Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. Equal Access Act - Wikipedia

    en.wikipedia.org/wiki/Equal_Access_Act

    Mergens, 496 U.S. 226 (1990) The Equal Access Act is a United States federal law passed as Title VIII of the Education for Economic Security Act in 1984 to compel federally funded public secondary schools to provide equal access to extracurricular student clubs. Lobbied for by Christian groups who wanted to ensure students the right to conduct ...

  3. Computer Fraud and Abuse Act - Wikipedia

    en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act

    The Computer Fraud and Abuse Act of 1986 ( CFAA) is a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law ( 18 U.S.C. ยง 1030 ), which had been included in the Comprehensive Crime Control Act of 1984. [1] Prior to computer-specific criminal laws, computer crimes were prosecuted as mail and ...

  4. Access code - Wikipedia

    en.wikipedia.org/wiki/Access_code

    Access code may refer to: Authentication. Password, a secret word; Personal identification number (PIN), a secret; Telecommunications. Trunk access code, used to dial a domestic call; International access code, used to dial an international call; Area code, a segment of a telephone number; Other. Access Code, a 1984 film with Macdonald Carey

  5. Timeline of disability rights in the United States - Wikipedia

    en.wikipedia.org/wiki/Timeline_of_disability...

    This landmark document, produced by the University of Illinois, became the basis for subsequent architectural access codes Uniform Federal Accessibility Standard 1984 and the Americans with Disabilities Act 1990.

  6. National Information Infrastructure Protection Act - Wikipedia

    en.wikipedia.org/wiki/National_Information...

    National Information Infrastructure Protection Act. The National Information Infrastructure Protection Act ( Pub. L. 104โ€“294 (text) (PDF), 110 Stat. 3488, enacted October 11, 1996; H.R. 3723) was Title II of the Economic Espionage Act of 1996, as an amendment to the Computer Fraud and Abuse Act. [1]

  7. Timeline of computing 1980โ€“1989 - Wikipedia

    en.wikipedia.org/wiki/Timeline_of_computing_1980...

    US. Timex/Sinclair introduced the first computer touted to cost under $100 marketed in the U.S., the Timex Sinclair 1000. In spite of the flaws in the early versions, half a million units were sold in the first 6 months alone, surpassing the sales of Apple, Tandy, and Commodore combined. August 1982.

  8. Hackers: Heroes of the Computer Revolution - Wikipedia

    en.wikipedia.org/wiki/Hackers:_Heroes_of_the...

    QA76.6 .L469 1984. Hackers: Heroes of the Computer Revolution ( ISBN 0-385-19195-2) is a book by Steven Levy about hacker culture. It was published in 1984 in Garden City, New York by Doubleday. Levy describes the people, the machines, and the events that defined the Hacker culture and the Hacker Ethic, from the early mainframe hackers at MIT ...

  9. Nineteen Eighty-Four - Wikipedia

    en.wikipedia.org/wiki/Nineteen_Eighty-Four

    Nineteen Eighty-Four (also published as 1984) is a dystopian novel and cautionary tale by English writer George Orwell. It was published on 8 June 1949 by Secker & Warburg as Orwell's ninth and final book completed in his lifetime. Thematically, it centres on the consequences of totalitarianism, mass surveillance, and repressive regimentation ...