5. Identifying people by occupation
Who are you?
I am a student.
Who is that over there?
He is a student too. (He's)
Is that lady a student?
No,she isn't.
Those men are students either.
Am I your teacher?
Yes,you are.
That man is a teacher,isn't he?
Yes,he is.
Who are those people?
May be the farmers.Maybe they are farmers.
Are these students?
I really don't know.
6. Introductions and courtesies
What's your name?
My name is Jones.
What's your first name?
My first name is Bill.
How do you spell your last name?
Jones,J-O-N-E-S.
What's your friend's name?
His name is Jone Smith.
Jone and I are all friends. old
Are you Jone's brother.
No,I'm not.
This is Mr. Jones.
How do you do.
Mr.Jones, this is Mr. John Smith.
Very pleased to meet you.
7. Days and months of the calendar
What day is today?
Today is Monday.
What day was yesterday?
Yesterday was Sunday.
What day is tomorrow?
What month is this?
This is January.
Last month was December, wasn't it.
Yes,it was.
What month is next month?
I was in the hospital for several weeks.
Where were you on Tuesday?
Do you were here Febuary, what you? You were here in February, weren't you?
No, I wasn't.
Your friend was here several week go, wasn't he?
Your friend was here a week ago, wasn't he?
分享到:
相关推荐
Identifying-Medical-Diagnoses-and-Treatable-Diseases-by-Image-Based_2018_Cel.pdf
(d) writing an English description of the data that the user needs Correct answer is (a) Your score on this question is: 10.00 Feedback: See section 1.2.3 in the course notes. (a) ...
In this paper, we propose a novel density based spatial clustering algorithm called K-DBSCAN with the main focus of identifying clusters of points with similar spatial density. This contrasts with ...
Identifying Customer Churnin a Telecom Company Using Big Data TechniquesInformat
利用Windows自带的声卡采集器,通过麦克风将声音采集。将录制的声音分为一系列频率,将基频进行比较,从而进行简单的声音识别。
一篇关于如何识别多实例数据中的异常点的技术论文。
ANSI IES LM-61-20 Identifying Operating Factors for Installed High Intensity Discharge Luminaires.pdf
ssd7 unit1 Skill Builder Identifying Keys and Integrity Constraints B 有点简略。无分下载仅供参考
Yelp-Project-in-identifying-categories-and-projecting-top-5-positives-and-negatives Yelp - 识别业务类别和查找业务的主要正面/负面项目在本项目中,您将有机会练习从 Z534 课程中学到的信息检索和文本挖掘方法...
最近做微信端的页面遇到了一个之前没有遇到过的一个页面,刚开始放在那没有...<p class=identifying-title>输入企业提供的验证码,即可完成签到 <!--黑色横线框--> <div class=pass-box> <div class=pass-line
Identifying Encrypted Malware Traffic with Contextual Flow Data 识别加密网络流量中包含的威胁会带来一系列独特的挑战。监视此流量中是否存在威胁和恶意软件很重要,但是必须以保持加密完整性的方式进行监视。...
JEDEC JEP158:2009 3D Chip Stack with Through-Silicon Vias (TSVS):Identifying, Evaluating and Understanding Reliability Interactions - 完整英文电子版(21页).pdf
HP Notebook Hard Drives & Solid State Drives Identifying, Preventing, Diagnostic Whitepaper
natrue上发表的一篇付费论文,文章有30多页,内容详细
最近做微信端的页面遇到了一个之前没有遇到过的一个页面,刚开始放在那没有去...<p class=identifying-title>输入企业提供的验证码,即可完成签到 <!--黑色横线框--> <div class=pass-box> <div class=pass-line>
摘要:深度神经网络(DNNs)缺乏透明性使得它们容易受到后门攻击,其中隐藏的关联或触发器会覆盖正常的分类以产生意想不到的结果。例如,如果输入中存在特定符号,则具
16-5. Simple whois frontend (PHP code) 16-6. Source code of the simple whois front-end 16-7. Allowing server choice 16-8. Changed PHP code 16-9. a function to tell the TLD 16-10. using an array to ...
A Community-Based Approach to Identifying Influential Spreaders
Hot Topic Propagation Model and Opinion Leader Identifying Model in Micro-blog Network
Identifying Encrypted Malware Traffic with Contextual Flow Data, ETA