Help


[permalink] [id link]
+
Page "Open mail relay" ¶ 11
from Wikipedia
Edit
Promote Demote Fragment Fix

Some Related Sentences

They and compare
They " tell no one " what they have seen (), compare with,,,.
They compare well with the chemistry of the other group 4 elements, even though some calculations had indicated that the element might show significantly different properties due to relativistic effects.
They compare more favorably with firms from lower middle income countries, but are hampered by inadequate governance arrangements and infrastructure.
They commonly compare the fulfillment of Christian prophecies to Jesus ' fulfillment of Jewish prophecies, where in both cases people were expecting the literal fulfillment of apocalyptic statements.
They compare them to non-literal expressions by Jesus such as " I am the door ", " I am the vine ", " You are the salt of the earth ... You are the light of the world " ()," Beware of the leaven of the Pharisees and the Sadducees " ().
They then compare their grids and play tic-tac-toe by filling in the squares by the priority they listed before.
They found that a breadth-first crawl captures pages with high Pagerank early in the crawl ( but they did not compare this strategy against other strategies ).
They were slain by the spring's guardian water-dragon ( compare the Lernaean Hydra ), which was in turn destroyed by Cadmus, the duty of a culture hero of the new order.
They compare it, of course, with Ulysses.
They may have originally been two aspects of Carmenta, namely those of her knowledge of the future and the past ( compare the two-faced Janus ).
They compare in their complexity of interpenetrating internal spaces with contemporaneous work in Italy by Francesco Borromini.
They may join to have an excuse to cosplay, to compare work, share tips or any other personal reason.
They had had difficulty finding sufficient same-week and same-village births to compare with champions born in rural areas and so had chosen only champions born in larger cities.
They compare the physical sensations experienced by a person in the state of wajd to a state of physical drunkenness, and therefore do not condone it.
They have readily adapted to urban environments ( compare urban opossums, skunks and foxes ), scavenging garbage bins and other food sources.
They were more disparagingly referred to as Kathedersozialisten, rendered in English as " Socialists of the Chair " ( compare armchair revolutionary ), due to their position as professors ( depicted sitting in chairs ).
They are most frequently used to compare a sample to a standard normal deviate ( standard normal distribution, with μ = 0 and σ = 1 ), though they can be defined without assumptions of normality.
They compare their sad stories and joyfully realise they are father and daughter.
*" They talk of Roman roads in Europe but they don't compare to Gaglardi roads in British Columbia.
They also re-photographed Central Asia, Kazhakstan, eastern Siberia, and the southwestern USSR in order to compare images with those taken earlier in the mission.
They take their name from the crossbenches, between and perpendicular to the government and opposition benches, where crossbenchers sit in the chamber ; compare frontbencher and backbencher.
They fail to grasp his meaning and compare everything he says to their idea of Halloween.
They compare stories and finally put both halves of the puzzle together.
They continue to give examples of influence and compare the works of two composers.

They and network
They found that the key is for software to monitor the number of scans that machines on a network sends out.
They are also cheaper to set up because most desktop operating systems have the software required for the network installed by default.
They navigated the seas and established a trade network with tribes in the Andes and the Amazon.
They ingratiate themselves with the all-powerful network bosses, while the real work is in fact done by their long-suffering production staff.
They are responsible for the network services such as email, file, and security.
They believed that the economics would encourage network providers to deliberately erode the quality of best effort traffic as a way to push customers to higher priced QoS services.
They designed and built the radios that communicated the Apollo Moon landings and the high frequency radio network that allows worldwide communication with US military aircraft.
( They did attempt a series of daily prime time soaps, which aired on newly created sister network MyNetworkTV, but the experiment was largely a failure.
They booted over the network ( via an Excelan EXOS / 101 Ethernet card ) from their controlling computer.
They have been working together to adapt the network code and build system.
They also believe that the network knows more about them than they do about themselves.
They have no network infrastructure of their own.
They thus became wholly dependent on the spurious information which was fed to them by Garbo's network and the other Double-Cross agents.
They can also be found embedded in devices such as printers, routers, webcams and serving only a local network.
They are still able to absorb heat through this armour, as a network of small capillaries allow blood through the scales to absorb heat.
They can be vertically or horizontally oriented, and form a network that allows travel throughout large volumes of a starship even when the turbolifts are not functioning.
They also installed a closed-circuit television system and radio network that reached 41 countries, with many other forms of expensive high-tech electronic equipment.
They typically provide access to files using network file sharing protocols such as NFS, SMB / CIFS ( Server Message Block / Common Internet File System ), or AFP.
They also lacked a support network within the camps and were ostracized in the prison community.
They are sent through email messages, postings on social network sites, and text messages.
They swept over the vastly unprepared 106th Infantry Division, overrunning two of its regiments who surrendered virtually intact, and finally capturing the key road and railroad network in St. Vith.
They may also take with them knowledge of many kinds of passwords outside of the network, such as building security codes or banking passwords.
They are normally used for broadcast feeds to and from television networks and local affiliate stations ( such as program feeds for network and syndicated programming, live shots, and backhauls ), as well as being used for distance learning by schools and universities, business television ( BTV ), Videoconferencing, and general commercial telecommunications.
They must maintain a large informed network of supporters who can be mobilized for events to garner media attention and influence policy changes.

0.508 seconds.