0%

14-letter words containing p, a, y, t

  • primary tissue — any tissue resulting directly from differentiation of an apical meristem.
  • principal type — The most general type of an expression. For example, the following are all valid types for the lambda abstraction (\ x . x): Int -> Int Bool -> Bool (a->b) -> (a->b) but any valid type will be an instance of the principal type: a -> a. An instance is derived by substituting the same type expression for all occurences of some type variable. The principal type of an expression can be computed from those of its subexpressions by Robinson's unification algorithm.
  • private equity — equity in a business that is raised from private sources, as opposed to shares that can be traded publicly
  • private treaty — a property sale based on terms resulting from a conference between buyer and seller.
  • processability — capable of being processed.
  • prognostically — of or relating to prognosis.
  • propitiatingly — to make favorably inclined; appease; conciliate.
  • proportionally — having due proportion; corresponding.
  • prosthetically — a device, either external or implanted, that substitutes for or supplements a missing or defective part of the body.
  • protectability — to defend or guard from attack, invasion, loss, annoyance, insult, etc.; cover or shield from injury or danger.
  • protocol layer — (networking)   The software and/or hardware environment of two or more communications devices or computers in which a particular network protocol operates. A network connection may be thought of as a set of more or less independent protocols, each in a different layer or level. The lowest layer governs direct host-to-host communication between the hardware at different hosts; the highest consists of user application programs. Each layer uses the layer beneath it and provides a service for the layer above. Each networking component hardware or software on one host uses protocols appropriate to its layer to communicate with the corresponding component (its "peer") on another host. Such layered protocols are sometimes known as peer-to-peer protocols. The advantages of layered protocols is that the methods of passing information from one layer to another are specified clearly as part of the protocol suite, and changes within a protocol layer are prevented from affecting the other layers. This greatly simplifies the task of designing and maintaining communication systems. Examples of layered protocols are TCP/IP's five layer protocol stack and the OSI seven layer model.
  • protoplanetary — of or relating to protoplanets
  • prototypically — in a prototypical manner
  • providentially — of, relating to, or resulting from divine providence: providential care.
  • provisionality — providing or serving for the time being only; existing only until permanently or properly replaced; temporary: a provisional government.
  • psycho-somatic — of or relating to a physical disorder that is caused by or notably influenced by emotional factors.
  • psychoacoustic — relating to psychoacoustics
  • psychoanalytic — a systematic structure of theories concerning the relation of conscious and unconscious psychological processes.
  • psychosomatics — the study of psychosomatic conditions
  • pterylographic — relating to pterylography
  • public analyst — a scientist who tests food, water etc to ensure that they are safe
  • pugilistically — a person who fights with the fists; a boxer, usually a professional.
  • pulmonary tree — the trachea, bronchi, and bronchioles of the lungs, which together resemble an upside-down tree.
  • pygmy marmoset — a related form, Cebuella pygmaea: the smallest monkey, inhabiting tropical forests of the Amazon
  • pyjama cricket — one-day cricket, in which the players wear colourful clothing rather than the traditional whites used in longer forms of the game
  • pyophthalmitis — suppurative inflammation of the eye.
  • pyramid letter — chain letter.
  • pyramidologist — a person who believes in pyramidology
  • pyrometallurgy — the process or technique of refining ores with heat so as to accelerate chemical reactions or to melt the metallic or nonmetallic content.
  • pyrophotograph — a photograph produced by a burning process, such as on glass or porcelain
  • pyrotechnician — a specialist in the origin of fires, their nature and control, etc.
  • pythagoreanism — the doctrines of Pythagoras and his followers, especially the belief that the universe is the manifestation of various combinations of mathematical ratios.
  • quoted company — a company whose shares are quoted on a stock exchange
  • radiotelephony — the constructing or operating of radiotelephones.
  • radium therapy — treatment of disease by means of radium.
  • railway porter — a person employed to carry luggage, parcels, supplies, etc at a railway station
  • rallying point — A rallying point is a place, event, or person that people are attracted to as a symbol of a political group or ideal.
  • raspberry tart — a fruit tart made with raspberries
  • recompensatory — serving to compensate, as for loss, lack, or injury.
  • red-lead putty — a compound for caulking pipe joints, made of red lead, white lead, and boiled linseed oil.
  • reflectography — a non-destructive technique which uses infrared light to see beneath the painted surface in works of art in order to obtain information about those artworks
  • replaceability — to assume the former role, position, or function of; substitute for (a person or thing): Electricity has replaced gas in lighting.
  • respectability — the state or quality of being respectable.
  • retail therapy — Retail therapy is the activity of shopping for clothes and other things in order to make yourself feel happier.
  • retirement pay — a pension; the pay a retired person gets
  • röntgenography — radiography
  • rotary printer — a machine for printing from a revolving cylinder, or a plate attached to one, usually onto a continuous strip of paper
  • rsa encryption — (cryptography, algorithm)   A public-key cryptosystem for both encryption and authentication, invented in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman. Its name comes from their initials. The RSA algorithm works as follows. Take two large prime numbers, p and q, and find their product n = pq; n is called the modulus. Choose a number, e, less than n and relatively prime to (p-1)(q-1), and find its reciprocal mod (p-1)(q-1), and call this d. Thus ed = 1 mod (p-1)(q-1); e and d are called the public and private exponents, respectively. The public key is the pair (n, e); the private key is d. The factors p and q must be kept secret, or destroyed. It is difficult (presumably) to obtain the private key d from the public key (n, e). If one could factor n into p and q, however, then one could obtain the private key d. Thus the entire security of RSA depends on the difficulty of factoring; an easy method for factoring products of large prime numbers would break RSA.
  • ruby-tail wasp — any of various brightly coloured wasps of the family Chrysididae, having a metallic sheen, which parasitize bees and other solitary wasps
  • safety-deposit — safe-deposit.
Was this page helpful?
Yes No
Thank you for your feedback! Tell your friends about this page
Tell us why?