Рекомендуемая категория для самостоятельной подготовки:
Контрольная работа*
Код |
494097 |
Дата создания |
2014 |
Мы сможем обработать ваш заказ (!) 18 ноября в 12:00 [мск] Файлы будут доступны для скачивания только после обработки заказа.
|
Описание
ВАРИАНТ I
ЗАДАНИЕ 1
Напишите начальную форму слов с учетом орфографических изменений:
1) laboratories; 2) producing; 3) switches; 4) later; 5) carried.
ЗАДАНИЕ 2
Переведите на русский язык следующие словосочетания:
1. First generation computer
2. Television screen
3. Wire contacts
4. Point contact transistor
5. Two point contact rectifiers
ЗАДАНИЕ 3
Определите залог и видовременную форму сказуемого. Переведите предложения письменно.
1. Today there is hardly a field in which computers are not made use of.
2. They will have developed the project by the turn of the century.
3. In principle Man is capable of making everything that Nature has already created or is creating.
ЗАДАНИЕ 4
Сравните предложения. Обратите внимание на залоги Active и Passive. Письменно переведите предложения с учетом видовременных форм глагола.
1. They have installed the computers in the laboratory.
2. He is carrying out an experiment.
3. Our scientists make researches in all fields of knowledge.
4. The computers have been computers in the installed in the laboratory.
5. The experiment is being carried out by him.
6. Researches are made in all fields of knowledge.
ЗАДАНИЕ 5
Выпишите предложения в страдательном залоге. Переведите их письменно.
1. Scientists and engineers have worked out special kinds of equipment for transmitting colour TV programmes.
2. Colour TV sets are quite common and they are being installed not only in hotels, palaces of culture and clubs but also in homes.
3. Matter is constantly moving.
4. The difficulties were caused by lack of order.
ЗАДАНИЕ 6
Выпишите предложения в действительном залоге. Переведите их письменно.
1. The construction of the algorithm requires creative thinking.
2. The experiment will be proved by data processing.
3. The accuracy of the device is affected by a number of factors.
4. The programmer first sets out the algorithm in broad terms and then visualizes possible alternatives.
ЗАДАНИЕ 7
Прочтите текст и переведите устно 1-й и 2-й абзацы, письменно 3-й абзац.
ПОЯСНЕНИЕ К ТЕКСТУ
1. Trait — характерная черта, особенность
2. Spreadsheet program — программа табличных расчётов
3. Wreak — причинять вред, ущерб
4. Havoc — опустошение; разорение, разрушение
5. Safeguard — гарантия, мера предосторожности
6. Boot - загрузка
COMPUTER VIRUSES
1. Computer viruses are called viruses because they share some of the traits of biological viruses. A computer virus passes from computer to computer like a biological virus passes from person to person. When you listen to the news, you hear about many different forms of electronic infection. The most common are: viruses, e-mail viruses, worms, Trojan horses.
2. A virus is a small piece of software. It might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc. An e-mail virus moves around in e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victims e-mail address book. A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well. A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.
3. You can protect yourself against viruses with a few simple steps: If you are truly worried about traditional (as opposed to e-mail) viruses, you should be running a more secure operating system like UNIX. You never hear about viruses on these operating systems because the security features keep viruses away from your hard disk. If you are using an unsecured operating system, then buying virus protection software is a nice safeguard. If you simply avoid programs from unknown sources (like the Internet), and instead stick with commercial software purchased on CDs, you eliminate almost all of the risk from traditional viruses. In addition, you should disable floppy disk booting - most computers now allow you to do this, and that will eliminate the risk of a boot sector virus coming in from a floppy disk accidentally left in the drive. You should make sure that Macro Virus Protection is enabled in all Microsoft applications, and you should never run macros in a document unless you know what they do. There is seldom a good reason to add macros to a document, so avoiding all macros is a great policy.
ЗАДАНИЕ 8
Ответьте письменно на вопросы по тексту, учитывая типы вопросов.
1. Where is computer virus?
2. What are the most common forms of electronic infection?
3. What is Trojan horse?
4. What is UNIX?
Пожалуйста, внимательно изучайте содержание и фрагменты работы. Деньги за приобретённые готовые работы по причине несоответствия данной работы вашим требованиям или её уникальности не возвращаются.
* Категория работы носит оценочный характер в соответствии с качественными и количественными параметрами предоставляемого материала. Данный материал ни целиком, ни любая из его частей не является готовым научным трудом, выпускной квалификационной работой, научным докладом или иной работой, предусмотренной государственной системой научной аттестации или необходимой для прохождения промежуточной или итоговой аттестации. Данный материал представляет собой субъективный результат обработки, структурирования и форматирования собранной его автором информации и предназначен, прежде всего, для использования в качестве источника для самостоятельной подготовки работы указанной тематики.
Другие контрольные работы
bmt: 0.00361