Group 2, Task 1
:
Specialist vocabulary building exercise
No
New
word/phrase
Example of use
Related
Vocabulary
Morphology
1
Acyclic
In mathematics and computer
science, a directed acyclic
graph is a directed graph with
no directed cycles.
Botany
2
Multiplicity
Among the great
multiplicity
of
details that complete
battlefield 2, there is one
minor feature that is both
obscure and wonderful.
Magnitude,
numerousness
Multiple,
3
Induction
An example of induction is a
ceremony welcoming new
members of
the military.
generalization
Induce, inductive
4
Rectilinear
Rectilinear motion does not
require special calculation
Linear, one
-
dimension
5
Spreadsheet
A spreadsheet is a computer
application with tools that
increase the user's
productivity in
capturing,
analyzing, and sharing tabular
data sets
.
Computer
program
6
Epidemiology
Nevertheless, we were unable
to identify any studies
examining the epidemiology,
characteristics or
management of dysphagia in
a typical primary care
population.
Prevale
nce
e
pidemiological
,
e
pidemiologist
7
Combinatorial
But beside consistency
checks, there are other, often
overlooked, sources of
complexity that are purely
combinatorial
.
Math
Combinatory
8
Gradient
Preconditioned conjugate
gradients are shown to be
extremely effective for all
symmetric problems.
concentration
gradient
Gradient
9
Anneal
Annealing of the films in
precisely controlled
atmospheres showed that the
ferromagnetism in our films is
not linked to the carrier
concentration density
.
harden,
indurate
annealer
10
Convergence
Convergence of computing
and home entertainment is
where
M
icrosoft believes it
can establish a new market
share.
encounter,
meeting
convergent
11
Optimization
Equation display is
an
automatically optimization
for
the reso
lution of the user's
screen.
improvement
optimize, optimal
12
Bug
Errors in computer programs
are called bugs.
Error
buggy
13
Assemble
Assembled
point police
snatched the pedal powered
sound
system from the crowd
and prevented the
autonomous bloc from
assembling in the square.
b
ring together,
join
assembly
14
Arithmetic
Integer arithmetic within the
decoders does not work, due
to the algorithms used.
math
Arithmetically,
arithmetician
15
Optical
This all optical computing, or ‘
light
controlling light ‘
has
remained a dream of
technologists for some time.
visual
Optically
, optic
16
Interrupt
Interrupt routine performs a
graphics operation it may
adversely affect graphics
output from the rest of the
program.
break
interruptible,
interruptive
17
Cryptography
Kerberos is a ne
twork security
protocol from MIT
that uses
private key cryptography to
provide strong security
between nodes.
e
ncryption
cryptographer,
cryptographic
18
Pragma
In C/C++ programming
languages,
pragma is
a
directive communicating
additional implementation
-
specific information.
computer
programming
language
pragmatic
19
Natural
language
processing
Natural language processing
gives machines the ability to
read and understand the
languages that humans speak
process
20
Cognitive
simulation
Cognitive simulation in
computer is primarily based
on linguistic development in
young children.
21
Paradigm
Analysis and design the
object
-
oriented paradigm is a
new and different way of
thinking about programming.
pattern,
example,
sample
paradigmatic
22
Evolutionary
Evolutionary computation
uses a form of optimization
search
.
Bio
-
informatics
evolution
23
Circumscription
The T
axon
circumscription
that these publications provide
is therefore usually limited to a
geographic area.
restriction,
confinement
circumscriptive
24
Machine
learning
Machine learning is the science
of getting computers to act
without being explicitly
programmed
Computer,
algorithm
25
Hierarchical
In a few clicks create
hierarchical a menu with
special effects, menu style, ...
and a ton of powerful
parameters.
rank
hierarchically
26
computing
platform
A computing platform includes
a hardware
architecture and a
software framework (including
application frameworks),
where the combination allows
software, particularly
application software, to run
.
