最新消息:20210917 已从crifan.com换到crifan.org

New English Words v2011-10-31

工作和技术 crifan 1750浏览 0评论

New English Words

Version: 2011-10-31 

For common special characters:

特殊字符

英文名

中文名

注解

~

tilde

波浪号

 

`

back quote

反引号

键盘上,用Shift + ~ 输入此字符

!

exclamation

感叹号/惊叹号

 

@

at

一般读作“小老鼠”

邮件地址中一般读作“小老鼠”或者直接像英文一样读作 “at”

#

number sign / pound / sharp / hash

井号

英语国家是hash,美语是pound,音乐里作sharp,C#

$

dollar sign

美元符号

 

%

percent

百分号

 

^

caret

脱字符号 / 插入符号

 

&

ampersand

/ 引用

C语言中,读作“取地址,引用”,逻辑语言中,表示“与”

*

asterisk / star / multiply

星号

star(美语),数学公式中作multiply

(

left parenthesis / opening parentheses

左括号 / 开括号

 

)

right parenthesis / close parentheses

右括号 /闭括号

 

_

underscore / underline

下划线

 

minus / negative / dash / hyphen

减号/负号/破折号/连字符

数学公式中作minus

+

plus / positive

加号/正(数)

数学公式中作positive

=

equal

等于号/等号

 

{

left  brace / opening brace

左大括号

 

}

right brace / closing brace

右大括号

 

[

left  bracket / opening bracket

左中括号

 

]

right bracket / closing bracket

右中括号

 

|

bar / pipe / vertical bar

竖线

 

backslash / escape

反斜杠

 

:

colon

冒号

 

;

semicolon

分好

 

“ ”

double quote / quotation mark

双引号 / 引号

 

‘ ’

(single) quote / apostrophe

撇号 / 单引号

 

less

小于号

 

greater

大于号

 

,

Comma

逗号

 

.

period / dot / point

 

?

question mark

问号

 

/

slash / slant

斜杠

 

ellipsis

省略号

 

 

一些特殊字符的英文读法

http://www.cnblogs.com/jason_lb/archive/2007/07/20/825484.html

 

Some useful sentences:

1. Should you have any questions or concerns please feel free to let me know.

 

2. … I wish him all the best.

 

3. Please join me in congratulating and supporting Beth and Tony in their roles.

 

Note:

 

Different color different meaning:

Color Meaning

Description

new words

 

auxiliary for the new words

 

Known word, but need learn new usage

 

 

 

1During October 1 and 15, 2010 all registered users of Enterprise Architect were asked to fill in a questionnaire.

 

2. respondents quite frequently use Enterprise Architect (47% at least once per week)

 

3. Respondents largely agree (80%) that the tools helps improve quality of systems and productivity as well as collaboration between team members

 

4. While this provides consistency and helps in understanding diagrams, it is sometimes desirable to use different graphical elements and/or icons for elements.

 

5. If you have any questions or concerns as well as ideas for further improvements, do not hesitate to contact us.

 

6. double / triple / quadruple / quintuple

 

7. Requirements management is built into the core product, solving many of the issues of traceability, interdisciplinary team divisions, and integration with change and configuration management systems

 

8. Use your calling card, some phones will allow you to swipe your card, while others will require you to punch in your card number and then punch in your PIN (Personal Identification Number).

 

9. Click on the ladder image to the right for an explanation of stakeholder benefits.

 

10. DMAIC is the acronym for Define-Measure-Analyze-Improve-Control, the 5-phase data-driven methodology for improving a product or process, underlying a Six Sigma quality initiative.

 

11. Lean Methods can be employed within the DMAIC framework to augment Six Sigma tools…

 

12. Ultra-light, and extremely flexible, (Shoes) they are perfect to tuck into any empty space in your luggage without adding the extra weight and bulk normally associated with toting an extra pair of shoes on a trip.

 

13. But as with many favorite products, there was a dark side. Two months ago, I noticed that the nearly sheer fabric in the heel area had split horizontally, despite rather light usage and very little actual running mileage.

 

14. It’s doubtful that the salesperson is privy to Nike policy discussions, but even discounting the story somewhat, I found it hard to believe that Lance Armstrong would want Nike to sell known defective shoes with his name on them.

