Tuesday, February 27, 2018


HERE IS HOW TO WRITE AN ANSWER TO A LEGAL COMPLAINT


ANSWER TO A COMPLAINT


FORMAT



CAPTION, TITLE, INTRODUCTORY CLAUSE

  • Caption same as caption for the complaint
  • Title reflects that this is an Answer
  • Introductory clause identifies Defendant and introduces the body of the answer

DEFENSES

  • Answer states the Defendant’s Defense
  • Admits or denies Plaintiff’s claims
  • Can contain either Affirmative Defenses or a Counterclaim that has a prayer for relief
  • CERTIFICATE OF SERVICE

  • If Defense attorney serves answer on Plaintiff’s attorney, a certificate of service must be included


Wednesday, February 21, 2018

Online English Websites



Web Sites to Explore:


www.loc.gov: U.S. Library of Congress- Contains U.S. History, Online Exhibitions and Audio  files


www.toread.com: Resources for Language Arts and Reading Research


www.nytimes.com: The New York Times Newspaper on the Web


www.washingtonpost.com: The Washington Post Newspaper on the Web


www.english-zone.com: Strategies to use for Paragraph Writing


www.iht.com: The International Herald Tribune (England) Newspaper on the
      Web.

www.jpl.nasa.gov: Great Site for Science!


www.readinga-z.com: Mini-Readers for students to use.


       www.thefreedictionary.com: Online Dictionary, Encyclopedia and Thesaurus

.www.thefreelibrary.com: Free Online Library: Classic Books by famous authors
      online

www.eltweb.com: Index of English Language Resources


www.onelang.com: Learn English Online: Comprehensive resources for studying
            English


http://english.specialist.hu: A site for students and teachers of English as a
            Foreign Language









Monday, February 19, 2018

Websites to Develop your English Language Skills

Here are some websites that can help you in developing your English Speaking, Listening, Grammar and Writing 



Topics Covered:

Grammar Quizzes: Adjectives, Adverbs, Apostrophes, Collective Nouns,
Comparatives, Interrogative Pronouns, Parts of Speech, Personal Pronouns,
Question Forms, Passive Participles, Relative Pronouns, Sentence Structure,
Ambiguous Sentences with Relative Clauses, Noun and Verb Matching,
Common Similes, Subject and Verb Agreement, Time, Word Endings.

Essay Writing: How to write an essay- Audience, Brainstorming, Structure,
Style and Tone, Introductions and Conclusions, Editing and Revising.

Vocabulary Memory Match Word Games

Word Search Practice: Months of the Year, Animals, Birds, Body Illnesses,
Parts of the Body, Clothing, Colors, Countries, Farm Animals, Geography,
House, Insects, Kitchen, Mammals, Music, Occupations, Ocean Animals

Reading: Online Literature Library



Topics Covered:

Practice Conversations
Common Mistakes in English
American Idioms
English Grammar: Types of Adjectives, Types of Verbs, Types of Nouns,
Prepositions, Adverbs, Types of Pronouns




Topics Covered:
Grammar: Sentence Structure, Questions, Conditionals, Irregular Verbs,
Verb Tenses
Practice Worksheets for: There is/There are, Sentence Patterns, Relative
Pronouns, May/Must/Can’t, Prepositions, Present Simple, Past Simple,
Present Perfect, Mixed Tenses, Use of Infinitive or – ing.



Topics Covered:
English Lessons: English Grammar, English Vocabulary, English Pronunciation
Guide, English Reading Practice
ESL Vocabulary Games: Hangman and Crossword Puzzles



An Interactive Online Writing Lab to help with Grammar, Punctuation,
Spelling, the Writing Process, Using MLA and APA, Professional Writing
of Resumes and Cover Letters.


