Type
Word Search
Description

This word search contains the following answers:

SIXTY CARDS
WHO DID IT
HAD FUN
MAILING CARDS
THANKS
FRIENDS AND FAMILY
GUESS WHO
CHRISTEN
CAKE
ICE CREAM
NEVER GUESS
DAUGHTER
MARCUS
CANDLES
CARDS
GIFTS
MELANIE
MICHAEL
MIKE
MOTHER OF FOUR
OLD LADY
GUILTY PARTY
LITTLE SISTER
ONE BROTHER
ONE SISTER
PRESENT
SENIOR CITIZEN
SEXAGENARIAN
SIXTY YEARS OLD
SURPRISE
SOCIAL SECURITY
TRICKS
YOUNG SIXTY

    Customize    

romeo & juliet Word Search

Type
Word Search
Description

This word search contains the following answers:

abram
apothecary
balthasar
benvolio
chief watchman
chorus
citizens
count paris
friar john
friar laurence
gregory
juliet
lady capulet
lady montague
lord capulet
lord montague
mercutio
nurse
officer
old man
page
peter
prince escalus
romeo
sampson
three musicians
tybalt

    Customize    

The Giver Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

Who is the main character? Jonas
What is Jonas' father's job? Nurturer
What is Jonas' sister's name? Lily
What is Jonas' bestfriend's name? Asher
Jonas has been selected to be the? Reciever of Memory
Jonas gets training from? The Giver
How old is Jonas? twelve
How old is Lily? eight
Who is the author? Lois Lowry
What age do you recieve a bike? nine
What was Jonas' first memory? sledding
What is the name of the baby staying with Jonas? Gabe
What is The Giver's daughter's name? Rosemary
How many children can be in one family unit? two

    Customize    

Sexy Thoughts Word Search

Type
Word Search
Description

This word search contains the following answers:

tongue
French kiss
aroma
lips
sex games
fantasy
buttocks
breast
erection
yoni
whip cream
chains
vibrator
sweating
sixty nine
handcuff
rectal sex
penis
passionate
panties
orgasms
oral sex
muscles
masturbation
massaging
licking
candles
Jacuzzi
hugs
horny
rose petals
fondling
beach

    Customize    

Macbeth Act III Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

Who does Banquo suspect of killing Duncan? Macbeth
In addition to Banquo, Macbeth wants this person killed? Fleance
"I'm very afraid of him." To whom is Macbeth referring? Banquo
Macbeth feels as if his mind is full of this. scorpions
"Come night and blindfold the kindhearted day" is an example of this literary device. personification
Because the light went out, who escapes the murderers? Fleance
At the banquet, who is seated in Macbeth's chair? ghostofBanquo
Banquo's character serves as a _____________to Macbeth's character. foil
Lady Macbeth tells the guests Macbeth has had these since childhood. hallucinations
Macbeth has placed one of these in the home of each of the Lords. spy
Who refused to come to the banquet? Macduff
"We're still just beginners when it comes to crime" is an example of this literary device. foreshadowing
Who does Macbeth plan to go see to learn his destiny? witches
Goddess of Witchcraft Hecate
one of Macbeth's tragic flaws overconfidence
Hectate instructs the Weird Sisters to create a new _________ that will trick Macbeth. spell
This Scottish nobleman believes Macbeth is guilty of ALL the murders. Lennox
Whose birthright and throne did Macbeth steal? Malcolm
Who does Macduff ask to help him form an alliance to overthrow Macbeth? KingEdward
Who was unaware of the plan to kill Banquo? LadyMacbeth
Whose manhood does Macbeth question? murderers
"Banquo's safe?" is an example of this literary device. irony
Act III is the _________ of the play; Macbeth has reached his highest point and his downfall begins. climax
Macbeth is jealous of this person who sleeps well. Duncan
The repercussions of acting on ambition without moral constraint is one of the play's main ____________. themes
When Macbeth states, "I have walked so far into this river of blood....it would be hard to go back" he admits that he has reached the what? pointofnoreturn
With whom is Hectate angry? hags

    Customize    

Cyber Security Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

process of confirming the correctness of the claimed identity authentication
approval, permission, or empowerment for someone or something to do something authorization
cryptanalysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one brute force
encrypted form of the message being sent ciphertext
stripping one llayer's headers and passing the rest of the packet up to next higher layer decapsulation
TCP/IP protocol specifying the transfer of text or binary files across the network File Transfer Protocol
pseudo IP address that always refer back to the local host and never sent out to a network (127.0.0.1) loopback address
software appearing to perform a useful function but actually tricks a user into executing malicious logic (e.g. Trojan horse) malicious code
prove that a user sent a message and the message has not been altered non repudiation
sequence of eight bits octet
e-mails that appear to originate from a trusted source to trick a user into entering valid credentials on a fake website phishing
gaining unauthorized logical access to sensitive data by circumventing a system's protections penetration
type of input validation attack where SQL code is inserted into application queries to manipulate the database SQL injection
basic communication language or "protocol" of the Internet TCP/IP
hidden, self-replicating section of computer software that inserts itself and becomes part of the another program virus

    Customize    

Grams 90th Birthday Party Wordsearch

Type
Word Search
Description

This word search contains the following answers:

Amethyst
Aquarius
Ballons
Cake
Candles
Cards
Celebration
Decorations
Family
Favors
February
Flowers
Food
Friend's
Fun
Games
Grandchildren
Happy
Ice cream
Leona
Love
Music
Ninety
Party
Pedicures
Photos
Presents
Songs
Surprise
Wishes

