attack Crossword Puzzles
unit 6 - Stefaniak, Monika Wróblewska, Nowecki 2022-01-25
Across
- continuous attack with bombs
- illegal rapid taking over government power
- military staff unit after retirement
- an important person in the organisation
- a promise carrying no result
- people wounded
- idea
- on the margin (rhymes with grinch)
Down
- make progress
- accidentaly
- under attack
- a group of soldiers e.g.fighting on horses
- competition
- lawful (e.g. from a trusted source)
- entities who died by accident
- a truce halting violence
16 Clues: idea • accidentaly • competition • under attack • make progress • people wounded • a truce halting violence • continuous attack with bombs • a promise carrying no result • entities who died by accident • on the margin (rhymes with grinch) • lawful (e.g. from a trusted source) • military staff unit after retirement • an important person in the organisation • ...
Chapter 7 Vocab 2021-10-05
Across
- attack a person or place with bombs
- the action of reserving something.
- northwest the land between the Great Lakes, The Mississippi, and the Ohio River.
- scope for freedom of action or thought
Down
- in search of stealing or people to attack
- restrain limit
- without the basic necessities of life.
- a brutal slaughter of people
- expel and bar someone from there native home
- make an attack or assault in return for a similar attack
10 Clues: restrain limit • a brutal slaughter of people • the action of reserving something. • attack a person or place with bombs • without the basic necessities of life. • scope for freedom of action or thought • in search of stealing or people to attack • expel and bar someone from there native home • make an attack or assault in return for a similar attack • ...
260-264 2025-02-07
Across
- what was the south smuggling to trade with Europe through blockade runners
- where did McClennans troops take position
- which direction did the confederacy go to Chattanooga, Tennessee
- who became the union general in febuary of 1862
- where did grant go to attack when he sent his troops up the tennesee river
- what were the two famous confederate war ships
- who at first said that the reason for the war was that he wanted to preserve the union
- what battle was known as the bloodiest one day battle in American history
- the McClennan became known as the what?
- where did the confederacy surprise attack the union
- who believed that a successful invasion might convince the north to accept southern independence
- white men between the age of 18-35 were forced into war which is called what?
- lincoln facing a pressure strike against the south of Washington DC
- farragut arrived at new orleans at what date?
- how long did it take McClellan to capture yorktown
Down
- who decided to attack union forces defending Washington
- lincoln changed the reason why the civil war was happening to ending slavery so that who wouldn't interfere with the war
- what troops attacked and inflicted heavy casualties
- money given as an reward
- what rivers were both side struggling to take control of
- ship that runs through a blockade,usaully to smuggle goods through a protected area
- who did lincoln fire because he was upset at how slow he was being to attack Chattanooga
- who was the union mad at because they didn't think they should have been making war ships for the south
- the south thought they would gain recognition from who if they won on northern soil
- what is it called when someone blocks off an area to stop them from trading, getting supplies, and their transport
- when did Mcclennen order his troops to attack for the antinetam battle
- when did president lincoln put blockades on all confederate ports
- McClennen was forced to what and go back to Washington with his troops
- how many troops were killed during the war of siloh
29 Clues: money given as an reward • the McClennan became known as the what? • where did McClennans troops take position • farragut arrived at new orleans at what date? • what were the two famous confederate war ships • who became the union general in febuary of 1862 • how long did it take McClellan to capture yorktown • what troops attacked and inflicted heavy casualties • ...
Plaque, Heart Attack, & Blood Pressure 2023-03-23
Across
- vein graft is sewn in to bypass a blockage
- a decrease in blood supply to a bodily organ due to occlusion
- insufficient levels of oxygen in blood or tissue
- an atheromatous plaque that is particularly prone to producing sudden major problems
- clot that migrates through the vascular system and causes an occlusion elsewhere
- interior space of blood vessel
- continuous flow of blood
- stent is inserted, expands, & stays in artery
- force exerted by the blood on the inner walls
Down
- constricting chest or shoulder pain caused by an insufficient blood supply to heart
- a blockage
- a buildup of plaque
- deposit of fatty material on inner arterial wall
- death of a bodily organ as a result of a blockage of blood vessels
- pressure exerted when ventricles relax
- a constriction or narrowing of a blood vessel
- clot inside of an artery that blocks blood flow
- pressure exerted when ventricles contract
18 Clues: a blockage • a buildup of plaque • continuous flow of blood • interior space of blood vessel • pressure exerted when ventricles relax • pressure exerted when ventricles contract • vein graft is sewn in to bypass a blockage • a constriction or narrowing of a blood vessel • stent is inserted, expands, & stays in artery • force exerted by the blood on the inner walls • ...
Argon Attack 2025-05-18
6 Clues: ______ number is 18 • the table of elements • what type of gas is argon • Greek word argon is named after • Argon Attack is the best _________ • the study of elements and chemicals
Encrypting the You Matter Most Cybersecurity Crossword Challenge! 2024-04-11
Across
- A method of hiding sensitive data within seemingly harmless files or messages (HARD!!!)
- A type of cyberattack that involves gaining access to a system and encrypting its data, then demanding payment for decryption.
- The practice of tricking individuals into divulging sensitive information such as passwords or credit card numbers vi e-mail
- _____-force attack is a technique used to guess a password by trying many possible combinations
- Gain access to someone else’s computer or device without permission
- The program you use to access the Internet (such as Chrome, Safari, Firefox, Edge)
- Man-In-The-________ attack is an type of attack that intercepts and alters communication between two parties
- An attack that floods a system with excessive network traffic, causing it to slow down or become unavailable is called a Denial of _______ attack
- Two-Factor ______________ is a security measure that verifies a user's identity based on something they have, such as a security token
- A location on the internet where you can save your data (rather than on your computer or device)
Down
- A program or device used to detect and prevent unauthorized access to a network
- A sequence of characters (or words) used to stop criminals from accessing your accounts
- A method of protecting data by converting it into unreadable code that only authorized parties can read
- Malicious software that could harm your computer or gadget
- What is a form of malware that monitors and records a user's activities without their knowledge?
- A simulated cyberattack on a computer system to identify vulnerabilities that could be exploited is called a ___________ test (Hard)
- A security incident where sensitive information is leaked to the public is a data ______
- ____-Day Vulnerabilities are software vulnerabilities that are unknown to the software vendor
18 Clues: Malicious software that could harm your computer or gadget • Gain access to someone else’s computer or device without permission • A program or device used to detect and prevent unauthorized access to a network • The program you use to access the Internet (such as Chrome, Safari, Firefox, Edge) • ...
The 9/11 Attacks 2019-11-12
Across
- What Chicago suburb was Joe Dittmar from?
- What month did they attack?
- Where were the suicide bombers from?
- How many cities did they attack
Down
- How many airliners did they use to attack?
- Who came up with the idea of using planes to attack?
- What was the name of the terrorist group?
- What side of the Pentagon did they hit?
- How many suicide bombers were there?
- What tower was Joe dittmar in?
10 Clues: What month did they attack? • What tower was Joe dittmar in? • How many cities did they attack • How many suicide bombers were there? • Where were the suicide bombers from? • What side of the Pentagon did they hit? • What Chicago suburb was Joe Dittmar from? • What was the name of the terrorist group? • How many airliners did they use to attack? • ...
Poke X Word : Puzzle # 4 (Normal) 2022-03-25
Across
- Ability: Shady Dealings
- Bonus: 2022 Salt Lake City Regional Champion
- Attack: Grass Knot
- Ability: Roaring Resolve
- Ability: Fleet-Footed
- Ability: Mysterious Tail
Down
- Attack: Pin Missile
- Ability: Dummy Doll
- Stadium: Whenever either player plays a Pokémon VMAX from their hand to evolve a Pokémon V during their turn, heal 100 damage from that Pokémon.
- Item: Search your deck for a Pokémon with 90 HP or less, reveal it, and put it into your hand. Then, shuffle your deck.
- Ability: Chromashift
- Ability: Spring Bloom
- Attack: Thunderbolt
13 Clues: Attack: Grass Knot • Attack: Pin Missile • Ability: Dummy Doll • Attack: Thunderbolt • Ability: Chromashift • Ability: Spring Bloom • Ability: Fleet-Footed • Ability: Shady Dealings • Ability: Roaring Resolve • Ability: Mysterious Tail • Bonus: 2022 Salt Lake City Regional Champion • ...
Cyber security 2023-04-28
Across
- Software designed to harm or exploit any device or network it infects.
- A type of malware that encrypts a victim's files and demands payment in exchange for the decryption key.
- Software designed to detect and remove viruses and other types of malware.
- detection system Software that monitors a network or system for signs of unauthorized access or activity.
- attack An attack that attempts to make a website or network unavailable to users by overwhelming it with traffic or requests.
- authentication A security measure that requires two forms of identification to access an account.
- breach The unauthorized access, use, or disclosure of sensitive information.
- engineering The use of psychological manipulation to trick people into divulging confidential information or performing actions that are not in their best interest.
- force attack A method of guessing a password by trying every possible combination until the correct one is found.
- security The practice of securing a network from unauthorized access or attacks.
- An update to software that fixes a vulnerability or bug.
- Criminal activity that involves the use of digital devices or networks.
- testing The process of testing a system or network for vulnerabilities by attempting to exploit them.
Down
- exploit An attack that exploits a previously unknown vulnerability in a software application or system.
- The process of verifying the identity of a user or system.
- A type of social engineering attack that involves sending fraudulent emails or messages to trick people into sharing sensitive information.
- Method of converting plain text into a code that can only be read by authorized parties.
- A weakness or flaw in a system that can be exploited by attackers.
- Network security system that monitors and controls incoming and outgoing network traffic.
- The practice of protecting computer systems and networks from digital attacks, theft, and damage.
20 Clues: An update to software that fixes a vulnerability or bug. • The process of verifying the identity of a user or system. • A weakness or flaw in a system that can be exploited by attackers. • Software designed to harm or exploit any device or network it infects. • Criminal activity that involves the use of digital devices or networks. • ...
Attack on Pearl Harbor 2025-12-04
Across
- the United States became upset after Japan invaded and conquered it in 1931
- Japan thought they shouldn't be ruled by white imperialist
- Japan launched an attack on the United States ___
- where did the United States move their Navy from San Diego
- what year did Pearl Harbor happen
- United States were able to send 31,095 troops in
Down
- the Japan placed on the torpedoes to prevent from hitting the bottom of Pearl Harbor
- Japan invaded the country and interrupted United States trade
- 12 times lost in the past six months
- who cut off the trade of oil and metal after Japan conquered French Indochina
- No chance of an surprise attack being there
- The United Staes wanted to stay _____ to stay out of the war
- who was angry with the US rejecting the racial equality proposal
13 Clues: what year did Pearl Harbor happen • 12 times lost in the past six months • No chance of an surprise attack being there • United States were able to send 31,095 troops in • Japan launched an attack on the United States ___ • Japan thought they shouldn't be ruled by white imperialist • where did the United States move their Navy from San Diego • ...
Pearl Harbor 2025-03-05
Across
- Where is Pearl Harbor?
- Which ship that was bombed and sunk is still at Pearl Harbor?
- A weapon used by the Japanese for the attack
- A hospital ship docked at Pearl Harbor during the attack; this ship was not bombed
- What was the date of the Attack?
- An underwater bomb used to damage ships from below
Down
- The US joined this as a result of Pearl Harbor
- Which country bombed Pearl Harbor?
- How many total ships were damaged or destroyed
- The president of the USA during the attack
- How many Americans were killed during Pearl Harbor?
11 Clues: Where is Pearl Harbor? • What was the date of the Attack? • Which country bombed Pearl Harbor? • The president of the USA during the attack • A weapon used by the Japanese for the attack • The US joined this as a result of Pearl Harbor • How many total ships were damaged or destroyed • An underwater bomb used to damage ships from below • ...
