Back to Helpful ESL Links
Maclean's Vocabulary Exerise
Here is what a previous student did for the Maclean's Vocabulary Assignment in order to create the definition and examples sentences below:
 
  1. She opened a new document in Microsoft Word.
  2. She opened up a window in Internet Explorer and went to one of the online dictionary websites.
  3. She searched for the vocabulary word.  The dictionary will usually bring back the simple or base form of the word.  For example, if you search for vulnerability, the dictionary will bring back vulnerable.
  4. Using the mouse, she selected the word, the meaning, the origin, examples, etc. and copied it
  5. She then switched to Word and pasted what she had copied.
  6. She opened another window in Explorer and went to the Maclean's website.
  7. She searched for the several variations of the vocabulary word.  She looked through several of the articles and chose examples that showed different ways the word was used.  When she found a good example, she copied several sentences surrounding the word, copied them, and pasted them in Word



Definition Copied from an On-line Dictionary

 
Main Entry: vul·ner·a·ble
Function: adjective
1 : capable of being physically wounded
2 : open to attack or damage : ASSAILABLE
3 : liable to increased penalties but entitled to increased bonuses after winning a game in contract bridge
- vul·ner·a·bil·i·ty /"v&l-n(&-)r&-'bi-l&-tE/ noun
- vul·ner·a·ble·ness /'v&l-n(&-)r&-b&l-n&s, 'v&l-n&r-b&l-/ noun
- vul·ner·a·bly /-blE/ adverb



  Sentences Copied from On-line Maclean's Articles
  1.There may be no simple defence against being spied on by your near and dear. But tools are emerging to reduce the vulnerability of private e-mail, and to help solve the flip side of the "lurer" problem: how to prove you really are who you say you are online.
2.For investors, 2000 began amid euphoria for high-technology stocks. But the bubble burst in March, and lost more air as the year progressed. As if to drive home the vulnerability of the New Economy, a rash of hacker attacks immobilized computers belonging to top Web sites .
3.And there can be no doubt she was abused in other ways as well. After Henry's death, the vulnerable 13-year-old went to live with the last of her father's six wives.