Computer,
operating
system
27
Transcend
Transcend duality than
paintings or photographs upon
a fla
t surface can go beyond
two dimensions.
excel, surpass,
stand out
transcendingly
28
Compatible
However
USB
2.0 devices are
backward compatible with
USB
1.1 interfaces.
harmonious,
matched
Compatibility
,
compatibly
29
Memory
allocation
The dynamic memory
allocation algorithm actually
used can impact performance
significantly and a study
conducted in 1994 by Digital
Equipment Corporation
illustrates the overheads
involved for a variety of
allocators.
Computer,
memory
management
30
Intermediary
Intermediary is therefore that
all departments should involve
interpreter,
translator
intermediary
private and voluntary sector
intermediaries for e
-
government services as part
of their overall e
-
government
strategy.
31
Android
It was the J
apanese who
rea
lly liked robots; so they
would breed the electronic
wizards most likely to
construct the first genuine
androids.
robot,
automaton,
golem
android
32
Multi
-
tasking
The running of two or more
programs in one computer at
the same time
is called
Multitasking.
Computer,
operating
system
multitask
33
primitive
Postscript is a T
uring
-
complete reverse polish
programming language wi
th
drawing primitives based on
B
ezier curves.
formula,
expression
Primitiveness
,
primitively
34
batch
processing
Batch processing is
execution
of a series of programs
("jobs") on a computer without
manual intervention.
Computer,
program
35
Virtual memory
In computing, virtual memory
is a memory management
technique developed for
multitasking kernels.
Computer,
memory
management
36
Interface
Despite advances in human
-
computer interface design, we
are accustomed to a quality of
communication that no
computer can yet convey.
C
omputer
science,
computing
37
Exponential
We review briefly the solution
of linear equations by using
the
matrix exponential and the
J
ordan canonical form of a
matrix.
function,
mapping,
mathematical
function, single
-
valued function,
map
exponentially
38
Asymmetric
Asymmetric digital subscriber
line (ADSL), for example,
supports more bandwidth
downstream than
upstream.
Etymology
Asymmetric
ally
39
Anonymous
In computer science, an
anonymous pipe is a simplex
FIFO communication channel
anonymity,
anonymousness
that may be used for one
-
way
inter
-
process communication
(IPC).
40
Clipboard
To change the clipboard
options when the clipboard
task pane is displayed an icon
appears in the system tray on
the taskbar.
Computer
science,
Computer
memory
41
mainstream
Before virtual memory could
be implemented in
mainstream operating
systems, many problems had
to be addr
essed.
thought,
exportable,
exportability
42
Mail merge
Mail merge is a software
function describing the
production of multiple (and
potentially large numbers of)
documents from a single
template form and a
structured data source.
43
Polymorphi
sm
In
computer science,
polymorphism is a
programming language
feature that allows values of
different data types to be
handled using a uniform
interface.
biological
science, bio
-
informatics,
multiform
polymorphic
,
polymorphous
44
Remote
Remote control means yo
u
actually take control of the
remote control means you
actually take control of the
remote pc through your local
keyboard.
Far, distant
Remotely,
remoteness
45
Troubleshooting
In computer science, the term
troubleshoot is usually used
when the problem is
suspected to be hardware
-
related.
Troubleshoot
,
troubleshooter
46
Workstation
The Alcatel T
sm
-
2532, with its
single
-
user workstation,
provides a simplified,
graphically oriented
presentation of the network
status.
Digital
computer
47
Query
Queries can
be issued from
th
e command
-
line, or from
Questioning,
search engine
Query (n, v)
within E
-
M
acs, serving as an
augmented tags facility.
48
Netiquette
(
NET
work etI
QUETTE
) Proper
manners when conferencing
between two or more users on
an online service or
the
Internet
.
Electronic
communication
49
Peripheral
U
niversal serial bus (
USB
) is
the most popular way of
connecting peripherals to your
computer.
Computer
hardware
peripherally
50
Justification
That is not a sufficient
justification for withholding
information under the code.
explanation,
account
justify
Enter the password to open this PDF file:
File name:
-
File size:
-
Title:
-
Author:
-
Subject:
-
Keywords:
-
Creation Date:
-
Modification Date:
-
Creator:
-
PDF Producer:
-
PDF Version:
-
Page Count:
-
Preparing document for printing…
0%
Comments 0
Log in to post a comment