Crossword cybersecurity 2024-04-17
10 Clues: resolv a fault • person hack you • protect to virus • program infect you • program hide your IP • most pc attack server • attack on link of fish • fault what developer don't know • attack try multiple combination • virus look all you make on your pc
BI416 Case study #1 Crossword 2021-10-06
Across
- Measurements indicating state of vital body functions
- over time panic attack episodes increase in ______
- Manifestation associated with tightening in chest and difficulty breathing
- Avoidance of ____ is typically associated with panic attack disorder
- Sensation of fast beating or pounding heart
Down
- Something that is feared when suffering from panic attack disorder
- Repeated episodes of panic attacks accompanied with physical manifestations. Also followed by the fear of another episode and/or the consequences such as death.
- A habit that may be linked to panic attacks
- A risk factor associated with panic attack disorder
- Past medical disorder that may increase an individuals chance of developing panic attack disorder
10 Clues: A habit that may be linked to panic attacks • Sensation of fast beating or pounding heart • over time panic attack episodes increase in ______ • A risk factor associated with panic attack disorder • Measurements indicating state of vital body functions • Something that is feared when suffering from panic attack disorder • ...
Legion Crosswords 2021-03-12
Across
- another attack after first attack keyword
- Incognito and Detachment
- Strong against commanders, weak against fieldcommanders and inspiring presence Padme
- 2 open 2 light 1 heavy
- only heavy weapon with repair
- Team Fortress game mode
- blast weapons ____ cover
- only unique gear upgrades
- Tank weak point 1 sides and rear
- Only heavy weapon with inspire
- short edge deployment
- you gain sentinel
- Cunning and Compel
Down
- Guardian and Disciplined
- First steady unit
- dauntless and infiltrate
- you gain charge upgrade
- Modern GAR standby sharing
- Jump and Steady
- you gain reliable 1 Corp or ARC unit
20 Clues: Jump and Steady • First steady unit • you gain sentinel • Cunning and Compel • short edge deployment • 2 open 2 light 1 heavy • you gain charge upgrade • Team Fortress game mode • Guardian and Disciplined • Incognito and Detachment • dauntless and infiltrate • blast weapons ____ cover • only unique gear upgrades • Modern GAR standby sharing • only heavy weapon with repair • ...
Crossword Puzzle for Touching Spirit Bear 2024-09-03
Across
- A heavy mammal
- dangerously low body temperature
- lacking knowledge or awareness in general
- the main character
- the person who is attacked by cole
- cole's parole officer
- provoke or challenge
- sadness or gloomy
- a land mass surrounded by water
- the elder
Down
- responsibility for an accident
- what peter experienced after the beat down he received
- expelled
- attack
- distant
- the therapy cole received after he attack peter
- punishment for wrong doing
- the towel cole had
- where cole was sent to be punished
- by yourself
- People the tribe involved in the book
21 Clues: attack • distant • expelled • the elder • by yourself • A heavy mammal • sadness or gloomy • the main character • the towel cole had • provoke or challenge • cole's parole officer • punishment for wrong doing • responsibility for an accident • a land mass surrounded by water • dangerously low body temperature • the person who is attacked by cole • where cole was sent to be punished • ...
Cybersecurity 2023-03-17
Across
- cable preventing theft of mobile devices
- network virus
- unwanted email messages
- storing files from hard drive remotely
- malicious code stored in files
- tricking victim into giving information
- bring your own device
- verifying a user's identity
- sending fake emails to scam
Down
- UI redress attack
- malicious software
- attack that changes devices' address
- malware requiring payment to fix
- false warning from fake senders
- masks user's location
- network of hacker computers
- website generated file storing info on your computer
- scrambling information necessitating a passkey
- instructions commanding browser actions
- malware hidden within another program
20 Clues: network virus • UI redress attack • malicious software • masks user's location • bring your own device • unwanted email messages • network of hacker computers • verifying a user's identity • sending fake emails to scam • malicious code stored in files • false warning from fake senders • malware requiring payment to fix • attack that changes devices' address • ...
WWII 2016-04-15
Across
- girl that became famous for her diary
- Russian leader during WWII
- town where 1st atomic bomb was dropped
- town in England (air attack)
- American troops in Hawaii
- concentration camp in Austria
- landing of the allied troops in France
- end of WWII (year)
- Italian leader during WWII
- handicapped people were killed there
- first country occupied by Hitler
- Japanese town
Down
- Hitler promised the people .....
- killing of the Jews during WWII
- Russian town
- USA, France, GB,....
- beginning of WWII
- end of WW2 in Europe (month)
- fast attack on a country
- neutral state during WWII
20 Clues: Russian town • Japanese town • beginning of WWII • end of WWII (year) • USA, France, GB,.... • fast attack on a country • American troops in Hawaii • neutral state during WWII • Russian leader during WWII • Italian leader during WWII • town in England (air attack) • end of WW2 in Europe (month) • concentration camp in Austria • killing of the Jews during WWII • ...
Part 2 2015-04-17
Across
- Nothing to do
- Always checking things out because you are ______
- Never change tone of voice
- Lack of experience
- Really smart and proper
- Unprotected
- Likely to attack
- A trip or journey
- Not strike but ______
- How deep something is
Down
- Being protected
- Driving force that causes the object to go forward
- Having little knowledge
- Take aggressive action
- Not guilty
- Letting their guard down they are _______
- Came across something or someone
- Make a physical attack on
- Dull
- Strength or power
- Someone very emotional
- Pity
- Unhappy
23 Clues: Dull • Pity • Unhappy • Not guilty • Unprotected • Nothing to do • Being protected • Likely to attack • Strength or power • A trip or journey • Lack of experience • Not strike but ______ • How deep something is • Take aggressive action • Someone very emotional • Having little knowledge • Really smart and proper • Make a physical attack on • Never change tone of voice • Came across something or someone • ...
Chapter 6 and 7 Vocab 2016-01-10
Across
- more money to buy same amount
- sharing power between federal and state gov.
- two house legislative
- approve
- freeing of enslaved individuals
- each branch has roles that check or limit others
- plan of government
- undercover sudden attack
- gov. where citizens rule
- enlist
- law
- prevented trade
- fallen in value
- hired soldiers
- apply to
Down
- corresponding in size
- left without permission
- agreement
- period of economic activity slowed
- surprise attack
- made up of presidential electors
- privately owned merchant ships
- something added to a document
- parts in the constitution
- taking neither side
25 Clues: law • enlist • approve • apply to • agreement • hired soldiers • surprise attack • prevented trade • fallen in value • plan of government • taking neither side • corresponding in size • two house legislative • left without permission • undercover sudden attack • gov. where citizens rule • parts in the constitution • more money to buy same amount • something added to a document • ...
Walk two moons vocab 2023-01-22
Across
- One taken or held prisoner
- Quarrelsome
- Given or written by a person whose name is unknown
- Harassing
- Huge; gigantic
- Pranced
- Partial or total loss of memory caused by brain injury or shock
- In a state of violent or destructive rage or frenzy
- Lot; group
- Hand tool with a sharp, wedged blade
- Feeling under attack and hence quick to justify one's actions
Down
- Dead body
- Deceived
- Collected or gathered together
- Surprise attack from hidden assailants
- arteries
- White sterol found in animal fats which can cause
- Pestered
- Of supreme importance
- Plentiful
- Comfort
21 Clues: Pranced • Comfort • Deceived • arteries • Pestered • Dead body • Harassing • Plentiful • Lot; group • Quarrelsome • Huge; gigantic • Of supreme importance • One taken or held prisoner • Collected or gathered together • Hand tool with a sharp, wedged blade • Surprise attack from hidden assailants • White sterol found in animal fats which can cause • Given or written by a person whose name is unknown • ...
WW1 2022-10-03
Across
- Tripple Alliance
- years
- battle
- fever
- of Verdun, French land
- boat that killed lots of people
- safe and comfortable trenches
- Frank Ferdinand, who was assassinated
- a deadliest weapon
- a system
- black hand, the group that was planning the attack
- Shock, PTSD
- muddy wet and unsafe
Down
- ww1 years
- no mans land
- the acronym for the longest term causes of WW1
- Empire, tripple alliance
- first gas attack
- flu
- ran out of
- Foot, wet and muddy
- a country
- Days offensive
- Hungary, declared war on Serbia
24 Clues: flu • years • fever • battle • a system • ww1 years • a country • ran out of • Shock, PTSD • no mans land • Days offensive • Tripple Alliance • first gas attack • a deadliest weapon • Foot, wet and muddy • muddy wet and unsafe • of Verdun, French land • Empire, tripple alliance • safe and comfortable trenches • boat that killed lots of people • Hungary, declared war on Serbia • ...
AI-Driven Cybersecurity 2026-04-04
Across
- Fake email based cyber attack
- Controls user permissions
- Harmful software in systems
- AI program that interacts with users
- Locks data and demands money
- Detects unusual system behavior
- User identity verification process
- Login using fingerprint or face
- Secures data using coding
- AI based security protection system
Down
- Safeguarding sensitive data
- Protects network from threats
- Software that secretly collects data
- Unauthorized system entry attempt
- Digital attack on systems
- Machine learning based model
- Advanced neural learning method
- AI based threat detection process
- AI system used for predictions
- Protecting computer networks
20 Clues: Controls user permissions • Digital attack on systems • Secures data using coding • Safeguarding sensitive data • Harmful software in systems • Machine learning based model • Locks data and demands money • Protecting computer networks • Protects network from threats • Fake email based cyber attack • AI system used for predictions • Advanced neural learning method • ...
AI-Driven Cybersecurity 2026-04-04
Across
- AI based security protection system
- Software that secretly collects data
- AI system used for predictions
- Controls user permissions
- Protecting computer networks
- Advanced neural learning method
- User identity verification process
- Unauthorized system entry attempt
- Protects network from threats
Down
- AI based threat detection process
- Safeguarding sensitive data
- Detects unusual system behavior
- Machine learning based model
- Digital attack on systems
- Locks data and demands money
- Secures data using coding
- AI program that interacts with users
- Fake email based cyber attack
- Login using fingerprint or face
- Harmful software in systems
20 Clues: Digital attack on systems • Controls user permissions • Secures data using coding • Safeguarding sensitive data • Harmful software in systems • Machine learning based model • Locks data and demands money • Protecting computer networks • Fake email based cyber attack • Protects network from threats • AI system used for predictions • Detects unusual system behavior • ...
Attack 2020-10-30
Attack 2020-10-30
Soul Surfer 2022-05-17
Across
- What did Bethany lose?
- What was Bethany’s dad about to have done during the attack?
- What did Bethany use to surf?
- What is Bethany dressed in 90% of the time?
- who was Bethany’s best friend?
- What day did the attack happened?
Down
- Who was Bethany sponsored by?
- What did Bethany name what’s left of her arm?
- Where was Bethany attacked?
- What attacked Bethany?
- Bethany has a lot of this after the attack.
- Where did Bethany live?
12 Clues: What did Bethany lose? • What attacked Bethany? • Where did Bethany live? • Where was Bethany attacked? • Who was Bethany sponsored by? • What did Bethany use to surf? • who was Bethany’s best friend? • What day did the attack happened? • Bethany has a lot of this after the attack. • What is Bethany dressed in 90% of the time? • What did Bethany name what’s left of her arm? • ...
UNIT 6 BOOK 2 PART 2 2022-10-01
Across
- obvious
- shapely figured
- belief system
- look for
- attack with sth sharp
- government funding
- very large
- hopelessness
- with melting
- practically
- progress, development
- on purpose
- vitamin C deficiency
- lack of legal status
- not straight
- disease caused by vitamin deficiency
- sth additional
- praised
Down
- disease of lungs
- decomposition
- obligatory
- severe malnutrition of children
- sore rotting open skin infection
- indulge in negative thoughts
- with feel uncomfortably hot
- making sth void or invalid
- obtain
- intervention
- restrict
- love
- impede progress
- attack hitting sb brutally
32 Clues: love • obtain • obvious • praised • look for • restrict • obligatory • very large • on purpose • practically • hopelessness • with melting • intervention • not straight • decomposition • belief system • sth additional • shapely figured • impede progress • disease of lungs • government funding • vitamin C deficiency • lack of legal status • attack with sth sharp • progress, development • making sth void or invalid • ...
