Puzzles and worksheets similar to Chapter 9 Crossword



when we predict a value inside the domain and range of the data
a diagram showing the relation between variable quantities
if for every point on that intervals the first derivate is positive
is commonly used to determine the distance between two numbers on the number line
is a set of real numbers that contains all real numbers lying between any two numbers of the set
describes a relationship between two quantities that show a constant rate of change
is a point where the graph of a function or relation intersects the y-axis of the cordinate system
a mathematical relationship or rule expreesed in symbols
if they are increasing at the same rate, the graphs will never cross
is a function whose graph produces a line
greather than, greather than or equal to, less than, or less than or equal to, between two numbers or algebraic expressions
determines if the function is an increasing function or a decreasing function
a collection of facts
when we predict a value outside the domain and range of the data
a function whose value decreases as the independent variables increases over a give range
when a point crosses x-axis then that point
is a point, line, or curve common to two or more objects
statement of equality between two expressions consisting of variables and/or numbers
lines that intersect at a rigth (90 degrees) angle

Distributed System Crossword

Distributed System Crossword

encryption that has two key differences
key to secure messaging
communication between two parties has been overheard by someone
services or data become unavailable, unusable or destroyed
unauthorized changing of data or tampering with a service
additional data or activities are generated
transform data to maintain confidentiality and integrity
verify the claimed identity of a user, client or server
verify the requested action is permitted
useful for analysis of a breach and tracking attackers
requiring correct permission to perform an action
list of those with access (acronym)
a collection of permissions assigned to one type of user
the right to perform one action
one of several security mechanisms working together
TLS spelled out
remote procedure call in short
one easy way to design better security
when security features should be addressed in development lifecycle
how to read encrypted messages
sharing one key
how you get a ticket
common network protection at the edge
allows code from known source to be trusted
most widely used system to get the secrets
how an authority takes away past trust
way to check to see if only one bit is set
temporararily loan your access rights
sent as part of a challenge, prevents replay attacks
feature that allows access without logging in repeatedly
last but perhaps most important system concern
gateway that filters traffic and executable code
key to getting a response
ensuring the message was not modified

Unit 5 AB Review Crossword


Because of his often failure to express agreement, Taiten gets himself into compromising situations
Because of his often courteous behavior and mannerly conduct, Jonathan has a reputation of being a knightly young man.
Often providing mercy in the form of pencils, Tiana should be deemed a saint due to the number of pencils she has lent Brian.
Mackenzie, though she is very reserved, has begun to open up, talk on occasions, and even have a cup of coffee.
Due to their little and loud differences, Kephon often argues with Michael, who in turn argues with Isaac.
Because of their refusal to yield to poor grades, Trinity, Shania, Kenzi, and a several others have worked really hard.
While very intelligent, Melissa often enters the classroom in a slow and heavy manner; she's typically a lot better after coffee.
Because of their neglectful mannerisms at times, Landon, Jason, Alphonso have to ask others to repeat classroom instructions.
Because of its intent to create integrity and character in students, ROTC is a perfect fit for both Jordan and Michael.
Be careful not to cross Amelia; though she is smart and kind, she can be full of malice when crossed the wrong way, ask Mason.
Due to an unselfish concern for helping each other, Makayla and Tiana have both increased their averages in English II.
Emma and Daisy help each other out during class work; this is a really good act for both girls as it helps them both.
Bryan's intelligence is often thwarted due to an inadequate supply of pencils.
Even though he can be scary at times, Kephon did at least make a start at a free style in class; his counterpart -- shameful...
Due to a superficial manner of writing, journaling became easy for Austin, an error he has since corrected.
Kenzi has worked very hard at writing this year; her chunks are often free from error and dependable.
When I inquired about Carla's unusual piercing, she replied that it did not cause too much of a sharp sensation.
Haylie typically carries a very calm demeanor, until she hears something that stirs her opinion.
Though it can be difficult, each of us should seek to avoid aggressive and destructive comments towards one another.
I have come to know Jennifer is very sincere young lady since she has been in my class.

