Exercise 25. No.1  (Worse) When the engineer attempts to confirm prediction accuracy, you should not neglect possible errors.  (Better 1) When the engineer.

Slides:



Advertisements
Similar presentations
CICT Course Introduction The aim of this course is to provide you with practical ICT skills to help with your studies.
Advertisements

Naming, Addressing, & Discovery
Chapter 1:Introduction to the world of computers
Ist.psu.edu School of Information Sciences and Technology IST 311 – Object-Oriented Design & Software Steven Haynes IST 311 – Class 1 10 January 2005
Exercise 15. No.1  (Worse) Incomplete data is commonly referred to as censored data and often occurs when the response variable is time to failure, e.g.,
Exercise 14. No.1  (Worse) Yum and Ko made a recommendation of starting with Taguchi ’ s two-step procedure and that the transformation be applied in.
 (Worse) It is recommended by us that the trackball be selected on the occasion of purchasing a user interface device of this type.  (Better) We recommend.
2.2 Validation & Verification
Information Systems Audit Program (cont.). PHYSICAL SECURITY CONTROLS.
Exercise 13. No.1  (Worse) Conventional approaches offer an explanation of this phenomenon and providing alternative strategies to solve the problem.
Professional and Technical Written Communication for Engineers Session Eight Test Procedure and Discussion of Results.
Project Clarification: Objectives Tree BE 20–Engineering Design with Computer Applications Week 4: 15-September-2004.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Computer Basics 1 Computer Basic 1 includes two lessons:
Exercise 3. No.1  (Worse) Everyone are planning to attend the event.  (Better) Everyone is planning to attend the event.
Exercise 9. No.1  (Worse) Cell formation is the first and most difficult step in CMS design in that it identifies parts with similar processing requirements.
CS 342 – Operating Systems Spring 2003 © Ibrahim Korpeoglu Bilkent University1 Input/Output – 3 I/O Software CS 342 – Operating Systems Ibrahim Korpeoglu.
Hardware and Multimedia Chapter 4. 4 Personal Computers (PCs) PCs are computers that can be: Used by individuals at home, work, or school Desktop models.
Learning Objectives LO1 Distinguish between management and auditor’s responsibilities regarding an auditee organization’s internal controls. LO2 Explain.
Computer for Health Sciences
PRISM: EU Network on Human Factors in the Process Industries.
Company structure, Product features. Look at your group’s résumés Take turns. Using the résumé as a guide, give a short outline of your professional life.
FALL 2012 Dr. Ghada Drahem Facult y of Engineering Computer Engineering Department.
Hands-On Microsoft Windows Server 2003 Administration Chapter 2 Managing Windows Server 2003 Hardware and Software.
Portable Computer Registration Jean-Michel Jouanigot et al. Presentation to FOCUS on 2 October 2003.
Software Software is omnipresent in the lives of billions of human beings. Software is an important component of the emerging knowledge based service.
EXERCISE 4. NO.1 (Worse) Modification of the heuristics was made by Lacksonen and Enscore (1993) to solve the dynamic layout problem. (Better) Lacksonen.
C++ Programming Language Lecture 1 Introduction By Ghada Al-Mashaqbeh The Hashemite University Computer Engineering Department.
Computers Inside and Out Components and Their Care.
Exercise 26. No.1  (Worse) Communicators must share a common language or protocol so that we can easily understand each other.  (Better) Communicators.
 2006 Pearson Education, Inc. All rights reserved Introduction to Computers, the Internet and World Wide Web.
BOOTH EVENTS BIG AND SMALL. BOOTH EVENTS Booth Policy Booth Philosophy Types of Booth Events How to Find Booth Events Booth Fees Booking homeshows Recruiting.
Copyright © 2008 by Nelson Education Ltd. Ch. 4-1 Chapter 4 Revising and Proofreading Business Messages.
Triggers and Stored Procedures in DB 1. Objectives Learn what triggers and stored procedures are Learn the benefits of using them Learn how DB2 implements.
Object Based Programming Chapter 8. 2 In This Chapter We will learn about classes Garbage Collection Data Abstraction and encapsulation.
 (Worse) It is a fact that engineers select an appropriate variable and the transformed observations are treated as though they are normally distributed.
State Data Center Daylight Saving Time 2007 Overview February 15, 2007.
Foundation year Lec.3: Computer SoftwareLec.3: Computer Software Lecturer: Dalia Mirghani Year: 2014/2015.
Exercise 5. No.1  (Original) Either gas delay time or mold temperatures (impacts, impact) the surface tension.  (Revised) Either gas delay time or mold.
1 Getting Started : Purposes of IS Strategic Planning.
Multimedia and Computers Introduction to Computers.
Keys to Understanding the Chapter
1 Title: Introduction to Computer Instructor: I LTAF M EHDI.
Workers’ Compensation Committee Agenda for December 17 th Meeting: Welcome/Introductions (7:30-7:45) Purpose of forming a Workers’ Comp Committee (7:45-8:15)
EXERCISE 2. NO.1 (Worse) This concept was further extended in their work to include the conventional approach. (Better) Their work further extended this.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
OO in Context Lecture 13: Dolores Zage. Confused about OO Not alone, there is much confusion about OO many programs are claimed to be OO but are not really.
Operating System. Chapter 1: Introduction What is an Operating System? Mainframe Systems Desktop Systems Multiprocessor Systems Distributed Systems Clustered.
By Tom and James. Hardware is a physical part of the system that you can pick up and move. There are two types of hardware, external and internal. External.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Risk Identification. Hazards and Risk Section 2: ACCIDENT THEORIES 2.1 Single Factor Theories  This theory stems from the assumption that an accident.
Chapter 7 Part II Structuring System Process Requirements MIS 215 System Analysis and Design.
Unit Seven : Avoid Unnecessary Shifts in a Sentence 避免不必要的句中轉換 柯泰德網路線上科技英 文論文編修訓練服務.
EXERCISE 1. NO.1 (Worse) All inputs are combined by engineers to create a product. (Better) Engineers combine all inputs to create a product.
OPERATING SYSTEM BASICS. What is an operating system and what does it do? The operating system has two basic functions: –communicates with the PC.
1SEP Software / Web Engineering Projects 2IPE0 Spring Lou Somers.
 Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives,
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Input and output device A Presentation. Task  Each group will research, design, create and present a short presentation regarding different and unusual.
به نام خدای مهربان زبان تخصصی دانشجویان کامپیوتر English for Computer Students درس 3 جوانمرد Ejavanmard.blogfa.com
State Data Center Daylight Saving Time 2007 Overview February 15, 2007
Software / Web Engineering Projects 2IPE0
MICROCOMPUTER HARDWARE (CONTINUED)
Decrypting Data Compliance in China
Diskless network security
Object Based Programming
Devil physics The baddest class on campus IB Physics
Network Programming CSC- 341
Exercise 9.
Software / Web Engineering Projects 2IPE0
Presentation transcript:

Exercise 25

No.1  (Worse) When the engineer attempts to confirm prediction accuracy, you should not neglect possible errors.  (Better 1) When the engineer attempts to confirm prediction accuracy, he or she should not neglect possible errors.  (Better 2) A engineer should not neglect possible errors when attempting to confirm prediction accuracy.

No.2  (Worse) A application makes calls to the executive kernel services, which will then make calls to the hardware.  (Better) A application makes calls to the executive kernel services, which then makes calls to the hardware.

No.3  (Worse) Mice and trackballs are used for the same reason and it performs the \ same task.  (Better) Mice and trackballs are used for the same reason and perform the same task.

No.4  (Worse) Orient the new employees on factory floor procedures and they should be warned about potential workplace hazards.  (Better) Orient the new employees on factory floor procedures and they should be warn them about potential workplace hazards.

No.5  (Worse) Give consideration to the external factors and the surrounding environment must be assessed.  (Better) Give consideration to the external factors and assess the surrounding environment.

[Note 7.12]  Avoid wordiness hiding a verb inside of a noun. In this sentence, wordiness can be omitted by saying Consider instead of Give consideration to. Sentences can often be simplified by identifying verbs hidden inside of nouns.

No.6  (Worse) The web server makes an inquiry regarding the number of users and does the system become overloaded during evening hours.  (Better) The web server makes an inquiry regarding the number of users and system overloading during evening hours.

[Note 7.13]  Avoid wordiness by not overusing verbs such as make, give, come, take, is, are, and were. This sentence can also say asks about inquires about instead of makes an inquiry.

No.7  (Worse) The network programmer establishes a link between two or more people so you can exchange information.  (Better) The network programmer establishes a link between two or more people to exchange information.

No.8  (Worse) The 100Mbps Network Card is rapidly becoming the industrial standard for local area network worldwide and had a per unit cost of around $110.  (Better 1) The 100Mbps Network Card is rapidly becoming the industrial standard for local area network worldwide and has a per unit cost of around $110.

No.8 (cont.)  (Better 2) The 100Mbps Network Card is rapidly becoming the industrial standard for local area network worldwide with a per unit cost of around $110.

No.9  (Worse) Not only can the devices be used to copy CDs in case of damage to the original, but it can also be used for backing up hard drives.  (Better 1) Not only can the devices be used to copy CDs in case of damage to the original, but they can also be used for backing up hard drives.

No.9 (cont.)  (Better 2) In addition to copying CDs in case of damage to the original, the devices can back up hard drives.

No.10  (Worse) Ascertain the location of the missing value and the equation should be derived.  (Better) Ascertain the location of the missing value and, in doing so, derive the equation.

[Note 7.14]  Avoid wordiness by saying Find instead of Ascertain the location of.

[Note 7.15]  Depending on the sentence ’ s context, obtain, derive, attain, locate, and identify can be used as an alternatives to find.

No.11  (Worse) The student applied for a library card and could it be ready next week.  (Better) The student applied for a library card and asked weather it could be ready next week.

No.12  (Worse) The organizing committee held the conference and invited speakers were compensated by it.  (Better) The organizing committee held the conference and compensated invited speakers.