Ronaldinho the King 2013-11-11
Across
- lack of interest or concern
- to deceive with charm
- harden and intensive
- cautious; watchful
- from a much earlier time
- to express strong disapproval
- unpleasantly sharp
- shamelessly bold
- one who gives
- to alter or modify
- quarrelsome
- selfless
- respect
- to criticise severely
- lavish; plentiful
- to follow the rules or customs groups\
Down
- ability;capability
- disagreeable to deal with
- to reduce in degree or intensity
- to reprimand severely
- a bitter, sharply abusive attack
- friendly;east to talk to
- to attack
- a reduction in number or strength
- excessively sweet or rich
25 Clues: respect • selfless • to attack • quarrelsome • one who gives • shamelessly bold • lavish; plentiful • ability;capability • cautious; watchful • unpleasantly sharp • to alter or modify • harden and intensive • to deceive with charm • to reprimand severely • to criticise severely • from a much earlier time • friendly;east to talk to • disagreeable to deal with • excessively sweet or rich • ...
WWII 2016-04-15
Across
- Hitler promised the people .....
- end of WWII (year)
- Russian leader during WWII
- fast attack on a country
- neutral state during WWII
- town where 1st atomic bomb was dropped
- Russian town
- town in England (air attack)
- concentration camp in Austria
- USA, France, GB,....
- first country occupied by Hitler
Down
- handicapped people were killed there
- American troops in Hawaii
- landing of the allied troops in France
- girl that became famous for her diary
- killing of the Jews during WWII
- beginning of WWII
- Japanese town
- end of WW2 in Europe (month)
- Italian leader during WWII
20 Clues: Russian town • Japanese town • beginning of WWII • end of WWII (year) • USA, France, GB,.... • fast attack on a country • American troops in Hawaii • neutral state during WWII • Russian leader during WWII • Italian leader during WWII • end of WW2 in Europe (month) • town in England (air attack) • concentration camp in Austria • killing of the Jews during WWII • ...
Birds 2024-02-27
Across
- cookies in Britain
- location of the first bird attack
- English word from stroller
- nat gets jill off the _______
- British baked pastry
- what mrs.trigg tried to fight the birds with
- led the second attack
- Nat's job title
- setting of the story
Down
- Dinner for the family
- fatal to birds
- found lying by the hedges
- bird that almost cracked Nat's scull
- Nat's daughter
- farmer that Nat worked for
- Winter Kind of winter in the story
- where the birds first start tapping
- Kitchen
- Director the birds come from
- English word for diaper
20 Clues: Kitchen • fatal to birds • Nat's daughter • Nat's job title • cookies in Britain • British baked pastry • setting of the story • Dinner for the family • led the second attack • English word for diaper • found lying by the hedges • English word from stroller • farmer that Nat worked for • Director the birds come from • nat gets jill off the _______ • location of the first bird attack • ...
Cyber Security 2024-03-15
Across
- Internet protocol
- Physical Components of a pc
- collective network of devices
- only numbers combined t
- social engineering attack involving email
- picture puzzles are common security
- several security methods is called
- Distributed Denial of service
- Controls and monitors traffic
- malware, that replicates inside files
Down
- process of proving you are
- an intentional harmful file
- global network of remote servers
- pretends to be something else
- in the middle attack
- Process of protecting information
- letters, numbers,special characters combined
- group of interconnected computing devices
- Programs, operating systems
- virtual private network
20 Clues: Internet protocol • in the middle attack • only numbers combined t • virtual private network • process of proving you are • an intentional harmful file • Physical Components of a pc • Programs, operating systems • pretends to be something else • collective network of devices • Distributed Denial of service • Controls and monitors traffic • global network of remote servers • ...
Spelling & Vocabulary Test (Term 1 2024) 2024-11-19
Across
- an overhead covering
- honesty
- real or truthful
- restore friendly relations
- cover or envelop so as to conceal from view
- promise
- drunk
- make an attack in return for a similar attack
- to shake with fright
- not affected by alcohol; not drunk
- intensely irritated and frustrated
- deep sincerity
Down
- the main character in a story, the good character
- very tiny
- done consciously and intentionally
- strange and frightening
- excessive pride or self-confidence
- understand
- so frightened that one is unable to move; terrified
- deciding what’s most important and doing that first
20 Clues: drunk • honesty • promise • very tiny • understand • deep sincerity • real or truthful • an overhead covering • to shake with fright • strange and frightening • restore friendly relations • done consciously and intentionally • excessive pride or self-confidence • not affected by alcohol; not drunk • intensely irritated and frustrated • cover or envelop so as to conceal from view • ...
COMPUTER CRIMES 2024-11-10
Across
- (Denial of Service attack)
- (Harassment online)
- (Intentional damage to computer systems)
- (Illegal copying of copyrighted material)
- (Network of infected computers)
- (Illegal activities committed online)
- (Extortion using sexually explicit material)
- (Unsolicited email)
- Theft (Stealing personal information)
- (Unauthorized access to computer systems)
- (Self-replicating malware)
Down
- (Malicious software)
- Injection (Cyberattack targeting databases)
- (Tricking users into clicking malicious links)
- (Software that monitors user activity)
- (Malware that encrypts data)
- (Harassment online)
- (Fraudulent emails to trick users)
- (Redirecting users to fake websites)
- Horse (Malicious software disguised as legitimate)
- (Distributed Denial of Service attack)
21 Clues: (Harassment online) • (Harassment online) • (Unsolicited email) • (Malicious software) • (Denial of Service attack) • (Self-replicating malware) • (Malware that encrypts data) • (Network of infected computers) • (Fraudulent emails to trick users) • (Redirecting users to fake websites) • (Illegal activities committed online) • Theft (Stealing personal information) • ...
CHESS GAME 2021-04-10
the blitz 2025-06-19
9 Clues: city • tactic • country • attacker • name of battle • what the attack was • county that attacked • what germany did to london • what the germans used to attack london
Hooligan history 2018-03-19
Across
- start of football game
- spiteful, bitter, nasty
- something that makes you remember
- ending without a winner
- dealing with an issue in the media
- very basic
- stadium, arena, pitch
- match, sporting event
- period of ten years
- big group, gang
- disorder, disturbance
- seldom, not often
Down
- infrequent, irregular, on and off
- attack
- a win
- person who watches a game
- violent uprising
- bad reputation, ill fame
- opponent, challenger, enemy
- hooligan gang
- prohibited,excluded
- accidentally, by mistake
- bringing strong images
- accidental, unsystematic
- focus of public attention
- surprise attack
- violent
27 Clues: a win • attack • violent • very basic • hooligan gang • surprise attack • big group, gang • violent uprising • seldom, not often • prohibited,excluded • period of ten years • stadium, arena, pitch • match, sporting event • disorder, disturbance • start of football game • bringing strong images • spiteful, bitter, nasty • ending without a winner • bad reputation, ill fame • accidentally, by mistake • ...
WWII crossword 2021-05-03
Across
- American troops in Hawaii
- Russian town
- USA, France, GB,....
- Italian leader during WWII
- Hitler promised the people .....
- Russian leader during WWII
- girl that became famous for her diary
- Japanese town
- town in England (air attack)
- concentration camp in Austria
Down
- end of WW2 in Europe (month)
- killing of the Jews during WWII
- neutral state during WWII
- fast attack on a country
- end of WWII (year)
- town where 1st atomic bomb was dropped
- beginning of WWII
- first country occupied by Hitler
- landing of the allied troops in France
- handicapped people were killed there
20 Clues: Russian town • Japanese town • beginning of WWII • end of WWII (year) • USA, France, GB,.... • fast attack on a country • American troops in Hawaii • neutral state during WWII • Italian leader during WWII • Russian leader during WWII • end of WW2 in Europe (month) • town in England (air attack) • concentration camp in Austria • killing of the Jews during WWII • ...
Cybersecurity 2023-09-13
Across
- cable preventing theft of mobile devices
- network virus
- unwanted email messages
- storing files from hard drive remotely
- malicious code stored in files
- tricking victim into giving information
- bring your own device
- verifying a user's identity
- sending fake emails to scam
Down
- UI redress attack
- malicious software
- attack that changes devices' address
- malware requiring payment to fix
- false warning from fake senders
- masks user's location
- network of hacker computers
- website generated file storing info on your computer
- scrambling information necessitating a passkey
- instructions commanding browser actions
- malware hidden within another program
20 Clues: network virus • UI redress attack • malicious software • masks user's location • bring your own device • unwanted email messages • network of hacker computers • verifying a user's identity • sending fake emails to scam • malicious code stored in files • false warning from fake senders • malware requiring payment to fix • attack that changes devices' address • ...
Diary of a Wimpy Kid: Meltdown 2019-01-22
Across
- To protect something
- Greg's last name
- Argument or battle
- Youngest brother's oldest brother
- What people ride, on snowy hills
- Something you throw, made out of snow
- Fighting with others
- Rain below freezing
- Journal of private thoughts
Down
- First name of main character
- A season where it snows
- Mom and Dad's youngest child
- Extreme tantrum
- Used in a cars, cooking and salads
- To strongly dislike
- Greg's Best friend
- Samurai, Highlanders, or snowball teams in the book
- Soggy snow
- Shelter for protection against attack
- To invade violently
20 Clues: Soggy snow • Extreme tantrum • Greg's last name • Argument or battle • Greg's Best friend • To strongly dislike • To invade violently • Rain below freezing • To protect something • Fighting with others • A season where it snows • Journal of private thoughts • First name of main character • Mom and Dad's youngest child • What people ride, on snowy hills • Youngest brother's oldest brother • ...
A2 German vocab 3.3 2020-03-03
Across
- to react
- eye contact
- to intimidate
- to resist, fight against
- solidarity
- civil courage
- critical of a regime
- to execute
- bomb attack
- takeover
- peaceful
- demonstration
- to protest
- to participate
- to attack
- society
- to kill
- to fight
- tolerance
- exploitation
- fall
- to act
- to pester
Down
- to kill
- self-confident
- to touch
- to rise up
- death
- to insult
- helpfulness
- resistance
- responsibility
- to provoke
- brave
- dictatorship
- racial hatred
- hero
- prison
- to request
- fan
- to emigrate
- conscience
42 Clues: fan • hero • fall • death • brave • prison • to act • to kill • society • to kill • to touch • to react • takeover • peaceful • to fight • to insult • to attack • tolerance • to pester • to rise up • resistance • solidarity • to execute • to provoke • to protest • to request • conscience • eye contact • helpfulness • bomb attack • to emigrate • dictatorship • exploitation • to intimidate • civil courage • demonstration • racial hatred • self-confident • ...
WWII 2016-04-15
Across
- beginning of WWII
- town in England (air attack)
- Russian leader during WWII
- neutral state during WWII
- killing of the Jews during WWII
- end of WW2 in Europe (month)
- American troops in Hawaii
- handicapped people were killed there
Down
- concentration camp in Austria
- girl that became famous for her diary
- USA, France, GB,....
- landing of the allied troops in France
- Italian leader during WWII
- end of WWII (year)
- Russian town
- first country occupied by Hitler
- fast attack on a country
- town where 1st atomic bomb was dropped
- Japanese town
- Hitler promised the people .....
20 Clues: Russian town • Japanese town • beginning of WWII • end of WWII (year) • USA, France, GB,.... • fast attack on a country • neutral state during WWII • American troops in Hawaii • Italian leader during WWII • Russian leader during WWII • town in England (air attack) • end of WW2 in Europe (month) • concentration camp in Austria • killing of the Jews during WWII • ...
