Word: scheme
(lookup in dictionary)
(lookup stats)
Dates: during 1990-1999
Sort By: most recent first
(reverse)
...half," Murphy said. "Since the Columbia [season-opening] game, we haven't finished teams off or played a consistent 60 minutes. I think we were too relaxed coming out [in the second half], then we started to press and didn't relax enough. We have good personnel, and the scheme is fine...
Though the table may appear to be just your normal credit card solicitation scheme, in fact, it's quite different...
That leaves a couple of different excuses to address. Both Murphy and Kacyvenski claimed that Rahne simply made great passes, that people weren't that open. Nevertheless, Harvard's scheme has to come into question because on some occasions there were huge gaps in the zone, and Rahne was able to pick the defense apart. Harvard also didn't put much pressure on Rahne in the final drives, which is puzzling because the Crimson's defensive line played well leading up to the last two series...
...This man has given a lot. I don't know if he'll be credited for it. He should be given credit." For Bebber, a reduction from 171 1/2 years to 12 was more than enough "credit" for a man who pleaded guilty to knowing about the whole deadly scheme beforehand. "This is an Oklahoma City judge who?s part of the community that this traumatized," says Cohen. "He?s obviously passionate about this. If you?re going to be tough, this is the crime to be tough about." Said a battle-weary McGuire afterward: "Might as well just...
...attempt to escape only drew unsuspecting Net surfers, including children, more deeply into Web pages full of explicit sex. That lurid webscam, allegedly cooked up by a Portuguese hacker and an Australian company, was halted last week by a federal court after the Federal Trade Commission uncovered the brazen scheme. It worked like this: first, according to the FTC, the perpetrators replicated hundreds of legitimate websites, ranging from the Japanese Friendship Garden to the Harvard Law Review. By changing a single line of hidden software code, the culprits then ensured that any visitor calling up these pages would automatically...