Topics Covered:
Grammar Explanations
Grammar Exercises
Vocabulary Explanations
Vocabulary Exercises
ESL Vocabulary Games
Writing Skills and Techniques: Creative Writing, Summary Writing,
Writing Letters, Analyzing Texts


An Online Dictionary, Encyclopedia and Thesaurus










Thursday, February 15, 2018

Our ITEP Course Offerings



At Innovative Technical English 4 Professionals, we provide Business English and Technical English programs for professionals who need or want to improve their pronunciation, vocabulary, grammar and listening while working with highly trained instructors in a professional environment. Our goal is to help participants in this program increase their knowledge of English, speak fluently, and build confidence. Because our program is on-line it is flexible.

The courses are broken down into 8-weeks or 12-weeks based on the curriculum. Each course includes all materials and two weekly 50-minute face to face sessions with a native English Instructor.

8-week Courses provided
Technical English
Business Emails
Aviation
Fashion
Energy
Accounting
Negotiations
Business Leadership Skills
IELTS Test Preparation

12-week Courses
English Grammar
Legal
Hotel and Hospitality
Restaurant Management and Culinary Arts
Marketing
Business Communication
Business English


Cost
The program cost is in USD, because we are based in the United States.
An 8-week course is $1,086.
A 12-week course is $1,756.

Wednesday, February 14, 2018

Sites to develop Listening, Speaking and Pronunciation


   Listening sites to develop English Speaking and Pronunciation
  1.  audio and text of over 200 famous speeches
www.AmericanRhetoric.comspeeches, as well as an index of over 5,000 more. Also, there are 200
short audio clips that illustrate rhetorical devices, such as Similes and Metaphors.


  1. www.HistoryChannel.com/speeches: you can read or hear a variety of famous
speeches.






Monday, February 12, 2018

ITEP Course Offerings



At Innovative Technical English 4 Professionals, we provide Business English and Technical English programs for professionals who need or want to improve their pronunciation, vocabulary, grammar and listening while working with highly trained instructors in a professional environment. Our goal is to help participants in this program increase their knowledge of English, speak fluently, and build confidence. Because our program is on-line it is flexible.

The courses are broken down into 8-weeks or 12-weeks based on the curriculum. Each course includes all materials and two weekly 50-minute face to face sessions with a native English Instructor.

8-week Courses provided
Technical English
Business Emails
Aviation
Fashion
Energy
Accounting
Negotiations
Business Leadership Skills
IELTS Test Preparation

12-week Courses
English Grammar
Legal
Hotel and Hospitality
Restaurant Management and Culinary Arts
Marketing
Business Communication
Business English


Cost
The program cost is in USD, because we are based in the United States.
An 8-week course is $1,086.
A 12-week course is $1,756.

Friday, February 9, 2018

Additional Vocabulary Terms used by Computer Professionals







Here are additional words and phrases used by computer professionals:


Import

1. command located in a program’s File menu that allows the user to move data from one program or earlier software versions into another program or later version


IP Address

1. Internet Protocol Address. (Also known as an IP number or IP.)
2. address of a computer or other network device assigned to your computer by a router (SEE router) and later updated by an Internet Service Provider once the user has connected to the Internet
3. code that is made up of numbers separated by three dots that identifies a particular computer on the Internet. Every computer requires an IP address to connect to the Internet
EXAMPLE: “123.45.67.89”


JPEG

1. Joint Photographic Experts Group
2. color image graphics compression file format


LAN

1. Local Area Network
2. computer network limited to a small area



Malware

1. also known as scumware.
2. software program that has been intentionally designed to change a user’s settings without his or her permission, delete a competing software program, cause a competing software program to stop working, or leave a computer open to attacks


MBAM

1. also known as Malwarebytes Anti-Malware
2. software utility program designed to scan, locate and remove malware from
your computer
3. a program that can be used in conjunction with your antivirus program to
help detect threats to your computer that antivirus programs may miss




Network

1. A group of two or more computer systems linked together
2. A group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a wide range of users


Phishing

1. term used to describe when a malicious individual or group of individuals scams users through email or web pages designed to look legitimate to encourage users to enter personal information
2. usually an email message designed to steal your personal data, such as credit card numbers, passwords, account data, or other information




