Title: Unit Six : Delete Redundant and Needless Phrases
1 Unit Six Delete Redundant and Needless
Phrases
???????? ???????????? ?? ?????????? ?????
?????????? ????????? ??????? ????????? ??????? ?
????'??????? ??????.
2?????? ????????? ?????????? ???????????
?????????????? ?? ???????????? ???????, ?? ??????
???? ??????? ??? ???????? ????????. ????????
???????? ?????????? ????????? ????????? ???? ???
??????????? ????, ?? ??????? ??????? ???????.
3?? ?? ?? ????????? ?? ??????? ??? ??????? ????
????? ??????? ?
- It is well known that a majority of Taguchi
method applications have the capacity for
addressing a single-response problem. - Revised Most Taguchi method applications can
address a single-response problem.
4?? ?? ?? ????????? ?? ??????? ??? ??????? ????
????? ??????? ?
- It may be said that computers have the ability to
incorporate kinds of equipment in order that the
user is in a position to interact with the
computer. - Revised Computers can incorporate equipment so
that the user can interact with the computer.
5?? ?? ?? ????????? ?? ??????? ??? ??????? ????
????? ??????? ?
- It is the operator who makes a determination of
the questions as to the phase should be
implemented. - Revised The operator determines whether to
implement the phase.
6?? ?? ?? ????????? ?? ??????? ??? ??????? ????
????? ??????? ?
- There is a guideline that makes a provision of
the necessary requirements. - Revised A guideline provides the requirements.
7?? ?? ?? ????????? ?? ??????? ??? ??????? ????
????? ??????? ?
- It has been found that any error that might
happen will be more destructive in light of the
fact that XYZ applications is in a position to
make direct calls to the hardware. - Revised Any possible error will be more
destructive since XYZ applications can make
direct calls to the hardware.
8?? ?? ?? ????????? ?? ??????? ??? ??????? ????
????? ??????? ?
- It has long been known that the logon between the
workstation and NT server is encrypted
considering the fact that an eavesdropper
actually wants to gain the ID and password. - Revised The logon between the workstation and
NT server is encrypted because an eavesdropper
wants to gain the ID and password.
9?? ?? ?? ????????? ?? ??????? ??? ??????? ????
????? ??????? ?
- It is our opinion that Windows 95 is for all
intents and purposes a good operating system in a
situation in which the user has many
requirements. - Revised We believe that Windows 95 is a good
operating system when the user has many
requirements.
10?? ?? ?? ????????? ?? ??????? ??? ??????? ????
????? ??????? ?
- It is possible that the error affects the
necessary requirements when attempting to
ascertain the location of the variables. - Revised The error might affect the requirements
when attempting to find the variables.
11?? ?? ?? ????????? ?? ??????? ??? ??????? ????
????? ??????? ?
- It is noted that 10Mbps network cards are
basically becoming obsolete for the reason of
their slow data transfer rates. - Revised 10Mbps network cards are becoming
obsolete because of their slow data transfer
rates.
12?? ?? ?? ????????? ?? ??????? ??? ??????? ????
????? ??????? ?
- It is interesting to note that monitoring
features in most cases inform the user provided
that a performance bottleneck occurs. - Revised Notably, (OR Interestingly,)
monitoring features usually inform the user if a
performance bottleneck occurs.