Puzzles and worksheets similar to Vocab week 1 Word Search

Rad Tech Week 2021 Crossword

Type
Crossword
Description

We wear these for protection
Requires part 1 and part 2
Our Angel
Dr Wilhelm ____________
Our suits of armour
Performed with SLP
Fearless Leader
Exam performed for parotid stones
A Barium Throne
Our first digital room
Raised part on a bone where muscle is attached
Our governing body
An unwanted foreign object or visualization on your image-something that should not be there

spelling words week 4 Crossword

Type
Crossword
Description

when you need a drink
boy gender
you write a book _______
your writting on ______
do it in microsoft ________
this candy is _______
you need a ________ to row a bout
you are very _______ doing this
you are at _______ school
__________ you sould have a apple
i use a __________ to cut my beard
i wont to _______ my frineds
i got a ________ from you
the second mouth
there are 4 ________ at school

Ethics & Compliance Week 2021 Crossword Puzzle

Ethics & Compliance Week 2021 Crossword Puzzle
Type
Crossword
Description

Common workplace ethic of respecting others and working well together.
Federal laws that provide protection from retribution against someone for reporting a suspected violation.
The capacity to do what is right even in the face of temptation to do otherwise.
Taking another’s property or money by a person to whom it has been entrusted.
When one obtains money or property by lying about a past or existing fact. False
Offering or giving anything of value to get or keep business or to influence performance of an official.
Obtaining money or other property by wrongful use of force or the power of office.
The duty of a business to contribute to the wellbeing of society. Social
An employee who speaks out about misconduct, malpractice, or corruption.
Set of standards or rules that guide business behavior in a positive direction. Code of
A person’s personal philosophies about what is right or wrong.
Use of confidential corporate information to buy or sell stocks. Insider
Deliberate deception to gain an unlawful advantage.
Crime against the environment. Green
Economic crimes committed by professionals in the course of their work. White Collar
Hiding money obtained illegally by putting it in legal businesses. Money
Negative or unfair treatment based on personal characteristics rather than job performance, skills, or merit.
Unwelcome conduct from another whose actions, communication, or behavior mocks, demeans, disparages, or ridicules an employee.
Sentenced to 150 years in prison for largest Ponzi scheme in history.
Its use poses a potential conflict between employees' rights to express themselves and an organization's need to preserve its reputation, intellectual property, and information its legally obligated to protect. Social
Responsible for making ethical choices to maintain our company's reputation for fair, honest business practices.
The set of measures taken to ensure that networks, systems, & data breaches are avoided.
A lifestyle influencer who served 5 months in federal prison and paid fines of treble damages in connection to allegations of insider trading. Martha
An unauthorized person viewing confidential data is an example of a reportable _______ incident.

Unit 8 VOCAB Crossword

Type
Crossword
Description

very old
the usual weather in a place
to hold on tight
the common tradition to a family or state
to destroy
to make angry; to uncomfort
to uncover or show
to act in a play
a very far place
shy

Gateway Welding Word Search

Gateway Welding Word Search
Type
Word Search
Description

Alternate Current
Carbon Dioxide
direct current
safety glasses
Short circuit
Mr Lundstrom
Base metal
horizontal
Pulsed Mig
flux core
weld face
Aluminum
globular
overhead
porosity
undercut
vertical
Anthony
Lincoln
Austin
crater
gloves
Ground
Isaiah
Jayden
Miller
Nathan
safety
Aiden
Argon
Ethan
Jacob
Spray
Talan
Coen
flat
hood
melt
root
slag
Tony
wire
arc
Don

Industrial ceramic terms Word Search

Type
Word Search
Description

Reducing Atmosphere
Moisture Expansion
Loss of Ignition
Edge Runner Mill
Kiln Furniture
Deflocculation
Combined Water
Sedimentation
Pendular Mill
Lawn / Sieve
Hardening On
Flocculation
Casting Slip
Muffle Kiln
Comminution
Calcination
Refractory
Plasticity
Once-Fired
Dispersion
Heat Work
Greenware
Extrusion
Ball Mill
Rheopexy
Porosity
Pitchers
Fillers
Colloid
Ceramic
Kaolin
Fusion
Engobe
Glost
Flux
Slip
Kiln
Clay

Bell Stage Crossword

Type
Crossword
Description

outer cubodial cells of the enamel
inner most tall columnar cells of the enamel organ
star-shaped forming network
compressed layer of flat to cubodial cells
proliferates to form the root
dental papilla cells near the IEE( under the IEEs influence) differentiate into
establishment of the shape of the crown
the dental papilla cells differentiate into ondontoblasts and the IEE cells become ameloblasts
IEE cells become
__disintegrates, seperating the tooth germ from the oral epithelium
inner cells will go on to form the
outer cells will become the odontoblasts for the
during weeks 11-12, differentiation occurs, creating four cell types in the enamel organ that contributes to its "bell" shape
determining factors of tooth type reside in the
stratum intermedium works in tandem with IEE to form

Distributed System Crossword

Distributed System Crossword
Type
Crossword
Description

encryption that has two key differences
key to secure messaging
communication between two parties has been overheard by someone
services or data become unavailable, unusable or destroyed
unauthorized changing of data or tampering with a service
additional data or activities are generated
transform data to maintain confidentiality and integrity
verify the claimed identity of a user, client or server
verify the requested action is permitted
useful for analysis of a breach and tracking attackers
requiring correct permission to perform an action
list of those with access (acronym)
a collection of permissions assigned to one type of user
the right to perform one action
one of several security mechanisms working together
TLS spelled out
remote procedure call in short
one easy way to design better security
when security features should be addressed in development lifecycle
how to read encrypted messages
sharing one key
how you get a ticket
common network protection at the edge
allows code from known source to be trusted
most widely used system to get the secrets
how an authority takes away past trust
way to check to see if only one bit is set
temporararily loan your access rights
sent as part of a challenge, prevents replay attacks
feature that allows access without logging in repeatedly
last but perhaps most important system concern
gateway that filters traffic and executable code
key to getting a response
ensuring the message was not modified

Serial Killer: Belle Gunness Crossword

Serial Killer: Belle Gunness  Crossword
Type
Crossword
Description

What type of serial killer was Belle Gunness?
What was one of Belle’s method of murder?
What was another method of murder Belle used?
What type of poison did Belle use?
What was one victim type for Belle Gunness?
What was another victim type for Belle Gunness?
What did Belle kill more of?
How many times was Belle married?
What physical abuse did Belle experience?
What did the physical abuse cause?
Where was the victims staying when they were killed?
What did Belle want after she killed her victims?
Where was the location of Belle's Gunness killing?

Wordsearch (Weeks 1 and 3)

Wordsearch (Weeks 1 and 3)
Type
Word Search
Description

convenience
controversy
competition
disastrous
dictionary
determined
correspond
conscience
embarrass
desperate
curiosity
criticise
conscious
definite
potatoes
balloons
develop
lunches
patches
schools
worries
parties
cities
hisses
fishes
babies
ropes
words
meals
tries
boxes
buses
cups