0%

22-letter words containing f, a, i, t, c, o

  • the merchant of venice — a comedy (1596?) by Shakespeare.
  • to fall to bits/pieces — To fall to pieces, or in British English to fall to bits, means the same as to fall apart.
  • trichlorofluoromethane — chlorotrifluoromethane.
  • trifluorochloromethane — chlorotrifluoromethane.
  • unconventional warfare — warfare that is conducted within enemy lines through guerrilla tactics or subversion, usually supported at least in part by external forces.
  • university of michigan — (body, education)   A large cosmopolitan university in the Midwest USA. Over 50000 students are enrolled at the University of Michigan's three campuses. The students come from 50 states and over 100 foreign countries. 70% of the University's students graduated in the top 10% of their high school class. 90% rank in the top 20% of their high school class. 60% of the students receive financial aid. The main Ann Arbor Campus lies in the Huron River valley, 40 miles west of Detroit. The campus boasts 2700 acres with 200 buildings, six million volumes in 23 libraries, nine museums, seven hospitals, hundreds of laboratories and institutes, and over 18000 microcomputers.
  • unprofessional conduct — activity that is contrary to the accepted code of conduct of a profession
  • user network interface — (communications, networking)   (UNI) An interface point between ATM end users and a private ATM switch, or between a private ATM switch and the public carrier ATM network. The physical and protocol specifications for UNIs are defined by the ATM Forum's UNI documents, which allow for various types of physical interfaces. See also: NNI
  • verification principle — (in the philosophy of the logical positivists) the doctrine that nontautologous statements are meaningful only if it is in principle possible to establish empirically whether they are true or false
  • wi-fi protected access — (networking, security)   (WPA) A security scheme for wireless networks, developed by the networking industry in response to the shortcomings of Wired Equivalent Privacy (WEP). WPA uses Temporal Key Integrity Protocol (TKIP) encryption and provides built-in authentication, giving security comparable to VPN tunneling with WEP, with the benefit of easier administration and use.
  • with egg on one's face — made to look ridiculous
  • yellow-shafted flicker — a North American woodpecker C. auratus, which has a yellow undersurface to the wings and tail
Was this page helpful?
Yes No
Thank you for your feedback! Tell your friends about this page
Tell us why?