Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
4/2 English_book.doc
Скачиваний:
65
Добавлен:
23.02.2016
Размер:
1.36 Mб
Скачать

24. Read the message and describe it according to the criteria above, paying attention to the words in bold:

From: l.c.smith@ABC.ac.uk

Date: 20.06.2007 14:33:38 GMTUK

To: Mr. Lee

Subject: Potential collaboration

Dear Mr. Lee,

I write on behalf of my CEO, Ms. Douglas, of the Dutch cell phone company ‘‘cell.com’’. You’ve met Ms. Douglas at the Cebit Trade Fair in Hannover. She was highly satisfied with your inspirational inventions, especially the auto rechargeable cell phone. This new technique is not only eco friendly, but also very efficient in many ways. This is why our company has a positive vision of our potential collaboration.

Considering the fact that our eye went to your invention, we would like to set up a deal. Ms. Douglas wants to draw up an order of 3.000 head of your cell phones. But instead of €130,- a piece, a descent settlement would be more appropriate seen the extent of the purchase.

First we would like to receive a small amount of your cell phones. This is to confirm our decision and test the Dutch view on your product. Then we would like to discuss the business aspect of this matter, which we also prefer on black and white. However, we most certainly are beyond doubt of the success.

Nevertheless, we look forward to our rewarding cooperation.

Yours sincerely.

Lara Porter, Manager cell.com

(based on: http://www.termpaperwarehouse.com)

25. What is wrong with these e-mails? Rewrite them correctly, paying attention at spelling and grammar and using e-mail Guidelines:

E-mail 1:

From: john.taylor@webmail.com

Date: 20.06.2007 14:33:38 GMTUK

To: John Brown

Subject: open day

Dear dr brown im coming to the open day at the univertisy and i wos hopping that i could make an apointment to come and see you I dont now what coarse i would like to do and i thought you mite be able to help me decide thanks very much.

John

E-mail 2:

From: r.s.hall@ABC.ac.uk

Date: 20.10.2007 17:49:38 GMTUK

To: paul.jones@ABC.ac.uk

Subject: UNFAIR ASSIGNMENT MARK

DR JONES

I AM REALLY ANNOYED WITH THE MARK YOU GAVE MY ASSIGNMENT. I WORKED FOR DAYS ON THAT AND I CANNOT BELIEVE YOU ONLY GAVE IT 58%. I KNOW YOU DON'T LIKE IT WHEN STUDENTS DISAGREE WITH YOUR NARROW WORLD VIEW AND THAT IS WHY YOU GAVE ME A BAD MARK. THIS IS A RUBBISH UNIVERSITY THAT DOES NOTHING TO HELP ITS STUDENTS AND MY DAD SAYS YOU WOULD NOT GET A JOB IN THE REAL WORLD.

I DEMAND THAT YOU GET SOMEONE ELSE TO MARK THIS ESSAY WHO ACTUALLY KNOWS SOMETHING ABOUT THE TOPIC.

ROB HALL

E-mail 3:

From: r.s.smith@ABC.ac.uk

Date: 20.06.2007 14:33:38 GMTUK

To: Professor T. Taylor (Head of School)

Subject:

Hiya Tina

I was wndering if u would give me some help with the assignment you set. I don't understand what u wnt us to do. I thought I might drop by later and have a chat about it - if that's cool with u ;) Cya later, Bob x

(based on: http://www.mondofacto.com)

Sample test to module 2

I. Choose the correct answer:

1. The platters inside a hard disk driveare usually made of:

a) glass or aluminum; b) silicon; c) fiber optics

2. What is the synonym of “susceptible”?

a) solid; b) vulnerable; c) changeable

3. DVDs have become standard for:

a) movie distribution; b) wor­d processing documents; c) digital photographs

4. Electronically Erasable Programmable Read Only Memory is:

a) a hard drive; b) RAM; c) flash memory

5. The ability of a computer to convert spoken words from a user into usable data is called:

a) voice recognition; b) interpreting; 3) biometric authentication

6. Such keys as Home, End, Page Up, and Page Down belong to:

a) editing keys; b) dedicated keys; c) cursor keys

7. The character which often means "multiply" in a math equation or "match all" is called:

a) at sign; b) ampersand; c) asterisk

8. A page description language is used by:

a) a scanner; b) a printer; c) a mouse

9. A standardized address of a location on the Internet, esp on the World Wide Web is called:

a) IP address; b) URL; c) Domain name

10. A worm has a capability to:

a) replicate itself; b) create a backdoor; c) exploit vulnerabilities

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]