0%

14-letter words containing a, c, t, o, r, p

  • private income — econ: from outside employment
  • private school — a school founded, conducted, and maintained by a private group rather than by the government, usually charging tuition and often following a particular philosophy, viewpoint, etc.
  • private sector — the area of the nation's economy under private rather than governmental control.
  • pro-capitalist — a person who has capital, especially extensive capital, invested in business enterprises.
  • proactiveness' — serving to prepare for, intervene in, or control an expected occurrence or situation, especially a negative or difficult one; anticipatory: proactive measures against crime.
  • proceleusmatic — inciting, animating, or inspiring.
  • processability — capable of being processed.
  • processing tax — a tax levied by the government at an intermediate stage in the production of goods.
  • procrastinated — to defer action; delay: to procrastinate until an opportunity is lost.
  • procrastinator — to defer action; delay: to procrastinate until an opportunity is lost.
  • prognostically — of or relating to prognosis.
  • prognosticator — to forecast or predict (something future) from present indications or signs; prophesy.
  • project athena — (project)   A distributed system project for support of educational and research computing at MIT. Much of the software developed is now in wider use, especially the X Window System.
  • project leader — leader of a task or programme
  • projectisation — the direction of aid to developing countries towards a specific project, without regard to wider issues or needs
  • projectization — the direction of aid to developing countries towards a specific project, without regard to wider issues or needs
  • pronunciamento — a proclamation; manifesto; edict.
  • propaedeutical — relating to preliminary instruction; introductory
  • propagandistic — a person involved in producing or spreading propaganda.
  • prosthetically — a device, either external or implanted, that substitutes for or supplements a missing or defective part of the body.
  • protectability — to defend or guard from attack, invasion, loss, annoyance, insult, etc.; cover or shield from injury or danger.
  • proto-germanic — the unattested prehistoric parent language of the Germanic languages; Germanic.
  • protocol layer — (networking)   The software and/or hardware environment of two or more communications devices or computers in which a particular network protocol operates. A network connection may be thought of as a set of more or less independent protocols, each in a different layer or level. The lowest layer governs direct host-to-host communication between the hardware at different hosts; the highest consists of user application programs. Each layer uses the layer beneath it and provides a service for the layer above. Each networking component hardware or software on one host uses protocols appropriate to its layer to communicate with the corresponding component (its "peer") on another host. Such layered protocols are sometimes known as peer-to-peer protocols. The advantages of layered protocols is that the methods of passing information from one layer to another are specified clearly as part of the protocol suite, and changes within a protocol layer are prevented from affecting the other layers. This greatly simplifies the task of designing and maintaining communication systems. Examples of layered protocols are TCP/IP's five layer protocol stack and the OSI seven layer model.
  • protocol stack — (protocol)   A layered set of protocols which work together to provide a set of network functions. Each intermediate protocol layer uses the layer below it to provide a service to the layer above. The OSI seven layer model is an attempt to provide a standard framework within which to describe protocol stacks.
  • prototypically — in a prototypical manner
  • pterylographic — relating to pterylography
  • puerto cabello — a seaport in N Venezuela.
  • punch operator — a person who enters data into cards by means of punching holes
  • put one across — to get (someone) to accept or believe a claim, excuse, etc, by deception
  • pyrotechnician — a specialist in the origin of fires, their nature and control, etc.
  • radio spectrum — the portion of the electromagnetic spectrum that includes radio waves.
  • rathke's pouch — an invagination of stomodeal ectoderm developing into the anterior lobe of the pituitary gland.
  • re-application — the act of putting to a special use or purpose: the application of common sense to a problem.
  • reactive power — Reactive power is the part of complex power that corresponds to storage and retrieval of energy rather than consumption.
  • recapitulation — the act of recapitulating or the state of being recapitulated.
  • reception area — the waiting area in a hotel near the desk or office where guests can books rooms or ask the staff questions
  • recompensatory — serving to compensate, as for loss, lack, or injury.
  • recording tape — a ribbon of material, esp magnetic tape, used to record sound, images and data, used in a tape recorder
  • reflectography — a non-destructive technique which uses infrared light to see beneath the painted surface in works of art in order to obtain information about those artworks
  • report a claim — If you report a claim, you inform an insurer that an insured event has occurred and that you intend to ask the insurer for financial payment.
  • rock partridge — the Greek partridge; Alectoris graeca
  • roller caption — caption lettering that moves progressively up or across the picture, as for showing the credits at the end of a programme
  • rsa encryption — (cryptography, algorithm)   A public-key cryptosystem for both encryption and authentication, invented in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman. Its name comes from their initials. The RSA algorithm works as follows. Take two large prime numbers, p and q, and find their product n = pq; n is called the modulus. Choose a number, e, less than n and relatively prime to (p-1)(q-1), and find its reciprocal mod (p-1)(q-1), and call this d. Thus ed = 1 mod (p-1)(q-1); e and d are called the public and private exponents, respectively. The public key is the pair (n, e); the private key is d. The factors p and q must be kept secret, or destroyed. It is difficult (presumably) to obtain the private key d from the public key (n, e). If one could factor n into p and q, however, then one could obtain the private key d. Thus the entire security of RSA depends on the difficulty of factoring; an easy method for factoring products of large prime numbers would break RSA.
  • scalar product — inner product (def 1).
  • scrape through — only just succeed
  • shoulder patch — a cloth emblem worn on the upper part of a sleeve of a uniform typically as identification of the organization to which the wearer is assigned.
  • social chapter — The social chapter is an agreement between countries in the European Union concerning workers' rights and working conditions.
  • space platform — space station.
  • spectator pump — a woman's spectator shoe, closed at the front and back, usually having a medium or medium-high heel.
  • spectra yellow — a vivid yellow color.
Was this page helpful?
Yes No
Thank you for your feedback! Tell your friends about this page
Tell us why?