SlideShare a Scribd company logo
English I & II
acquire
 ac.quire


Definition:
1. to get (something) : to come to own
  (something)
   The coach announced today that the club has
    acquired defenseman Bryan McCabe from the
    Florida Panthers.
Dolphins to conditionally acquire Reggie
Bush from The Saints.
Facebook tries to acquire Twitter.
Did he acquire a new car?
Nokia will acquire a new
application.
Lakers Acquire Pau Gasol From Grizzlies.
Your turn to write your
own sentence using the
word acquire.
Accurate
 ac.cu.rate

Definition:
1. free from mistakes or errors
2. able to produce results that are
   correct : not making mistakes
Are you looking for a digital watch
that's accurate and easy to read?
The weather forecast is not always
accurate.
Which scale is accurate?
Are these kitchen timers accurate?
Precise, accurate and to the point.
Your turn to write your
own sentence using the
word accurate.
approach
 ap.proach

Definition:
1. to move or become near or nearer
   to something or someone
2.   to get close to
An airplane approaches the airport
at Sunset Beach.
The cat approached the baby
cautiously.
This weekend we're expecting
temperatures approaching 100 degrees.
Ease off the gas pedal to slow down as
the bend in the road approaches.
Your turn to write your
own sentence using the
word approach.

More Related Content

Viewers also liked

Word of the day 4 23-12
Word of the day 4 23-12Word of the day 4 23-12
Word of the day 4 23-12
lindarobb2
 
Words analysis form week 4 9-12
Words analysis form week 4 9-12Words analysis form week 4 9-12
Words analysis form week 4 9-12
lindarobb2
 
How to survive
How to surviveHow to survive
How to survive
lindarobb2
 
Word of the day
Word of the dayWord of the day
Word of the day
lindarobb2
 
Empires of the sea bits
Empires of the sea bitsEmpires of the sea bits
Empires of the sea bits
monkded
 
Word of the day 4 9-12
Word of the day 4 9-12Word of the day 4 9-12
Word of the day 4 9-12
lindarobb2
 
Word of the day
Word of the dayWord of the day
Word of the day
lindarobb2
 
Social Engineering - By Chris Hills
Social Engineering - By Chris HillsSocial Engineering - By Chris Hills
Social Engineering - By Chris Hills
Chris Hills CPP, CRMP
 
Presentation1.pptx rebecca winter
Presentation1.pptx   rebecca winterPresentation1.pptx   rebecca winter
Presentation1.pptx rebecca winter
beccawinter
 
Történelem 5. osztályosoknak - Interaktív tananyag értékelése
Történelem 5. osztályosoknak - Interaktív tananyag értékeléseTörténelem 5. osztályosoknak - Interaktív tananyag értékelése
Történelem 5. osztályosoknak - Interaktív tananyag értékelése
Tamás Bakos
 
Laws related to disability rights
Laws related to disability rightsLaws related to disability rights
Laws related to disability rights
lindarobb2
 
Simple past lesson
Simple past lesson Simple past lesson
Simple past lesson
Christian Alape
 
7 myths of the spanish conquest
7 myths of the spanish conquest7 myths of the spanish conquest
7 myths of the spanish conquest
monkded
 
Archives à conserver Associations loi 1901 .compressed 1
Archives à conserver Associations loi 1901 .compressed 1Archives à conserver Associations loi 1901 .compressed 1
Archives à conserver Associations loi 1901 .compressed 1
Dominique Gayraud
 
Identifier les risques
Identifier les risquesIdentifier les risques
Identifier les risques
Carine Pascal
 
Ateliers commercants acv-ucm-acia #2
Ateliers commercants acv-ucm-acia #2Ateliers commercants acv-ucm-acia #2
Ateliers commercants acv-ucm-acia #2
Laurent ANNET ☆ WSI Marketing Digital
 
Formation "Développer son activité commerciale sur le marché du tourisme d'a...
 Formation "Développer son activité commerciale sur le marché du tourisme d'a... Formation "Développer son activité commerciale sur le marché du tourisme d'a...
Formation "Développer son activité commerciale sur le marché du tourisme d'a...
MONA
 
Intervention Silvère MERCIER
Intervention Silvère MERCIER Intervention Silvère MERCIER
Intervention Silvère MERCIER
Université de Nantes - IUT La Roche/Yon
 