 

15. So why does the Six Sigma process pass the test of effectiveness that guarantees a life beyond temporaryfad” status? The answer is more than improved product quality – by eliminating waste, reducing cycle time, and bolstering customer satisfaction, Six Sigma contributes to bottom-line results.

 

16. Six Sigma has contributed to sustained superior financial results at many large businesses over several years.

 

17. By equipping all of our people with the tools and knowledge they need to infuse quality and superior service into everything we do.

 

18. the percentage of customers rating themselves highly satisfied (9 or 10 on a 10-point scale) rose on average by 11 percentage points, from 41 to 52 percent. Two years later, those scores hit a plateau. In response, associates throughout the company worked with customers to better understand key drivers of customer satisfaction.

 

19. “other banks don’t necessarily wed the technology and the processes together” like Bank of America has…

 

20. In gold mining, the prospector may need to return to the sluicing operation to screen more rock and gravel before finding any gold.

 

21. large vague problem occurs.

 

22. The gains Six Sigma can help achieve include increased profitability , improved social service outcomes or worker safety, and improved environmental impact, to name a few.

 

23. More than anything, the DMAIC process is a systematic critical thinking exercise – a process of asking and answering questions.

 

24. The backbone to a thought process map is the sequence of question >>> action >>> answer.

 

25. if you have ever tried to win a prize at a County Fair, Carnival, or Amusement Park by shooting a basketball…

 

26. Suboptimization – Refers to the situation when a system’s subsystems are optimized for performance based on specific goals for each subsystem to the detriment of the performance of the overall system.

 

 

27. Develop high level action plans to mitigate risk and correct underperforming aspects of the project

 

28. Value Streams include the tangible flow of material as well as the intangible flow of information and services.

 

29. Derogatory comments, slurs, and inappropriate comments or emails.

 

30. An unsolicited letter is sent to a company for which you would like to work though you know of no particular opening.

 

31. These films may contain strong profanity strong sexual content/nudity strong violence/gore drug use and smoking.

 

32 The micro-blogging  is less invasive than instant messaging, but less labored than e-mail.

 

33Honeywell started a pilot in 2009 of Yammer, which provides secure online conversations. 

 

34RS232 data wordOn PC’s a length between 5 and 8 bits can be selected. This length is the netto information length of each word.

 

35. If starting at each moment is possible, this can pose some problems for the receiver to know which the first bit to receive.

 

36. This causes garbled date to reach the receiver.

 

37. In time, USB 2.0 may be phased out as was USB 1.1, but for now and the foreseeable future, USB 2.0 isn’t going anywhere.

 

38. Once that hurdle is out of the way, the Linux USB stack would have to be updated to add support for USB 3.0 details such as bus speed, power management, and a slew of other significant changes detailed in the USB 3.0 specification.

 

39. Over time, these bugs will be ironed out, but expect some growing pains as systems migrate and the development teams struggle to catch up to the high expectations of the computing community at large.

 

40. In a nutshell, any high-bandwidth device that works with USB 2.0 will become better if updated with USB 3.0 support.

 

41. With its promised 4.8Gbps speed, the standard will find its way into some products that previously weren’t USB territory, like external RAID storage systems.

 

42. Early bird catches the worm.

 

43. UML is not an industry standard, but is taking shape under the auspices of the Object Management Group (OMG).

 

44. This article is a satire and in the time-honored tradition of the pamphlet some of its comments may appear outrageous to some readers.

 

45. The notation is a hodgepodge of notations from several legacy notations (Booch, OMT, Objectory, SDL, and MSCs) that is inconsistent with each other and difficult to learn and remember.

 

46. Since UML is a visual modeling language, this shortcoming is a showstopper for many modelers who don’t want to redraw their diagrams.

 

47. Please note that the first support bullet may be problematic, since at the time of this writing we know of no UML modeling tool that completely complies with the UML 1.1 specification (which was adopted in 1997) let alone the UML 1.5 specification (which was finalized in H1 2003).

 

48. Consequently, you will likely need to perform your own due diligence in this regard.

 

49Broadly speaking, there are two flavors of measurement with very distinct properties – Discrete and Continuous.

 

50In a drive to increase efficiency of care and reduce costs in the process, the hospital is devising strategies to reduce the length of hospital stay in its wards.

 

51. For several years I have argued that the UML needs a data model (first in Building Object Applications that Work in 1997 and most recently in Refactoring Databases) and have vacillated between various ways that it should be done.

