<±è´ë±ÕÀÇ ºñÁî´Ï½º ¿µ¾î Ç¥Çö°ú ´Ü¾î>I¡®ll be there with bells on (°Å±â¿¡ ²À ±â²¨ÀÌ °¥°Ô)

  • ¹®È­ÀϺ¸
  • ÀÔ·Â 2017-05-25 14:31
ÇÁ¸°Æ®
º»¹® ÆùÆ® Å©±â ¼³Á¤
Æ˾÷ ´Ý±â

photoŬ¸¯ÇÏ½Ã¸é ´õ Å«À̹ÌÁö¸¦ º¸½Ç ¼ö ÀÖ½À´Ï´Ù


ÀýÂ÷Ź¸¶(ï·ó¯öüب) ´ë±â¸¸¼º(ÓÞÐïعà÷)À̶ó´Â ¸»ÀÌ ÀÖ½À´Ï´Ù. ÇÑ °³ÀÇ ±×¸©ÀÌ ¸¸µé¾îÁö±â À§Çؼ­´Â ²÷°í, ±ð°í, ÂÉ°í, °¥¾Æ³»´Â Èûµç °úÁ¤À» °ÅÃÄ¾ß ÇÑ´Ù´Â ÀǹÌÁÒ. ÁÖº¯¿¡¼­ ¾Ë´ø Ä£±¸³ª ÁöÀÎÀÌ Å©°Ô ¼º°øÇÏ´Â °ÍÀ» º¸°í ³Ê¹« ºÎ·¯¿öÇϸ鼭 ¾î¶»°Ô ±×·¸°Ô ½±°Ô ¼º°øÇϳİí ÁúÅõÇÒ ¼ö ÀÖ½À´Ï´Ù. ±×·¯³ª ±× ¼º°øÇÑ »ç¶÷Àº ºÐ¸í ³ë·ÂÀ» ¸¹ÀÌ ÇÏ°í Èûµé¾úÀ» °ÍÀÔ´Ï´Ù. ´ÙÀ½ ¹®ÀåÀÌ ¶°¿À¸¨´Ï´Ù. It takes a lot of early mornings and late nights to become an overnight success.(À̸¥ ¾ÆħºÎÅÍ ´ÊÀº ¹ã±îÁö ¸¹Àº ¼¼¿ùÀ» º¸³»¾ß ÇÏ·ç¾Æħ¿¡ ¼º°øÇÏ°Ô µÈ´Ù.)

Brad Lea¶ó´Â Light Speed VTÀÇ ¼³¸³ÀÚ°¡ ÀÌ·± ¸»À» Çß½À´Ï´Ù. It took me 15 years to become an overnight success.(³»°¡ ÇÏ·í¹ã »õ ¼º°øÀ» ÇÏ´Â µ¥ 15³â °É·È´Ù.) ±×¸¸Å­ Èûµç ³ë·Â°ú °íÅëÀÌ ÀÖ¾ú±â ¶§¹®¿¡ °©ÀÛ½º·¯¿î ¼º°øµµ ÇÏ´Â °ÍÀ̶ó ÀÎÁ¤ÇØ ÁÖ°í ÃàÇÏÇØ Áָ鼭 Àڱ⠰³¹ßÀ» ²ÙÁØÈ÷ ÇÏ´Â °ÍÀÌ Áß¿äÇÏ´Ù´Â »ý°¢ÀÌ µì´Ï´Ù. ¿À´ÃÀÇ Ç¥ÇöÀÔ´Ï´Ù!

I¡¯ll be there with bells on.(°Å±â¿¡ ²À ±â²¨ÀÌ °¥°Ô.)

with bells onÀº with a lot of enthusiasm(¿­·ÄÈ÷) ¶Ç´Â eagerly, willingly, and on time(±â²¨ÀÌ ½Ã°£¿¡ Á¤È®È÷)À̶ó´Â ÀǹÌÀÔ´Ï´Ù.

