Help


[permalink] [id link]
+
Page "Chess960" ¶ 34
from Wikipedia
Edit
Promote Demote Fragment Fix

Some Related Sentences

When and castling
When castling on a physical board with a human player, it is recommended that the king be moved outside the playing surface next to his final position, the rook then be moved from its starting to ending position, and then the king be placed on his final square.
When castling those pieces are the king and rook, and in capturing moves they are the capturing and the captured piece.
When a chess clock is used, pressing the button can be taken as a sign that a castling move has been completed.
When using an electronic board, to castle one should remove the king, remove the castling rook, place the castling rook on its new position, and then place the king on its new position.
When they agreed to swap jobs in November 2011, with Putin retaking his old position of president which Medvedev had held for four years ( because Putin was constitutionally barred from having a third term in a row ), many in Russia called this " castling " (" рокировка "-" rokirovka ")-after the move in chess when the king and a castle swap sides.
When White does play 5. Nc3, it is usually with the idea of continuing 5 ... Bg7 6. Be3 Nf6 7. Bc4 0-0 8. Bb3 ( forestalling any tricks involving ... Nxe4 and ... d5 ), followed by kingside castling.

When and using
When he had given the call a few moments thought, he went into the kitchen to ask Mrs. Yamata to prepare tea and sushi for the visitors, using the formal English china and the silver tea service which had been donated to the mission, then he went outside to inspect the grounds.
When he returned home, the station wagon loaded with tools, Jinny had gone with a friend to some meeting in the village, using the recently purchased second car.
When the early part of the gradient was flattened, either by using the gradient shown in Fig. 2 or by allowing the `` cone-sphere '' gradient to become established more slowly, Region 2 activity could sometimes be separated into two areas ( donors P. J. and R. S., Fig. 1 and E. M., Fig. 2 ).
When Selkirk's clothes wore out, he made new garments from goatskin using a nail for sewing.
When a specific allophone ( from a set of allophones that correspond to a phoneme ) must be selected in a given context ( i. e. using a different allophone for a phoneme will cause confusion or make the speaker sound non-native ), the allophones are said to be complementary ( i. e. the allophones complement each other, and one is not used in a situation where the usage of another is standard ).
When using the works of his authorities Alexander does not only review their reasoning but also gives conclusions, expands on them, and offers his agreements and disagreement with them.
When the lines joined, Labienus ordered the cavalry to attack ; as expected they successfully pushed back Caesar's cavalry until his hidden fourth line joined in, using their pila to thrust at Pompey's cavalry and turn them to flight.
When using a cipher the original information is known as plaintext, and the encrypted form as ciphertext.
When using biologically based regenerative practices, this dramatic benefit can be accomplished with no decrease in yields or farmer profits.
When using the 1581 together with the older C64, however, it is almost as slow as the older 1541 drive, due to limitations of the C64's ROM code.
When asked " Would you approve or disapprove of the UK using nuclear weapons against a country we are at war with?
When s < sup > 2 </ sup >− v < sup > 2 </ sup > is expanded using these expressions the result is
When using his title, he is normally styled as Lord Haden-Guest.
When this field is instead studied using the QED vacuum of quantum electrodynamics, it is seen that the plates do affect the virtual photons which constitute the field, and generate a net force — either an attraction or a repulsion depending on the specific arrangement of the two plates.
When using this definition, or may be the start symbol.
When the Air Force project wound down, the Lab turned their attention to an effort to build a version of the Whirlwind using transistors in place of vacuum tubes.
When Doonesbury ran the names of soldiers who had died in Iraq since the 2003 invasion, conservative commentators accused Trudeau of using the American dead to make a profit for himself, and again demanded that the strip be removed from newspapers.
When the database is ready ( all its data structures and other needed components are defined ) it is typically populated with initial application's data ( database initialization, which is typically a distinct project ; in many cases using specialized DBMS interfaces that support bulk insertion ) before making it operational.
When John Stossel accused USAID of not funding DDT because it wasn't " politically correct ," Anne Peterson, the agency's assistant administrator for global health, replied that " I believe that the strategies we are using are as effective as spraying with DDT ...
When data is replicated between database servers, so that the information remains consistent throughout the database system and users cannot tell or even know which server in the DBMS they are using, the system is said to exhibit replication transparency.
When an HTML page is rendered in a browser, the browser downloads the HTML into local memory and parses it, using the DOM to construct the internal data structures employed to display the page in the browser window.
When he broadcast on Welsh BBC, early in his career, he was introduced using this pronunciation.
When playing in the instrument's upper range ( above the G below middle C ), the player shifts their hand out from behind the neck and flattens it out, using the side of the thumb to press down the string.
When someone judges something to be good, or some action to be right, then the person is using the faculty of moral intuition.
When the United States resumed EVAs on April 7, 1983, astronauts started using an Extravehicular Mobility Unit ( EMU ) for self-contained life support independent of the spacecraft.

