. defensive guarding style
  14. ball exchange between teammates
  15. point scored with a serve
  16. two points shot
  17. the first contack to start a rally
  18. the tall player near the basket
  19. protection body armor
  20. deffensive move in silat
  21. team discussion
  22. the person who controls the offense
  23. when a ball goes out of court
  24. a violation of taking too many steps
  25. a defensive move to stop a shot

49 Clues: server mistakekick techniqueback row attacktwo points shotteam discussionmovement patternhard downward hitout of bound areathe net violationcompetition arenabasic silat stancerotation directionthrowing techniquecoach strategy talklong pass to setterfive set match sytemhigh ball for spikerprotection body armorjump to start the game...

Pearl Habor Crossword Puzzle 2025-12-04

Pearl Habor Crossword Puzzle crossword puzzle
Across
  1. How many ships were present during the attack?
  2. What country attacked Pearl Harbor?
  3. How many waves was the Japanese attack?
  4. What are the doors called to prevent water from entering a ship but traps both the person and water inside?
  5. What supplies did US cutoff trade with Japan?
  6. How many Americans died? 2,40_
  7. and Dutch Indies Where did Japan plan to conquer to get oil?
Down
  1. What country did Japan invade and conquer in 1931?
  2. How many months did it take for the US to recover from the attack of Pearl Harbor?
  3. What did the commander ignore and thought was unimportant?
  4. Britain and the US both declared war on who?
  5. The term of not being involved or siding in war.
  6. What's the most effective way to attack ships?
  7. Where did the US Navy move to from San Fransisco?

14 Clues: How many Americans died? 2,40_What country attacked Pearl Harbor?How many waves was the Japanese attack?Britain and the US both declared war on who?What supplies did US cutoff trade with Japan?How many ships were present during the attack?What's the most effective way to attack ships?The term of not being involved or siding in war....

Chapter 8 Security Plus 2024-03-20

Chapter 8 Security Plus crossword puzzle
Across
  1. examines the current state of an endpoint before it can connect
  2. Removing or dismantling a technology
  3. A device that distributes resources and services to devices connected to the network
  4. Designed to limit the spread of malware
  5. Automatically blocking an attack when it occurs
  6. Fake data that has been added to live production systems
  7. A physically separated network
  8. Known attack patterns
  9. A network set up with intentional vulnerabilities
Down
  1. A device that distributes work across a network
  2. The means for communication in a zero-trust architecture
  3. Verification of a user in a zero-trust architecture
  4. Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
  5. server within the DMZ that is used to connect two dissimilar security zones
  6. A user in a zero-trust architecture
  7. Criteria for which a website is inaccessible to users
  8. A network device that can forward packets across different computer networks
  9. Keeping multiple instances of an attack surface separate
  10. filtering entire domains

19 Clues: Known attack patternsfiltering entire domainsA physically separated networkA user in a zero-trust architectureRemoving or dismantling a technologyDesigned to limit the spread of malwareA device that distributes work across a networkAutomatically blocking an attack when it occursA network set up with intentional vulnerabilities...

Gout/Pseudogout 2023-06-15

Gout/Pseudogout crossword puzzle
Across
  1. The first _ is often the first joint affected in gout
  2. Prolonged _ is necessary but not sufficient for development of gout
  3. Sample that needs to diagnose gout
  4. Precursor of uric acid
  5. Gout is an inflammatory reaction to the presence of _ crystals
  6. 1/3 of the body's uric acid pool derives from here
  7. Xanthine oxidase inhibitor (reduced production of uric acid)
  8. The alternative name for pseudogout
  9. Pain level of an acute attack
  10. Onset of acute inflammatory arthritis
  11. Wrist, knee, shoulder and _ are the common joints affected in pseudogout
Down
  1. What changes can a patient make to help prevent gout?
  2. Levels of 12 across can be described as _
  3. Metabolised to form 2/3 of the body's uric acid pool
  4. Can precipitate a gout attack (dehydration and infection)
  5. 14 across down can cause a temporary elevation in this if given too soon after an attack
  6. Pseudogout is characterised by elevated levels of extracellular _
  7. Quick and easy pain relief for gout
  8. An important differential on presentation

19 Clues: Precursor of uric acidPain level of an acute attackSample that needs to diagnose goutQuick and easy pain relief for goutThe alternative name for pseudogoutOnset of acute inflammatory arthritisLevels of 12 across can be described as _An important differential on presentation1/3 of the body's uric acid pool derives from here...