CyberSecurity Terms (Participation 3) 2023-01-28
Across
- Lots of attackers preventing users
- Tricking users to click an image
- Malware disguised as normal software
- Public internet access
- Malware that tracks you
- Bring your own device
- Attack seeking out personal info
- Malware that makes you pay
- Attack that exploits unknown vulnerability
- Making data unreadable by scrambling
- Shield for data
- Network pro learning hacking techniques
Down
- Malicious hackers
- Security keeping internet users safe
- Software that is harmful
- Software that checks for malware
- Malware that displays ads
- Media altered realistically
- Virtual private network
- Unauthorized access to sensitive info
20 Clues: Shield for data • Malicious hackers • Bring your own device • Public internet access • Malware that tracks you • Virtual private network • Software that is harmful • Malware that displays ads • Malware that makes you pay • Media altered realistically • Software that checks for malware • Tricking users to click an image • Attack seeking out personal info • ...
COMPUTER CRIMES 2024-11-10
Across
- (Denial of Service attack)
- (Fraudulent emails to trick users)
- Theft (Stealing personal information)
- (Network of infected computers)
- Horse (Malicious software disguised as legitimate)
- (Illegal copying of copyrighted material)
- (Malicious software)
- (Redirecting users to fake websites)
- (Unauthorized access to computer systems)
- (Distributed Denial of Service attack)
- (Illegal activities committed online)
- (Unsolicited email)
Down
- (Extortion using sexually explicit material)
- (Software that monitors user activity)
- Injection (Cyberattack targeting databases)
- (Harassment online)
- (Intentional damage to computer systems)
- (Tricking users into clicking malicious links)
- (Self-replicating malware)
- (Malware that encrypts data)
20 Clues: (Harassment online) • (Unsolicited email) • (Malicious software) • (Denial of Service attack) • (Self-replicating malware) • (Malware that encrypts data) • (Network of infected computers) • (Fraudulent emails to trick users) • (Redirecting users to fake websites) • Theft (Stealing personal information) • (Illegal activities committed online) • ...
COMPUTER CRIMES 2024-11-10
Across
- (Illegal copying of copyrighted material)
- (Self-replicating malware)
- (Denial of Service attack)
- (Tricking users into clicking malicious links)
- (Malicious software)
- (Harassment online)
- (Unsolicited email)
- (Illegal activities committed online)
- (Software that monitors user activity)
- (Intentional damage to computer systems)
Down
- (Redirecting users to fake websites)
- (Unauthorized access to computer systems)
- Horse (Malicious software disguised as legitimate)
- (Malware that encrypts data)
- Injection (Cyberattack targeting databases)
- (Distributed Denial of Service attack)
- Theft (Stealing personal information)
- (Extortion using sexually explicit material)
- (Network of infected computers)
- (Fraudulent emails to trick users)
20 Clues: (Harassment online) • (Unsolicited email) • (Malicious software) • (Self-replicating malware) • (Denial of Service attack) • (Malware that encrypts data) • (Network of infected computers) • (Fraudulent emails to trick users) • (Redirecting users to fake websites) • Theft (Stealing personal information) • (Illegal activities committed online) • ...
COMPUTER CRIMES 2024-11-10
Across
- (Malware that encrypts data)
- Injection (Cyberattack targeting databases)
- (Harassment online)
- (Denial of Service attack)
- (Software that monitors user activity)
- (Unauthorized access to computer systems)
- Horse (Malicious software disguised as legitimate)
- (Redirecting users to fake websites)
- (Fraudulent emails to trick users)
- (Unsolicited email)
Down
- (Harassment online)
- (Network of infected computers)
- (Distributed Denial of Service attack)
- (Illegal copying of copyrighted material)
- (Extortion using sexually explicit material)
- (Self-replicating malware)
- (Malicious software)
- (Tricking users into clicking malicious links)
- (Illegal activities committed online)
- Theft (Stealing personal information)
- (Intentional damage to computer systems)
21 Clues: (Harassment online) • (Harassment online) • (Unsolicited email) • (Malicious software) • (Self-replicating malware) • (Denial of Service attack) • (Malware that encrypts data) • (Network of infected computers) • (Fraudulent emails to trick users) • (Redirecting users to fake websites) • (Illegal activities committed online) • Theft (Stealing personal information) • ...
Walk two moons vocab 2023-01-22
Across
- Surprise attack from hidden assailants
- In a state of violent or destructive rage or frenzy
- Of supreme importance
- Quarrelsome
- Pestered
- Pranced
- Harassing
- Comfort
- Huge; gigantic
- Plentiful
Down
- One taken or held prisoner
- arteries
- White sterol found in animal fats which can cause
- Given or written by a person whose name is unknown
- Feeling under attack and hence quick to justify one's actions
- Partial or total loss of memory caused by brain injury or shock
- Deceived
- Collected or gathered together
- Hand tool with a sharp, wedged blade
- Lot; group
- Dead body
21 Clues: Pranced • Comfort • arteries • Pestered • Deceived • Harassing • Dead body • Plentiful • Lot; group • Quarrelsome • Huge; gigantic • Of supreme importance • One taken or held prisoner • Collected or gathered together • Hand tool with a sharp, wedged blade • Surprise attack from hidden assailants • White sterol found in animal fats which can cause • Given or written by a person whose name is unknown • ...
Myocardial Infarction 2022-04-25
Across
- main test for a heart attack
- the substance that is built up by fatty deposits
- common symptom of a heart attack
- medication to help treat a heart attack
Down
- medical term for a heart attack
- main way to prevent a heart attack
- what to do first if you think you're having a heart attack
- majority of cardiac deaths occur in this gender
8 Clues: main test for a heart attack • medical term for a heart attack • common symptom of a heart attack • main way to prevent a heart attack • medication to help treat a heart attack • majority of cardiac deaths occur in this gender • the substance that is built up by fatty deposits • what to do first if you think you're having a heart attack
BI416 Case study #1 Crossword 2021-10-06
Across
- Something that is feared when suffering from panic attack disorder
- Repeated episodes of panic attacks accompanied with physical manifestations. Also followed by the fear of another episode and/or the consequences such as death.
- Sensation of fast beating or pounding heart
- Avoidance of ____ is typically associated with panic attack disorder
Down
- over time panic attack episodes increase in ______
- A risk factor associated with panic attack disorder
- Past medical disorder that may increase an individuals chance of developing panic attack disorder
- A habit that may be linked to panic attacks
- Manifestation associated with tightening in chest and difficulty breathing
- Measurements indicating state of vital body functions
10 Clues: A habit that may be linked to panic attacks • Sensation of fast beating or pounding heart • over time panic attack episodes increase in ______ • A risk factor associated with panic attack disorder • Measurements indicating state of vital body functions • Something that is feared when suffering from panic attack disorder • ...
Poke X Word : Puzzle # 19 (Normal) 2022-07-02
Across
- Ability: Malevolent Charge
- Supporter: Your opponent reveals their hand. Discard up to 2 in any combination of Pokémon Tool cards, Special Energy cards, and Stadium cards from it.
- Item: Look at your face-down Prize cards. You may reveal a Basic Pokémon you find there, put it into your hand, and put this card in its place as a face-down Prize card. (If you don’t reveal a Basic Pokémon, put this card in the discard pile.) Then, shuffle your face-down Prize cards.
- Attack: Rainbow Flavor
- Attack: Vengeful Cut
Down
- Attack: Ominous Numbers
- Ability: Ancient Wisdom
- Ability: Reassuring Dam
- Attack: Raging Fin
- Attack: Star Raid
10 Clues: Attack: Star Raid • Attack: Raging Fin • Attack: Vengeful Cut • Attack: Rainbow Flavor • Attack: Ominous Numbers • Ability: Ancient Wisdom • Ability: Reassuring Dam • Ability: Malevolent Charge • Supporter: Your opponent reveals their hand. Discard up to 2 in any combination of Pokémon Tool cards, Special Energy cards, and Stadium cards from it. • ...
WWII 2016-04-15
Across
- town in England (air attack)
- Japanese town
- town where 1st atomic bomb was dropped
- killing of the Jews during WWII
- beginning of WWII
- Russian leader during WWII
- handicapped people were killed there
Down
- Italian leader during WWII
- first country occupied by Hitler
- landing of the allied troops in France
- concentration camp in Austria
- neutral state during WWII
- Hitler promised the people .....
- girl that became famous for her diary
- USA, France, GB,....
- end of WWII (year)
- Russian town
- fast attack on a country
- American troops in Hawaii
- end of WW2 in Europe (month)
20 Clues: Russian town • Japanese town • beginning of WWII • end of WWII (year) • USA, France, GB,.... • fast attack on a country • neutral state during WWII • American troops in Hawaii • Italian leader during WWII • Russian leader during WWII • town in England (air attack) • end of WW2 in Europe (month) • concentration camp in Austria • killing of the Jews during WWII • ...
Word Gen review 10-12 Portuguese 2023-05-02
Across
- harmful treatment
- of or involving the body
- to influence, control, or persuade with skill and often dishonesty
- to show; to display
- huge
- unavoidable
- to inflict harm
- to argue against; to deny
- a causa de something that makes something else happen
- large; important
- honesty; morality
- to persuade
Down
- to attack suddenly or violently
- an attack
- enough; adequate
- buildup; collection
- to misrepresent or give false meaning to
- to make something happen
- to add to
- unwilling; hesitant
- an object or collection of objects put on display
- to show; to display
- continuing despite difficulty; relentless; continuing longer than expected
- defensible; true
24 Clues: huge • an attack • to add to • unavoidable • to persuade • to inflict harm • enough; adequate • large; important • defensible; true • harmful treatment • honesty; morality • buildup; collection • to show; to display • unwilling; hesitant • to show; to display • of or involving the body • to make something happen • to argue against; to deny • to attack suddenly or violently • ...
COMPUTER CRIMES 2024-11-10
Across
- (Harassment online)
- Injection (Cyberattack targeting databases)
- (Software that monitors user activity)
- (Distributed Denial of Service attack)
- (Malware that encrypts data)
- (Unauthorized access to computer systems)
- (Fraudulent emails to trick users)
- Horse (Malicious software disguised as legitimate)
- (Malicious software)
- (Extortion using sexually explicit material)
Down
- (Denial of Service attack)
- (Illegal copying of copyrighted material)
- (Tricking users into clicking malicious links)
- (Illegal activities committed online)
- Theft (Stealing personal information)
- (Self-replicating malware)
- (Intentional damage to computer systems)
- (Redirecting users to fake websites)
- (Unsolicited email)
- (Network of infected computers)
20 Clues: (Harassment online) • (Unsolicited email) • (Malicious software) • (Denial of Service attack) • (Self-replicating malware) • (Malware that encrypts data) • (Network of infected computers) • (Fraudulent emails to trick users) • (Redirecting users to fake websites) • (Illegal activities committed online) • Theft (Stealing personal information) • ...
week 5 2025-12-17
Across
- coming friday
- shot up a beach
- had a long gun
- in browns university
- parents i love you
- when boat caught on fire
- are happenings a lot this year
- attack one of the shooters
- largest snow fall
- is very cold
- as a school gets shoot up
Down
- might attack on new years eve
- people under flood watch
- ruining holidays
- at a beach in australia
- safed fisherman
- lost there parents at a shoot out
- found her parents dead
- lawmakers fight
- did a candle light
- is off to a fast start
21 Clues: is very cold • coming friday • had a long gun • shot up a beach • safed fisherman • lawmakers fight • ruining holidays • largest snow fall • parents i love you • did a candle light • in browns university • found her parents dead • is off to a fast start • at a beach in australia • people under flood watch • when boat caught on fire • as a school gets shoot up • attack one of the shooters • ...