¿ì¸®°¡ ÀÏÀ» ÇÏ°í °øºÎ¸¦ ÇÏ´Â µ¥ Áß¿äÇÑ ±âº»Àº ¿­Á¤°ú µµÀüÁ¤½ÅÀÔ´Ï´Ù. ¿äÁîÀ½ ³¯ÀÌ ´õ¿öÁö´Âµ¥ ÀÌ¿­Ä¡¿­(We fight heat with heat)À» ÇØ¾ß ÇÏ´Â °æ¿ìµµ ÀÖÁÒ. ÀÌ Ç¥ÇöµéÀ» ÀÔÀ¸·Î ¸»Çغ¸°í Á÷Á¢ ½áº¸¸é¼­ ÀÇ¿åÀûÀ¸·Î °øºÎÇÏ¸é ¹Ýµå½Ã ¾²½Ç ÀÏÀÌ ÀÖÀ» °ÍÀÔ´Ï´Ù!

Oh, yes! I¡¯ll meet you at the restaurant. I¡¯ll be there with bells on.(¿À, ±×·¡. ³Ê¸¦ ·¹½ºÅä¶û¿¡¼­ ¸¸³ªÁö. Á¦½Ã°£¿¡ ¸Â°Ô °Å±â ±â²¨ÀÌ °¡Áö!)

A : Can you make it to my party tonight?(¿À´Ã ¹ã ³» ÆÄƼ¿¡ ¿Ã ¼ö ÀÖ´Ï?)

B : I¡¯ll be there with bells on.(±â²¨ÀÌ °¡Áö.)

¿À´ÃÀÇ ´Ü¾î : Ransomware(·£¼¶¿þ¾î)

ÀÌ ´Ü¾î´Â ¿äÁò ´Ù ¾Ë°í °è½ÃÁÒ? À̸§À» Âü Àç¹ÌÀÖ°Ô Àß Áö¾î¼­ °øºÎÇØ º¾´Ï´Ù. Ransomware´Â ransom(¸ö°ª)+ware(=software)¸¦ ÀǹÌÇÕ´Ï´Ù. ¸ö°ªÀ» Áà¾ß ¹®Á¦¸¦ Ç®¾îÁÖ´Â ¾Ç¼º ¼ÒÇÁÆ®¿þ¾î¸¦ °¡¸®Å°ÁÒ. RansomwareÀÇ Àǹ̸¦ ¿µ¾î·Î Ç®¾îº¸¸é ´ÙÀ½°ú °°½À´Ï´Ù.

Malware that disables the normal operation of a computer until money or other ransom is paid to the person or organization responsible for the malware.(ÇØ´ç Ã¥ÀÓÀÚ³ª Á¶Á÷¿¡ µ·À̳ª ¸ö°ªÀÌ ÁöºÒµÉ ¶§±îÁö ÄÄÇ»ÅÍÀÇ Á¤»ó ¿î¿µÀ» ¸ø ÇÏ°Ô ÇÏ´Â ¾Ç¼º ¼ÒÇÁÆ®¿þ¾î.)

±è´ë±Õ ¹®È­ÀϺ¸ ¿¬Àçµµ ¹ßÀüÇؾßÁÒ. ´ÙÀ½ ÁÖºÎÅÍ ¾ÆÇÁ¸®Ä«TV ¹æ¼Û±¹¿¡¼­ Àú °°Àº Best BJ¿¡°Ô´Â ÃÔ¿µ µ¿¿µ»óÀ» ¿µ±¸ º¸°üÇØÁÝ´Ï´Ù. ¹®È­ÀϺ¸ ¿¬À縦 Á¾Á¾ µ¿¿µ»ó °­ÀÇ·Î ¿Ã·Áµå¸®°Ú½À´Ï´Ù. ÀÌ °­ÀÇ´Â ´ÙÀ½ ÁÖ ¿¬ÀçºÎÅÍ ¿µ±¸ º¸°üµÅ µ¿¿µ»óÀ¸·Îµµ º¸½Ç ¼ö ÀÖ½À´Ï´Ù!

±è´ë±Õ¾îÇпø ¿øÀå
ÁÖ¿ä´º½º
±â»ç´ñ±Û
AD
count
AD
AD
AD
ADVERTISEMENT