Tech24 Deals Web Search

Search results

  1. Results from the Tech24 Deals Content Network
  2. List of pen names - Wikipedia

    en.wikipedia.org/wiki/List_of_pen_names

    This is a list of pen names used by notable authors of written work. A pen name or nom de plume is a pseudonym adopted by an author.A pen name may be used to make the author' name more distinctive, to disguise the author's gender, to distance the author from their other works, to protect the author from retribution for their writings, to combine more than one author into a single author, or ...

  3. Poem code - Wikipedia

    en.wikipedia.org/wiki/Poem_code

    The poem code is a simple and insecure, cryptographic method which was used during World War II by the British Special Operations Executive (SOE) to communicate with their agents in Nazi-occupied Europe. The method works by having the sender and receiver pre-arranging a poem to use. The sender chooses a set number of words at random from the ...

  4. The Road Not Taken - Wikipedia

    en.wikipedia.org/wiki/The_Road_Not_Taken

    The Road Not Taken. " The Road Not Taken " is a narrative poem by Robert Frost, first published in the August 1915 issue of the Atlantic Monthly, [1] and later published as the first poem in the 1916 poetry collection, Mountain Interval. Its central theme is the divergence of paths, both literally and figuratively, although its interpretation ...

  5. Junius manuscript - Wikipedia

    en.wikipedia.org/wiki/Junius_manuscript

    Junius manuscript. An illustration of patriarch Kenan, from the Junius manuscript. The Junius manuscript is one of the four major codices of Old English literature. Written in the 10th century, it contains poetry dealing with Biblical subjects in Old English, the vernacular language of Anglo-Saxon England. Modern editors have determined that ...

  6. The Life That I Have - Wikipedia

    en.wikipedia.org/wiki/The_Life_That_I_Have

    The Life That I Have. " The Life That I Have " (sometimes referred to as " Yours ") is a short poem written by Leo Marks and used as a poem code in the Second World War . In the war, famous poems were used to encrypt messages. This was, however, found to be insecure because enemy cryptanalysts were able to locate the original from published ...

  7. Code Name Verity - Wikipedia

    en.wikipedia.org/wiki/Code_Name_Verity

    Code Name Verity is a young adult historical fiction novel by Elizabeth Wein published in 2012. It focuses on the friendship between two young British women in World War II: a spy captured by Nazis in German-occupied France and the pilot who took her there. It was named a Michael L. Printz Honor Book in 2013, and shortlisted for the Carnegie ...

  8. All in the golden afternoon... - Wikipedia

    en.wikipedia.org/wiki/All_in_the_golden_afternoon...

    "All in the golden afternoon" is the preface poem in Lewis Carroll's 1865 book Alice's Adventures in Wonderland.The introductory poem recalls the afternoon that he improvised the story about Alice in Wonderland while on a boat trip from Oxford to Godstow, for the benefit of the three Liddell sisters: Lorina Charlotte (the flashing "Prima"), Alice Pleasance (the hoping "Secunda"), and Edith ...

  9. Code poetry - Wikipedia

    en.wikipedia.org/wiki/Code_poetry

    A code poem may be interactive or static, digital or analog. Code poems can be performed by computers or humans through spoken word and written text. Examples of code poetry include: poems written in a programming language, but human readable as poetry; computer code expressed poetically, that is, playful with sound, terseness, or beauty.