configuration control action

  • 81Bell P-39 Airacobra — P 39 Airacobra P 39Q 1BE 42 19447, Saga Boy II of Lt. Col. Edwin S. Chickering, CO 357th Fighter Group, July 1943 Role Fighter …

    Wikipedia

  • 82Oracle Corporation — Type Public Traded as NYSE: ORCL NASDAQ:  …

    Wikipedia

  • 83Dornier Do 217 — Do 217 Do 217 E 2 Role Medium bomber Heavy bomber …

    Wikipedia

  • 84Gun laws in the United States (by state) — U.S. Firearms Legal Topics Assault weapons ban ATF Bureau Brady Handgun Violence Prevention Act Concealed carry in the U.S. Domestic Violence Offender Gun Ban …

    Wikipedia

  • 85Technical features new to Windows Vista — This article is part of a series on Windows Vista New features Overview Technical and core system Security and safety Networking technologies I/O technologies Management and administration Removed features …

    Wikipedia

  • 86F-16 Fighting Falcon variants — A large number of F 16 Fighting Falcon variants have been produced by General Dynamics, Lockheed Martin, and various licensed manufacturers. These versions, along with major modification programs and derivative designs significantly influenced by …

    Wikipedia

  • 87lake — lake1 /layk/, n. 1. a body of fresh or salt water of considerable size, surrounded by land. 2. any similar body or pool of other liquid, as oil. 3. (go) jump in the lake, (used as an exclamation of dismissal or impatience.) [bef. 1000; ME lak(e) …

    Universalium

  • 88Lake — /layk/, n. Simon, 1866 1945, U.S. engineer and naval architect. * * * I Relatively large body of slow moving or standing water that occupies an inland basin. Lakes are most abundant in high northern latitudes and in mountain regions, particularly …

    Universalium

  • 89Hemoglobin — Hemoglobin, human, adult (heterotetramer, (αβ)2) Structure of human hemoglobin. The protein s α and β subunits are in red and blue, and the iron containing heme groups in green. Fro …

    Wikipedia

  • 90Spyware — is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically,… …

    Wikipedia