0%

21-letter words containing f, i, t, y

  • a crying need for sth — If you say that there is a crying need for something, you mean that there is a very great need for it.
  • a fly in the ointment — If you describe someone or something as a fly in the ointment, you think they spoil a situation and prevent it being as successful as you had hoped.
  • a nasty piece of work — If you say that someone is a nasty piece of work, you mean that they are very unkind or unpleasant.
  • a sight for sore eyes — a person or thing that one is pleased or relieved to see
  • antiferromagnetically — In an antiferromagnetic manner.
  • antimony pentasulfide — a deep-yellow, water-insoluble powder, Sb 2 S 5 , used chiefly as a pigment in oil and water colors.
  • away with the fairies — out of touch with reality
  • axiom of countability — the property satisfied by a topological space in which the neighborhood system of each point has a base consisting of a countable number of neighborhoods (first axiom of countability) or the property satisfied by a topological space that has a base for its topology consisting of a countable number of subsets of the space (second axiom of countability)
  • butterfly common lisp — A parallel version of Common LISP for the BBN Butterfly computer.
  • certificate authority — (cryptography, body)   (CA or "Trusted Third Party") An entity (typically a company) that issues digital certificates to other entities (organisations or individuals) to allow them to prove their identity to others. A Certificate Authority might be an external company such as VeriSign that offers digital certificate services or they might be an internal organisation such as a corporate MIS department. The Certificate Authority's chief function is to verify the identity of entities and issue digital certificates attesting to that identity. The process uses public key cryptography to create a "network of trust". If I want to prove my identity to you, I ask a CA (who you trust to have verified my identity) to encrypt a hash of my signed key with their private key. Then you can use the CA's public key to decrypt the hash and compare it with a hash you calculate yourself. Hashes are used to decrease the amount of data that needs to be transmitted. The hash function must be cryptographically strong, e.g. MD5.
  • coinfectious immunity — premunition.
  • comfortably-furnished — containing comfortable furniture
  • correctional facility — A correctional facility is a prison or similar institution.
  • cost-benefit analysis — an analysis that takes into account the costs of a project and its benefits to society, as well as the revenue it generates
  • degradation of energy — the principle that during any irreversible process the total energy available to do work decreases.
  • dictionary definition — the meaning of a word as given in a dictionary or dictionaries
  • differential analyzer — an analog computer designed for solving certain differential equations.
  • differential geometry — the branch of mathematics that deals with the application of the principles of differential and integral calculus to the study of curves and surfaces.
  • differential topology — the branch of topology that studies the properties of differentiable manifolds that remain invariant under diffeomorphisms.
  • electric flux density — Electric flux density is electric flux passing through a unit area perpendicular to the direction of the flux.
  • eyes right (or left) — a command to snap the head to the right (or left) while marching, as a salute when passing in review
  • faculty board meeting — a meeting of the governing body of a faculty
  • forensic anthropology — the branch of physical anthropology in which anthropological data, criteria, and techniques are used to determine the sex, age, genetic population, or parentage of skeletal or biological materials in questions of civil or criminal law.
  • fort lesley j. mcnair — a military reservation in SW Washington, D.C., on the Potomac River, SW of the Capitol.
  • forward compatibility — (jargon)   The ability to accept input from later versions of itself. Forward compatibility is harder to achieve than backward compatibility, since, in the backward case, the input format is know whereas a forward compatible system needs to cope gracefully with unknown future features. An example of future compatibility is the stipulation that a web browser should ignore HTML tags it does not recognise. See also extensible.
  • franco-belgian system — French system.
  • free-floating anxiety — chronic anxiety occurring for no identifiable cause
  • functional dependency — (database)   Given a relation R (in a relational database), attribute Y of R is functionally dependent on attribute X of R and X of R functionally determines Y of R (in symbols R.X -> R.Y) if and only if each X in R has associated with it precisely one Y in R (at any one time). Attributes X and Y may be composite. This is very close to a function in the mathematical sense.
  • host command facility — (operating system)   (HCF) Used to access IBM S/36 and AS/400 computers from a mainframe.
  • infant mortality rate — number of babies dying
  • infertility treatment — treatment aimed at helping a couple conceive
  • infiltration capacity — the maximum rate at which a soil in a given condition will absorb water.
  • inflationary universe — a version of the big bang theory in which the universe underwent very rapid growth during the first fraction of a second before it settled down to its current rate of expansion.
