Agreement of DP-External Items Sample Clauses

Agreement of DP-External Items. A second configuration in which the error rate is particularly high concerns DP-external modifiers. Two cases are possible: in the first, the modifier is used as nominal predicate of a noun; in the second, a past participle is used in a compound verb form. In both cases, the agreeing item is part of the predicate and not of the determiner phrase. The percentages of expected answers are particularly low here: around 45% of the predicative modifiers is correctly inflected. In the case of participles in compound verb forms, the percentage decreases to less than 30%. Therefore, these modifiers occur in the incorrect default form in the majority of cases (55% and around 70%, respectively). This sharply contrasts with DP-internal modifiers, where the error rate is below 25%. Consider first some examples of non-target-like predicative modifiers:
AutoNDA by SimpleDocs

Related to Agreement of DP-External Items

  • EXTERNAL SERVICES The Platform may enable access to third-party services and websites and Applications (collectively and individually, "External Services"). You agree to use the External Services at your sole risk. NCR Voyix is not responsible for examining or evaluating the content or accuracy of any third-party External Services and shall not be liable for any such third-party External Services. Data displayed by any External Service, including but not limited to financial, and location information, is for general informational purposes only and is not guaranteed by NCR Voyix or its agents. You will not use the External Services in any manner that is inconsistent with the terms of this Agreement or that infringes the intellectual property rights of any third party. You agree not to use the External Services to harass, abuse, stalk, threaten or defame any person or entity, and that NCR Voyix is not responsible for any such use. External Services may not be available in all languages or in your home country and may not be appropriate or available for use in any particular location. To the extent you choose to use such External Services, you are solely responsible for compliance with any applicable laws. NCR Voyix reserves the right to change, suspend, remove, disable or impose access restrictions or limits on any External Services at any time without notice or liability to you.

  • Rights Protection Mechanisms and Abuse Mitigation ­‐ Registry Operator commits to implementing and performing the following protections for the TLD: i. In order to help registrars and registrants identify inaccurate data in the Whois database, Registry Operator will audit Whois data for accuracy on a statistically significant basis (this commitment will be considered satisfied by virtue of and for so long as ICANN conducts such audits). ii. Work with registrars and registrants to remediate inaccurate Whois data to help ensure a more accurate Whois database. Registry Operator reserves the right to cancel a domain name registration on the basis of inaccurate data, if necessary. iii. Establish and maintain a Domains Protected Marks List (DPML), a trademark protection service that allows rights holders to reserve registration of exact match trademark terms and terms that contain their trademarks across all gTLDs administered by Registry Operator under certain terms and conditions. iv. At no cost to trademark holders, establish and maintain a Claims Plus service, which is a notice protection mechanism that begins at the end of ICANN’s mandated Trademark Claims period. v. Bind registrants to terms of use that define and prohibit illegal or abusive activity. vi. Limit the use of proxy and privacy registration services in cases of malfeasance. vii. Consistent with the terms of this Registry Agreement, reserve the right to exclude from distribution any registrars with a history of non-­‐compliance with the terms of the Registrar Accreditation Agreement. viii. Registry Operator will be properly resourced to perform these protections.

  • External Hosting Facilities DST shall implement controls, consistent with applicable prevailing industry practices and standards, regarding the collection, use, storage and/or disclosure of Fund Data by an external hosting provider.

  • Placement of DNS probes Probes for measuring DNS parameters shall be placed as near as possible to the DNS resolvers on the networks with the most users across the different geographic regions; care shall be taken not to deploy probes behind high propagation-­‐delay links, such as satellite links.

  • Implementation Arrangements Institutional Arrangements

  • Safeguards Monitoring and Reporting The Borrower shall do the following or cause the Project Executing Agency to do the following:

  • Implementing Agreement The Governments of the Parties shall conclude a separate agreement setting forth the details and procedures for the implementation of this Agreement (hereinafter referred to in this Agreement as “the Implementing Agreement”).

  • CERTIFICATION REGARDING CERTAIN FOREIGN-OWNED COMPANIES IN CONNECTION WITH CRITICAL INFRASTRUCTURE (Texas law as of September 1, 2021) By submitting a proposal to this Solicitation, you certify that you agree to the following required by Texas law as of September 1, 2021: Proposing Company is prohibited from entering into a contract or other agreement relating to critical infrastructure that would grant to the company direct or remote access to or control of critical infrastructure in this state, excluding access specifically allowed by the Proposing Company for product warranty and support purposes. Company, certifies that neither it nor its parent company nor any affiliate of company or its parent company, is (1) owned by or the majority of stock or other ownership interest of the company is held or controlled by individuals who are citizens of China, Iran, North Korea, Russia, or a designated country; (2) a company or other entity, including governmental entity, that is owned or controlled by citizens of or is directly controlled by the government of China, Iran, North Korea, Russia, or a designated country; or (3) headquartered in China, Iran, North Korea, Russia, or a designated country. For purposes of this contract, “critical infrastructure” means “a communication infrastructure system, cybersecurity system, electric grid, hazardous waste treatment system, or water treatment facility.” See Tex. Gov’t Code § 2274.0101(2) of SB 1226 (87th leg.). The company verifies and certifies that company will not grant direct or remote access to or control of critical infrastructure, except for product warranty and support purposes, to prohibited individuals, companies, or entities, including governmental entities, owned, controlled, or headquartered in China, Iran, North Korea, Russia, or a designated country, as determined by the Governor.

  • Monitoring Arrangements 8.1 We will formally monitor the progress of the access agreement at least once a year and report annually to the SCITT Management Group. Initial monitoring will be concerned with participation rates and the development of data on lower income and other under-represented groups. When specific data is accrued, we will look to monitor against this. 8.2 Our annual report to the SCITT Management Group will form the basis of our monitoring report to OFFA.

  • Master Feeder Structure If permitted by the 1940 Act, the Board of Trustees, by vote of a majority of the Trustees, and without a Shareholder vote, may cause the Trust or any one or more Series to convert to a master feeder structure (a structure in which a feeder fund invests all of its assets in a master fund, rather than making investments in securities directly) and thereby cause existing Series of the Trust to either become feeders in a master fund, or to become master funds in which other funds are feeders.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!