Types of Social Engineering Tactics 2022-05-11
Across
- A security exploit that compromises a site that a targeted victim visits to gain access to the victim's computer and network.
- The perpetrator usually promises a victim a reward in return for sensitive information or knowledge of its whereabouts.
- This attack centers around an exchange of information or service to convince the victim to act.
- An attack in which the attacker creates a scenario to try and convince the victim to give up valuable information, such as a password.
- The fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
- A type of monitoring software designed to record keystrokes made by a user.
- Thieves trick victims into sending sensitive data to the wrong person, this is usually achieved through spoofing an email address of someone within the victim's company.
- A category of attacks that includes ransomware, victims are sent an urgently-worded message and tricked into installing malware on their device(s).
- A type of romance scam in which scammers create fake online dating and social media profiles using attractive stolen photos.
Down
- A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email.
- Occurs when a cyber criminal tries to trick victims into disclosing their information or even giving them direct access to the victim's computer via telephone.
- This attack targets individuals who can give the criminal physical access to a secure building or area.
- When a scammer inserts a malicious code into a webpage, causing a pop-up window that has flashing colours and alarming sounds.
13 Clues: A type of monitoring software designed to record keystrokes made by a user. • This attack centers around an exchange of information or service to convince the victim to act. • A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email. • ...
9/11 CrossWord. 2014-09-25
Across
- The site of the world.
- Who abuses a power of a high leadership and has a very high violent rate against other countries.
- The God of the Islamic religion in which case many people thought that they,d have to die for Alla to get into Heaven.
- The year of 9/11 was.
- The ring leader of 9/11
- Tried to help guard and try to pick up evidence from the crime scene.
- Helping with the FBI investigation with the 9/11 attack.
- The height of 1,368 and 1,362 feet tall and over 110 stories tall.
- When many people had perished and two towers attacked.
- What was held almost within days after the 9/11 attack to help the family/friends/ and loved ones cope with many people pershing.
Down
- Who takes a vehicle or that is moving.
- An organizational approach to protecting us from terrorists.
- The council who had plotted 9/11.
- What religion was mostly made up of ____________ which helped with 9/11 attack.
- Who had tried to take credit for the attack.
- An organized fundamentalist group formed by the Islamic people.
- Who was the president when 9/11 had happened.
- The news coverage doubled and it was all over the what.
- When many loved ones/family members/friends and etc died unexpectedly.
19 Clues: The year of 9/11 was. • The site of the world. • The ring leader of 9/11 • The council who had plotted 9/11. • Who takes a vehicle or that is moving. • Who had tried to take credit for the attack. • Who was the president when 9/11 had happened. • When many people had perished and two towers attacked. • The news coverage doubled and it was all over the what. • ...
Volleyball 2023-10-25
Across
- the person assigned to run the team
- the way a rally is started
- Backrow player who also has the opportunity to hit
- attack made by front row player
- The person who makes subs and assists order
- a part of volleyball off the court, helps the team with organization
- Amateur level of highschool volleyball
Down
- The main net defense focusing on quick and drawing attacks
- Wing spiker that gives a third opportunity for attack
- Main point of attack, the ace plays this position
- The highest highschool level of play
- The person who makes all final calls
- the name of a non-touched spike
- another word for 'bump' or 'pass'
- defensive specialist who only plays in the back row
- defensive touch from a spike
16 Clues: the way a rally is started • defensive touch from a spike • the name of a non-touched spike • attack made by front row player • another word for 'bump' or 'pass' • the person assigned to run the team • The highest highschool level of play • The person who makes all final calls • Amateur level of highschool volleyball • The person who makes subs and assists order • ...
9/11 Facts 2022-10-11
Across
- - The "one world trade center" was the ___ of the memorial
- - Admitted that the terrorists were "always seemed to be one step ahead"
- A company in the South Tower (Network)
- - The one tree that survived the attack (type)
- The day before the attack
- - The one world trade center serves as an ___
- The group responsible for 9/11
- - Daniel Libeskind was this nationality
- - Were Al Qaeda was headquartered
Down
- - what the survivor tree represents
- - Was in charge of looking for the missing planes
- - Built in the same place as the towers
- - Invited multiple architects to come up with designs
- - dedicated to the people that died from exposure to toxins
- - First name of person responsible for the attack
- The day of the week 9/11 occurred
16 Clues: The day before the attack • The group responsible for 9/11 • The day of the week 9/11 occurred • - Were Al Qaeda was headquartered • - what the survivor tree represents • A company in the South Tower (Network) • - Built in the same place as the towers • - Daniel Libeskind was this nationality • - The one world trade center serves as an ___ • ...
Early Battles of WWII 2020-04-22
Across
- Canal that was vitally important for the Allies
- German Submarines used in Battle of the Atlantic
- Japanese General Hideki _______ helped plan the attack on U.S
- German and Italian forces fighting in Africa
- German code system broken by the British
- December 7th, 1941 attack on U.S.
- Operation _______, name for invasion of North Africa
- U.S. joined the ____________ powers.
Down
- Key battle in Egypt-British Won
- Tactic used by the U-boats to attack Convoys
- General for the U.S. in North Africa
- boats traveled together in these for protection
- German General known as the "Desert Fox"
- Technology used to detect u-boats
14 Clues: Key battle in Egypt-British Won • December 7th, 1941 attack on U.S. • Technology used to detect u-boats • General for the U.S. in North Africa • U.S. joined the ____________ powers. • German code system broken by the British • German General known as the "Desert Fox" • Tactic used by the U-boats to attack Convoys • German and Italian forces fighting in Africa • ...
DO NOW: CH15 WW2 L1-4 2025-04-07
Across
- giving up military weapons
- a camp where Japanese Americans were held during WW2
- across the ocean
- seeking to control all aspects of life through dictatorial control
- money
- object of an attack
Down
- protective measures taken by civilians in case of attack
- fast sudden attack by massed forces
- hostility toward or discrimination against Jews
- a leader who has absolute power and rules a nation by force
- the policy of giving in to the demands of others in an effort to keep peace
- not siding with either party in a disagreement
- to make scarce items available to people on a limited basis
- to join together
14 Clues: money • to join together • across the ocean • object of an attack • giving up military weapons • fast sudden attack by massed forces • not siding with either party in a disagreement • hostility toward or discrimination against Jews • a camp where Japanese Americans were held during WW2 • protective measures taken by civilians in case of attack • ...
Volleyball Game 2024-12-17
10 Clues: Unreturnable serve • Offensive play to score • Setter’s surprise attack • Sets the ball for attackers • Powerful strike over the net • Starting the play with a hit • Defensive back-row specialist • Stopping an opponent's attack • Receiving and directing the ball • Saving a ball from hitting the court
Types of Social Engineering Tactics 2022-05-11
Across
- A security exploit that compromises a site that a targeted victim visits to gain access to the victim's computer and network.
- The perpetrator usually promises a victim a reward in return for sensitive information or knowledge of its whereabouts.
- This attack centers around an exchange of information or service to convince the victim to act.
- An attack in which the attacker creates a scenario to try and convince the victim to give up valuable information, such as a password.
- The fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
- A type of monitoring software designed to record keystrokes made by a user.
- Thieves trick victims into sending sensitive data to the wrong person, this is usually achieved through spoofing an email address of someone within the victim's company.
- A category of attacks that includes ransomware, victims are sent an urgently-worded message and tricked into installing malware on their device(s).
- A type of romance scam in which scammers create fake online dating and social media profiles using attractive stolen photos.
Down
- A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email.
- Occurs when a cyber criminal tries to trick victims into disclosing their information or even giving them direct access to the victim's computer via telephone.
- This attack targets individuals who can give the criminal physical access to a secure building or area.
- When a scammer inserts a malicious code into a webpage, causing a pop-up window that has flashing colours and alarming sounds.
13 Clues: A type of monitoring software designed to record keystrokes made by a user. • This attack centers around an exchange of information or service to convince the victim to act. • A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email. • ...
Cybersecurity Unit 8 2026-02-13
Across
- multiple systems under the control of the attacker are used in a coordinated attack
- this type of hacker does not have permission and hacking in a criminal manner
- opens a secure connection with another computer
- An attack that prevents a system or server from functioning normally
- opens a port to listen to incoming connections
- this type of access point is installed on a secure network without explicit authorization
- displays the IP address for the device
- sends packets to another device to test connectivity
- testing the effectiveness of security controls or find vulnerabilities in software
- this type of attack is where the victim connects to a rogue access point instead of the legitimate one
- does defensive pentesting
- this hacker often has good intentions, but they don't have permission to hack
- a tool that disguises your actual IP address and encrypts internet traffic between a device and a server
Down
- this type of hacker has good intentions and received permission to hack
- pulling email, contacts, passwords and other data off the device
- an attack where the attacker poses as another by falsifying data to gain access to target systems
- a technology that allows computers to remember IP addresses with their corresponding domain names
- eavesdropping on messages
- tool to monitor incoming and outgoing network connections
- does offensive pentesting
- spying on your device by gaining access and then installing a backdoor for future access
- pushing unsolicited messages onto a device using Bluetooth
22 Clues: eavesdropping on messages • does offensive pentesting • does defensive pentesting • displays the IP address for the device • opens a port to listen to incoming connections • opens a secure connection with another computer • sends packets to another device to test connectivity • tool to monitor incoming and outgoing network connections • ...
Vocabulary Final Exam #1-5 2023-10-29
Across
- Being disappointed or angry by a failure or mistake.
- Paying too much attention to small details.
- To continue or go on for too long.
- To put yourself between two things in order to stop something.
- The moving/migration of a big group from a place to another.
- An action in a situation that is intended to achieve an advantage.
- A large group of people standing close together for the purpose of defense or an attack.
- Of a son or daughter.
- To show or state that someone is not guilty of something.
- Not wanting or not able to believe something.
- A person who is in charge to guard something.
- A small and quick attack from a military force.
- An unpleasant situation that you can't get out of.
Down
- Being confident and positive.
- The ability get back up after something difficult or bad happened.
- To attack or hurt someone violently.
- To be happy or without worry.
- To get or earn something, often with difficulty.
- The full force of something like an attack.
- To argue or disagree.
- To help something or someone that is suffering or in need.
- The combining of different groups for a reason.
- An arrangement to meet up at a particular place and time.
- Expecting something to be obeyed without any questions.
- A person who suffers or died due to their religion or beliefs.
25 Clues: To argue or disagree. • Of a son or daughter. • Being confident and positive. • To be happy or without worry. • To continue or go on for too long. • To attack or hurt someone violently. • Paying too much attention to small details. • The full force of something like an attack. • Not wanting or not able to believe something. • A person who is in charge to guard something. • ...
Types of Social Engineering Tactics 2022-05-11
Across
- A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email.
- The perpetrator usually promises a victim a reward in return for sensitive information or knowledge of its whereabouts.
- A category of attacks that includes ransomware, victims are sent an urgently-worded message and tricked into installing malware on their device(s).
- A type of romance scam in which scammers create fake online dating and social media profiles using attractive stolen photos.
- A security exploit that compromises a site that a targeted victim visits to gain access to the victim's computer and network.
Down
- This attack targets individuals who can give the criminal physical access to a secure building or area.
- Thieves trick victims into sending sensitive data to the wrong person, this is usually achieved through spoofing an email address of someone within the victim's company.
- An attack in which the attacker creates a scenario to try and convince the victim to give up valuable information, such as a password.
- This attack centers around an exchange of information or service to convince the victim to act.
- Occurs when a cyber criminal tries to trick victims into disclosing their information or even giving them direct access to the victim's computer via telephone.
- A type of monitoring software designed to record keystrokes made by a user.
- The fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in electronic communications.
- When a scammer inserts a malicious code into a webpage, causing a pop-up window that has flashing colours and alarming sounds.