Gout/Pseudogout 2023-06-15

Gout/Pseudogout crossword puzzle
Across
  1. The first _ is often the first joint affected in gout
  2. Prolonged _ is necessary but not sufficient for development of gout
  3. Sample that needs to diagnose gout
  4. Precursor of uric acid
  5. Gout is an inflammatory reaction to the presence of _ crystals
  6. 1/3 of the body's uric acid pool derives from here
  7. Xanthine oxidase inhibitor (reduced production of uric acid)
  8. The alternative name for pseudogout
  9. Pain level of an acute attack
  10. Onset of acute inflammatory arthritis
  11. Wrist, knee, shoulder and _ are the common joints affected in pseudogout
Down
  1. What changes can a patient make to help prevent gout?
  2. Levels of 12 across can be described as _
  3. Metabolised to form 2/3 of the body's uric acid pool
  4. Can precipitate a gout attack (dehydration and infection)
  5. 14 across down can cause a temporary elevation in this if given too soon after an attack
  6. Pseudogout is characterised by elevated levels of extracellular _
  7. Quick and easy pain relief for gout
  8. An important differential on presentation

19 Clues: Precursor of uric acidPain level of an acute attackSample that needs to diagnose goutQuick and easy pain relief for goutThe alternative name for pseudogoutOnset of acute inflammatory arthritisLevels of 12 across can be described as _An important differential on presentation1/3 of the body's uric acid pool derives from here...

Chapter 9 Crossword 2024-10-24

Chapter 9 Crossword crossword puzzle
Across
  1. examines the current state of an endpoint before it can connect
  2. Removing or dismantling a technology
  3. A device that distributes resources and services to devices connected to the network
  4. Designed to limit the spread of malware
  5. Automatically blocking an attack when it occurs
  6. Fake data that has been added to live production systems
  7. A physically separated network
  8. Known attack patterns
  9. A network set up with intentional vulnerabilities
Down
  1. A device that distributes work across a network
  2. The means for communication in a zero-trust architecture
  3. Verification of a user in a zero-trust architecture
  4. Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
  5. server within the DMZ that is used to connect two dissimilar security zones
  6. A user in a zero-trust architecture
  7. Criteria for which a website is inaccessible to users
  8. A network device that can forward packets across different computer networks
  9. Keeping multiple instances of an attack surface separate
  10. filtering entire domains

19 Clues: Known attack patternsfiltering entire domainsA physically separated networkA user in a zero-trust architectureRemoving or dismantling a technologyDesigned to limit the spread of malwareA device that distributes work across a networkAutomatically blocking an attack when it occursA network set up with intentional vulnerabilities...

Pearl Harbor 2025-12-08

Pearl Harbor crossword puzzle
Across
  1. Ships ammo was ____ up to prevent sabotage
  2. Who did Japan invade and conquered in 1931?
  3. was the water shallow or deep?
  4. Japan though they would ____ down America with the bombing of Pearl Harbor
  5. How many aircraft attacked?
  6. How many American battle ships were sunk
  7. How many Japanese ships were left behind to produce extra radio traffic
  8. Where is Pearl Harbor located
  9. what camps were Japanese Americans forced to go to?
Down
  1. how many Americans were killed?
  2. The one Japanese soldier who was captured?
  3. Whats the most effective way to attack ships?
  4. The day of the attack?
  5. two materials Japan needed?
  6. Naval intelligence lost Japanese carriers ___ amount of time
  7. Which one of the three waves of Japans attack was canceled
  8. Japan believed they were the right full _____ of Asia
  9. How many air crafts carriers were not in Pearl Harbor during the attack?
  10. What military force did the US expand that threatened Japan?
  11. how many months did it take America to recover from the attac?

20 Clues: The day of the attack?two materials Japan needed?How many aircraft attacked?Where is Pearl Harbor locatedwas the water shallow or deep?how many Americans were killed?How many American battle ships were sunkShips ammo was ____ up to prevent sabotageThe one Japanese soldier who was captured?Who did Japan invade and conquered in 1931?...

