Search Details

Word: protecters (lookup in dictionary) (lookup stats)
Dates: during 1990-1999
Sort By: most recent first (reverse)


Usage:

...edict from the dining authorities, handed down just before the semester began, states that any person without an ID will not be admitted to meals. The rationale is to protect the cards, suddenly made more precious than gold by the advent of Crimson Cash...

Author: By Sarah J. Schaffer, | Title: HUNGER CLEANSES THE SPIRIT | 2/3/1996 | See Source »

...there is a better way to protect cash than by barring ID-less students from the dining halls. Students should still be able to orally tell checkers their ID numbers in order to eat as long as they do not bring guests in with them. That way, there is no way students will be taking money away from other students' ID cards...

Author: By Sarah J. Schaffer, | Title: HUNGER CLEANSES THE SPIRIT | 2/3/1996 | See Source »

...away from the mundanities of the world and fill your senses. Now, when we have television, movies and computers to assault our senses every day, maybe asking people to concentrate upon music is just too much. But its depth is too valuable to lose. We must do something to protect...

Author: By Sarah J. Schaffer, | Title: A Case of Classical Ignorance | 2/2/1996 | See Source »

...into question. Richard Mawe, Deena Mazer, Paula Plum and John P. Arnold each play fifteen people or more, many of whom are themselves performing their story. Clearly some characters are coloring the truth. Others are either delusional or simply lying. They want their memory to serve them and to protect them rather than hew to objectivity. The more deeply the actors dig into their characters the more the characters look like actors; resourceful, practiced, and more than mildly disingenuous...

Author: By Thomas Madsen, | Title: Memory Ignites in Nora Theater's Spoon | 2/1/1996 | See Source »

...while Harvard users dodged the bullet with little_red.a, the crisis raises an important point: there are things everyone can do to protect their computers and files from virus attacks...

Author: By Kevin S. Davis, | Title: tech TALK | 1/31/1996 | See Source »

Previous | 214 | 215 | 216 | 217 | 218 | 219 | 220 | 221 | 222 | 223 | 224 | 225 | 226 | 227 | 228 | 229 | 230 | 231 | 232 | 233 | 234 | Next