La Création de Contenu dans votre Inbound Stratégie
La Création de Contenu dans votre Inbound StratégieLa Création de Contenu dans votre Inbound Stratégie
La Création de Contenu dans votre Inbound Stratégie
Noemie Aguettant
 

Viewers also liked (20)

Word of the day 4 23-12
Word of the day 4 23-12Word of the day 4 23-12
Word of the day 4 23-12
 
Words analysis form week 4 9-12
Words analysis form week 4 9-12Words analysis form week 4 9-12
Words analysis form week 4 9-12
 
How to survive
How to surviveHow to survive
How to survive
 
Word of the day
Word of the dayWord of the day
Word of the day
 
Empires of the sea bits
Empires of the sea bitsEmpires of the sea bits
Empires of the sea bits
 
Word of the day 4 9-12
Word of the day 4 9-12Word of the day 4 9-12
Word of the day 4 9-12
 
Word of the day
Word of the dayWord of the day
Word of the day
 
Social Engineering - By Chris Hills
Social Engineering - By Chris HillsSocial Engineering - By Chris Hills
Social Engineering - By Chris Hills
 
Presentation1.pptx rebecca winter
Presentation1.pptx   rebecca winterPresentation1.pptx   rebecca winter
Presentation1.pptx rebecca winter
 
Történelem 5. osztályosoknak - Interaktív tananyag értékelése
Történelem 5. osztályosoknak - Interaktív tananyag értékeléseTörténelem 5. osztályosoknak - Interaktív tananyag értékelése
Történelem 5. osztályosoknak - Interaktív tananyag értékelése
 
Laws related to disability rights
Laws related to disability rightsLaws related to disability rights
Laws related to disability rights
 
Simple past lesson
Simple past lesson Simple past lesson
Simple past lesson
 
7 myths of the spanish conquest
7 myths of the spanish conquest7 myths of the spanish conquest
7 myths of the spanish conquest
 
Archives à conserver Associations loi 1901 .compressed 1
Archives à conserver Associations loi 1901 .compressed 1Archives à conserver Associations loi 1901 .compressed 1
Archives à conserver Associations loi 1901 .compressed 1
 
Identifier les risques
Identifier les risquesIdentifier les risques
Identifier les risques
 
Ateliers commercants acv-ucm-acia #2
Ateliers commercants acv-ucm-acia #2Ateliers commercants acv-ucm-acia #2
Ateliers commercants acv-ucm-acia #2
 
Formation "Développer son activité commerciale sur le marché du tourisme d'a...
 Formation "Développer son activité commerciale sur le marché du tourisme d'a... Formation "Développer son activité commerciale sur le marché du tourisme d'a...
Formation "Développer son activité commerciale sur le marché du tourisme d'a...
 
Intervention Silvère MERCIER
Intervention Silvère MERCIER Intervention Silvère MERCIER
Intervention Silvère MERCIER
 
La Création de Contenu dans votre Inbound Stratégie
La Création de Contenu dans votre Inbound StratégieLa Création de Contenu dans votre Inbound Stratégie
La Création de Contenu dans votre Inbound Stratégie
 
MemoireYS
MemoireYSMemoireYS
MemoireYS
 

More from lindarobb2

Word of the day 3 19-12
Word of the day 3 19-12Word of the day 3 19-12
Word of the day 3 19-12
lindarobb2
 
Words of the week 1 3-12
Words of the week 1 3-12Words of the week 1 3-12
Words of the week 1 3-12
lindarobb2
 
Word of the day
Word of the dayWord of the day
Word of the day
lindarobb2
 
Planning a career
Planning a careerPlanning a career
Planning a career
lindarobb2
 
Laws related to disability rights
Laws related to disability rightsLaws related to disability rights
Laws related to disability rights
lindarobb2
 
Weekly words
Weekly wordsWeekly words
Weekly words
lindarobb2
 

More from lindarobb2 (6)

Word of the day 3 19-12
Word of the day 3 19-12Word of the day 3 19-12
Word of the day 3 19-12
 
Words of the week 1 3-12
Words of the week 1 3-12Words of the week 1 3-12
Words of the week 1 3-12
 
Word of the day
Word of the dayWord of the day
Word of the day
 
Planning a career
Planning a careerPlanning a career
Planning a career
 
Laws related to disability rights
Laws related to disability rightsLaws related to disability rights
Laws related to disability rights
 
Weekly words
Weekly wordsWeekly words
Weekly words
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 

Weekly words