13 Clues: A type of monitoring software designed to record keystrokes made by a user. • This attack centers around an exchange of information or service to convince the victim to act. • A highly targeted phishing attack aimed at senior executives, masquerading as a legitimate email. • ...
Chapter 8 Security Plus 2024-03-20
Across
- examines the current state of an endpoint before it can connect
- Removing or dismantling a technology
- A device that distributes resources and services to devices connected to the network
- Designed to limit the spread of malware
- Automatically blocking an attack when it occurs
- Fake data that has been added to live production systems
- A physically separated network
- Known attack patterns
- A network set up with intentional vulnerabilities
Down
- A device that distributes work across a network
- The means for communication in a zero-trust architecture
- Verification of a user in a zero-trust architecture
- Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
- server within the DMZ that is used to connect two dissimilar security zones
- A user in a zero-trust architecture
- Criteria for which a website is inaccessible to users
- A network device that can forward packets across different computer networks
- Keeping multiple instances of an attack surface separate
- filtering entire domains
19 Clues: Known attack patterns • filtering entire domains • A physically separated network • A user in a zero-trust architecture • Removing or dismantling a technology • Designed to limit the spread of malware • A device that distributes work across a network • Automatically blocking an attack when it occurs • A network set up with intentional vulnerabilities • ...
Persuasive techniques 2026-02-25
Across
- Hominem Attack, An ad hominem attack criticises the person making the argument instead of the argument itself.
- An allusion is a brief reference to a well-known person, story, event, or text to support an idea.
- establishes credibility and authority
- to Fear and Insecurity, This appeal persuades by creating worry or fear about what might happen if action is not taken.
- An attack is when language is used to strongly criticise or blame a person, group, or idea.
- to Justice, An appeal to justice persuades by arguing that something is fair, right, or morally correct.
- A rebuttal is when you respond to an opposing argument and explain why it is wrong or weak.
- to the Hip Pocket, This appeal tries to persuade by focusing on money, costs, or savings.
- Hyperbole is deliberate exaggeration used to emphasise a point or create a strong reaction.
- Man Argument, A straw man argument twists or oversimplifies someone else’s argument to make it easier to attack.
- appeals to emotions and values
Down
- to Arms, A call to arms encourages people to take action or get involved in a cause.
- An anecdote is a short personal story used to make an argument more relatable or convincing.
- to Loyalty and Patriotism, This appeal persuades by encouraging pride, loyalty, or duty to a country or group.
- Generalisations make broad statements about a group or situation without considering exceptions.
- appeals to logic, facts, and reason
- An analogy explains an idea by comparing it to something else that is familiar or easy to understand.
- A fallacy is a mistake in reasoning where an argument sounds convincing but is not logical or true.
18 Clues: appeals to emotions and values • appeals to logic, facts, and reason • establishes credibility and authority • to Arms, A call to arms encourages people to take action or get involved in a cause. • to the Hip Pocket, This appeal tries to persuade by focusing on money, costs, or savings. • ...
Poke X Word : Puzzle # 13 (Hard) 2022-05-28
Across
- Item: When applying Weakness to damage from the attacks of the Pokémon this card is attached to done to your opponent’s Active Pokémon, apply it as x3.
- Ability: Blue Assist
- Item: Choose 1 of your Pokémon, and then flip a coin until you get tails. For each heads, heal 40 damage from that Pokémon.
- Attack: Wide Wing
- Pokedex Entry: It stores static electricity in its fur for discharging. It gives off sparks if a storm approaches.
- Ability: Voltage Beat
Down
- Attack: Honey Rush
- Ability: Happy Match
- Attack: Cheerful Charge
- Attack: Dancing Shuriken
- Pokedex Entry: Its cry leaves a lasting headache if heard for too long. It moves so quickly that it is almost invisible.
- Ability: Thunderous Awakening
12 Clues: Attack: Wide Wing • Attack: Honey Rush • Ability: Happy Match • Ability: Blue Assist • Ability: Voltage Beat • Attack: Cheerful Charge • Attack: Dancing Shuriken • Ability: Thunderous Awakening • Pokedex Entry: It stores static electricity in its fur for discharging. It gives off sparks if a storm approaches. • ...
Cardi/Resp Crossword - Anthony Garcia 2024-04-29
Across
- - pollen, dust, pet dander
- - high arterial blood pressure
- - pulse in neck
- - determines severity of asthma attack
- - hardened arteries
- - infection of alveoli and bronchioles
Down
- infarction - heart attack
- - shortness of breath
- pulse in foot
- - body temperature being over 102 degrees F
- - chest pain
- - pulse in wrist
- - Upper Respiratory Tract Infections
- - constricted bronchi
14 Clues: - chest pain • pulse in foot • - pulse in neck • - pulse in wrist • - hardened arteries • - shortness of breath • - constricted bronchi • infarction - heart attack • - pollen, dust, pet dander • - high arterial blood pressure • - Upper Respiratory Tract Infections • - determines severity of asthma attack • - infection of alveoli and bronchioles • ...
Pearl Harbor 2013-09-18
Across
- Also known as the United States.
- Pearl Habour was a day remembered in ________.
- People who were killed or injured in the war.
- 7th________1941.
- Number of Japanese aircraft carriers.
Down
- Launched attacks against America.
- Japan lost 29 of these.
- President at the time of the attack
- The attack on Pearl ________.
- Location of Pearl Harbour.
- War II The attack on Pearl Harbour forced America into_______.
11 Clues: 7th________1941. • Japan lost 29 of these. • Location of Pearl Harbour. • The attack on Pearl ________. • Also known as the United States. • Launched attacks against America. • President at the time of the attack • Number of Japanese aircraft carriers. • People who were killed or injured in the war. • Pearl Habour was a day remembered in ________. • ...
Pearl Harbor 2013-09-18
Across
- Location of Pearl Harbour.
- Also known as the United States.
- Pearl Habour was a day remembered in ________.
- President at the time of the attack
- Launched attacks against America.
- 7th________1941.
- War II The attack on Pearl Harbour forced America into_______.
Down
- The attack on Pearl ________.
- People who were killed or injured in the war.
- Number of Japanese aircraft carriers.
- Japan lost 29 of these.
11 Clues: 7th________1941. • Japan lost 29 of these. • Location of Pearl Harbour. • The attack on Pearl ________. • Also known as the United States. • Launched attacks against America. • President at the time of the attack • Number of Japanese aircraft carriers. • People who were killed or injured in the war. • Pearl Habour was a day remembered in ________. • ...
Dragon Ball Z/S: Attacks, Characters and More 2022-10-06
Across
- Back to the future
- Bald Dude Two
- Purple Skinny Cat
- Protagonist
- Grower of the beans(cat)
- final__ (Vegeta Attack)
- What is Goku's power level over?
- Their version of "chi"
- Vegeta's Wife
- Krillin's Wife's Number
- Goku+Vegeta Dancing
- BIG SAIYAN
- Little green real name?
- Probably Racist Genie
- what species is goku?
- Dude Piccolo Fused with
- Obvi gay Angel
- Goku reaches this level when Krillin dies
- Product of Dr.Gero
- Namekian Friend
- who keeps dying all the time
- Yass queen angel
- Bald Dude Three
- King Kai's monkey
- Gohan reaches this against Cell
- Also Known as room of space and time
- Potara Earring Fusion
- Great Lord
- Goku's brother
- Goku's Second Born
Down
- Goku's "real name"
- Magic Dragon
- ___Gun (Vegeta's Attack)
- Goku Reaches this in the Majin Buu Saga
- Goku's First Born
- Goku's Rival
- Turns people into candy
- Goku's classic attack
- Other dude piccolo fused with
- King Kai's Cricket
- Goten+Trunks
- currency?
- Lil saiyan
- Learned from King Kai
- Doctor Gero's Invention
- Goku's Wife
- Bald Dude One
- what does trunks' ship say
- Vegeta's Daughter
- first saga
- Bulma's Company
- Healing bean?
- OmniKing/Grand Who?
- Goku's other attack
- Pervy Bald Dude
- second saga
- Assassin
- How many dragon balls
- in TFS, What crime does Krillin Commit
- Device that reads power levels
60 Clues: Assassin • currency? • Lil saiyan • BIG SAIYAN • first saga • Great Lord • Protagonist • Goku's Wife • second saga • Magic Dragon • Goku's Rival • Goten+Trunks • Bald Dude Two • Vegeta's Wife • Bald Dude One • Healing bean? • Obvi gay Angel • Goku's brother • Namekian Friend • Bulma's Company • Bald Dude Three • Pervy Bald Dude • Yass queen angel • Goku's First Born • Purple Skinny Cat • Vegeta's Daughter • King Kai's monkey • ...
Human conflict - agb 2020-12-09
Across
- the P in POW
- war between factions without a country: _____ war
- unintended destruction: ___________ damage
- a temporary cessation of hostilities
- a small, irregular force of combatants
- missiles, shells, and land mines
- a person who has been forced to flee from hostilities
- soldiers who fight on foot
- a robotic aircraft
- weapons that fire explosive shells over distances
- soldiers whose job it is to maintain the peace by keeping combatants apart
- an attack on a city in which the city is surrounded and bombarded over a period of time
- the place where two armies face each other: the _____ line
Down
- the destruction of bridges, railroads, or communication by agents behind enemy lines
- a short attack with limited objectives
- a person who is engaged in fighting
- an attack made by soldiers who are hiding
- an explosive that blows up when stepped on
- the branch of the military responsible for guarding a nation's air space
- an attack meant to prevent another country from attacking first: _____ strike
- tanks and other mobile weapons
- the act of spying or intelligence gathering
- a branch of the military responsible for protecting a nation's seas
- using force to prevent people or materials from going into an area
- a permanent cessation of hostilities
- the number of people killed in fighting: death ____
- a person who is killed or injured during hostilities
- hostile or aggressive
- lay down your arms and quit fighting
29 Clues: the P in POW • a robotic aircraft • hostile or aggressive • soldiers who fight on foot • tanks and other mobile weapons • missiles, shells, and land mines • a person who is engaged in fighting • a temporary cessation of hostilities • a permanent cessation of hostilities • lay down your arms and quit fighting • a short attack with limited objectives • ...
Soal PJOK M.Haris Al Fatih 2025-11-30
Across
- coach strategy talk
- jump to start the game
- action of stopping opponent's spike
- soft attack over the blockers
- basic silat stance
- when both teams hit ball many times
- high ball for spiker
- throwing technique
- the net violation
- a shot made close to the basket
- competition arena
- line seperating front and back zone
- penalty for illegal contact
- long pass to setter
- half court defensive sytem
- the action of bouncing ball while moving
- shot taken from free throw line
- point obtained from strike
- kick technique
- when a player grabs the ball after a missed shot
- player wearing different jersey
- movement pattern
- toucing ball twice in a row
- quick offensive attack
Down
- back row attack
- attack using hand in silat
- five set match sytem
- scoring shot worth three points
- defensive save using forearms
- line between two halves
- server mistake
- blocking with the foot
- losing the ball to the opponent
- rotation direction
- hard downward hit
- out of bound area
- defensive guarding style
- ball exchange between teammates
- point scored with a serve
- two points shot
- the first contack to start a rally
- the tall player near the basket
- protection body armor
- deffensive move in silat
- team discussion
- the person who controls the offense
- when a ball goes out of court
- a violation of taking too many steps
- a defensive move to stop a shot
49 Clues: server mistake • kick technique • back row attack • two points shot • team discussion • movement pattern • hard downward hit • out of bound area • the net violation • competition arena • basic silat stance • rotation direction • throwing technique • coach strategy talk • long pass to setter • five set match sytem • high ball for spiker • protection body armor • jump to start the game • ...
Pearl Habor Crossword Puzzle 2025-12-04
Across
- How many ships were present during the attack?
- What country attacked Pearl Harbor?
- How many waves was the Japanese attack?
- What are the doors called to prevent water from entering a ship but traps both the person and water inside?
