Word: twofold
(lookup in dictionary)
(lookup stats)
Dates: all
Sort By: most recent first
(reverse)
Genetically modifying plants to produce more food is a twofold folly. This untested and possibly risky procedure only masks the painful effects of an unsustainably large population. If genetic engineering of plants fails, it irreversibly contaminates current gene pools. If it succeeds, it will result in continued population growth in areas that have already exceeded their capacity. CAROLYN HOAGLAND Sewanee, Tenn...
...make his autonomy agenda a reality, Chen is now faced with the twofold challenge of maintaining the country's economic prosperity while holding China at bay. Most of the country is still more concerned with peace and safety than political autonomy and will quickly defect to the Nationalists if a threat of aggression becomes real. What's more, investors both within and without Taiwan trust the Nationalists' economic stewardship. Many Taiwanese may love the concept of autonomy, but will still take a silent relationship with China over jeopardizing their economic and physical safety...
...critics weren't prepared for the study in last week's Journal of the American Medical Association. A review of HMO and Medicaid prescription records shows that over the five-year period from 1991 to 1995, the number of stimulant prescriptions written for preschoolers (ages 2 to 4) increased twofold to threefold. That's a jump of 200% to 300%. Next we will be prescribing Ritalin for toddlers...
...answer to this dilemma, the Student Playwrights Project focuses more on the scripts themselves, putting together staged readings of the plays as opposed to full productions. "Readings are perfect, because they merely require a bit of rehearsal and minimum technical work," McClelland explains. "The advantages of staged readings are twofold: they allow the writer's vision to be more fully realized by adding the actions which augment the words, and they are simply more dynamic and interesting than seated play readings...
...different sources, possibly sent with forged return addresses, the systems under attack are unable simply to screen out the attackers and continue business as usual. Indeed, even the best protections can sometimes be overcome by the brute force of thousands of network requests. The implications of such defenselessness are twofold...