連謂式 的英文怎麼說

中文拼音 [liánwèishì]
連謂式 英文
[語言學] sentence with consecutive predicates
  • : Ⅰ動詞1 (連接) link; join; connect 2 (連累) involve (in trouble); implicate 3 [方言] (縫) ...
  • : Ⅰ動詞1. (說) say 2. (稱呼; 叫做) call; name Ⅱ名詞1. (意義) meaning; sense 2. (姓氏) a surname
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  1. The simple sentences in news titles have such patterns as subject - predicate structure, modifier - keyword structure, verb - object structure, parataxis structure, structure with consecutive predicates, appositive structure, and single - word structure. subject - predicate structure is the major one in simple sentence. the logical relations between clauses of main titles that are complex sentences, or between shoulder titles and main titles, or between main titles and subtitles are : parataxis, continuity, illustration, causality, transition, progression, purpose, hypothesis, condition, and so on

    新聞標題單句一般由主、偏正、動賓、並列、、同位、獨詞等結構形構成,其中主結構是新聞標題單句的主要結構形;新聞標題復句中,主題復句各分句之間、引題與主題之間、主題與副題之間、引題與主題與副題之間存在著並列、順承、解說、因果、遞進、轉折、目的、條件、假設等邏輯關系。
  2. A verb, such as a form of be or seem, that identifies the predicate of a sentence with the subject

    系詞將一個句子的語和主語起來的動詞,如be或seem的一種形
  3. The definition of fraud as it is used in the context of the australian commonwealth s policy on fraud control is " inducing a course of action by deceit or other dishonest conduct, involving acts or omissions or the making of false statements, orally or in writing, with the object of obtaining money or other benefit from, or of evading a liability to, the commonwealth "

    詐騙,在澳大利亞聯邦范圍內對防詐騙政策上之釋義,是以欺騙手段或不誠實行為,包括行動或省略行動或以錯誤詞章,以口述或書面方,引致一串列動,目的是從聯邦政府取獲金錢或其他利益,甚或躲避責任。
  4. This means, then, that references to dimensions ? first, second, third, and fourth ? are ultimately nonsensical, but are used to penetrate and register with the linear dimensional nature of " thinking, " for the purpose of providing a bridge, if you will, to that which is beyond the three - dimensional perception of nondimensional being which thinking creates

    這意著,那些次元性的思想架構:第一、第二、第三, 「甚至」第四,終究來說都是毫無意義的,只是用來設法打入線性次元的「思考」模,為的是要提供一座橋梁,結那超越三次元知見的非次元的實存境界。
  5. With the rich protocol descriptions that we ' re getting to connect machines across the internet, so - called web services, we ' re now formalizing the idea of the boundaries between two pieces of software in a much better way

    藉由我們正在開始的富有記錄描述接機器橫過英特網,所的網路服務,我們現在正在以一好多了方使正在二個軟體之間的邊界主意。
  6. Among them language preface of complicated and the most familiar, include the subject postpose, the object places before, the main guest changes, settle the language before moving, settle the language after moving, settle the inside change a language moves the front, form language after moving, connect move type parts of the ian guage of predicate before moving and concurrently language type parts of the language of predicate is before moving

    其中語序的錯綜最為常見,包括主語後置、賓語前置、主賓換位、定語挪前、定語挪后、定中換位、狀語挪前、狀語挪后、部分語挪前、兼語部分語挪前。
  7. Main characteristics of dbxi are : 1 ) a new xml numbering scheme is adopted which enables each element in xml documents carries corresponding dtd structural information. 2 ) a path query with n elements ( or attributes ) and a predicate restriction can be implemented with only 0 or 2 structural join operations per xml document while at least n - 1 times of structural join operations are needed in xiss ( xiss is a kin xml indexing system developed by q. li and b. moon ). 3 ) for a path expression that is not complying with any paths in xml documents, dbxi can give a judgment of no answer in much shorter time than that of sphinx, xiss, etc. experimental results demonstrate that dbxi can process path expressions much faster than lore sphinx and xiss do

    Dbxi的主要特點是: 1 )採用了新的xml編碼方法,使xml文檔中每個元素屬性的編碼攜帶了相應的dtd結構信息; 2 )對一個由n個元素屬性組成的有一個詞約束的路徑表達, dbxi處理每個xml文檔,由同類系統xiss所需的至少n - 1次結構接運算,降低至0次或2次結構接運算; 3 )如果查詢路徑在待查xml文檔中不存在正確的匹配結構, dbxi能夠在比國際上的sphinx和xiss等xml索引方法較短的時間內給出無查詢結果的判斷。
  8. Why would data or communications buffers ever contain executable code ?. . because so - called “ buffer overrun ” attacks are the predominant way internet - connected computers have historically been remotely hacked and compromised

    為什麼會數據或通信緩沖器以往任何時候都包含可執行代碼? … … 。因為我們所的"緩沖區溢出"攻擊是最主要的方與網際網路接的電腦,在歷史上都曾遙控砍死,並作出妥協。
分享友人