mealymouthed
antilogarithms
counterattacks
overexpose
ensigns
fielder
Mulder
diagram