Example sentences of "access [prep] [adj] [noun sg] " in BNC.

  Next page
No Sentence
1 Here are ranged such organizations as the National Association of Language in Education Centres ( NALEC , 1985 ) on the one hand , whose membership commands direct access through professional development teachers and initial training lectures to classroom teachers and who take the predominantly phenomenological approach to language of ‘ reading through real books ’ .
2 If you camouflage your filter remember to allow easy access for regular maintenance .
3 They called for a ceasefire in the region and for access for humanitarian aid deliveries .
4 Status access for various corporation activities .
5 This heavy construction , which has good sound-insulating properties , provided an economic solution to the problem posed by the need to insert new floors in spite of the fact that all the beams had to be manhandled into position because there was no access for mechanical handling .
6 As resource allocation is meant to embody the principle of equal access for equal need this presents the problem of measuring need for health care .
7 The doctors examined carefully the hardware necessary to provide access for each doctor and also for the pharmaceutical dispensery .
8 There are new developments ahead in FE , such as new funding arrangements , which I hope will not add to the difficulties of access for any student who may require specific support for learning .
9 ICI needed a large flat site with access for ocean-going oil tankers .
10 However , US officials have claimed that their government has already taken all the necessary counter action to the 1985 ban by enforcing a $90 million retaliation on Italian tomatoes and restricting the access of Irish beef .
11 Private access of this kind raises other matters that you mention — confidentiality and informed consent .
12 This situation might seem more difficult in the case of physical activities such as walking : I walk , with or without conscious effort , it may be said , but have no access of any kind to the associated brain , nerve and muscle activities , even though we have perfectly good physiological evidence for the regular association of those activities with the act of walking .
13 In a sudden access of enraged energy , Dyson jumped out of the car , slammed the door violently behind him , and wrenched the bonnet open .
14 With a sudden access of cold doubt Louisa Agnew recognized that , beyond the narrow world of her books , of neither suffering nor joy had she any great understanding .
15 Much of the erm sector which is east of the A sixty four is very isolated from existing roads and the only access into that area is over the A sixty four or from the A sixty four .
16 Well it 's obvious that any er settlement in that area would have an impact on the A sixty four as that 's the only access into that area .
17 These interfaces provide access into other programming languages operating in supercomputing environments , such as message passing sub-routines .
18 These interfaces provide access into other programming languages operating in supercomputing environments , such as message passing sub-routines .
19 It is also clear from a recent evaluation that , despite the fact that the course was originally concerned with recruiting activists and not concerned with qualifications , the activists are now in the minority and that the course has become for many a means of access into higher education .
20 Freedom , variety , and debate may have to be provided by open access into existing news products ( existing papers , existing television networks ) and by variety and debate within these products .
21 Foreign investors were allowed direct access into domestic stock markets for the first time from June 5 .
22 Held , that , in the opinion of the court , in section 1(1) ( a ) of the Act of 1990 the words ‘ causes a computer to perform any function with intent to secure access to any program or data held in any computer , ’ in their plain and ordinary meaning , were not confined to the use of one computer with intent to secure access into another computer ; so that section 1(1) was contravened where a person caused a computer to perform a function with intent to secure unauthorised access to any program or data held in the same computer ( post , pp. 437A–B , C–D , 438A , E–F ) .
23 ( iii ) In respect of count 1 it was submitted that section 2(1) did not apply to the facts of this case ; in particular it was submitted that in order to contravene section 1(1) and therefore in turn section 2(1) it was necessary to establish that the offender had used one computer with intent to secure unauthorised access into another computer .
24 ‘ It is submitted : ( i ) the judge erred in law in his ruling on count 1 ; ( ii ) for an offence to be committed under section 1(1) of the Act there does not have to be the use by the offender of one computer with intent to secure unauthorised access into another computer ; ( iii ) there is no ambiguity in the wording of section 1(1) ( a ) of the Act which clearly refers to an intent to secure access to any program or data held in any computer ; ( iv ) section 17(2) and ( 3 ) are applicable to the alleged actions of the respondent in this case ; ( v ) the Act has been drafted so as to deal with the person who misuses a computer to which he has direct ( but unauthorised ) access , as well as a computer into which he is able to secure indirect access by operating another computer . ’
25 In respect of count 1 it was submitted that section 2(1) did not apply to the facts of this case and it was particularly submitted that in order to contravene section 1(1) , and therefore in turn section 2(1) , it was necessary to establish that the offender had used one computer with intent to secure unauthorised access into another computer .
26 It is submitted by Mr. Moses that , for an offence to be committed under section 1(1) of the Act , there does not have to be use by the offender of one computer with intent to secure unauthorised access into another computer .
27 We 've got support of social services , who actually own the access onto that site .
28 More detailed records on each employee will be held for access via each site 's own APL system ( Figure 4 ) .
29 In a computerised system , however , each document could well be stored at the same level across an entire institution , with access via key word searching on various fields , or full text retrieval .
30 In none of these cases could it be said that if a person entered the premises and caused a computer to exercise a function so as to reveal information , there had been access via one computer to another .
  Next page