0%

24-letter words containing y, e, n, t, a

  • permeability coefficient — the volume of an incompressible fluid that will flow in unit time through a unit cube of a porous substance across which a unit pressure difference is maintained
  • polychlorinated biphenyl — PCB.
  • preparatory to doing sth — If one action is done preparatory to another, it is done before the other action, usually as preparation for it.
  • present company excepted — If you are making a general, unfavourable comment about a particular type of person, and you are with people of that type, you can say 'present company excepted' as a way of making your comment sound more polite.
  • pretty amazing new stuff — (humour, communications)   (PANS) What PSTN is evolving into.
  • psychopathic personality — an antisocial personality characterized by the failure to develop any sense of moral responsibility and the capability of performing violent or antisocial acts
  • quick-assembly furniture — furniture such as shelves and cupboards which you buy as a number of separate pieces and assemble yourself
  • rapid eye movement sleep — REM sleep.
  • rational-emotive therapy — a form of therapy in which a patient is asked to reject irrational attitudes and assumptions in order to deal effectively with stressful situations.
  • referential transparency — (programming)   An expression E is referentially transparent if any subexpression and its value (the result of evaluating it) can be interchanged without changing the value of E. This is not the case if the value of an expression depends on global state which can change value. The most common example of changing global state is assignment to a global variable. For example, if y is a global variable in: f(x) { return x+y; } g(z) { a = f(1); y = y + z; return a + f(1); } function g has the "side-effect" that it alters the value of y. Since f's result depends on y, the two calls to f(1) will return different results even though the argument is the same. Thus f is not referentially transparent. Changing the order of evaluation of the statements in g will change its result. We could make f above referentially transparent by passing in y as an argument: f(x, y) = x+y Similarly, g would need to take y as an argument and return its new value as part of the result: g(z, y) { a = f(1, y); y' = y+z; return (a + f(1, y'), y'); } Referentially transparent programs are more amenable to formal methods and easier to reason about because the meaning of an expression depends only on the meaning of its subexpressions and not on the order of evaluation or side-effects of other expressions. We can stretch the concept of referential transparency to include input and output if we consider the whole program to be a function from its input to its output. The program as a whole is referentially transparent because it will always produce the same output when given the same input. This is stretching the concept because the program's input may include what the user types, the content of certain files or even the time of day. If we do not consider global state like the contents of files as input, then writing to a file and reading what was written behaves just like assignment to a global variable. However, if we must consider the state of the universe as an input rather than global state then any deterministic system would be referentially transparent! See also extensional equality, observational equivalence.
  • repetitive strain injury — overuse strain injury
  • representative democracy — a person or thing that represents another or others.
  • responsibility allowance — payment made to somebody who has special responsibilities
  • reverse annuity mortgage — a type of home mortgage under which an elderly homeowner is allowed a long-term loan in the form of monthly payments against his or her paid-off equity as collateral, repayable when the home is eventually sold. Abbreviation: RAM.
  • ricardian theory of rent — economic rent.
  • rocky mountain whitefish — mountain whitefish.
  • secondary school teacher — a person who teaches at a secondary school
  • sequentially compact set — a set in which every sequence has a subsequence that converges to a point of the set.
  • shadow foreign secretary — the member of the main opposition party in Parliament who would hold the office of Foreign Secretary if their party were in power
  • staggered pin grid array — (hardware)   (SPGA) A style of integrated circuit socket or pin-out with a staggered grid of pins around the edge of the socket, positioned as several squares, one inside the other. SPGA is commonly used on motherboards for processors, e.g. Socket 5, Socket 7 and Socket 8. See also PGA.
  • steak and kidney pudding — beefsteak and kidney in a suet pastry crust, steamed in a basin.
  • system management server — (operating system)   (SMS) Software used by Microsoft Windows NT system administrators to manage personal computers on any size network. SMS can distribute software to desktops from one central location, detect every machine on the network, track software and hardware configurations, send key information back to a central database, and perform other tasks.
  • telephony user interface — (communications)   (TUI) Either a software interface to telephony (e.g. a phone-capable PC) or a DTMF-based interface to software (e.g. voicemail).
