.


:




:

































 

 

 

 





1. . 2. ( ).

 

0[2]   1   2   3   4
, (? ? . .)   [3]     ()   , [4] (? ? . .)
,         ,

 

[5]

 

Radio can ensure greater safety in navigation.

In navigation radio can ensure greater safety.

 

I. Define the place of each constituent element in a simple sentence.

1. The x x.

2. The x x the x.

3. The x x an x x in the x x.

4. X x can be xed as a x x.

5. The x x the x x from x x.

6. The xed x xed x x.

7. The x x is a xly xing x in the x.

II. Define the number of sense groups in each sentence.

1 2

1. The visit visits.

1 2 3

2. The visit visits the visit.

1 2 3 4

3. The visit along the visit visits the visit.

1 2 3 4 5

4. The visiting visit from the visit visits the visit.

1 2 3 4 5 6

5. The visited visits at the visit visit visited visit.

1 2 3 4 5 6 7 8

6. The visiting visits for visited visit visit the visited visit for visit.

 

III. Define the similarities and differences of the words in bold type, name their functions in the sentence. Give their Russian equivalents.

1. The telegraph works by converting the contacts between a telegraph key and a metal conductor into electrical impulses. 2. A. Bell was able to make his prototype telephone work. 3. To meet such demands in practice scientists and engineers must work hard. 4. Of special concern would be those individuals whose work places them in regular contact with free nanoparticles. 5. He was newly employed to work on a project to build smaller electrical circuits. 6. Typically GPS units will not work indoors, underwater or underground.

IV. Divide the sentences into sense groups. Define the dependency relations in each group.

1. The most basic and useful method for studying usability is user testing. 2. Usability plays an important role at each stage of the design process. 3. Mobile devices can also be used as a control device. 4. The power consumption of mobile devices directly affects their usage time. 5. Issues of security and privacy become more prominent with wireless networks. 6. Any party with proper equipment can receive and send messages in the network. 7. Authentication protects the service provider from unauthorized intrusion.

 

V.Unite all the constituent elements in one sentence (the English variant of the table is on page).

VI. Define the differences in the forms of the following nouns. Explain how these differences influence their meanings.

Receive receiver, transmit transmitter, send sender, connect connector, serve server, provide provider, browse browser.

 

VII. Match each word from the left column with the correct Russian equivalent.

message-retrieval protocol ()
deliver
header ,
subject
download
transmit
recognize
receive
mail client
initiate
data transfer
preset interval

VIII. Arrange in pairs the words with similar meaning.

Get, duplicate, allow, remove, connect, obtain, delete, theme, retrieve, option, mean, permit, find, signify, copy, subject, link, choice.

IX. In the text of task XXI find the word derived from the verb toretrieve. Name other derivatives of this verb.

X. Look through the text and find the answer to the question: What are the advantages of using IMAP4 protocol?

Post Office Protocol

1. POP is a message-retrieval protocol used by many PC mail clients to get messages from a server, typically your ISPs mail server. It only allows you to download all messages in your mailbox at once. It works in pull mode: the receiving PC initiates the connection. PC-based POP3 mail clients can do this automatically at a preset interval. When you use your Web mail account to access a POP3 mailbox, the mail server opens a connection to the POP3 server just as a PC-based application would. The messages are then copied into your Web mailbox and read via a browser.

2. Since POP3 downloads all the messages in your mailbox, there is an option to leave messages on the server. This does mean that youll get every message downloaded every time you connect to the server. If you dont clean out your mailbox regularly, this could mean long downloads. Many Web mail systems wont recognize messages youve already downloaded, so youll get duplicates of ones you havent deleted.





:


: 2016-10-07; !; : 404 |


:

:

.
==> ...

1364 - | 1200 -


© 2015-2024 lektsii.org - -

: 0.008 .