- What supplies did US cutoff trade with Japan?
- How many Americans died? 2,40_
- and Dutch Indies Where did Japan plan to conquer to get oil?
Down
- What country did Japan invade and conquer in 1931?
- How many months did it take for the US to recover from the attack of Pearl Harbor?
- What did the commander ignore and thought was unimportant?
- Britain and the US both declared war on who?
- The term of not being involved or siding in war.
- What's the most effective way to attack ships?
- Where did the US Navy move to from San Fransisco?
14 Clues: How many Americans died? 2,40_ • What country attacked Pearl Harbor? • How many waves was the Japanese attack? • Britain and the US both declared war on who? • What supplies did US cutoff trade with Japan? • How many ships were present during the attack? • What's the most effective way to attack ships? • The term of not being involved or siding in war. • ...
Chapter 8 Security Plus 2024-03-20
Across
- examines the current state of an endpoint before it can connect
- Removing or dismantling a technology
- A device that distributes resources and services to devices connected to the network
- Designed to limit the spread of malware
- Automatically blocking an attack when it occurs
- Fake data that has been added to live production systems
- A physically separated network
- Known attack patterns
- A network set up with intentional vulnerabilities
Down
- A device that distributes work across a network
- The means for communication in a zero-trust architecture
- Verification of a user in a zero-trust architecture
- Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
- server within the DMZ that is used to connect two dissimilar security zones
- A user in a zero-trust architecture
- Criteria for which a website is inaccessible to users
- A network device that can forward packets across different computer networks
- Keeping multiple instances of an attack surface separate
- filtering entire domains
19 Clues: Known attack patterns • filtering entire domains • A physically separated network • A user in a zero-trust architecture • Removing or dismantling a technology • Designed to limit the spread of malware • A device that distributes work across a network • Automatically blocking an attack when it occurs • A network set up with intentional vulnerabilities • ...
Gout/Pseudogout 2023-06-15
Across
- The first _ is often the first joint affected in gout
- Prolonged _ is necessary but not sufficient for development of gout
- Sample that needs to diagnose gout
- Precursor of uric acid
- Gout is an inflammatory reaction to the presence of _ crystals
- 1/3 of the body's uric acid pool derives from here
- Xanthine oxidase inhibitor (reduced production of uric acid)
- The alternative name for pseudogout
- Pain level of an acute attack
- Onset of acute inflammatory arthritis
- Wrist, knee, shoulder and _ are the common joints affected in pseudogout
Down
- What changes can a patient make to help prevent gout?
- Levels of 12 across can be described as _
- Metabolised to form 2/3 of the body's uric acid pool
- Can precipitate a gout attack (dehydration and infection)
- 14 across down can cause a temporary elevation in this if given too soon after an attack
- Pseudogout is characterised by elevated levels of extracellular _
- Quick and easy pain relief for gout
- An important differential on presentation
19 Clues: Precursor of uric acid • Pain level of an acute attack • Sample that needs to diagnose gout • Quick and easy pain relief for gout • The alternative name for pseudogout • Onset of acute inflammatory arthritis • Levels of 12 across can be described as _ • An important differential on presentation • 1/3 of the body's uric acid pool derives from here • ...
Gout/Pseudogout 2023-06-15
Across
- The first _ is often the first joint affected in gout
- Prolonged _ is necessary but not sufficient for development of gout
- Sample that needs to diagnose gout
- Precursor of uric acid
- Gout is an inflammatory reaction to the presence of _ crystals
- 1/3 of the body's uric acid pool derives from here
- Xanthine oxidase inhibitor (reduced production of uric acid)
- The alternative name for pseudogout
- Pain level of an acute attack
- Onset of acute inflammatory arthritis
- Wrist, knee, shoulder and _ are the common joints affected in pseudogout
Down
- What changes can a patient make to help prevent gout?
- Levels of 12 across can be described as _
- Metabolised to form 2/3 of the body's uric acid pool
- Can precipitate a gout attack (dehydration and infection)
- 14 across down can cause a temporary elevation in this if given too soon after an attack
- Pseudogout is characterised by elevated levels of extracellular _
- Quick and easy pain relief for gout
- An important differential on presentation
19 Clues: Precursor of uric acid • Pain level of an acute attack • Sample that needs to diagnose gout • Quick and easy pain relief for gout • The alternative name for pseudogout • Onset of acute inflammatory arthritis • Levels of 12 across can be described as _ • An important differential on presentation • 1/3 of the body's uric acid pool derives from here • ...
Chapter 9 Crossword 2024-10-24
Across
- examines the current state of an endpoint before it can connect
- Removing or dismantling a technology
- A device that distributes resources and services to devices connected to the network
- Designed to limit the spread of malware
- Automatically blocking an attack when it occurs
- Fake data that has been added to live production systems
- A physically separated network
- Known attack patterns
- A network set up with intentional vulnerabilities
Down
- A device that distributes work across a network
- The means for communication in a zero-trust architecture
- Verification of a user in a zero-trust architecture
- Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
- server within the DMZ that is used to connect two dissimilar security zones
- A user in a zero-trust architecture
- Criteria for which a website is inaccessible to users
- A network device that can forward packets across different computer networks
- Keeping multiple instances of an attack surface separate
- filtering entire domains
19 Clues: Known attack patterns • filtering entire domains • A physically separated network • A user in a zero-trust architecture • Removing or dismantling a technology • Designed to limit the spread of malware • A device that distributes work across a network • Automatically blocking an attack when it occurs • A network set up with intentional vulnerabilities • ...
Pearl Harbor 2025-12-08
Across
- Ships ammo was ____ up to prevent sabotage
- Who did Japan invade and conquered in 1931?
- was the water shallow or deep?
- Japan though they would ____ down America with the bombing of Pearl Harbor
- How many aircraft attacked?
- How many American battle ships were sunk
- How many Japanese ships were left behind to produce extra radio traffic
- Where is Pearl Harbor located
- what camps were Japanese Americans forced to go to?
Down
- how many Americans were killed?
- The one Japanese soldier who was captured?
- Whats the most effective way to attack ships?
- The day of the attack?
- two materials Japan needed?
- Naval intelligence lost Japanese carriers ___ amount of time
- Which one of the three waves of Japans attack was canceled
- Japan believed they were the right full _____ of Asia
- How many air crafts carriers were not in Pearl Harbor during the attack?
- What military force did the US expand that threatened Japan?
- how many months did it take America to recover from the attac?
20 Clues: The day of the attack? • two materials Japan needed? • How many aircraft attacked? • Where is Pearl Harbor located • was the water shallow or deep? • how many Americans were killed? • How many American battle ships were sunk • Ships ammo was ____ up to prevent sabotage • The one Japanese soldier who was captured? • Who did Japan invade and conquered in 1931? • ...
Hand and Foot Techniques 2024-06-24
12 Clues: Back kick • High punch • Side punch • Middle punch • Roundhouse kick • Side thrust kick • Knife hand attack • Front thrust kick • Inside/outside kick • Low block, front stance • High block, front stance • Reverse knife hand attack
Brawl stars 2022-12-29
14 Clues: Has a book • Candy queen • The Buzzassin • Janet’s friend • Bonnie’s friend • first chromatic • super insta-charge • A ticking time bomb • attacks using a jackhammer • gadget: gives 2k hp sheild • voice actor: Brian Stivale • has a super: Jack in the box • Has a attack called big sting • Has an attack: Finger pointer
Fantastic Characters Lessons 1-4 Crossword Evaluation 2022-11-23
Across
- Person living in the wilderness.
- Human predecessor.
- Attack in the past simple.
- People found guilty of a crime.
- Synonym of bandit.
- Synonym of migrants.
- People who travel for visiting sights.
- Sudden violent attack.
- Expeled from a country.
Down
- Send in the past simple.
- Country in southern hemisphere.
- People who settle outside own country.
- Gunfight.
- Judgement of individuals.
- Robber.
15 Clues: Robber. • Gunfight. • Human predecessor. • Synonym of bandit. • Synonym of migrants. • Sudden violent attack. • Expeled from a country. • Send in the past simple. • Judgement of individuals. • Attack in the past simple. • Country in southern hemisphere. • People found guilty of a crime. • Person living in the wilderness. • People who settle outside own country. • ...
Heart Health 2022-02-09
11 Clues: Attack • Cessation • Has a trunk • Body Health • Brain attack • Flying mammal • Large marsupial • Emotional Health • Man's best friend • Likes to chase mice • fruits and vegetables
Network Threats 2015-03-02
Across
- What threat usually originates from an employee
- Any attack or weakness on a network
- An attack that steals company or customer information.
- Can become an internal network threat if unhappy.
- A programme or code that is designed to prevent a computer or application working correctly
- Someone that uses their knowledge and programmes to access a network without permission
Down
- "Script kiddies" use this type of attack
- A Reconnaissance attack is described as this.
- This threat prevents legitimate access to resources such as websites
- This programme or code can replicate throughout the network without any intervention
- Creates a point of entry to a system without the user knowing
- Which threat type does not begin on the company network
12 Clues: Any attack or weakness on a network • "Script kiddies" use this type of attack • A Reconnaissance attack is described as this. • What threat usually originates from an employee • Can become an internal network threat if unhappy. • An attack that steals company or customer information. • Which threat type does not begin on the company network • ...
Module 2 Puzzle 2021-09-29
Across
- A sudden and unintended failure
- Software that monitors computer usage
- Software that appears to have a valid and benign purpose but actually has another nefarious purpose
- Using the Internet to defraud someone
- The response a server sends back to a connection request from a client
- An address used to test a machine’s own network card,127.0.0.1
- A type of attack against a TCP/IP stack based on using fragmented packets
- An attack that involves loading a buffer with more data than it is designed to hold
- A term for a seller putting in fake bids on his own item to drive up the price
- The process of collecting enough personal information on someone so that you might pose as that person.
- A numerical designation for a connection point on a computer
Down
- Using interpersonal skills to extract information about a computer system and its security
- Using the Internet to harass someone
- Hacking conducted for ideological purposes
- A method to prevent denial-of-service attacks that actually uses a type of cookie to authenticate the client’s connection
- The act of encrypting a message
- A DOS attack in which the target is flooded with connection requests
- To send an extremely large packet to a target. For some older systems, this would cause the target to crash
- Phony email spoofing legitimate email to steal information
- A specific type of distributed denial-of-service attack
20 Clues: A sudden and unintended failure • The act of encrypting a message • Using the Internet to harass someone • Software that monitors computer usage • Using the Internet to defraud someone • Hacking conducted for ideological purposes • A specific type of distributed denial-of-service attack • Phony email spoofing legitimate email to steal information • ...
Chapter 27 Lesson 2 2025-03-20
Across
- series of bunkers along the French-German border
- Hitler's last obstacle of conquering western Europe was what country
- outlined goals for post-Nazism world
- created by isolationists advocating non-intervention in Europe's issues
- on June 14, 1940, German troops marched on what city
- what country did Stalin try to establish military bases on got mad that led to war
- where did the allies retreat after German invasion of Belgium
- Japanese Prime Minister who was seeking talks with the US to come up with some sort of an agreement
- fast, sudden attack by massed forces
- giving up military weapons
- this is what Stalin ordered after Germany attacked
Down
- allowed the US to sell, lend, or lease weapons to any country crucial for US defense
- instituted the first US peacetime draft
- after Germany's failure to take over Great Britain, Hitler turned east and tried to take what country
- US joins the ____ in the fight against the Axis Powers after the attack on Pearl Harbor
- Hitler's invasion of what country triggered WWII
- on December 7, 1941, Japan led a surprise attack on what US military base
- what leader extended their influence in Latvia, Lithuania, and Estonia
- who won the election of 1940 (last name only)
- when Germany turned west they invaded ____ and Belgium
- in April of 1940 Germany led a surprise attack on Denmark and ____
- in 1938, Congress increased the size of the US ____
22 Clues: giving up military weapons • outlined goals for post-Nazism world • fast, sudden attack by massed forces • instituted the first US peacetime draft • who won the election of 1940 (last name only) • series of bunkers along the French-German border • Hitler's invasion of what country triggered WWII • this is what Stalin ordered after Germany attacked • ...
