Word: list
(lookup in dictionary)
(lookup stats)
Dates: during 1980-1989
Sort By: most recent first
(reverse)
There are, however, more esoteric security measures being developed by computer companies. Callback is a recently-devised procedure where the user telephones the computer, the computer compares their number with a list of approved user numbers and calls the user back if the numbers match. User Verification/Encryption is a system still under development where a microchip in the user's terminal identifies them as authorized and translator encoded data coming from the main computer...
...Computers. The nature of corporate compliance is clearly defined by the government: computer companies must first obtain sufficient documentation and verification to know positively who the final recipient of their products will be and second they must not do business with companies on the Defense or Commerce Departments unauthorized list Companies on the unauthorized list have proven untrustworthy in their descriptions of product destinations according to the Commerce Department...
Santiago has pushed for 814 yards this season, best on the squad, and entering The Game he ranks fourth on Harvard's all-time single-season rushing list. He also leads the team in pass receptions with...
Santiago has also piled up enough yardage that he's only 13 yards short of third on the all-time single-season list, 136 shy of second...
...better than to take the words of Ortega and Marcial at face value. But they are not the point of the book. While Getting To Know The General is dedicated to "the friends of my friend, Omar Torrijos," its real goal is to eulogize the Panamanian leader. To the list of the General's accomplishments, not the least of which was setting Panama on the road to becoming only the second Central American nation to form a lasting democracy, Greene adds a deeply personal, very moving look at the man. Early in the book, Greene explains his interest in Latin...