 

52. Unfortunately we have all come up with slightly different modeling notations, a problem that the UML is supposed to address if my memory serves me correctly.

 

53UML 2 components are modeled as simple rectangles, whereas in UML 1.x there were depicted as rectangles with two smaller rectangles jutting out from the left-hand side.

 

54You can also see that both diagrams use the lollipop symbol to indicate an implemented interface although the UML 2 version introduces the socket symbol to indicate a required interface.

 

55. Python is a remarkably powerful dynamic programming language that is used in a wide variety of application domains.

 

56. Online tutorials target both the seasoned programmer and the newcomer.

 

57. The language is mostly the same, but many details, especially how built-in objects like dictionaries and strings work, have changed considerably, and a lot of deprecated features have finally been removed.

 

58. Data Matrix Symbology Historically read using expensive, complicated, modified vision systems (hindering its adoption).

 

60. The specifications for one step, in essence, become the requirements for the next.

 

61. Once those specifications and requirements have been identified, and the product or process benchmarked, an optimum concept will be selected from brainstormed alternatives.

 

62. Identify a superior concept from a group of alternatives using criteria based on customer requirements and a datum identified through benchmarking.

 

63. This is done by collecting data for the design parameter measures and using that data to calculate capability indices.

 

64. The design parameters are developed from conceptualization through the early part of the design phase by progressive elaboration of the requirements and associated design features.

 

65. Early in the design process data will be collected from surrogate processes or, in the case of a redesign, from actual processes.

 

66. Think of Cpk as a Cp calculation that is handicapped by considering only the half of the distribution that is closest to the specification.

 

67. Benchmarking should be based on tangible, measurable results that are known to be truly superior.

 

68. Encourage wild ideas.

 

69. Most brainstorming sessions follow a power curve: They start out slowly, build to a crescendo, and then start to plateau.

 

70. The interior development team was working on concepts for a seat recliner – a subsystem for the seating system which, in turn, is a subsystem for the cockpit module.

 

71. Design for Six Sigma clearly adheres to this dictum.

 

72. The tools and methods described in the Model phase are focused on Analyzing the design, determining the transfer function for the design and assessing and mitigating risk from potential failure modes.

 

73. seven corollaries

 

74. The manager faces a dilemma: …

 

75. Rather than let the situation fester, Best Buy? jumped into action and completely redesigned the checkout process.

 

76. The “doneness” of a steak is a function of the steak’s thickness, cooking time and cooking temperature

 

77. Any information in this document is purely fictious and any resemblance to

real hardware, software or driver is purely coincidental

 

78. Most Wireless LANs are designed to work well in most configurations, but my

experience tells that some Wireless LANs or some environment may be capricious.

 

79. After capturing the packets, you need to understand the different 802.11 frame types as a basis for deciphering what the network is or isn’t doing.

 

80. In this tutorial, I’ll give you an overview of the more common 802.11 frames to help you become more adept at comprehending the operation of a wireless LAN and solving network problems.

 

81. For example, a beacon’s frame body contains the service set identifier (SSID), timestamp, and other pertinent information regarding the access point.

 

82. WLANs are on the verge of becoming a mainstream connectivity solution for a broad range of business customers.

 

83. As with other wireless technologies, WLANs must meet stringent government and industry standards for safety.

 

84. We already have the excellent wireless-tools package, however, admittingly, it can be a pain.

 

85. I am supposed to be getting a drive to do backups…had a dinky 20 Gb flash drive for PCMCIA slot…two refreshed old.  I understand that the Iomega drive has software but I don’t know anything about it.

 

86. Kindly forward feedback and criticism to Sandeep.S. I will be indebted to anybody who points out errors and inaccuracies in this document; I shall rectify them as soon as I am informed.

 

 

87. ctags As found on most Unix systems.  Only supports C.  Only does the basic work. exuberant ctags This a very good one.  It works for C, C++, Java, Fortran, Eiffel and others.  It can generate tags for many items.  See http://ctags.sourceforge.net.

 

88. This small investment of time up front will help you immeasurably in the long run.

 

89. scanner: stunning motion tolerance

 

90. When requesting changes don’t demand or threaten to abandon Drupal, and certainly don’t resort to name calling or derogatory comments.

 

91. It’s a helper for novice Drupal users coming from other CMS, a real time-saver for Drupal site administrators, and definitely a must for Drupal developers and site builders (keyword: Devel integration).