Hand and Foot Techniques 2024-06-24

Hand and Foot Techniques crossword puzzle
Across
  1. Low block, front stance
  2. High block, front stance
  3. Roundhouse kick
  4. Inside/outside kick
  5. Reverse knife hand attack
  6. High punch
  7. Side punch
Down
  1. Knife hand attack
  2. Middle punch
  3. Back kick
  4. Front thrust kick
  5. Side thrust kick

12 Clues: Back kickHigh punchSide punchMiddle punchRoundhouse kickSide thrust kickKnife hand attackFront thrust kickInside/outside kickLow block, front stanceHigh block, front stanceReverse knife hand attack

Brawl stars 2022-12-29

Brawl stars crossword puzzle
Across
  1. Candy queen
  2. Has a book
  3. Has an attack: Finger pointer
  4. has a super: Jack in the box
  5. The Buzzassin
Down
  1. Janet’s friend
  2. attacks using a jackhammer
  3. Bonnie’s friend
  4. gadget: gives 2k hp sheild
  5. Has a attack called big sting
  6. A ticking time bomb
  7. first chromatic
  8. super insta-charge
  9. voice actor: Brian Stivale

14 Clues: Has a bookCandy queenThe BuzzassinJanet’s friendBonnie’s friendfirst chromaticsuper insta-chargeA ticking time bombattacks using a jackhammergadget: gives 2k hp sheildvoice actor: Brian Stivalehas a super: Jack in the boxHas a attack called big stingHas an attack: Finger pointer

Fantastic Characters Lessons 1-4 Crossword Evaluation 2022-11-23

Fantastic Characters Lessons 1-4 Crossword Evaluation crossword puzzle
Across
  1. Person living in the wilderness.
  2. Human predecessor.
  3. Attack in the past simple.
  4. People found guilty of a crime.
  5. Synonym of bandit.
  6. Synonym of migrants.
  7. People who travel for visiting sights.
  8. Sudden violent attack.
  9. Expeled from a country.
Down
  1. Send in the past simple.
  2. Country in southern hemisphere.
  3. People who settle outside own country.
  4. Gunfight.
  5. Judgement of individuals.
  6. Robber.

15 Clues: Robber.Gunfight.Human predecessor.Synonym of bandit.Synonym of migrants.Sudden violent attack.Expeled from a country.Send in the past simple.Judgement of individuals.Attack in the past simple.Country in southern hemisphere.People found guilty of a crime.Person living in the wilderness.People who settle outside own country....

Heart Health 2022-02-09

Heart Health crossword puzzle
Across
  1. Large marsupial
  2. fruits and vegetables
  3. Body Health
  4. Flying mammal
  5. Brain attack
  6. Emotional Health
Down
  1. Cessation
  2. Man's best friend
  3. Has a trunk
  4. Attack
  5. Likes to chase mice

11 Clues: AttackCessationHas a trunkBody HealthBrain attackFlying mammalLarge marsupialEmotional HealthMan's best friendLikes to chase micefruits and vegetables

Network Threats 2015-03-02

Network Threats crossword puzzle
Across
  1. What threat usually originates from an employee
  2. Any attack or weakness on a network
  3. An attack that steals company or customer information.
  4. Can become an internal network threat if unhappy.
  5. A programme or code that is designed to prevent a computer or application working correctly
  6. Someone that uses their knowledge and programmes to access a network without permission
Down
  1. "Script kiddies" use this type of attack
  2. A Reconnaissance attack is described as this.
  3. This threat prevents legitimate access to resources such as websites
  4. This programme or code can replicate throughout the network without any intervention
  5. Creates a point of entry to a system without the user knowing
  6. Which threat type does not begin on the company network

12 Clues: Any attack or weakness on a network"Script kiddies" use this type of attackA Reconnaissance attack is described as this.What threat usually originates from an employeeCan become an internal network threat if unhappy.An attack that steals company or customer information.Which threat type does not begin on the company network...

