Homesessive Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Secret Service code name - Wikipedia

    en.wikipedia.org/wiki/Secret_Service_code_name

    Secret Service code name. President John F. Kennedy, codename "Lancer" with First Lady Jacqueline Kennedy, codename "Lace". The United States Secret Service uses code names for U.S. presidents, first ladies, and other prominent persons and locations. [1] The use of such names was originally for security purposes and dates to a time when ...

  3. Category:List of code names - Wikipedia

    en.wikipedia.org/wiki/Category:List_of_code_names

    Pages in category "List of code names" The following 7 pages are in this category, out of 7 total. This list may not reflect recent changes. F.

  4. List of ISO 3166 country codes - Wikipedia

    en.wikipedia.org/wiki/List_of_ISO_3166_country_codes

    ISO 3166-1 alpha-2 – two-letter country codes which are also used to create the ISO 3166-2 country subdivision codes and the Internet country code top-level domains. ISO 3166-1 alpha-3 – three-letter country codes which may allow a better visual association between the codes and the country names than the 3166-1 alpha-2 codes.

  5. List of Microsoft codenames - Wikipedia

    en.wikipedia.org/wiki/List_of_Microsoft_codenames

    Preliminary name Final name Notes Ref Razzle NT OS/2, Advanced Windows Windows NT 3.1: Is also the name of a script that sets up the Windows NT development environment. NT OS/2 reflected the first purpose of Windows NT to serve as the next version of OS/2, before Microsoft and IBM split up. Microsoft used the NT OS/2 code to release Windows NT 3.1.

  6. List of country calling codes - Wikipedia

    en.wikipedia.org/wiki/List_of_country_calling_codes

    Zone 5 uses eight 2-digit codes (51–58) and two sets of 3-digit codes (50x, 59x) to serve South and Central America. Zone 6 uses seven 2-digit codes (60–66) and three sets of 3-digit codes (67x–69x) to serve Southeast Asia and Oceania. Zone 7 uses an integrated numbering plan; two digits (7x) determine the area served: Russia or Kazakhstan.

  7. List of search engines - Wikipedia

    en.wikipedia.org/wiki/List_of_search_engines

    Find files and folders by name instantly on NTFS volumes Freeware GNOME Storage: Linux: Open-source desktop search tool for Unix/Linux GPL Google Desktop: Linux, Mac OS X, Windows: Integrates with the main Google search engine page. As of September 14, 2011, Google has discontinued this product. Freeware ISYS Search Software: Windows

  8. List of aircraft registration prefixes - Wikipedia

    en.wikipedia.org/wiki/List_of_aircraft...

    D-AUAA to D-AZZZ (test registrations) for aircraft manufactured by Airbus at Finkenwerder. D-BAAA to D-BZZZ for aircraft with 14–20 t MTOW. D-CAAA to D-CZZZ for aircraft with 5.7–14 t MTOW. D-EAAA to D-EZZZ for single-engine aircraft up to 2 t MTOW. D-FAAA to D-FZZZ for single-engine aircraft from to 2–5.7 t MTOW.

  9. ISO 3166-1 - Wikipedia

    en.wikipedia.org/wiki/ISO_3166-1

    ISO 3166-1. ISO 3166-1 ( Codes for the representation of names of countries and their subdivisions – Part 1: Country codes) is a standard defining codes for the names of countries, dependent territories, and special areas of geographical interest. It is the first part of the ISO 3166 standard published by the International Organization for ...

  10. List of mobile telephone prefixes by country - Wikipedia

    en.wikipedia.org/wiki/List_of_mobile_telephone...

    10. NANP member. Argentina. +54. 9/15. 10. All carriers: Claro, Movistar, Personal, Tuenti. 15 before the local number but after long distance area code for national calls (0 11 15 xxxx-xxxx) and 9 placed after the international access code excluding the 15 for international calls (+54 9 11 xxxx-xxxx). Armenia.

  11. Code name - Wikipedia

    en.wikipedia.org/wiki/Code_name

    A code name, codename, call sign or cryptonym is a code word or name used, sometimes clandestinely, to refer to another name, word, project, or person. Code names are often used for military purposes, or in espionage. They may also be used in industrial counter-espionage to protect secret projects and the like from business rivals, or to give ...