Program

1. A computer program is a sequence of instructions written to perform specific tasks with a computer
2. A computer requires programs to function and is always running unless the computer is turned off or halted


Scareware

1. program claiming it’s an antivirus or other security program and has found dozens of potential threats on a computer, which in reality are either nonexistent or not really a threat to the user or the user’s computer
2. programs typically installed onto a computer through false Internet advertisements, free programs and other malware


Search Engine

1. software program or script available through the Internet that searches documents and files for keywords and returns the results of any files containing those keywords


Software

1. A collection of computer programs and related data that provides the instructions that enable the user to interact with the computer or have the computer perform specific tasks
2. any set of machine-readable instructions (most often in the form of a computer program) that directs a computer’s processor to perform specific operations


Spyware

1. software program that is intentionally installed on the computer by a user to monitor or spy on what other users of the same computer are doing
2. malicious or unwanted software that can track your activities or simply slow your computer




Trojan Horse

1. program or utility that appears to be something useful or safe, but in reality is performing background tasks such as giving access to your computer or sending personal information to other computers
2. one of the most common methods a criminal uses to infect your computer and collect personal information from your computer


Virus

1. a program that runs on a system against the user’s wishes and knowledge
2. programs that can send your data to a third party, delete your data, or ruin your computer and render it unusable without a reinstallation of the operating system


WAN

1. Wide Area Network
2. network not limited to a single location
3. networks that span long distances using telephone lines, fiber-optic cables or satellite links


Wi-Fi

1. Wireless Local Area Network
2. the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections


WinZip

1. software program commonly used to compress larger files into smaller ones for easy sharing and downloading




Worm

1. destructive software program containing code capable of gaining access to computers or networks
2. a program similar to a virus that will exploit vulnerability in an operating system or application that a computer user is running
3. software that causes harm by deleting, modifying, distributing, or otherwise manipulating data
4. also known as Write Once Read Many (W.O.R.M.) – a CD that can be written to and then read from thereafter


Zip

1. file extension associated with WinZip file compression programs
2. hardware drive, diskette, or backup device for file compression



Wednesday, February 7, 2018

Vocabulary Words and Phrases used by Computer Professionals



Here are vocabulary words and phrases used by Computer Professionals:


Anti-spyware

1. program that helps to block and prevent spyware and other malware infections on a computer
2. monitor incoming data from email, websites, and downloads of files and stop spyware programs from getting a foothold in the computer operating system


Antivirus Program

1. also known as antivirus software
2. software program designed to protect your computer or network against computer viruses. If a virus is detected, the computer will display a warning asking what action should be taken, often giving the options to remove, ignore, or move the file

Bandwidth

1. describes network speed. The maximum data transfer rate of a network or Internet connection
2. measures how much data can be sent over a specific connection in a given amount of time
EXAMPLES: A gigabyte Ethernet connection has a bandwidth of 1,000 Mbps (megabits per second). An Internet connection via cable modem may provide 25 Mbps of bandwidth



Cloaking

1. the technique of hiding something or giving a false appearance
2. method by which most malware infects a computer
EXAMPLE: malware disguises itself as an antivirus program when in reality it is a virus

Cloud Computing

1. services over a network by a collection of servers
2. service that allows visiting users to access programs and services anywhere with Internet access without having to install other software




CPU

1. central processing unit; also known as processor or microprocessor
2. computer “brain” that processes data


Driver

1. group of files that enable one or more hardware devices to communicate
   with the computer’s operating system
2. software that allows computer hardware, such as printers, to work with the operating system




Emoticon

1. text-based faces and objects that are often seen in emails and online chat that help give the reader a sense of the writer’s feelings behind the text




Ethernet Port

1. a computer port resembling a regular telephone jack, but slightly wider, used to connect a computer to another computer, a local network, or an external DSL or cable modem






File format

1. A standard way that information is encoded for storage in a computer file. Each file type has a different file format EXAMPLES: common file formats include BMP, JPEG, GIF, PICT, PCX, TIFF




Firewall

1. software utility or hardware device that limits outside network access to a computer or local network by blocking or restricting ports
2. helps prevent unauthorized access to a company or home network