Module 2 Puzzle 2021-09-29

Module 2 Puzzle crossword puzzle
Across
  1. A sudden and unintended failure
  2. Software that monitors computer usage
  3. Software that appears to have a valid and benign purpose but actually has another nefarious purpose
  4. Using the Internet to defraud someone
  5. The response a server sends back to a connection request from a client
  6. An address used to test a machine’s own network card,127.0.0.1
  7. A type of attack against a TCP/IP stack based on using fragmented packets
  8. An attack that involves loading a buffer with more data than it is designed to hold
  9. A term for a seller putting in fake bids on his own item to drive up the price
  10. The process of collecting enough personal information on someone so that you might pose as that person.
  11. A numerical designation for a connection point on a computer
Down
  1. Using interpersonal skills to extract information about a computer system and its security
  2. Using the Internet to harass someone
  3. Hacking conducted for ideological purposes
  4. A method to prevent denial-of-service attacks that actually uses a type of cookie to authenticate the client’s connection
  5. The act of encrypting a message
  6. A DOS attack in which the target is flooded with connection requests
  7. To send an extremely large packet to a target. For some older systems, this would cause the target to crash
  8. Phony email spoofing legitimate email to steal information
  9. A specific type of distributed denial-of-service attack

20 Clues: A sudden and unintended failureThe act of encrypting a messageUsing the Internet to harass someoneSoftware that monitors computer usageUsing the Internet to defraud someoneHacking conducted for ideological purposesA specific type of distributed denial-of-service attackPhony email spoofing legitimate email to steal information...

Chapter 27 Lesson 2 2025-03-20

Chapter 27 Lesson 2 crossword puzzle
Across
  1. series of bunkers along the French-German border
  2. Hitler's last obstacle of conquering western Europe was what country
  3. outlined goals for post-Nazism world
  4. created by isolationists advocating non-intervention in Europe's issues
  5. on June 14, 1940, German troops marched on what city
  6. what country did Stalin try to establish military bases on got mad that led to war
  7. where did the allies retreat after German invasion of Belgium
  8. Japanese Prime Minister who was seeking talks with the US to come up with some sort of an agreement
  9. fast, sudden attack by massed forces
  10. giving up military weapons
  11. this is what Stalin ordered after Germany attacked
Down
  1. allowed the US to sell, lend, or lease weapons to any country crucial for US defense
  2. instituted the first US peacetime draft
  3. after Germany's failure to take over Great Britain, Hitler turned east and tried to take what country
  4. US joins the ____ in the fight against the Axis Powers after the attack on Pearl Harbor
  5. Hitler's invasion of what country triggered WWII
  6. on December 7, 1941, Japan led a surprise attack on what US military base
  7. what leader extended their influence in Latvia, Lithuania, and Estonia
  8. who won the election of 1940 (last name only)
  9. when Germany turned west they invaded ____ and Belgium
  10. in April of 1940 Germany led a surprise attack on Denmark and ____
  11. in 1938, Congress increased the size of the US ____

22 Clues: giving up military weaponsoutlined goals for post-Nazism worldfast, sudden attack by massed forcesinstituted the first US peacetime draftwho won the election of 1940 (last name only)series of bunkers along the French-German borderHitler's invasion of what country triggered WWIIthis is what Stalin ordered after Germany attacked...

Famous battles 2014-10-13

Famous battles crossword puzzle
Across
  1. a napoleonic battle and a victory against russia
  2. Famous air battle in ww1
  3. a small island held by british in ww1
  4. a allied attack on july 6th, 1944
  5. a allied naval attack on the japanese fllet in ww2
  6. Spot for ANZAC landings
  7. an american invasion on and island near japan in ww2
Down
  1. famous british battle in ww1
  2. british cavalry charge in crimea
  3. Napoleons last battle
  4. mass attack by commonwealth forces in north africa in ww2
  5. Famous french battle in ww1

12 Clues: Napoleons last battleSpot for ANZAC landingsFamous air battle in ww1Famous french battle in ww1famous british battle in ww1british cavalry charge in crimeaa allied attack on july 6th, 1944a small island held by british in ww1a napoleonic battle and a victory against russiaa allied naval attack on the japanese fllet in ww2...

Chapter 9 Security Plus 2024-03-21

Chapter 9 Security Plus crossword puzzle
Across
  1. examines the current state of an endpoint before it can connect
  2. Removing or dismantling a technology
  3. A device that distributes resources and services to devices connected to the network
  4. Designed to limit the spread of malware
  5. Automatically blocking an attack when it occurs
  6. Fake data that has been added to live production systems
  7. A physically separated network
  8. Known attack patterns
  9. A network set up with intentional vulnerabilities
Down
  1. A device that distributes work across a network
  2. The means for communication in a zero-trust architecture
  3. Verification of a user in a zero-trust architecture
  4. Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
  5. server within the DMZ that is used to connect two dissimilar security zones
  6. A user in a zero-trust architecture
  7. Criteria for which a website is inaccessible to users
  8. A network device that can forward packets across different computer networks
  9. Keeping multiple instances of an attack surface separate
  10. filtering entire domains

19 Clues: Known attack patternsfiltering entire domainsA physically separated networkA user in a zero-trust architectureRemoving or dismantling a technologyDesigned to limit the spread of malwareA device that distributes work across a networkAutomatically blocking an attack when it occursA network set up with intentional vulnerabilities...

