0%

11-letter words containing a, b, e, n, k

  • break in on — to intrude on
  • break point — a point which allows the receiving player to break the service of the server
  • break ranks — to fall out of line, esp when under attack
  • breakdancer — a person who does breakdancing
  • breaking-up — separation, or the action of separating, into smaller parts
  • broken coal — anthracite in pieces ranging from 2 1/2 to 4 inches (6.5 to 11 cm) in extreme dimension; the largest commercial size, larger than egg coal.
  • broken play — an improvised offensive play that results when the originally planned play has failed to be executed properly.
  • brown snake — any of various common venomous snakes of the genus Pseudonaja
  • bulkheading — the construction of bulkheads; bulkheads in general.
  • bundelkhand — a region of central India: formerly native states, now mainly part of Madhya Pradesh
  • cabinetwork — the making of furniture, esp of fine quality
  • center back — the player in the middle of the back line.
  • chelyabinsk — an industrial city in SW Russia; in 2013 a large meteor exploded in an airburst over the city's surrounding district. Pop: 1 067 000 (2005 est)
  • cornerbacks — Plural form of cornerback.
  • dark nebula — a type of nebula that is observed by its blocking of radiation from other sources
  • debarkation — Disembarkation.
  • diefenbakerJohn George, 1895–1979, prime minister of Canada 1957–63.
  • dogger bank — a shoal in the North Sea, between N England and Denmark: fishing grounds; naval battle 1915.
  • doner kebab — a fast-food dish comprising grilled meat and salad served in pitta bread with chilli sauce
  • double-bank — to have two rowers pull (each of a number of oars).
  • drakensberg — a mountain range in the E Republic of South Africa: highest peak, 10,988 feet (3350 meters).
  • embankments — Plural form of embankment.
  • embarkation — The act of embarking.
  • embarkments — Plural form of embarkment.
  • frank dobie — (James) Frank, 1888–1964, U.S. folklorist, educator, and author.
  • half-broken — past participle of break.
  • hand-basket — a small basket with a handle for carrying by hand.
  • handbaskets — Plural form of handbasket.
  • harken back — hearken back (see phrase under hearken)
  • heartbroken — crushed with sorrow or grief.
  • home baking — such things as bread, cakes and biscuits that are baked at home
  • hunchbacked — humpbacked.
  • husbandlike — resembling a husband
  • icebreaking — Serving the purpose of breaking ice.
  • keelboatman — a member of the crew of a keelboat.
  • keyboarding — the row or set of keys on a piano, organ, or the like.
  • kidney bean — a common bean, Phaseolus vulgaris, cultivated in many varieties for its edible seeds and pods.
  • klausenburg — German name of Cluj-Napoca.
  • knuckleball — a slow pitch that moves erratically toward home plate, usually delivered by holding the ball between the thumb and the knuckles of the first joints of the first two or three fingers.
  • lawbreaking — Unlawful; illegal.
  • likableness — The property of being likable, that which makes likable.
  • linebackers — Plural form of linebacker.
  • linebacking — the act of forming a second line of defence, close to the linesman
  • lunch break — pause for midday meal
  • memory bank — the complete records, archives, or the like of an organization, country, etc.
  • monkey bars — children's climbing frame
  • mountebanks — Plural form of mountebank.
  • nonbreaking — Alternative spelling of non-breaking.
  • nonsinkable — (of items designed to float on water) not liable to sink
  • orange book — (security, standard)   A standard from the US Government National Computer Security Council (an arm of the U.S. National Security Agency), "Trusted Computer System Evaluation Criteria, DOD standard 5200.28-STD, December 1985" which defines criteria for trusted computer products. There are four levels, A, B, C, and D. Each level adds more features and requirements. D is a non-secure system. C1 requires user log-on, but allows group ID. C2 requires individual log-on with password and an audit mechanism. (Most Unix implementations are roughly C1, and can be upgraded to about C2 without excessive pain). Levels B and A provide mandatory control. Access is based on standard Department of Defense clearances. B1 requires DOD clearance levels. B2 guarantees the path between the user and the security system and provides assurances that the system can be tested and clearances cannot be downgraded. B3 requires that the system is characterised by a mathematical model that must be viable. A1 requires a system characterized by a mathematical model that can be proven. See also crayola books, book titles.
Was this page helpful?
Yes No
Thank you for your feedback! Tell your friends about this page
Tell us why?