  • that goes without saying — that is self-evident
  • the way things are going — You can use the way things are going to indicate that you expect something to happen because of the way the present situation is developing.
  • thermal neutron analyzer — a baggage-screening device that detects explosives by using low-energy neutrons to sense gamma radiation.
  • to cramp someone's style — If someone or something cramps your style, their presence or existence restricts your behaviour in some way.
  • to have egg on your face — If someone has egg on their face or has egg all over their face, they have been made to look foolish.
  • to have not got a prayer — If you say that someone hasn't got a prayer, you mean that it is impossible for them to succeed in what they are trying to do.
  • to have seen better days — If you say that something has seen better days, you mean that it is old and in poor condition.
  • to keep something at bay — If you keep something or someone at bay, or hold them at bay, you prevent them from reaching, attacking, or affecting you.
  • to lay something to rest — If you lay something such as fears or rumours to rest or if you put them to rest, you succeed in proving that they are not true.
  • to make boundary changes — to change the boundaries of parliamentary constituencies, because of population shifts
  • total quality management — Total quality management is a set of management principles aimed at improving performance throughout a company, especially by involving employees in decision-making. The abbreviation TQM is also used.
  • transpersonal psychology — a branch of psychology or psychotherapy that recognizes altered states of consciousness and transcendent experiences as a means to understand the human mind and treat psychological disordrs.
  • tricyclic antidepressant — pertaining to or embodying three cycles.
  • trotskyist international — Fourth International.
  • twenty-seventh amendment — an amendment to the U.S. Constitution, ratified in 1992, ensuring that no laws relating to Congressional salaries take effect until after the next Congressional election.
  • under the sway of sb/sth — If you are under the sway of someone or something, they have great influence over you.
  • under-secretary of state — any of various high officials subordinate only to the minister in charge of a department
  • unfederated malay states — a former group of native states in the Malay Peninsula that became British protectorates between 1885 and 1909. All except Brunei joined the Malayan Union (later Federation of Malaya) in 1946. Brunei joined the Federation of Malaysia in 1963 but later became an independent nation
  • visual component library — (programming)   VCL A application framework library for Microsoft Windows and Borland Software Corp.'s Delphi and C++Builder rapid application development software. VCL was originally designed for Delphi but is now also used for C++Builder. This replaces OWL Object Windows Library as Borland's Windows C++ framework of choice. VCL encapsulates the C-based Win32 API into a much easier to use, object-oriented form. Like its direct rival, Microsoft Foundation Class Library (MFC), VCL includes classes to create Windows programs. The VCL component class can be inherited to create new VCL components, which are the building blocks of Delphi and C++Builder applications. VCL components are somewhat in competition with ActiveX controls, though a VCL wrapper can be created to make an ActiveX control seem like a VCL component.
  • voluntary aid detachment — (in World War I) an organization of British women volunteers who assisted in military hospitals and ambulance duties
  • water of crystallization — water of hydration, formerly thought necessary to crystallization: now usually regarded as affecting crystallization only as it forms new molecular combinations.
  • ways and means committee — a standing committee of the US House of Representatives that supervises all financial legislation
  • webster-ashburton treaty — U.S. History. an agreement between the U.S. and England (1842) defining the boundary between British and American territory from Maine to present-day Minnesota.
  • what are you playing at? — If you ask what someone is playing at, you are angry because you think they are doing something stupid or wrong.
  • what are you waiting for — If you say to someone 'What are you waiting for?' you are telling them to hurry up and do something.
  • which way the wind blows — air in natural motion, as that moving horizontally at any velocity along the earth's surface: A gentle wind blew through the valley. High winds were forecast.
  • wired equivalent privacy — (networking, standard)   (WEP) IEEE 802.11:1999. A cryptographic privacy algorithm, based on the RC4 encryption engine, used to provide confidentiality for 802.11 wireless networks. WEP is intended to provide roughly the same level of confidentiality for wireless data as a wired LAN (Ethernet), which is NOT protected by encryption. WEP is often wrongly expanded as "Wireless Encryption Protocol". WEP is a protocol that provides encryption used on wireless networks but that's not what it stands for.
Was this page helpful?
Yes No
Thank you for your feedback! Tell your friends about this page
Tell us why?