Beowulf Study Guide - Plot 2025-02-05

Beowulf Study Guide - Plot crossword puzzle
Across
  1. Who becomes king after Beowulf?
  2. Person who provokes the sleeping dragon.
  3. How many years/"winters" did the lord of the Shieldings suffer?
  4. Who was the first person Beowulf and his men met in Denmark?
  5. How many nights between Grendel's final attack and his mother's?
  6. Who died during Grendel's mother's attack?
  7. How many years between Beowulf's last two battles?
  8. What country/people lived in Hrothgar's kingdom?
  9. What does Unferth give Beowulf for his battle with Grendel's mother?
  10. "Viking funeral."
Down
  1. Second attacker of Heorot.
  2. How many men did Beowulf enlist to battle Grendel?
  3. Trophy from the ancient sword.
  4. What happens to Beowulf after the dragon battle?
  5. What was stolen from the dragon's barrow?
  6. What happened to the "ancient heirloom" after Beowulf slays Grendel's mother?
  7. How many men did Grendel kill on his first night/attack?
  8. The tale of ___, a dragon slayer, is compared to Beowulf.
  9. What does Beowulf do to Grendel's corpse?

19 Clues: "Viking funeral."Second attacker of Heorot.Trophy from the ancient sword.Who becomes king after Beowulf?Person who provokes the sleeping dragon.What was stolen from the dragon's barrow?What does Beowulf do to Grendel's corpse?Who died during Grendel's mother's attack?What happens to Beowulf after the dragon battle?...

CYBER SECURITY 2023-09-20

CYBER SECURITY crossword puzzle
Across
  1. to steal sensitive information
  2. malware
  3. protection of computing systems and data that these systems store
  4. set of rules
Down
  1. the virtual and dynamic space created by the machine clones
  2. protecting info.from inauthorized parties
  3. attack data to web application
  4. malicious software
  5. attack uses trial & attack method
  6. automated process

10 Clues: malwareset of rulesautomated processmalicious softwareto steal sensitive informationattack data to web applicationattack uses trial & attack methodprotecting info.from inauthorized partiesthe virtual and dynamic space created by the machine clonesprotection of computing systems and data that these systems store

2nd Crossword Challenge 2024-03-11

2nd Crossword Challenge crossword puzzle
Across
  1. Monstercat channel
  2. Japanese cakes made with glutinous rice flour
  3. "No, Mr Bond. I expect you to die."
  4. Ludeon Studios
  5. Papers, Please country
  6. (abv) Seto Kaiba dragon
  7. Lunar_Eclipse
Down
  1. Trigonometric Function
  2. (abv) Jay-Z and Alicia Keys music
  3. Prefecture of Sarthe, France
  4. Bismarck attack target
  5. WW2 Japanese attack target
  6. The A-Team member
  7. Love Live group
  8. (abv) Just Monika

15 Clues: Lunar_EclipseLudeon StudiosLove Live groupThe A-Team member(abv) Just MonikaMonstercat channelTrigonometric FunctionBismarck attack targetPapers, Please country(abv) Seto Kaiba dragonWW2 Japanese attack targetPrefecture of Sarthe, France(abv) Jay-Z and Alicia Keys music"No, Mr Bond. I expect you to die."Japanese cakes made with glutinous rice flour

Pearl Harbor 2024-11-19

Pearl Harbor crossword puzzle
Across
  1. Yamamoto was an
  2. The attack took place in
  3. President Franklin D.
  4. The US gathered these
  5. Who did the US Declare war on
Down
  1. Second of this war
  2. You can still see the USS
  3. Date in December the attack occurred
  4. "a date which will live in"
  5. What did the Japanese attack

10 Clues: Yamamoto was anSecond of this warPresident Franklin D.The US gathered theseThe attack took place inYou can still see the USS"a date which will live in"What did the Japanese attackWho did the US Declare war onDate in December the attack occurred

