Английский к/р.
5,5 страниц решения
Exercise 2. Make the following sentences negative, interrogative.
1. She has been with the company since it began. (Who?)
2. The firm paid for the flights and accommodation expenses of the new export clerk. (Who? What?)
3. The two businessmen worked out the terms of the contracts over the phone yesterday. (Who? When? What?)
4. Sales have fallen since the beginning of June. (What?)
5. They met at Berlin trade fair last month. (Who? Where? When?)
6. Mr. Hanson wanted to speak to the manager and discuss the questions concerning an order. (Who? Why?)
7. European banking has become far more competitive. (What?)
8. They expected keen demand on products of International Express. (Who? What?)
9. Raising interest of their customers promised good volume of business. (What?)
10. In 1991 the firm moved to new premises Bethnal Green. (When? Who?) Where?)
11. Turnover fell by 9 percent mainly because of divestments. (What? Why?)
12. She was a successful businesswoman with her own secretarial agency. (Who?)
13. The French businessman has sold his controlling stake in Adidas. (Who? What?)
14. Government in Malaysia has promised to reduce its interference in economy. (Who? What?)
15. Newspaper Publishing announced the plans to increase the Spanish/Italian stake. (Who? What?)
16. Aircraft has kept the manufacturing sector going for much of this year. (What? How long?)
17. The agribusiness group has abandoned efforts to sweet-talk the Caterpillar vehicles distributor into a friendly merger. (Who?)
Exercise 3. Match the words and their definitions.
1) fulfill
2) stack
3) transfer
4) superior
5) victim
6) download
7) increase
8) sneak
9) overflow
10) contain
a) one who is harmed or killed by another
b) to bring into actuality, effect
c) higher than another in rank, station, or authority
d) a section of memory and its associated registers used for temporary storage of information
e) to become greater or larger
f) to be filled beyond capacity
h) to transfer data or programs to a computer or de¬vice
i) to have as component parts, include
j) to move, give, take, or put in a quiet, stealthy man¬ner
k) to convey or cause to pass from one place, person, or thing to another.
Exercise 5. Make yourself sure that you know the meaning of the words in the right column. Fill in the blanks. Mind the grammar!
A computer virus – an unwanted program that has entered your system without knowing about it – has two parts, which are called the _______and the______. They have two very different jobs. One of the _____of a computer virus that _____it from other kinds of computer program is that it _____ itself, so that it can spread (_____ floppies transported from computer to computer, or networks) to other computers.
After the infector has copied the virus elsewhere, the deto¬nator _____ the virus's main work. Generally, that work is either _____ data on your disks, altering what you see on your computer display, or doing something else that__ with normal use of your computer.
Here's an example of a simple virus, the Lehigh virus. The infector portion of Lehigh replicates by ______a copy itself to COMMAND.COM (an important part of DOS), enlarging it by about 1000 bytes.
So, let's say you put a floppy containing COM-MAND.COM into an infected PC at your office – that is, a PC that is ______ the Lehigh program. The infector portion of Lehigh looks over DOS's shoulder, monitoring all floppy _____. The first time you tell the infected PC to access your ____, the Lehigh infector notices the copy of COMMAND.COM on the floppy and adds a copy to itself to that file.
Then you take the floppy home to your PC and _____from the floppy. (In this case, you've got to boot from the floppy in order for the virus to_____, since you may have many copies of COMMAND.COM on your hard and floppy disks, but DOS only uses the COMMAND.COM on the boot drive.)
Now the virus has silently and ____been installed in your PC's memory. Every time you access a hard disk subdi¬rectory or a floppy disk containing COMMAND.COM, the virus sees that file and infects it, in the hope that this particular C0MMAND.COM will be used on a boot disk on some com-puter someday.
Meanwhile. Lehigh ____ of infections. Once it has in¬fected four copies of COMMAND.COM, the detonator is _____. The detonator in Lehigh is a simple one. It ___ a vital part of your hard disk, making the file on that part of the disk no longer accessible. You grumble and set about rebuild¬ing your work, _______that Lehigh is waiting to infect other unsuspecting computers if you boot from one of those four infected floppies.
infector
detonator feature
separate replicate
via
perform
damage
interfere
attach
run
access
floppy drive
boot
take effect
instantly
keep a count
trigger
erase
unaware