 

92. This is useful for developers and site administrators alike to identify pages that are slow to generate or use excessive memory.

 

93. Starting out new with USB can be quite daunting.

 

94. With the USB 2.0 specification at 650 pages one could easily be

put off just by the sheer size of the standard.

 

95. Terms and Abbreviations – This chapter is self-explanatory and a necessary evil to any standard.

 

96. I guess we should be inundated with mini USB cables soon and a range of mini to standard converter cables.

 

97. The term “Global Suspend” is used when the entire USB bus enters suspend mode collectively.

 

98. Another area which is often overlooked is the tolerance of the USB clocks.

 

99. As we have already discussed, USB is a host centric bus.

 

100. The USB device filesystem is a dynamically generated filesystem, similar to the /proc filesystem. This filesystem can be mounted just about anywhere, however it is customarily mounted on /proc/bus/usb.

 

101. Organizational Chart is the best way to visualize and understand your workforce.

 

102. The rest of this specification documents the implementation details, caveats, and restrictions for developing HID class devices and drivers.

 

103. In addition, many known devices seemed to straddle multiple classifications—for example, keyboards with locators, or locators that provided keystrokes.

 

104. Each Main item tag (Input, Output, or Feature) identifies the size of

the data returned by a particular control, and identifies whether the data is

absolute or relative, and other pertinent information.

 

105. Preceding descriptors are illustrated by flowchart items that represent tables of information.

 

106. I hope you find the book useful. Comments invited!

 

107. Easy to use, so there’s no need to fiddle with configuration and setup details.

 

108. Inexpensive, so manufacturers and users don’t balk at the price.

 

109. Mice tend to use low speed because the less stringent cable requirements allow flexible cables.

 

110. The USB 3.0 Standard-A plug fits the USB 2.0 Standard-A receptacle, so you can use a USB 3.0 cable to attach a USB 3.0 device to a USB 2.0 host.

 

111. If you don’t have a background in USB, you won’t absorb it all in one reading.

 

112. The host attempts to parcel out the available time as fairly as possible to all devices.

 

113. A bulk transfer can send large amounts of data without clogging the bus because the transfers defer to the other transfer types and wait until time is available.

 

114. Writing drivers has long been an arcane and difficult art.

 

115. For example, a USB speaker might use isochronous transfers for audio and a HID interface for controlling volume, balance, treble, and bass

 

116. USBwatch is a low-budget USB analyzer for HIDs.

 

117. Active low representation: xxx (overscore over pin or signal name)

 

118. Real-time control systems are used in a wide range of applications, including: office equipment such as HDDs (Hard Disk Drives), PPCs (Plain Paper Copiers), printers, and facsimiles

 

119. However, a thin latex glove may be worn in the health care or manufacturing environment.

 

120. Environmental concerns are minimal as the retail POS market is largely an indoor application however there will be retail outlets where ambient light can be as low as 90 lux and as great as 130k lux.

 

121. The recovery is real, and the global economy continues to grow, albeit slower than many would like.

 

122. “Production processes at the site must be top-notch while the safety, reliability, and efficiency of people and assets are paramount.

 

123. Also, do you use any flash writing routines in your code which could inadvertently be setting the flash protect bits.

 

124. It is an entirely different story so I failed miserably the first, second, third, …… (n+1)th time to design a working model of the above.

 

125. There is only 1 road block

 

126. But, these things are continuing to see rapid change, so be prepared to roll up your sleeves and hack a bit.

 

127.  The data that is checked off in each category will display in HPD, Career Profile report, and MDA.

 

128. However, it is by no means a complete solution.

 

129. However, making such calculations can be tedious, and can bog down logic circuit design.

 

130. A famous aphorism of David Wheeler goes: All problems in computer science can be solved by another level of indirection.

 

131. as yet unimplemented.

 

132. Please also note that if in future you don’t want to receive the communications on Subversion you can opt out by contacting me by email.

 

133. Empowering consumers to adjust how they use electricity starts with awareness,” said Jeremy Eaton, Vice President of Energy Solutions for Honeywell. “But it doesn’t end there — they also need easy-to-use controls to implement changes and make them stick.

 

134. Honeywell has been selected by Johnson & Johnson (J&J) to develop an enterprise-wide security management system for 1,400 global sites as part of a multi-million dollar contract.