Famous battles 2014-10-13
Across
- a napoleonic battle and a victory against russia
- Famous air battle in ww1
- a small island held by british in ww1
- a allied attack on july 6th, 1944
- a allied naval attack on the japanese fllet in ww2
- Spot for ANZAC landings
- an american invasion on and island near japan in ww2
Down
- famous british battle in ww1
- british cavalry charge in crimea
- Napoleons last battle
- mass attack by commonwealth forces in north africa in ww2
- Famous french battle in ww1
12 Clues: Napoleons last battle • Spot for ANZAC landings • Famous air battle in ww1 • Famous french battle in ww1 • famous british battle in ww1 • british cavalry charge in crimea • a allied attack on july 6th, 1944 • a small island held by british in ww1 • a napoleonic battle and a victory against russia • a allied naval attack on the japanese fllet in ww2 • ...
Chapter 9 Security Plus 2024-03-21
Across
- examines the current state of an endpoint before it can connect
- Removing or dismantling a technology
- A device that distributes resources and services to devices connected to the network
- Designed to limit the spread of malware
- Automatically blocking an attack when it occurs
- Fake data that has been added to live production systems
- A physically separated network
- Known attack patterns
- A network set up with intentional vulnerabilities
Down
- A device that distributes work across a network
- The means for communication in a zero-trust architecture
- Verification of a user in a zero-trust architecture
- Serves as “bait” to threat actors and is intentionally configured with vulnerabilities
- server within the DMZ that is used to connect two dissimilar security zones
- A user in a zero-trust architecture
- Criteria for which a website is inaccessible to users
- A network device that can forward packets across different computer networks
- Keeping multiple instances of an attack surface separate
- filtering entire domains
19 Clues: Known attack patterns • filtering entire domains • A physically separated network • A user in a zero-trust architecture • Removing or dismantling a technology • Designed to limit the spread of malware • A device that distributes work across a network • Automatically blocking an attack when it occurs • A network set up with intentional vulnerabilities • ...
Beowulf Study Guide - Plot 2025-02-05
Across
- Who becomes king after Beowulf?
- Person who provokes the sleeping dragon.
- How many years/"winters" did the lord of the Shieldings suffer?
- Who was the first person Beowulf and his men met in Denmark?
- How many nights between Grendel's final attack and his mother's?
- Who died during Grendel's mother's attack?
- How many years between Beowulf's last two battles?
- What country/people lived in Hrothgar's kingdom?
- What does Unferth give Beowulf for his battle with Grendel's mother?
- "Viking funeral."
Down
- Second attacker of Heorot.
- How many men did Beowulf enlist to battle Grendel?
- Trophy from the ancient sword.
- What happens to Beowulf after the dragon battle?
- What was stolen from the dragon's barrow?
- What happened to the "ancient heirloom" after Beowulf slays Grendel's mother?
- How many men did Grendel kill on his first night/attack?
- The tale of ___, a dragon slayer, is compared to Beowulf.
- What does Beowulf do to Grendel's corpse?
19 Clues: "Viking funeral." • Second attacker of Heorot. • Trophy from the ancient sword. • Who becomes king after Beowulf? • Person who provokes the sleeping dragon. • What was stolen from the dragon's barrow? • What does Beowulf do to Grendel's corpse? • Who died during Grendel's mother's attack? • What happens to Beowulf after the dragon battle? • ...
CYBER SECURITY 2023-09-20
Across
- to steal sensitive information
- malware
- protection of computing systems and data that these systems store
- set of rules
Down
- the virtual and dynamic space created by the machine clones
- protecting info.from inauthorized parties
- attack data to web application
- malicious software
- attack uses trial & attack method
- automated process
10 Clues: malware • set of rules • automated process • malicious software • to steal sensitive information • attack data to web application • attack uses trial & attack method • protecting info.from inauthorized parties • the virtual and dynamic space created by the machine clones • protection of computing systems and data that these systems store
2nd Crossword Challenge 2024-03-11
Across
- Monstercat channel
- Japanese cakes made with glutinous rice flour
- "No, Mr Bond. I expect you to die."
- Ludeon Studios
- Papers, Please country
- (abv) Seto Kaiba dragon
- Lunar_Eclipse
Down
- Trigonometric Function
- (abv) Jay-Z and Alicia Keys music
- Prefecture of Sarthe, France
- Bismarck attack target
- WW2 Japanese attack target
- The A-Team member
- Love Live group
- (abv) Just Monika
15 Clues: Lunar_Eclipse • Ludeon Studios • Love Live group • The A-Team member • (abv) Just Monika • Monstercat channel • Trigonometric Function • Bismarck attack target • Papers, Please country • (abv) Seto Kaiba dragon • WW2 Japanese attack target • Prefecture of Sarthe, France • (abv) Jay-Z and Alicia Keys music • "No, Mr Bond. I expect you to die." • Japanese cakes made with glutinous rice flour
Pearl Harbor 2024-11-19
10 Clues: Yamamoto was an • Second of this war • President Franklin D. • The US gathered these • The attack took place in • You can still see the USS • "a date which will live in" • What did the Japanese attack • Who did the US Declare war on • Date in December the attack occurred
Art Attack 1 2022-03-10
8 Clues: a collection • think, ponder • a man-made tool • artistic, tasteful • one-sided, prejudiced • eyewitness, perceiver • bewitch, charm, enchant • person in charge of a museum
Easter Speed Attack 2022-04-15
8 Clues: The month Easter is in • First word in the title • A season famous for flowers • He hands out eggs during Easter • you keep your Easter eggs in this • This bird is a thanksgiving staple • Make the best peanut butter chocolate cups ever! • This tasty Easter candy is made out of marshmallows.
Word Attack Crossword 2013-12-03
Text: Bear Attack 2024-01-15
8 Clues: very big • not dead • sportsman • to rescue • a series of lessons • to talk with someone to get information • someone who is between 13 and 19 years old • A person who offers time and skills without pay
ATTACK ON TIATAN 2025-04-27
Game Knights D&D Rules Puzzle 1 2021-09-25
Across
- sneak attack and short swords deal damage with this die.
- the action that lets you use your weapons to harm foes. Extras of these let you do it more than once during this action.
- inflicting this condition on a foe would give you advantage, but only automatic critical hits if you are within 5 feet.
- your character is this after three failed deaths saves
- type of hit when you roll a 20 on 1d20
- this condition makes you fail ability checks requiring a certain sense AND imposes disadvantage on your attacks and advantage on attacks against you.
- maces and longswords deal damage with this die.
- this condition ends automatically if you are moved by another creature or spell away from whatever inflicted it on you.
- this condition gets worse the more of it you get, potentially causing even instant death.
- inflicting this condition will cause your target to fail ability checks tied to a sense, but otherwise does nothing to attack rolls related to the creature.
- number of death saves you lose if you take critical damage while at 0 hit points
- with this action you will not provoke attacks of opprotunity by movement
- glaves and heavy crossbows deal damage with this die.
- you can take this action to make an ally's attack against a foe next to you have advantage.
- the reach, in feet of most creatures, including larger creatures, unless otherwise specifically stated.
- You suffer an automatic critical hit if someone within 5 feet of you damages you while suffering this condition.
- while "suffering" this condition you have advantage on attack rolls and foes have disadvantage to attack you.
- your speed becomes 0 and cannot be improved while suffering this condition.
- suffering this condition gives you resistance to all damage.
Down
- when you get to roll 2d20 and keep the lowest
- amount of your movement you spend standing up from prone. (Use hypen if two words are needed).
- the cost of movement in feet while trying to move wile prone and in difficult terrain.
- this action lets you double your movement speed at the cost of your action.
- if you suffer this condition you cannot attack or otherwise harm the one who inflicted it upon you.
- you can only focus on one of these kinds of spells at once.
- when you score a critical hit you double these, but not your modifiers.
- daggers and magic missiles deal their damage with this die.
- you can only cast these kinds of spells with your action if you spend your bonus action casting a level 1 spell or higher.
- amount of your total hit die recovered on long rest (use hyphen if you need two words)
- Initiative roll is an ability check using this ability.
- a typically underground area that adventurers explore to slay monsters, find loot, and twart evil.
- reduce fire damage from *fireball* to this amount if you both pass the dexterity save AND have fire resistence.
- greataxes and witch bolt deal damage with this die.
- when you get to roll 2d20 and keep the highest
- attack rolls and saving throws are made with this die.
- You automatically fail strength and dexterity saving throws while suffering this condition.
- you may willingly inflict this condition on yourself to impose disadvantage on ranged attacks against you.
- size of hit dice for wizards in 5th edition
- the number of feet a single square on a grid map takes up when using grid rules.
- a magical monster, typically large and intelligent, and can grow to be anchient.
40 Clues: type of hit when you roll a 20 on 1d20 • size of hit dice for wizards in 5th edition • when you get to roll 2d20 and keep the lowest • when you get to roll 2d20 and keep the highest • maces and longswords deal damage with this die. • greataxes and witch bolt deal damage with this die. • glaves and heavy crossbows deal damage with this die. • ...
My Topologies 2022-06-24
Across
- ___________ is hidden software that monitors and collects information about you and your surfing habits.
- Within cyber security a weakness that can compromise a system is known as a _______
- What tool is used to get through a vulnerability other than the key
- In a ____________ attack, the hacker modifies the source address of the packets he or she is sending so that the packet appears to be coming from someone else
- A ___________ is either a piece of software installed on the system or a hardware device that is designed to capture all of the keystrokes on a system
- the type of attack called when the hacker inserts himself in the middle of two systems that are communicating
- involves the use of a network monitoring tool known as a sniffer, which is used to capture and analyze network traffic
- ____ _________ is when two or more servers have the same information stored on it
- A ________ virus is a program that you are tricked into installing because you thought the application did something useful
- another term used to describe Eavesdropping attacks
- ______________ is malicious software that takes control of your system and does not give control back until you pay a fee
Down
- A ________________ is a type of attack that causes the system or its services to either crash or become unresponsive
- What is an actual potential to break in, destroy, steal, or otherwise modify something without permission
- With a _________________ the hacker uses multiple systems to attack a single target system
- the type of attack called when the hacker creates a fake website that looks exactly like a popular website, then sends an e-mail message trying to trick the user into clicking a link that leads to the fake site
- type of attack that sends victims to a malicious website but involves compromising the services that direct users toward a well-known or trusted website
- _______ is the concept of ensuring that system will continue to function after a disaster.
- Bomb A ______________ is a type of virus that is planted on the system, and the application you installed acts as it is supposed to until a certain event occurs to trigger it.
- What is used when an attacker compromises the network or system through social interaction with an individual
19 Clues: another term used to describe Eavesdropping attacks • What tool is used to get through a vulnerability other than the key • ____ _________ is when two or more servers have the same information stored on it • Within cyber security a weakness that can compromise a system is known as a _______ • ...
chp 7 vocab 2021-10-05
Across
- an attack
- the action of reserving something
- northwest land between the great lakes, mississippi, and ohio river
- measurement of distance north or south of the equator
Down
- going about in search of thing to steal or people to attack
- chain with shackles
- without the basic necessities of life
- an indiscriminate and brutal slaughter of people
- the state of being barred from one's native country, typically for political or punitive reasons
- make an attack or assault in return for a similar attack
10 Clues: an attack • chain with shackles • the action of reserving something • without the basic necessities of life • an indiscriminate and brutal slaughter of people • measurement of distance north or south of the equator • make an attack or assault in return for a similar attack • going about in search of thing to steal or people to attack • ...
