Academic Vocabulary List Eason

更新时间:2023-05-07 18:00:19 阅读: 评论:0

Independent Learning Task: Academic Vocabulary List
Full Name: _________________________________________________________            Class: ________________________________
ILT3: Include approximately 50 words taken from reading texts to complete this table. The words lected should be of value to your future field of study.
Future field of study: ______________________________________________________
No.
Word/phra
Example of u
Collocations / Synonym
Morphology
1
Application
The wide application of electronic computers in science and technology will free man from the labour of complicated measurement and computation
appliance
submission
applicativeadj.)
applicant    (n.)
2
Browr
Google is basing the new product on its Chrome Web browr and the Linux open-source operating system.
brow    (n.)
brow    (v.)
3
Copyright
In particular, Parliament created "copy right" as the right to manufacture copies.
4
Download
Select if you want to limit the download time and amount of disk space.
5
Citation
By comparison, 1948 Triple Crown winner Citation raced 16 times before the Kentucky Derby.
citation index
cite(vt.)
6
Format
BitTorrent said it believed the format had the potential to "revolutioni" the media industry.
file format
formative (adj.)
formalization (n.)
formalize(v.)
7
Hyperlink
It declined to divulge how much a licence to u the hyperlink technology would cost.
8
Peripheral
That's a feature I don't think you've en anywhere in a peripheral for audio devices before.
peripheral device
peripherally(adv.)
periphery (n.)
9
Plagiarism
There is a great deal more courwork—with all the attendant dangers of plagiarism and cramming.
piracy
cribbing
plagiarist(n.)
plagiarize (vi.)
plagiarize (vt.)
10
Upload
High-definition cameras will be built into bikes so you can upload your ride to YouTube.
11
Tablet
At first glance, PeeWee PC's Pivot Tablet Laptop is a formidable rival to the long-standing OLPC XO.
tablet pc
12
Inrt
They allowed you to get inside them and inrt commands into programs to alter almost anything.
inrt mode
inrtion (n.)
13
Spam
No spam, no lling products or rvices, no free advertising for your own blog.
junk mail
spammer (n.)
14
Databa
The high speed cutting databa system is developed.
databa system
databa management
15
Interface
The few attempts at interface customization, like the toolbar in MS Office, have failed mirably.
ur interface
graphical ur interface
interfacial(adv.)
16
Heap
This paper propod an optimal Dijkstra algorithm which adopted the structure of binary heap and network side storage structure model.
heap sort
17
Stack
Removing an element from a stack.
protocol stack
18
Algorithm
Facebook has a parate algorithm for its Promoted Posts ad product, which launched in January.
arithmetic
algorithmic(adj.)
19
Bandwidth
That means the more bandwidth subscribers u, the more they will have to pay.
bandwidth control
20
Binary
But computer only can process operation according to binary system.
dualistic
bin (n.)
21
Capacity
Ability for strategic planning and management, including capacity to administer extensive programmes and financial resources.
ability
productivity
capability(n.)
22
Communication
This paper introduced USB communication technology.
communication system
communication technology
communicative(adj.)
communicator(n.)
communicate(vt.)
23
Decimal
On one side is the casino, which can reliably calculate its advantage to two decimal points.
coded decimal
decimalization(adj.)
decimalize(vt.)
24
Entity
Running curity of software entity.
entity type
25
Function
The change is publicly accessible by a track-changes function on v website.
objective function
functional (adj.)
functionally(adv.)
functionality(n.)
26
Interrupt
The interrupt tting does not match tho on the card. Check your hardware ttings, and then try again.
external interrupt
interruptive(adj.)
interruption(n.)
27
Kernel
The process is marked with PID numbers in kernel program.
kernel mode
28
Matrix
Matrix computations for rules extraction are prented.
transfer matrix
29
Occurrence
And in the event of such an occurrence taking place, that prents a great risk.
emergence
appearance
occurrent(adj.)
occur(v.)
30
Overflow
Therefore, the buffer overflow attack also becomes one of the foci of the antivirus software nowadays.
buffer overflow
overflowing(adj.)
31
Period
This can not only save a great deal in hardware investment, but also shorten the development period of new products, accommodate the change of market, and make great economic benefit.
long period
periodical (adj.)
periodically(adv.)
32
Preemption
This paper analyzes the principle of the preemptible kernel and compares two approaches to implement preemption.
displacement
subrogation
preemptive(adj.)
preemptor (n.)
preempt(vt.)
33
Process
And an example is given to describe the recommending process.
in process
procedural (adj.)
procedure(n.)
34
Protocol
The communication protocol designed in this paper satisfies the requirements of general industry control.
communication protocol
35
Queue
The third chapter is about message queue middleware.
priority queue
36
Redundancy
Using +L-R algorithm can reduce data redundancy.
data redundancy
37
Register
A new register allocation algorithm for predicated code is propod.
register system
registered (adj.)
registration (n.)
38
Relay
Features 3D geometric modeling technology is the area of solid model relay technology is another important milestone.
frame relay
39
Repeater
The hardware of the system contains three parts. They are 24-bit data acquisition substation, CAN repeater and CAN adapter ud for PC.
repeated (adj.)
repeatedly (adv.)
40
Scheme
It is proved that the scheme is feasible.
plan
programme
scheming(adj.)
schematically (adv.)
41
Sequence
Sequence should be various and adaptive in the web learning age.
quence analysis
quential (adj.)
quent (n.)
42
Subt
The correlation feature lection algorithm and the genetic algorithm are adopted to lect the attribute feature subt.
data subt
43
Terminal
The characteristic of Linux fits the terminal system.
terminal equipment
terminally (adv.)
44
Transaction
It can manage the component life circle and transaction.
transaction processing
transactor (n.)
transact (vi.)
transact (vt.)
45
Update
Self-increasing method is ud in knowledge update.
dynamic update
updating(n.)
46
Value
So P2P has great potential value on commerce and technology.
score
valuable(adj.)
valuation(n.)
47
Workspace
With Skype in the workspace, I am visible to quality leads without even leaving the office
48
Predecessor
The prent scheduling algorithms are mostly bad on task duplication,and the dependence between the predecessor tasks and successor tasks is not well taken into account.
predecessor company
49
Successor
Nintendo is developing a successor to the GameCube, dubbed Revolution, for a likely late-2006 launch.
heres
50
Array
Designing optimum array processing toolbox bad on MATLAB.
phad array
linear array

本文发布于:2023-05-07 18:00:19,感谢您对本站的认可!

本文链接:https://www.wtabcd.cn/fanwen/fan/90/99552.html

版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。

标签:
相关文章
留言与评论(共有 0 条评论)
   
验证码:
Copyright ©2019-2022 Comsenz Inc.Powered by © 专利检索| 网站地图