(1) The interview tapes were transcribed verbatim and assigned a unique identifier for each participant.(2) Because member numbers can change, the date of birth is a unique identifier used to confirm that we are accessing the correct account and to eliminate duplicate subscriptions.(3) Similarly, an identifier used in program source text, such as is meant to stand for a global procedure or data type, could be made to refer to the source text defining the value to be bound to that global at runtime.(4) the new number is to be known as the u201cunique patient identifier.u201d(5) To radio listeners, it sounds vaguely like the quacking of a duck, but encoded within it is a timestamp, a station identifier , a region code, an expiration time, and a three-letter event code identifying the type of alert.(6) In that sense we use the metaphor of the bar code, it's a unique identifier for each species.(7) Think about it - the signs will probably have a unique identifier anyway, given by the roads crew to facilitate their placement.(8) All responses were anonymous and linked to individual respondents through a unique identifier , where only independent research assistants were able to match identifiers to students.(9) Rather, the filename's location will be resolvable with reference to its identifier .(10) The system gives patients a unique identifier and records details of sex, age, and each outpatient referral (including the specialty and dates of subsequent appointments).(11) The Driver and Vehicle Licensing Agency introduced new plates on Saturday, with location and age identifiers within the registration numbers.(12) We can provide rough sketches of how he looks, and probe for unique identifiers .(13) By necessity, this survey is anonymous, with no unique identifiers at all.(14) This is of very little use unless combined with other - more unique - personal identifiers .(15) You may need to query the/proc/bus/usb filesystem for your available USB identifiers , and you may need to try each identifier to find which one applies to your hardware.(16) Next, the host performs a series of numerical operations on stored keys and identifiers to assemble a Content Key.