C1 - Physical or Chemical Changes Crossword


Tiny bits of matter are called?
Particles are very close together
Particles are close together but can move
Particles are far apart from each other
All particles have e________
Term when a solid changes to a liquid
Term when a liquid changes to a solid
Term when a liquid changes to a gas
Term when a gas changes to a liquid
When melting or boiling happens particles _____ energy
When freezing or condensation happens particles _____ energy
Movement of particles from a high concentration to a low concentration is called?
The forces between the particles in a solid are s______
The forces between the particles in a gas are w_____

Surgical Radiography Crossword


MD or certified registered nurse anesthetist who specializes in the art and science of administering anesthesia.
preferably an RN; monitors and coordinates all activities in OR, provides supplies to scrub nurse, and manages patient care.
provides intraoperative imaging in a variety of examinations with a variety of equipment
responsible for maintaining the integrity, safety, and efficacy of the sterile field
allied health practitioner qualified by academic and clinical education
qualified surgeon or resident in an accredited surgical educational program; must be capable to assume duties of surgeon
licensed physician specially trained and qualified to perform surgical procedures
The area between the patient drape and the instrument table is maintained as a_________________ and is the territory of the surgeon and the instrument nurse only.
Access in the sterile corridor area is permitted only to those wearing? (4 wds)
What are the Three Cardinal Principles of Radiation Protection; Especially important during C-arm procedure? (3wds)
What C-arm Orientation has the least exposure to operator?
What C-arm Orientation has increased exposure to face and neck by a factor of four?
What C-arm Orientation has increased exposure at x-ray tube end?
What C-arm Orientation should be avoided; increased exposure to head and neck?
The_______ pedal allows the physician or other operator to have hands-free operation of the C-arm.
________ _________ consists of the practice and procedures used to minimize the levels of infectious agents present in the surgical environment. (2 wds)
The typical surgical suite has two general regions known as? (3wds)
What is the area called where the technologist is located?
left posterior oblique (abbrv)
Right posterior oblique (abbrv)
anterior posterior (abbrv)
What is the primary source of radiation exposure to the fluoroscopy staff ? (2wds)
What outfit does the sterile team wear?
Position where patient is lying on their back?
Position where patient is lying on their Stomach?

Ethics & Compliance Week 2021 Crossword Puzzle

Ethics & Compliance Week 2021 Crossword Puzzle

Common workplace ethic of respecting others and working well together.
Federal laws that provide protection from retribution against someone for reporting a suspected violation.
The capacity to do what is right even in the face of temptation to do otherwise.
Taking another’s property or money by a person to whom it has been entrusted.
When one obtains money or property by lying about a past or existing fact. False
Offering or giving anything of value to get or keep business or to influence performance of an official.
Obtaining money or other property by wrongful use of force or the power of office.
The duty of a business to contribute to the wellbeing of society. Social
An employee who speaks out about misconduct, malpractice, or corruption.
Set of standards or rules that guide business behavior in a positive direction. Code of
A person’s personal philosophies about what is right or wrong.
Use of confidential corporate information to buy or sell stocks. Insider
Deliberate deception to gain an unlawful advantage.
Crime against the environment. Green
Economic crimes committed by professionals in the course of their work. White Collar
Hiding money obtained illegally by putting it in legal businesses. Money
Negative or unfair treatment based on personal characteristics rather than job performance, skills, or merit.
Unwelcome conduct from another whose actions, communication, or behavior mocks, demeans, disparages, or ridicules an employee.
Sentenced to 150 years in prison for largest Ponzi scheme in history.
Its use poses a potential conflict between employees' rights to express themselves and an organization's need to preserve its reputation, intellectual property, and information its legally obligated to protect. Social
Responsible for making ethical choices to maintain our company's reputation for fair, honest business practices.
The set of measures taken to ensure that networks, systems, & data breaches are avoided.
A lifestyle influencer who served 5 months in federal prison and paid fines of treble damages in connection to allegations of insider trading. Martha
An unauthorized person viewing confidential data is an example of a reportable _______ incident.

Promoting Student Development- (1A) Development of Children Crossword

Promoting Student Development- (1A) Development of Children Crossword

Learning/academics refers to the _________ domain of development?
Interactions with people & the environment refers to the _________ domain of development?
The body & movement refers to the _________ domain of development?
Processing & understanding feelings refers to the _________ domain of development?
________ representations use manipulatives to introduce a concept.
The symbolic/_____________ stage students draw pictures/symbols to represent a concept.
_________ stage is when students use variables to represent a concept.
Analysis & judgement refers to which cognitive process?
Looking from a new perspective refers to which cognitive process?
Asking questions to gather information to gather information refers to which cognitive process?
__________ & planning: cognitive process involves solving problems & making decisions?
Memory/___________: cognitive process involves providing facts from given information
Writing, running & using scissors are __________ skills that are developed & honed everyday.
Object permanence occurs is which of Piaget's four stages of cognitive development?
Language development & beginning to think symbolically occurs in which of Piagets' four stages of cognitive development?
A student that is understand logical reasoning, not yet understanding abstract thought is in which stage of Piagets' four Stages of Cognitive Development?
Stage of play where a child makes seemingly random movements with no clear purpose &/or observing others without acting?
Playing alone w/ limited interaction among other children is which stage of play?
______ Play/Onlooker Play: stage of play that observes other children playing, but does not play w/ them
Stage of play where a student plays alongside other children, but not in cooperation w/ them
Stage of play when a child plays in cooperation w/ other children in a loosely organized manner; generally developing preferences for playing w/ certain children

