Search Details

Word: commands (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...tournament also provided a showcase for the talents of senior forward Sarah Duncan. Showing why she is one of the Crimson's best players, Duncan, a Crimson co-captain, took command of the boards. She had nine rebounds against Tulane and blocked 11 shots in the two games. Duncan was selected to the all-tournament team...

Author: By Christine Dimino, | Title: Women Cagers Get Split Decision at Rice Classic | 11/28/1988 | See Source »

Wolf experts have long known that a pack has a social structure, but Mech and Brandenburg got to observe it intimately. The pack is led by a dominant, "alpha," male and female, and every other wolf knows its place in the chain of command. Much of wolf home life is focused on teaching the pups to be competitive, while at the same time schooling them in the social graces of the hierarchy...

Author: /time Magazine | Title: Environment: Two Wolf Men Go Wild in The High Arctic | 11/21/1988 | See Source »

George Bush's last and greatest mission has now been defined: he is charged with taking command of the Reagan Revolution, adjusting its course a bit, and guiding it safely into the 1990s...

Author: /time Magazine | Title: What To Expect: The outlook for the Bush years | 11/21/1988 | See Source »

...Navy may mistreat people," joked an officer last week, "but never dolphins." He was trying to defuse charges by Rick Trout, a former trainer at the Naval Ocean Systems Command in San Diego, that sea mammals in a classified Navy program had been beaten or starved during training, and that two had died as a result of abuse. The Marine Mammal Commission, announced that it will investigate...

Author: /time Magazine | Title: The Navy: The Case of Lieut. Dolphin | 11/14/1988 | See Source »

...infected host computer first sent a short message through "electronic mail" over the Internet to the target computer. By using a number of tricks, Morris' program made the target machine treat the message as a command program instead of ordinary mail, which the computer places into a file to be read by users if they wish. The message--now acting like a program--told each computer which received it to ask the host computer for the rest of the virus, according to Mckay Professor of Computer Science Mark Friedell...

Author: By Gregory R. Galperin, | Title: Computer `Virus' Infects Nation With Built-In Wile | 11/12/1988 | See Source »

First | Previous | 711 | 712 | 713 | 714 | 715 | 716 | 717 | 718 | 719 | 720 | 721 | 722 | 723 | 724 | 725 | 726 | 727 | 728 | 729 | 730 | 731 | Next | Last