When and computer
When entries are being retrieved from this file, the table of dictionary usage indicates which entries to skip and which entries to store in the computer.
When AA was ported to the English Electric KDF9 computer, the character set was changed to ISO and that compiler has been recovered from an old paper tape by the Edinburgh Computer History Project and is available online, as is a high-quality scan of the original Edinburgh version of the Atlas Autocode manual.
When management refused to support the concept, Ahl left DEC in 1974 to found the seminal computer magazine, Creative Computing.
When a backplane is used with a plug-in single board computer ( SBC ) or system host board ( SHB ), the combination provides the same functionality as a motherboard, providing processing power, memory, I / O and slots for plug-in cards.
When a customer bought a minicomputer, at that time the smallest computer on the market, the computer did not come with Pre-installed software, but needed to be installed by engineers employed by the OEM.
When the amount of RAM is not sufficient to run all the current programs, it can result in a situation where the computer spends more time moving memory from RAM to disk and back than it does accomplishing tasks ; this is known as thrashing.
When the computer ran a program that needed access to a peripheral, the Central processing unit ( CPU ) would have to stop executing program instructions while the peripheral processed the data.
When a computer allows the use of folders, each file and folder has not only a name of its own, but also a path, which identifies the folder or folders in which a file or folder resides.
When this flag is turned on for a file ( which can be accomplished by a computer program or by a human user ), the file can be examined, but it cannot be modified.
When computer files contain information that is extremely important, a back-up process is used to protect against disasters that might destroy the files.
When a DHCP-configured client ( a computer or any other network-aware device ) connects to a network, the DHCP client sends a broadcast query requesting necessary information to a DHCP server.
* When using computer files or the Internet, often shortened to " e -" as in e-mail for electronic mail, or prefix " e " as in eCommerce for electronic commerce.
When expressing the abstract nature of computer science, he wrote
When a human played the game against the computer, the computer queried the Earl Weaver or Tony La Russa Expert System for a decision on what strategy to follow.
When social identity and ingroup status are salient, computer mediation can decrease flaming because individuals focus their attention on the social context ( and associated norms ) rather than themselves.
When a pilot moves the control column ( or sidestick ), a signal is sent to a computer ( analogous to moving a game controller ) the signal is sent through multiple wires ( channels ) to ensure that the signal reaches the computer.
When the term was introduced to wider society by the mainstream media in 1983, even those in the computer community referred to computer intrusion as " hacking ", although not as the exclusive use of that word.
When the music is stored in an audio file format that is lossless such as FLAC, Monkey's Audio or WMA Lossless, the computer playback of recorded audio can serve as an audiophile-quality source for a hi-fi system.
When they are both large, for instance more than 2000 bits long, randomly chosen, and about the same size ( but not too close, e. g. to avoid efficient factorization by Fermat's factorization method ), even the fastest prime factorization algorithms on the fastest computers can take enough time to make the search impractical ; that is, as the number of digits of the primes being factored increases, the number of operations required to perform the factorization on any computer increases drastically.
When the PDA is repaired or replaced, it can be " re-synced " with the computer, restoring the user's data.
When the terms formal parameter and actual parameter are used, they generally correspond with the definitions used in computer science.

0.221 seconds.