Law Ed Unit 1 Crossword


Number of Justices on the Supreme Court
highest court in the land
What does the Executive branch do to approve a law after it passes both houses of congress?
What branch of government writes laws?
the study of law and legal philosophy
laws that regulate public conduct and set out duties owed to society
laws that regulate relations between individuals or groups of people
criminal offenses that have a penalty of a term of more than one year in prison
criminal offenses that have a penalty of a term of less than one year in prison
the level of proof required to convict a person of a crime
lawsuit that can be brought by a person who feels wronged or injured by another person
the person accused of committing a crime
the person or company harmed in a civil case
the government’s attorney in a criminal case
The power of government is split between state and national governments
Each branch of government prevents the others from becoming too powerful.

Cyber Awareness Month Crossword


Something that shows up in a email
Hard to detect both by Users
Identity and Privacy Protection
Someone attempting to create Identity fraud
A security mechanism prohibiting the execution of those programs on a known malicious or undesired list of software
The occurrence of disclosure of confidential information, access to confidential information, destruction of data assets or abusive use of a private IT environment. Generally, a data breach results in internal data being made accessible to external entities without authorization.
A security tool, which may be a hardware or software solution that is used to filter network traffic.
A form of identity theft in which a transaction, typically financial, is performed using the stolen identity of another individual. The fraud is due to the attacker impersonating someone else.
he likelihood or potential that an employee or another form of internal personnel may pose a risk to the stability or security of an organization
Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system. Malware includes a wide range of types of malicious programs including: virus, worm, Trojan horse, logic bomb, backdoor, Remote Access Trojan (RAT), rootkit, ransomware and spyware/adware.
The likelihood or potential that an outside entity, such as an ex-employee, competitor or even an unhappy customer, may pose a risk to the stability or security of an organization. An outsider must often gain logical or physical access to the target before launching malicious attacks.
A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP. Most SPAM is advertising, but some may include malicious code, malicious hyperlinks or malicious attachments.
A form of malware that often attaches itself to a host file or the MBR (Master Boot Record) as a parasite. When the host file or MBR is accessed, it activates the virus enabling it to infect other objects. Most viruses spread through human activity within and between computers
a dishonest scheme; a fraud.
The act of falsifying the identity of the source of a communication or interaction. It is possible to spoof IP address, MAC address and email address.
A form of malware that monitors user activities and reports them to an external their party. Spyware can be legitimate in that it is operated by an advertising and marketing agency for the purpose of gathering customer demographics. However, spyware can also be operated by attackers using the data gathering tool to steal an identity or learn enough about a victim to harm them in other ways.
An attack focusing on people rather than technology
Alerts used as a warning of danger.
an attempt by hackers to damage or destroy a computer network or system.
a specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats and .
the ultimate call control center that gives customers full control of all T-Mobile's scam protection options.
Malware is defined as any device software that aims to cause damage and steal data. Malware is an abbreviation for malicious software. Ransomware and trojan, for example, are types of malware widely used in email attacks

Types of Propaganda Crossword

Types of Propaganda Crossword

information ideas or rumors deliberately spread widely to help harm a person, group, movement institution or nation
promoting only one side of an argument or issue (positive or negative)
we're all in this together
celebrity endorsement of a philosophy movement or candidate they are closely related to
a high profile person tries to relate to regular ordinary people
the use of symbols quotes or endorsements to convey a message not normally associated with them
presentation of something dreaded or terrifying to get people to do something to avoid the horror
reaching a false conclusion based on two true statements
using positive words that everyone supports to promote your idea
ties a person idea or cause to a largely perceived negative image
description of candidates in our first lesson that led the class to elect Adolph Hitler
Don't you want to join our winning team?
Doctors endorse my diet program.
The President of the United States stops by McDonalds for a Big Mac after jogging
Abraham Lincoln endorses the latest Dodge Ram pickup truck
If we don't stop North Korea today we will all vanish in an atomic blast
My cat has a tail. My dog has a tail. Cats and dogs are the same animal
stand for liberty, support rights, promote freedom
My opponent is a raging tree hugger