0%

21-letter words containing f, e, t, u, c, i

  • afro-american studies — black studies.
  • aluminum fluosilicate — a white, water-soluble powder, Al 2 (SiF 6) 3 , used in the manufacture of optical glass and of synthetic sapphires and rubies.
  • analects of confucius — Chinese Lun Yü. a compilation of the discourses, maxims, and aphorisms of Confucius, dating from the 4th century b.c.
  • annual change traffic — (software)   (ACT) The fraction of the software product's source code which changes during a year, either through addition or modification. The ACT can be used to determine the product size in order to estimate software maintenance effort.
  • atomic unit of length — (in the Bohr atom) the radius of the electron orbit having the lowest energy.
  • butterfly common lisp — A parallel version of Common LISP for the BBN Butterfly computer.
  • cantilever foundation — a building foundation supporting its load partly or wholly upon cantilevers.
  • cause-effect graphing — (programming)   A testing technique that aids in selecting, in a systematic way, a high-yield set of test cases that logically relates causes to effects to produce test cases. It has a beneficial side effect in pointing out incompleteness and ambiguities in specifications.
  • certificate authority — (cryptography, body)   (CA or "Trusted Third Party") An entity (typically a company) that issues digital certificates to other entities (organisations or individuals) to allow them to prove their identity to others. A Certificate Authority might be an external company such as VeriSign that offers digital certificate services or they might be an internal organisation such as a corporate MIS department. The Certificate Authority's chief function is to verify the identity of entities and issue digital certificates attesting to that identity. The process uses public key cryptography to create a "network of trust". If I want to prove my identity to you, I ask a CA (who you trust to have verified my identity) to encrypt a hash of my signed key with their private key. Then you can use the CA's public key to decrypt the hash and compare it with a hash you calculate yourself. Hashes are used to decrease the amount of data that needs to be transmitted. The hash function must be cryptographically strong, e.g. MD5.
  • clostridium difficile — Clostridium difficile is a bacterium that causes severe diarrhoea. It is commonly found in hospitals. C.diff is also used.
  • coinfectious immunity — premunition.
  • comfortably-furnished — containing comfortable furniture
  • computer conferencing — the conduct of meetings through the use of computer-based telecommunications
  • contextual definition — definition of a word or symbol by explaining the meaning of the phrase or statement in which it occurs.
  • counsel of perfection — excellent but unrealizable advice
  • count of monte cristo — a novel (1844–45) by Alexandre Dumas père.
  • credit life insurance — insurance guaranteeing payment of the unpaid portion of a loan if the debtor should die.
  • customer satisfaction — When customers are pleased with the goods or services they have bought, you can refer to customer satisfaction.
  • dataflow architecture — a means of arranging computer data processing in which operations are governed by the data present and the processing it requires rather than by a prewritten program that awaits data to be processed
  • department of justice — the department of the U.S. federal government charged with the responsibility for the enforcement of federal laws. Abbreviation: DOJ.
  • differential calculus — the branch of mathematics that deals with differentials and derivatives.
  • diffusion coefficient — the rate at which a diffusing substance is transported between opposite faces of a unit cube of a system when there is unit concentration difference between them
  • electric flux density — Electric flux density is electric flux passing through a unit area perpendicular to the direction of the flux.
  • faculty board meeting — a meeting of the governing body of a faculty
  • ferric sodium oxalate — an emerald-green, crystalline, extremely water-soluble salt, used in photography and blueprinting.
  • financial underwriter — A financial underwriter is an insurance employee working in financial underwriting.
  • fraudulent conversion — conversion committed with the intent to defraud
  • fuel injection engine — and engine with a system for introducing atomized liquid fuel under pressure directly into the combustion chambers of an internal-combustion engine without the use of a carburettor
  • full faith and credit — the obligation under Article IV of the U.S. Constitution for each state to recognize the public acts, records, and judicial proceedings of every other state.
  • functional dependency — (database)   Given a relation R (in a relational database), attribute Y of R is functionally dependent on attribute X of R and X of R functionally determines Y of R (in symbols R.X -> R.Y) if and only if each X in R has associated with it precisely one Y in R (at any one time). Attributes X and Y may be composite. This is very close to a function in the mathematical sense.
  • functional illiterate — a person with some basic education who still falls short of a minimum standard of literacy or whose reading and writing skills are inadequate to everyday needs.
  • functional imperative — a requirement for the survival of any social system, as communication, control of conflict, or socialization.
  • ground-effect machine — ACV (def 2).
  • high court of justice — an English court formed in 1873 from several superior courts and consisting of a court of original jurisdiction (High Court of Justice) and an appellate court (Court of Appeal)
  • higher-order function — (HOF) A function that can take one or more functions as argument and/or return a function as its value. E.g. map in (map f l) which returns the list of results of applying function f to each of the elements of list l. See also curried function.
  • hubble classification — a method of classifying galaxies depending on whether they are elliptical, spiral, barred spiral, or irregular
  • in (or out of) place — in (or out of) the customary, proper, or assigned place
  • in the course of time — eventually
  • infectious ectromelia — ectromelia (def 2).
  • insurance certificate — a certificate that shows that a person or organization has insurance
  • lafcadio's adventures — French Les Caves du Vatican. a novel (1914) by André Gide.
  • learning difficulties — difficulty experienced in reaching the average standard of people of the same age group as regards intellectual and cognitive skills and performance
  • line of communication — a means by which information may be transmitted from one person to another
  • magnetic flux density — Also called magnetic flux density. a vector quantity used as a measure of a magnetic field. Symbol: B.
  • magnetofluid dynamics — magnetohydrodynamics.
  • manufacturing process — chain of production
  • modulus of elasticity — the ratio of the stress applied to a body or substance to the resulting strain within the elastic limit
  • muon-catalysed fusion — an experimental form of nuclear fusion in which hydrogen and deuterium muonic atoms are formed. Because the mass of the muon is much larger than that of the electron, the atoms are smaller, and the nuclei are close enough for fusion to occur
  • north pacific current — a warm current flowing eastward across the Pacific Ocean.
  • one-way hash function — (algorithm)   (Or "message digest function") A one-way function which takes a variable-length message and produces a fixed-length hash. Given the hash it is computationally infeasible to find a message with that hash; in fact one can't determine any usable information about a message with that hash, not even a single bit. For some one-way hash functions it's also computationally impossible to determine two messages which produce the same hash. A one-way hash function can be private or public, just like an encryption function. MD5, SHA and Snefru are examples of public one-way hash functions. A public one-way hash function can be used to speed up a public-key digital signature system. Rather than sign a long message, which can take a long time, compute the one-way hash of the message, and sign the hash.

On this page, we collect all 21-letter words with F-E-T-U-C-I. It’s easy to find right word with a certain length. It is the easiest way to find 21-letter word that contains in F-E-T-U-C-I to use in Scrabble or Crossword puzzles

Was this page helpful?
Yes No
Thank you for your feedback! Tell your friends about this page
Tell us why?