  • lady of the camellias — French La Dame aux Camélias. a novel (1848) and play (1852) by Alexandre Dumas fils.
  • lafayette, marquis de — Marie Joseph Paul Yves Roch Gilbert du Motier [ma-ree zhaw-zef pawl eev rawk zheel-ber dy maw-tyey] /maˈri ʒɔˈzɛf pɔl iv rɔk ʒilˈbɛr dü mɔˈtyeɪ/ (Show IPA), Marquis de. Also, La Fayette. 1757–1834, French soldier, statesman, and liberal leader, who served in the American Revolutionary Army as aide-de-camp to General Washington, and took a leading part in the French revolutions of 1789 and 1830.
  • law of thermodynamics — any of three principles variously stated in equivalent forms, being the principle that the change of energy of a thermodynamic system is equal to the heat transferred minus the work done (first law of thermodynamics) the principle that no cyclic process is possible in which heat is absorbed from a reservoir at a single temperature and converted completely into mechanical work (second law of thermodynamics) and the principle that it is impossible to reduce the temperature of a system to absolute zero in a finite number of operations (third law of thermodynamics)
  • luminous flux density — luminous flux per unit of cross-sectional area.
  • macintosh file system — (file system)   A file on the Macintosh consists of two parts, called forks. The "data fork" contains the data which would normally be stored in the file on other operating systems. The "resource fork" contains a collection of arbitrary attribute/value pairs, including program segments, icon bitmaps, and parametric values. Yet more information regarding Macintosh files is stored by the Finder in a hidden file, called the "Desktop Database". Because of the complications in storing different parts of a Macintosh file in non-Macintosh file systems that only handle consecutive data in one part, it is common to only send the Data fork or to convert the Macintosh file into some other format before transferring it.
  • magnetic flux density — Also called magnetic flux density. a vector quantity used as a measure of a magnetic field. Symbol: B.
  • magnetofluid dynamics — magnetohydrodynamics.
  • manufacturing company — a company that manufactures goods
  • mayor of casterbridge — a novel (1886) by Thomas Hardy.
  • modulus of elasticity — the ratio of the stress applied to a body or substance to the resulting strain within the elastic limit
  • muon-catalysed fusion — an experimental form of nuclear fusion in which hydrogen and deuterium muonic atoms are formed. Because the mass of the muon is much larger than that of the electron, the atoms are smaller, and the nuclei are close enough for fusion to occur
  • myocardial infarction — heart attack. Abbreviation: MI.
  • network filing system — (spelling)   Misnomer for Network File System.
  • nightmare file system — Pejorative hackerism for Sun's Network File System (NFS). In any nontrivial network of Suns where there is a lot of NFS cross-mounting, when one Sun goes down, the others often freeze up. Some machine tries to access the down one, and (getting no response) repeats indefinitely. This causes it to appear dead to some messages (what is actually happening is that it is locked up in what should have been a brief excursion to a higher spl level). Then another machine tries to reach either the down machine or the pseudo-down machine, and itself becomes pseudo-down. The first machine to discover the down one is now trying both to access the down one and to respond to the pseudo-down one, so it is even harder to reach. This situation snowballs very quickly, and soon the entire network of machines is frozen - worst of all, the user can't even abort the file access that started the problem! Many of NFS's problems are excused by partisans as being an inevitable result of its statelessness, which is held to be a great feature (critics, of course, call it a great misfeature). ITS partisans are apt to cite this as proof of Unix's alleged bogosity; ITS had a working NFS-like shared file system with none of these problems in the early 1970s. See also broadcast storm.
  • nitrosylsulfuric acid — a clear, straw-colored, oily, corrosive liquid, HNO 5 S, used chiefly in the manufacture of dyes.
  • one-way hash function — (algorithm)   (Or "message digest function") A one-way function which takes a variable-length message and produces a fixed-length hash. Given the hash it is computationally infeasible to find a message with that hash; in fact one can't determine any usable information about a message with that hash, not even a single bit. For some one-way hash functions it's also computationally impossible to determine two messages which produce the same hash. A one-way hash function can be private or public, just like an encryption function. MD5, SHA and Snefru are examples of public one-way hash functions. A public one-way hash function can be used to speed up a public-key digital signature system. Rather than sign a long message, which can take a long time, compute the one-way hash of the message, and sign the hash.
  • pacific daylight time — the version of Pacific Standard Time that is in use when daylight saving time is being observed

On this page, we collect all 21-letter words with F-I-T-Y. It’s easy to find right word with a certain length. It is the easiest way to find 21-letter word that contains in F-I-T-Y to use in Scrabble or Crossword puzzles

Was this page helpful?
Yes No
Thank you for your feedback! Tell your friends about this page
Tell us why?