 

135.  Proficient in PLC application development & implementation

 

136. In celebration of the 25th Anniversary of Boletin del la Computación, the web-based Leader Brands survey collected votes from 1,532 resellers and business leaders.

 

137. The results of the stratified study accounted for 44 product lines across 460 major manufacturers in the IT industry based in the five economic regions of Mexico.

 

138. Honeywell has secured a $1.5 million contract to retrofit the existing Casino Niagara surveillance system.

 

139. Honeywell Reaffirms Full-Year 2011 Financial Guidance, Updates 3Q Outlook

 

140. The PVC-dotted design ensures excellent skid-resistant grab performance on each side, making it possible for workers to alternate the gloves on both hands and lengthen the lifetime of the product.

 

141. XXX discussed the four key growth technologies pervasive across the ACS portfolio.

 

142. the world’s largest carpet manufacturer and a leading floor covering provider.

 

143. Honeywell has secured an $8 million order from Fokker Elmo for Honeywell’s new aerospace proximity sensor, which the company will mount in 17 different spots on planes in the F35 Lightning II program under the U.S. Department of Defense.

 

144. Educational institutions look to ESSER by Honeywell to provide technical solutions for various threat scenarios, ranging from vandalism and arson to serious acts of violence.

 

145. On the basis of Singapore Central Provident Fund (CPF), SIP created a new PF system according to actual conditions and gradually covers landless farmers so as to improve the living quality of local farmers and to benefit the entire population.

 

146. This customized measurement tool helps maximize mobile workforce productivity by allowing IT professionals to remotely determine the root cause of device performance issues, such as reoccurring scan errors or low battery power, and identify a solution.

 

147. Ensuring that our customers reap the benefits of customized performance measurement, the new platform simplifies the tracking and evaluation of critical device operations in real time, driving improved efficiency across the workforce

 

148. Tony is replacing Joe Sawitsky, who is leaving HSM to pursue new opportunities.

 

149. Offering unprecedented ease-of-use, μC/OS-II is delivered with complete 100% ANSI C source code and in-depth documentation.

 

150. ? Device manager – uninstall any leftover devices that are in …

 

151. This training and certification is being required of all employees in all regions. It is being rolled out to U.S. employees throughout 2011.

 

152. The Auto DR project will give SSE the ability to work with its business customers to temporarily reduce or shift energy use when overall demand spikes, eliminating transmission and distribution bottlenecks.

 

153. Together, we can achieve our simple, yet unwavering mission: “Improving our Communities, One School, One Home, One Family, One Life at a Time.”

 

154. Your support of these programs would be vital to helping saving lives, rebuilding homes, educating teachers and students, and so much more, and I hope that you will consider a generous contribution that will serve to benefit countless individuals.

 

155. Over the past seven years, HHS has developed a wide array of award-winning programs across five areas of critical importance: Family Safety & Security, Housing & Shelter, Math & Science Education, Humanitarian Relief, and Habitat & Conservation.

 

156. Whether it is responding to natural disasters, revitalizing low-income neighborhoods, or teaching abduction prevention to our nation’s children, HHS is there to get the right work done and bring lasting and measurable results.

 

157. Xenon 1900 Color Scanner Affirms Honeywell’s Leadership in Imaging Technology.

 

158. At Honeywell, we take pride in meeting and exceeding the expectations of our customers.

 

159. Healthcare professionals will also be able to take color images for improved wound management, and visual identification of patients without a wristband.

 

160.Both the Xenon 1900 and 1902 Color scanners are available with disinfectant-ready housing for healthcare professionals.

 

161. Honeywell anticipates that color imaging will quickly follow suit

 

162. The Xenon family of scanners continues to arm customers with the technologies necessary for future success.

 

163. It’s been fun learning little tidbits from all across the company, meeting new people, and sharing bits of knowledge here and there, and I’m going to miss it.

 

这些单词的含义,如果不了解,可以去看这里的解释:

 

New English Words 中的英文单词的中文翻译和注释

http://againinput4.blog.163.com/blog/static/1727994912011920103335247/

转载请注明:在路上 » New English Words v2011-10-31

发表我的评论
取消评论

表情

Hi,您需要填写昵称和邮箱!

  • 昵称 (必填)
  • 邮箱 (必填)
  • 网址
89 queries in 0.222 seconds, using 20.42MB memory