0%

11-letter words containing k, a, b, r, g, o

  • aerobraking — the use of aerodynamic braking in extremely low-density atmospheres in space at hypersonic Mach numbers
  • backgrounds — Plural form of background.
  • bankrolling — Present participle of bankroll.
  • bikram yoga — a form of yoga in which traditional exercises are performed at high temperature and humidity
  • block grant — (in Britain) an annual grant made by the government to a local authority to help to pay for the public services it provides, such as health, education, and housing
  • bokhara rug — a Turkoman rug having a tan or red background and decorated with varied octagon patterns.
  • dogger bank — a shoal in the North Sea, between N England and Denmark: fishing grounds; naval battle 1915.
  • dragon book — (publication)   The classic text "Compilers: Principles, Techniques and Tools", by Alfred V. Aho, Ravi Sethi, and Jeffrey D. Ullman (Addison-Wesley 1986; ISBN 0-201-10088-6). So called because of the cover design featuring a dragon labelled "complexity of compiler design" and a knight bearing the lance "LALR parser generator" among his other trappings. This one is more specifically known as the "Red Dragon Book" (1986); an earlier edition, sans Sethi and titled "Principles Of Compiler Design" (Alfred V. Aho and Jeffrey D. Ullman; Addison-Wesley, 1977; ISBN 0-201-00022-9), was the "Green Dragon Book" (1977). (Also "New Dragon Book", "Old Dragon Book".) The horsed knight and the Green Dragon were warily eying each other at a distance; now the knight is typing (wearing gauntlets!) at a terminal showing a video-game representation of the Red Dragon's head while the rest of the beast extends back in normal space. See also book titles.
  • keyboarding — the row or set of keys on a piano, organ, or the like.
  • nonbreaking — Alternative spelling of non-breaking.
  • orange book — (security, standard)   A standard from the US Government National Computer Security Council (an arm of the U.S. National Security Agency), "Trusted Computer System Evaluation Criteria, DOD standard 5200.28-STD, December 1985" which defines criteria for trusted computer products. There are four levels, A, B, C, and D. Each level adds more features and requirements. D is a non-secure system. C1 requires user log-on, but allows group ID. C2 requires individual log-on with password and an audit mechanism. (Most Unix implementations are roughly C1, and can be upgraded to about C2 without excessive pain). Levels B and A provide mandatory control. Access is based on standard Department of Defense clearances. B1 requires DOD clearance levels. B2 guarantees the path between the user and the security system and provides assurances that the system can be tested and clearances cannot be downgraded. B3 requires that the system is characterised by a mathematical model that must be viable. A1 requires a system characterized by a mathematical model that can be proven. See also crayola books, book titles.
  • outbreaking — The act of breaking out.
  • pawnbroking — the business of a pawnbroker.
  • raking bond — a brickwork bond in which concealed courses of diagonally laid bricks are used to bond exposed brickwork to the wall structure.

On this page, we collect all 11-letter words with K-A-B-R-G-O. It’s easy to find right word with a certain length. It is the easiest way to find 11-letter word that contains in K-A-B-R-G-O to use in Scrabble or Crossword puzzles

Was this page helpful?
Yes No
Thank you for your feedback! Tell your friends about this page
Tell us why?