whatsappWhatsApp: +79119522521
telegramTelegram: +79119522521
Логин Пароль
и
для авторов
Выполненные работы

Иностранный язык



Высшая школа технологии и энергетики СПбГУПТД


Методичка 033(2013)
Методичка 033(2013). Титульный лист

Министерство образования и науки Российской Федерации
Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования
Санкт-Петербургский государственный технологический университет растительных полимеров
В.В.Кириллова, Т.В.Лиоренцевич, Г.И.Найданова, А.М.Знаменская
Английский язык
Учебно-методическое пособие для студентов заочного факультета
Санкт-Петербург
2013

Стоимость выполнения контрольной работы по английскому языку на заказ ... руб.
Готовы следующие варианты:

К.р.2 Вариант 5

Контрольная работа 2
Вариант 5
Упражнение №1. Перепишите предложения, определите в них залог и временные формы глагола. Укажите их инфинитивы. Предложения переведите.

1. These digits are easily multiplied.
2. The first microcomputer was built in 1975.
3. The feedback principle had been used in all automatic control mechanisms for centuries.
4. This computer program can’t be relied on, it is not reliable.

Упражнение №2. Перепишите предложения. Подчеркните в них причастия и определите их функции. Предложения переведите.
1. During the last years integrated circuit technology is especially impressive, when viewed in terms of cost decrease.
2. Signals given to measuring instruments and controlling devices are introduced into the electronic machine.
3. A designer was drawing the project, using CAD system.

Упражнение №3. Перепишите предложения. Подчеркните в них герундий и определите его функцию. Предложения переведите.
1. His repairing the computer thoroughly is quite natural as he is a skilled specialist.
2. No advantage was gained by using this method of control.
3. The memory of the microprocessors system serves the purpose of holding information.

Упражнение №4. Перепишите предложения. Подчеркните инфинитив, укажите его функцию. Предложения переведите.
1. The information address tells where the results to be put.
2. Information to be computed is stored usually in registers units of hardware.
3. To create the model the interactive terminal screen is usually divided into sections showing various views of the model.

Упражнение №5. Перепишите и письменно переведите текст.
COMPUTERS AND HACKERS

1. In the twenty-first century the computer technology is greatly developing. It would be really difficult to imagine life without computers. They are a source of information, education and entertainment. But today’s world of computer can also be quite frightening and dangerous. This is because of people who use computers for illegal purposes. They are called hackers. So you should be very careful when working with computer information.
2. Hackers spend their time playing with computer data in all parts of cyberspace. Much of what they do is not dangerous, but sometimes their activities break the law, for example, when they break into websites, take control of computer or create viruses. They are especially interested in breaking through the security of military websites. Hackers know how to trick people just using their programmes. They use a ‘Trojan Horse’, a programme that looks perfectly safe, but actually contains something destructive. The only way of not getting into trouble is not to open it.
3. Although they can get serious punishment if they are caught, most hackers still think that what they do is a game. They often meet at festivals, taking part in discussions, sharing experience, meeting other hackers and generally having a good time. These meetings are organized in well-known places like Las Vegas or Berlin. Recently, hacking has started to increase. Hackers are getting into computer systems and stealing or destroying information. It is certain that there will be a lot more of this high-tech crime in the twenty-first century.

Упражнение №6. Выпишите из 1-го абзаца причастия и укажите их функции в предложении.

Упражнение №7. Выпишите из 2-го абзаца герундий и укажите его функции.

Упражнение №8. Прочитайте 3-й абзац текста и ответьте на вопрос:

Will the number of hackers change in the future years?

К.р.1 Вариант 1, К.р.1 Вариант 2, К.р.1 Вариант 3, К.р.1 Вариант 4, К.р.1 Вариант 5, К.р.2 Вариант 1, К.р.2 Вариант 2, К.р.2 Вариант 3, К.р.2 Вариант 4, К.р.2 Вариант 5

показать все

Мы используем cookie. Продолжая пользоваться сайтом,
вы соглашаетесь на их использование.   Подробнее