I. Перепишите следующие предложения. Определите по грамматическим признакам, какой частью речи являются слова, оформленные окончанием -s и какую функцию это окончание выполняет, т. е. служит ли оно:
а) показателем 3 - го лица единственного числа в Present Indefinite;
б) признаком множественного числа имени существительного;
в) показателем притяжательного падежа имени существительного (см. образец выполнения 1)
Переведите предложения на русский язык.
1. My friend lives in this city.
2. I like Ann's flat.
3. My sister's son skates well.
4. He has got very interesting books.
5. I made mistakes in the test.
II. Переведите следующие предложения, содержащие разные формы сравнения, и переведите их на русский язык.
1. This flat is lighter than the one on the ground floor.
2. I think this room is the best in the flat.
3. Today I have less free time than yesterday.
4. The children were playing in the farthest corner of the garden.
5. The longer the night is, the shorter the day.
6. Mary is not so lazy as her brother.
7. Russian grammar is more difficult than English grammar.
III. Заполните пропуски глаголами to be, to have в Present, Past, Future Indefinite. Переведите предложения на русский язык.
IV. Перепишите следующие предложения, определите в них видо - временные формы глаголов и укажите их инфинитив, переведите предложения на русский язык.
1. I don't always learn new words.
2. Where are you going? - I am going home.
3. Who decided to answer her letter? - We did.
4. He has been away from Moscow since August.
5. Though I came home at 11 last night, my son hadn’t gone to sleep.
6. They’ll be packing tomorrow.
7. We were having our English at 10 in the morning.
V. Употребите нужную форму местоимений: личные, притяжательные, вопросительные, указательные, относительные.
3. (Their, theirs) … boat was faster than (our, ours) … .
VI. Перепишите и письменно переведите предложения на русский язык, обращая внимание на перевод неопределенных местоимений и их производных.
1. There is something in the bag.
2. Is there anybody in the house? — Yes, there is somebody there.
3. Is there anything under the table? — Yes, there is something there.
4. There is nothing there.
VII. Перепишите следующие предложения, подчеркните в каждом из них модальный глагол и его эквивалент. Переведите предложения на русский язык.
VIII. Прочтите и устно переведите текст. Письменно переведите 1-3 абзацы.
(1) More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap substantial rewards. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.
(2) These facts have not been lost on criminals or would-be criminals. A recent Stanford Research Institute study of computer abuse was based on 160 case histories, which probably are just the proverbial tip of the iceberg. After all, we only know about the unsuccessful crimes. How many successful ones have gone undetected is anybody's guess. Here are a few areas in which computer criminals have found the pickings all too easy.
(3) Banking. All but the smallest banks now keep their accounts on computer files. Someone who knows how to change the numbers in the files can transfer funds at will. For instance, one programmer was caught having the computer transfer funds from other people's accounts to his wife's checking account. Often, tradition ally trained auditors don't know enough about the workings of computers to catch what is taking place right under their noses.
(4) Business. A company that uses computers extensively offers many opportunities to both dishonest employees and clever outsiders. For instance, a thief can have the computer ship the company's products to addresses of his own choosing. Or he can have it issue checks to him or his confederates for imaginary supplies or ser vices. People have been caught doing both.
(5) Credit Cards. There is a trend toward using cards similar to credit cards to gain access to funds through cash-dispensing terminals. Yet, in the past, organized crime has used stolen or counterfeit credit cards to finance its operations. Banks that offer after-hours or remote banking through cash-dispensing terminals may find themselves unwillingly subsidizing organized crime.
(6) Theft of Information. Much personal information about individuals is now stored in computer files. An unauthorized person with access to this information could use it for blackmail. Also, confidential information about a company's products or operations can be stolen and sold to unscrupulous competitors. (One attempt at the latter came to light when the competitor turned out to be scrupulous and turned in the people who were trying to sell him stolen information.)
IX. Письменно ответьте на вопросы.
1) Who can commit computer crimes?
2) What was Stanford Research Institute study of computer abuse based on?
3) What are areas in which computer criminals have found the pickings all too easy?