No. | Word/phra | Example of u | Collocations / Synonym | Morphology |
1 | Application | The wide application of electronic computers in science and technology will free man from the labour of complicated measurement and computation | appliance submission | applicative(adj.) applicant (n.) |
2 | Browr | Google is basing the new product on its Chrome Web browr and the Linux open-source operating system. | brow (n.) brow (v.) | |
3 | Copyright | In particular, Parliament created "copy right" as the right to manufacture copies. | ||
4 | Download | Select if you want to limit the download time and amount of disk space. | ||
5 | Citation | By comparison, 1948 Triple Crown winner Citation raced 16 times before the Kentucky Derby. | citation index | cite(vt.) |
6 | Format | BitTorrent said it believed the format had the potential to "revolutioni" the media industry. | file format | formative (adj.) formalization (n.) formalize(v.) |
7 | Hyperlink | It declined to divulge how much a licence to u the hyperlink technology would cost. | ||
8 | Peripheral | That's a feature I don't think you've en anywhere in a peripheral for audio devices before. | peripheral device | peripherally(adv.) periphery (n.) |
9 | Plagiarism | There is a great deal more courwork—with all the attendant dangers of plagiarism and cramming. | piracy cribbing | plagiarist(n.) plagiarize (vi.) plagiarize (vt.) |
10 | Upload | High-definition cameras will be built into bikes so you can upload your ride to YouTube. | ||
11 | Tablet | At first glance, PeeWee PC's Pivot Tablet Laptop is a formidable rival to the long-standing OLPC XO. | tablet pc | |
12 | Inrt | They allowed you to get inside them and inrt commands into programs to alter almost anything. | inrt mode | inrtion (n.) |
13 | Spam | No spam, no lling products or rvices, no free advertising for your own blog. | junk mail | spammer (n.) |
14 | Databa | The high speed cutting databa system is developed. | databa system databa management | |
15 | Interface | The few attempts at interface customization, like the toolbar in MS Office, have failed mirably. | ur interface graphical ur interface | interfacial(adv.) |
16 | Heap | This paper propod an optimal Dijkstra algorithm which adopted the structure of binary heap and network side storage structure model. | heap sort | |
17 | Stack | Removing an element from a stack. | protocol stack | |
18 | Algorithm | Facebook has a parate algorithm for its Promoted Posts ad product, which launched in January. | arithmetic | algorithmic(adj.) |
19 | Bandwidth | That means the more bandwidth subscribers u, the more they will have to pay. | bandwidth control | |
20 | Binary | But computer only can process operation according to binary system. | dualistic | bin (n.) |
21 | Capacity | Ability for strategic planning and management, including capacity to administer extensive programmes and financial resources. | ability productivity | capability(n.) |
22 | Communication | This paper introduced USB communication technology. | communication system communication technology | communicative(adj.) communicator(n.) communicate(vt.) |
23 | Decimal | On one side is the casino, which can reliably calculate its advantage to two decimal points. | coded decimal | decimalization(adj.) decimalize(vt.) |
24 | Entity | Running curity of software entity. | entity type | |
25 | Function | The change is publicly accessible by a track-changes function on v website. | objective function | functional (adj.) functionally(adv.) functionality(n.) |
26 | Interrupt | The interrupt tting does not match tho on the card. Check your hardware ttings, and then try again. | external interrupt | interruptive(adj.) interruption(n.) |
27 | Kernel | The process is marked with PID numbers in kernel program. | kernel mode | |
28 | Matrix | Matrix computations for rules extraction are prented. | transfer matrix | |
29 | Occurrence | And in the event of such an occurrence taking place, that prents a great risk. | emergence appearance | occurrent(adj.) occur(v.) |
30 | Overflow | Therefore, the buffer overflow attack also becomes one of the foci of the antivirus software nowadays. | buffer overflow | overflowing(adj.) |
31 | Period | This can not only save a great deal in hardware investment, but also shorten the development period of new products, accommodate the change of market, and make great economic benefit. | long period | periodical (adj.) periodically(adv.) |
32 | Preemption | This paper analyzes the principle of the preemptible kernel and compares two approaches to implement preemption. | displacement subrogation | preemptive(adj.) preemptor (n.) preempt(vt.) |
33 | Process | And an example is given to describe the recommending process. | in process | procedural (adj.) procedure(n.) |
34 | Protocol | The communication protocol designed in this paper satisfies the requirements of general industry control. | communication protocol | |
35 | Queue | The third chapter is about message queue middleware. | priority queue | |
36 | Redundancy | Using +L-R algorithm can reduce data redundancy. | data redundancy | |
37 | Register | A new register allocation algorithm for predicated code is propod. | register system | registered (adj.) registration (n.) |
38 | Relay | Features 3D geometric modeling technology is the area of solid model relay technology is another important milestone. | frame relay | |
39 | Repeater | The hardware of the system contains three parts. They are 24-bit data acquisition substation, CAN repeater and CAN adapter ud for PC. | repeated (adj.) repeatedly (adv.) | |
40 | Scheme | It is proved that the scheme is feasible. | plan programme | scheming(adj.) schematically (adv.) |
41 | Sequence | Sequence should be various and adaptive in the web learning age. | quence analysis | quential (adj.) quent (n.) |
42 | Subt | The correlation feature lection algorithm and the genetic algorithm are adopted to lect the attribute feature subt. | data subt | |
43 | Terminal | The characteristic of Linux fits the terminal system. | terminal equipment | terminally (adv.) |
44 | Transaction | It can manage the component life circle and transaction. | transaction processing | transactor (n.) transact (vi.) transact (vt.) |
45 | Update | Self-increasing method is ud in knowledge update. | dynamic update | updating(n.) |
46 | Value | So P2P has great potential value on commerce and technology. | score | valuable(adj.) valuation(n.) |
47 | Workspace | With Skype in the workspace, I am visible to quality leads without even leaving the office | ||
48 | Predecessor | The prent scheduling algorithms are mostly bad on task duplication,and the dependence between the predecessor tasks and successor tasks is not well taken into account. | predecessor company | |
49 | Successor | Nintendo is developing a successor to the GameCube, dubbed Revolution, for a likely late-2006 launch. | heres | |
50 | Array | Designing optimum array processing toolbox bad on MATLAB. | phad array linear array | |
本文发布于:2023-05-07 18:00:19,感谢您对本站的认可!
本文链接:https://www.wtabcd.cn/fanwen/fan/90/99552.html
版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。
留言与评论(共有 0 条评论) |