0%

22-letter words containing p, o, t, s, f

  • speckle interferometry — a photographic technique for clarifying the telescopic images of a star by taking short exposures of the electronic images of the star's speckle pattern and extrapolating properties of the starlight to create a more accurate composite image.
  • speech from the throne — (in Britain and the dominions of the Commonwealth) the speech at the opening of each session of Parliament in which the Government outlines its legislative programme. It is read by the sovereign or his or her representative
  • stereospecific polymer — an organic polymer in which the steric arrangements of groups on asymmetric carbon atoms occur in a regular sequence
  • subornation of perjury — the offense of bribing or otherwise persuading another to commit perjury.
  • the caring professions — professions such as nursing and social work that are involved with looking after people who are ill or who need help in coping with their lives
  • the medical profession — the occupation of working as a doctor of medicine
  • to fall to bits/pieces — To fall to pieces, or in British English to fall to bits, means the same as to fall apart.
  • to make a pig's ear of — If you make a pig's ear of something you are doing, you do it very badly.
  • to open the floodgates — If events open the floodgates to something, they make it possible for that thing to happen much more often or much more seriously than before.
  • to play fast and loose — If you say that someone is playing fast and loose, you are expressing disapproval of them for behaving in a deceitful, immoral, or irresponsible way.
  • to play happy families — to spend time with your family or partner and to outwardly give the impression of being happy (although this may not be the case)
  • unprofessional conduct — activity that is contrary to the accepted code of conduct of a profession
  • wi-fi protected access — (networking, security)   (WPA) A security scheme for wireless networks, developed by the networking industry in response to the shortcomings of Wired Equivalent Privacy (WEP). WPA uses Temporal Key Integrity Protocol (TKIP) encryption and provides built-in authentication, giving security comparable to VPN tunneling with WEP, with the benefit of easier administration and use.
Was this page helpful?
Yes No
Thank you for your feedback! Tell your friends about this page
Tell us why?