Art Attack 1 2022-03-10

Art Attack 1 crossword puzzle
Across
  1. think, ponder
  2. one-sided, prejudiced
  3. eyewitness, perceiver
  4. a collection
  5. bewitch, charm, enchant
Down
  1. a man-made tool
  2. artistic, tasteful
  3. person in charge of a museum

8 Clues: a collectionthink, pondera man-made toolartistic, tastefulone-sided, prejudicedeyewitness, perceiverbewitch, charm, enchantperson in charge of a museum

Easter Speed Attack 2022-04-15

Easter Speed Attack crossword puzzle
Across
  1. you keep your Easter eggs in this
  2. The month Easter is in
  3. A season famous for flowers
  4. Make the best peanut butter chocolate cups ever!
Down
  1. He hands out eggs during Easter
  2. First word in the title
  3. This tasty Easter candy is made out of marshmallows.
  4. This bird is a thanksgiving staple

8 Clues: The month Easter is inFirst word in the titleA season famous for flowersHe hands out eggs during Easteryou keep your Easter eggs in thisThis bird is a thanksgiving stapleMake the best peanut butter chocolate cups ever!This tasty Easter candy is made out of marshmallows.

Word Attack Crossword 2013-12-03

Word Attack Crossword crossword puzzle
Across
  1. I went __ the store.
  2. opposite of left
  3. #2
  4. pencil
Down
  1. they are
  2. also
  3. opposite of here
  4. belongs to them

8 Clues: #2alsopencilthey arebelongs to themopposite of leftopposite of hereI went __ the store.

Text: Bear Attack 2024-01-15

Text: Bear Attack crossword puzzle
Across
  1. a series of lessons
  2. sportsman
  3. to talk with someone to get information
  4. to rescue
Down
  1. A person who offers time and skills without pay
  2. very big
  3. not dead
  4. someone who is between 13 and 19 years old

8 Clues: very bignot deadsportsmanto rescuea series of lessonsto talk with someone to get informationsomeone who is between 13 and 19 years oldA person who offers time and skills without pay

ATTACK ON TIATAN 2025-04-27

ATTACK ON TIATAN crossword puzzle
Across
  1. is jealous of Eren
  2. Eren's half-brother
  3. Eren's titan
  4. likes EREN
Down
  1. Armored Titan
  2. Badass
  3. main character
  4. genius

8 Clues: Badassgeniuslikes ERENEren's titanArmored Titanmain characteris jealous of ErenEren's half-brother

Game Knights D&D Rules Puzzle 1 2021-09-25

Game Knights D&D Rules Puzzle 1 crossword puzzle
Across
  1. sneak attack and short swords deal damage with this die.
  2. the action that lets you use your weapons to harm foes. Extras of these let you do it more than once during this action.
  3. inflicting this condition on a foe would give you advantage, but only automatic critical hits if you are within 5 feet.
  4. your character is this after three failed deaths saves
  5. type of hit when you roll a 20 on 1d20
  6. this condition makes you fail ability checks requiring a certain sense AND imposes disadvantage on your attacks and advantage on attacks against you.
  7. maces and longswords deal damage with this die.
  8. this condition ends automatically if you are moved by another creature or spell away from whatever inflicted it on you.
  9. this condition gets worse the more of it you get, potentially causing even instant death.
  10. inflicting this condition will cause your target to fail ability checks tied to a sense, but otherwise does nothing to attack rolls related to the creature.
  11. number of death saves you lose if you take critical damage while at 0 hit points
  12. with this action you will not provoke attacks of opprotunity by movement
  13. glaves and heavy crossbows deal damage with this die.
  14. you can take this action to make an ally's attack against a foe next to you have advantage.
  15. the reach, in feet of most creatures, including larger creatures, unless otherwise specifically stated.
  16. You suffer an automatic critical hit if someone within 5 feet of you damages you while suffering this condition.
  17. while "suffering" this condition you have advantage on attack rolls and foes have disadvantage to attack you.
  18. your speed becomes 0 and cannot be improved while suffering this condition.
  19. suffering this condition gives you resistance to all damage.
Down
  1. when you get to roll 2d20 and keep the lowest
  2. amount of your movement you spend standing up from prone. (Use hypen if two words are needed).
  3. the cost of movement in feet while trying to move wile prone and in difficult terrain.
  4. this action lets you double your movement speed at the cost of your action.
  5. if you suffer this condition you cannot attack or otherwise harm the one who inflicted it upon you.
  6. you can only focus on one of these kinds of spells at once.
  7. when you score a critical hit you double these, but not your modifiers.
  8. daggers and magic missiles deal their damage with this die.
  9. you can only cast these kinds of spells with your action if you spend your bonus action casting a level 1 spell or higher.
  10. amount of your total hit die recovered on long rest (use hyphen if you need two words)
  11. Initiative roll is an ability check using this ability.
  12. a typically underground area that adventurers explore to slay monsters, find loot, and twart evil.
  13. reduce fire damage from *fireball* to this amount if you both pass the dexterity save AND have fire resistence.
  14. greataxes and witch bolt deal damage with this die.
  15. when you get to roll 2d20 and keep the highest
  16. attack rolls and saving throws are made with this die.
  17. You automatically fail strength and dexterity saving throws while suffering this condition.
  18. you may willingly inflict this condition on yourself to impose disadvantage on ranged attacks against you.
  19. size of hit dice for wizards in 5th edition
  20. the number of feet a single square on a grid map takes up when using grid rules.
  21. a magical monster, typically large and intelligent, and can grow to be anchient.

