Search Details

Word: access (lookup in dictionary) (lookup stats)
Dates: during 1980-1989
Sort By: most recent first (reverse)


Usage:

...port of Maputo come from the white-ruled republic. Another way for Mozambique to rake in South African rands would be by reopening its doors to tourism, a subject discussed in Pretoria and Maputo last week. Since Mozambique won independence in 1975, wealthy South Africans have been denied access to its big-game hunting, deep-sea fishing and summer houses overlooking...

Author: /time Magazine | Title: Mozambique: Sweet Talk | 1/30/1984 | See Source »

...Terminal hacks" say they often must wait up to an hour for a terminal, and then have to wait an additional 30 to 40 minutes to access one of the system's six computers...

Author: By The COMPUTERISM Of harvard, | Title: Learning the Wires | 1/27/1984 | See Source »

...influence of women on the Faculty, she says, can be seen in such diverse areas as the new parity women's athletic teams have reached in official financial support and widening access for women scholars in the hard sciences...

Author: By Michael W. Miller, | Title: Women in the Spotlight | 1/27/1984 | See Source »

...America's first museum founder, hopefully named his sons Rembrandt, Raphaelle and Rubens, not one work by these exalted names had yet crossed the Atlantic. The fact that 18th century America had few major artists is not news; the surprising thing, given the meagerness of taste and thin access to good art in Boston, Philadelphia and New York, was that it could support even one. That person, of course, was Copley, whose Boy with a Squirrel, sent to London in 1765, caused Sir Joshua Reynolds to advise its young author to get across the Atlantic "before your manner...

Author: /time Magazine | Title: Art: Manifest Destiny in Paint | 1/23/1984 | See Source »

Such factors as "traffic flow," "public access" and the "value of the equipment" all play important roles in determining security procedures, he added...

Author: By Christopher J. Georges, | Title: Police, B-School Review Computer Security Plan | 1/20/1984 | See Source »

Previous | 221 | 222 | 223 | 224 | 225 | 226 | 227 | 228 | 229 | 230 | 231 | 232 | 233 | 234 | 235 | 236 | 237 | 238 | 239 | 240 | 241 | Next