Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Computer as it is.doc
Скачиваний:
30
Добавлен:
16.05.2015
Размер:
798.21 Кб
Скачать

Lesson 4

Exercise 4.1

Translate the following words paying attention to affixes.

Perform, performed, performance, performer, performing; hear, heard, hearing, unheard; internal, interior; occur, occurrence, occurred; reason, reasonable, reasoning, reasoned, reasonableness; include, included, inclusive, including, includes; erase, erased, erasing; power, powerless, powered, powerful, power-station, powerlessness; store, storage, storing, store-room, stored; compare, comparably, comparator, compared, comparability, comparing; print, printing, imprint, printed, printer; range, ranged, ranger, ranging; investigate, investigator, investigated, investigation, investigating; color, colorful, colored, colorless, coloring; term, termed, terming.

Exercise 4.2

Translate the following paying attention to modal verbs.

  1. Research must use several approaches to…

  2. Research must be using several approaches to…

  3. Research must have used several approaches to…

  4. Researchers had to use some new technologies…

  5. Researchers were to use the technique of…

  6. Researchers should not have used that method to…

  7. Researchers could use the approach…

  8. Researchers were able to use the method…

  9. Researchers could have used the technology…

  10. Researchers couldn’t have used the technology…

  11. Couldn’t they have used the technology…?

  12. Researchers ought to have used that method…

  13. Researchers will have to use the approach to…

  14. Researchers might be using the technology for…

  15. Researchers needn’t have used the method…

  16. Researchers may have used the technology…

  17. Research may be used for…

  18. Research can be useful if…

  19. Researchers were allowed to use the device…

  20. Researchers were able to check…

  21. Researchers can be using several new…

  22. Researchers might have used the new…

  23. Researchers should be able to finish the work…

  24. Researchers can’t afford the technology, though it might help them…

Exercise 4.3

Translate the following sentences paying attention to modal verbs.

  1. With viruses that are able to defend themselves so cunningly, the chance of their interacting and causing damage to more enterprise networks is high.

  2. The Sobig virus family may have caused more damage, in monetary costs, than any other computer bug in history.

  3. Like Sobig.F, MS Blast caused infected computers to reboot themselves every 10 or 11 minutes, faster than many users could download the software that would eradicate it.

  4. Speculation is growing that Sobig may be a means for culling e-mail addresses that could be assembled into mailing lists for spammers.

  5. A metadirectory is simply a directory that can link all the application-specific directories in an organization to provide a single point of management.

  6. However, directories and metadirectories aren’t simply a matter of technology – they have to be deployed in accordance with the needs of the business.

  7. Two other platforms that should be noted by alert developers are Linux and RIM OS, as found in the Blackberry device.

  8. Software emulation will allow programs designed for the existing 68000 series to run satisfactory on ARM devices, but it may be that developers will have to rewrite from scratch to maintain acceptable performance.

  9. This may have been led by Nokia’s Communicator, or Ericsson’s R380, but is now being driven by the likes of Microsoft’s Stringer initiative.

  10. Systems should also be able to fix server failures, system freezes, and operating systems crashes when they happen or, better yet, prevent them from cropping.

  11. 200 million information technology (IT) workers might be needed to support a billion people using computers at millions of businesses that could be interconnected via intranets, extranets, and the Internet.

  12. eWLM (enterprise Workload Management software) should be able to look at the topology of the network and predict whether it can do this.

  13. If not, eWLM could alter the topology, calling for, perhaps, another server on the farm to provide temporary relief.

  14. You should be able to set high-level goals in plain English and the computer learns how to adjust the knobs.

  15. A system administrator at a money management firm could issue a policy that all stock trade transactions must be completed in one second, whereas other tasks may be permitted to take longer.

  16. Stanford’s project for the agency was to design an IC chip to do three-dimensional graphics transformations.

  17. You don’t have to think about key functions or how they need to be optimized to accomplish what you want.

  18. Because blades are a relatively new technology, standards both for hardware and software have yet to be widely adopted.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]