Search Details

Word: perfection (lookup in dictionary) (lookup stats)
Dates: during 1980-1989
Sort By: most recent first (reverse)


Usage:

Harvard swept its weekend schedule with a perfect score against Andover, 15-50. The Crimson, led by first-place finisher Todd Wells, captured the top seven positions of the race...

Author: By Michael J. Lartigue, | Title: Crimson Crushes JV Foes | 9/29/1988 | See Source »

Another essential rule about lying is that the timing has to be perfect, a subtlety to which vice presidential candidate Dan Quayle is not attuned. When someone asks you about your decision to use family connections in joining the National Guard during the Vietnam War, the right lie is not: "I did not know in 1969 that I would be in this room today...

Author: By Suk Han, | Title: Lying Down on the Job | 9/28/1988 | See Source »

...only thing we can say at this stage is that it is a tragedy, a mistake or a sabotage," said Johnson's manager, Larry Heidebrecht. "Up to five days before the race, Ben was in perfect condition. Something has happened in those days...

Author: NO WRITER ATTRIBUTED | Title: Johnson Loses Gold Medal | 9/27/1988 | See Source »

...That is a perfect example of what this department is going to provide, and it's the basic reason we don't trust this department," said William Noble of the Cambridge Tenants' Union...

Author: By Matthew M. Hoffman, | Title: Zoning Overhaul Criticized As Harmful in Short Term | 9/27/1988 | See Source »

...viruses are tiny scraps of genetic code -- DNA or RNA -- that can take over the machinery of a living cell and trick it into making thousands of flawless replicas of the original virus. Like its biological counterpart, a computer virus carries in its instructional code the recipe for making perfect copies of itself. Lodged in a host computer, the typical virus takes temporary control of the computer's disk operating system. Then, whenever the infected computer comes in contact with an uninfected piece of software, a fresh copy of the virus passes into the new program. Thus the infection...

Author: /time Magazine | Title: Technology: Invasion of the Data Snatchers | 9/26/1988 | See Source »

Previous | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | Next