Firmware

1. software program or set of instructions programmed on a hardware device that provides necessary instructions for how the device communicates with other computer hardware

GIF

1. Graphic Interchange Format
2. a graphics file extension
3. a bitmapped graphics file

Hashtag

1. function used with Twitter or other services that assigns a post or a tweet a keyword by using a number symbol (#)
2. number symbols used to categorize tweets or posts of related topics
EXAMPLES: #ESPConference, #Education, #Health




HTML

1. Hyper-Text Markup Language
2. computer language that Web pages are written in




HTTP

1. HyperText Transfer Protocol
2. set of standards that allows users of the World Wide Web to exchange information found on web pages

HTTPS

1. HyperText Transfer Protocol over Secure Socket
2. secure method of transferring or accessing information on a web page
3. secure, encrypted sites that require login information on web pages or on web pages that contain sensitive information
EXAMPLE: online bank web page

Hyperlink

1. often referred to as just “links”
2. a word, phrase, or image that you can click on to jump to a new document or section of a document. They can be found on nearly all web pages

Monday, February 5, 2018

Help in Developing English Speaking, Listening and Pronunciation


Here are some Websites to visit that will help you develop your English Listening, Speaking and Pronunciation:


BBC Learning English: English at Work



American English Fluency with Flow:



Listen and Learn English



Business English Podcast Lessons:




Friday, February 2, 2018

Key Legal Terms Commonly Used by Legal Professionals


EVIDENTIARY FACTS,
ULTIMATE FACTS, LEGAL
CONCLUSIONS: UNDERSTANDING KEY TERMS

EVIDENTIARY FACTS
Facts that are admissible in evidence

ULTIMATE FACTS
Facts in a case upon which liability is determined or based
Establish the elements of the Cause of Action

LEGAL CONCLUSION
Statement of the result
Applies the Law to a set of facts

States an element of the Cause of Action

Thursday, February 1, 2018

How a Legal Professional Writes a Law Office Memo


LAW OFFICE MEMO: PURPOSE AND USE


PURPOSE
Record the Law found as a result of the research
Explain how the researcher analyzed the law and applied it to the facts
Propose a Solution to the problem

USE
Attorney and Client use information to resolve the problem discussed in  
  the Law Office Memo

Format
Elements of a Law Office Memo

TO AND FROM
Contains the name of person who assigned you the Memo and your name

RE
Identifies the Subject Matter of the Memo

DATE
Memo should be dated
Use either date you complete your research or date you deliver it to reader
Date is important as it is assumed the research is current

FACTS
Clearly state significant facts
Limit them to one or two paragraphs


ISSUES AND ANSWERS
Heart of the Memo
Each issue and corresponding answer should be one sentence and give the  
  reader as much information as possible.
Number each issue and answer
An issue and answer contain a blend of fact and law

REASONING
Comprised of:
THESIS
SHORT CONCLUSION
STATEMENT OF RULE OF LAW
APPLICATION OF RULE OF LAW TO THE FACTS

THESIS PARAGRAPH
Contains thesis- central idea of your memo
Gives reader the big picture of your memo
• “Road Map”
Besides stating thesis statement, also state your conclusion in simple terms

RULE OF LAW
Law contained in legal resources that will be applied later to the facts in
  your memo
Comes from Primary Sources- Case Law
Need to clearly explain rule of law so reader has a solid basis for
  understanding your reasoning.



APPLICATION OF LAW TO FACTS
Create Case Analysis Chart
Include:
Name of Case
Facts that are Similar
Facts that are Different
Rule of Law and Conclusion
Use Separate Chart for each case discussed
Writing of Statement of Rule of Law and Application of Law to Facts 
  needs to be so clear that someone who has never read about the area of law
  discussed in the memo can easily understand your memo

CONCLUSION
Final Paragraph
Ties everything together
Summarize similarities and differences between Case Law used as 
  Authority and the Facts of the Memo

Explain what Cases you relied on to reach your conclusion