40 Clues: type of hit when you roll a 20 on 1d20size of hit dice for wizards in 5th editionwhen you get to roll 2d20 and keep the lowestwhen you get to roll 2d20 and keep the highestmaces and longswords deal damage with this die.greataxes and witch bolt deal damage with this die.glaves and heavy crossbows deal damage with this die....

My Topologies 2022-06-24

My Topologies crossword puzzle
Across
  1. ___________ is hidden software that monitors and collects information about you and your surfing habits.
  2. Within cyber security a weakness that can compromise a system is known as a _______
  3. What tool is used to get through a vulnerability other than the key
  4. In a ____________ attack, the hacker modifies the source address of the packets he or she is sending so that the packet appears to be coming from someone else
  5. A ___________ is either a piece of software installed on the system or a hardware device that is designed to capture all of the keystrokes on a system
  6. the type of attack called when the hacker inserts himself in the middle of two systems that are communicating
  7. involves the use of a network monitoring tool known as a sniffer, which is used to capture and analyze network traffic
  8. ____ _________ is when two or more servers have the same information stored on it
  9. A ________ virus is a program that you are tricked into installing because you thought the application did something useful
  10. another term used to describe Eavesdropping attacks
  11. ______________ is malicious software that takes control of your system and does not give control back until you pay a fee
Down
  1. A ________________ is a type of attack that causes the system or its services to either crash or become unresponsive
  2. What is an actual potential to break in, destroy, steal, or otherwise modify something without permission
  3. With a _________________ the hacker uses multiple systems to attack a single target system
  4. the type of attack called when the hacker creates a fake website that looks exactly like a popular website, then sends an e-mail message trying to trick the user into clicking a link that leads to the fake site
  5. type of attack that sends victims to a malicious website but involves compromising the services that direct users toward a well-known or trusted website
  6. _______ is the concept of ensuring that system will continue to function after a disaster.
  7. Bomb A ______________ is a type of virus that is planted on the system, and the application you installed acts as it is supposed to until a certain event occurs to trigger it.
  8. What is used when an attacker compromises the network or system through social interaction with an individual

19 Clues: another term used to describe Eavesdropping attacksWhat tool is used to get through a vulnerability other than the key____ _________ is when two or more servers have the same information stored on itWithin cyber security a weakness that can compromise a system is known as a _______...

chp 7 vocab 2021-10-05

chp 7 vocab crossword puzzle
Across
  1. an attack
  2. the action of reserving something
  3. northwest land between the great lakes, mississippi, and ohio river
  4. measurement of distance north or south of the equator
Down
  1. going about in search of thing to steal or people to attack
  2. chain with shackles
  3. without the basic necessities of life
  4. an indiscriminate and brutal slaughter of people
  5. the state of being barred from one's native country, typically for political or punitive reasons
  6. make an attack or assault in return for a similar attack

10 Clues: an attackchain with shacklesthe action of reserving somethingwithout the basic necessities of lifean indiscriminate and brutal slaughter of peoplemeasurement of distance north or south of the equatormake an attack or assault in return for a similar attackgoing about in search of thing to steal or people to attack...