Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
IT_Grammar_Exercises.doc
Скачиваний:
0
Добавлен:
01.07.2025
Размер:
526.34 Кб
Скачать

Unit 19 Data Security 2 Cause and effect (2) links using allow and prevent

What is the relationship between these events?

1. The scanner finds a match for your

fingerprint.

2. The keyboard is unlocked.

3. You can use the PC.

1 and 2 are cause and effect. We can link them using the methods studied in Unit 18. In addition we can use an if-sentence. Note that the tenses for both cause and effect are the same. For example:

If the scanner finds a match for your fingerprint, the keyboard is unlocked.

2 allows 3 to happen. We can link 2 and 3 using allow or permit.

The keyboard is unlocked, allowing/permitting you to use the PC.

What is the relationship between these events?

4. The scanner does not find a match for your fingerprint.

5. The keyboard remains locked.

6. You cannot use the PC.

We can show that 4 and 5 are cause and effect using the methods studied in Unit 18. We can also use therefore.

The scanner does not find a match for your fingerprint, therefore the keyboard remains locked.

5 prevents 6 from happening. We can link 5 and 6 using prevent or stop.

The keyboard remains locked, preventing you (from) using the PC. The keyboard remains locked, stopping you (from) using the PC.

I Link two sentences into one complex sentence using allow/permit, prevent/stop, therefore.

  1. The user runs an infected program. It is loaded into memory carrying the virus.

  2. The virus uses a common programming technique. It stays resident in memory.

  3. The virus returns control to the host program. The program then continues with its normal sequence of instructions. It is executed in the normal way.

  4. Two parties engaging in a secure transaction know each other’s public keys. The system works.

  5. Keep backups in separate locations, in fireproof containers, under lock and key. You will protect files from natural disasters, crimes and errors.

  6. Normally you keep only the recent differential back up on hand. This minimizes the size of your backup set.

II Find the mistakes in the following sentences .

  1. A second key feature of OOP (Object-Oriented Programming) is inheritance allowed OOP developers have defined one class of object.

  2. If the user will click the mouse on “Right triangle”, a voice clip explained the properties of right triangles.

  3. If you decide programming was really for you, spent more time on training course.

  4. If you will be able show someone an impressive piece of software with your name on it, it will count for a lot more than a string of academic qualifications.

  5. You were unlikely to be asking to take responsibility for a small team or a project prevented you from to be an IT manager.

  6. You already are having a screen on the fridge to allow you didn’t clutter up (загромождать) the work surface with the TV

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]