    Customize    

Macbeth Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

Who killed Duncan to be the next king of Scotland? Macbeth
Who committed suicide because of “the blood on her hands”? Lady Macbeth
Where does Macbeth go to be crown king? Scone
Macbeth slowly turns into this throughout the whole play? Tyrant
The witches are this? Evil
How many withes where there in the play Macbeth? Three
'Out ___________ spot! Out, I say' (Lady Macbeth)? Damned
Location of Macbeth's castle? Burnum-wood
'Double, double toil and trouble, fire burn and __________ bubble' (Weird Sisters)? Cauldron
Escaped Macbeth's assassins? Malcom
Who was the Thane of Glamis? Macbeth
The country that Duncan rules? Scotland
Escaped Macbeth's assassins? Fleance
Head witch/Goddess of witchcraft? Hecate
Who killed Macbeth? Macduff
Who wrote the play Macbeth? Shakespeare
Who is Macbeth’s best friend that he murdered? Banquo
The boss of the witches, also known as the devil? Hecate
Who is Duncan’s younger son? Malcom
How Lady Macbeth dies. Suicide

    Customize    

Identity Theft Crossword

Type
Crossword
Description

This crossword contains the following questions and answers:

SSN, Date of Birth, Address, Maiden Name, Phone Numbers and Account Numbers are all examples of... Personal Information
Mail theft, trash sifting, internet, thefts and burglaries, family members and acquaintances, and scams are all ways your ______ can be stolen. Identity
________ _________ and alerts can help to prevent mail theft. Electronic Statements
________ all unnecessary paperwork. DO NOT throw it in the garbage can. Shred
Do not leave wallets and purses in your _____. car
To protect yourself from online theft, use ________ internet sites. secure
If you become a victim of fraud, file a police report with your ______ jurisdiction. local
To protect members from Identity Theft, talk to them about _________ _______ of fraud. warning signs
Protect member's information by ___________ ID. verifying
Be cautious with use of your ____. SSN
A thief can use your identity by using your _______ card and/or ATM card to drain your funds. credit
A thief can use your identity to create ___________ ________ made with your account information on them. counterfeit checks
A thief may ______ benefits under your name. claim
To help protect yourself, ______ your credit report yearly. check
To prevent theft, do not write important ___________ down and keep it in an easily accessible. information
To help keep your information safe, avoid carrying important documents in your purse or wallet, such as your Social Security _______ or multiple credit cards. card
______ ______ is when a person obtains and uses your personal information without your permission for financial gain. Identity theft
America First strives to keep its ________ safe by informing them of possible risks. members
If you obtain a stolen ID from a fraudulent member, do not give the ID ______. back
Always follow __________ procedures. security

    Customize    

To Kill A Mockingbird Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

the narrator of the story's nickname Scout
the narrator's brothers nickname Jem
the narrator's dad's full name Atticus Finch
the boys nickname that came every summer Dill
the man's last name who tried to kill Jem and Scout Ewell
the boys nickname who was locked up in his room Boo
the woman who took the narrator and the narrator's brother to her church Calpurnia
the man's full name who was charged with rapeing a mans daughter Tom Robinson
who accused a man of rapeing her Mayella Ewell
what was the narrator's aunt's first name Alexandra
the old lady's last name who the children didn't fond being around Dubose
the state in which the story takes place in Alabama
the animal the narrator's brother was told never to shot Mockingbird
the author of the story Harper Lee
the county which the story takes place in Maycomb
the last name of the family that lives next door to the narrator Radley
the boy who scares the narrator and their brother on the way to the play Cecil Jacobs
the narrator's teacher who told her to stop reading Miss Caroline
the boy's full name who came to the Finch's house for lunch Walter Cunningham
the lady's last name who's house burned down Maudie
the name of the church that the Finch's go to with their cook First Purchase
the Reverend's last name Sykes
the Judge's last name Taylor
the narrator's grandpa's full name Simon Finch
the narrator's aunt's grandson's first name Francis

    Customize    

IT&S Cyber Security Crossword Puzzle

Type
Crossword
Description

This crossword contains the following questions and answers:

A software that is designed and destroy computer viruses Antivirus
Do not leave your laptop or computer ___________________ Unattended
A ___________ is a hardware of a software that helps keep hackers from using your computer and it watches for outside attempts to access your system and blocks communication that you don't permit Firewall
Email scam or attempt to trick you into giving your password or personal information Phishing
The state of being free from danger and threat Security
A ___________ is often an email that gets mailed in chain letter fashion describing some devasting. highly unlikely type of virus. HOAX
Choose a password that is easy for you _______________ but hard for you someone to guess. Remember
Also known as malicious software any; any program or file that is harmful to a computer user Malware
Passwords should should always be at least this many characters long. Eight
A _______ assessment is the process by which risks are identified and the impact of those risks determined Risk
Applied to data to protect it from unauthorized use in case of theft or loss. Encryption
Always _______your computer when you leave your desk Lock
To protect personal information, avoid sending it via Email
_________________ is a software that gathers computer user information and transmits it to the creator of the software without the explicit knowledge or informed consent of the user SPYWARE
A collection of information that is organized so that it can easily be accessed, managed and updated Database
Never share your _________ with another person Password

    Customize