Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
English-book.doc
Скачиваний:
199
Добавлен:
01.06.2015
Размер:
6.25 Mб
Скачать

17. Grammar. Active Voice.

Grammar tasks

Task A. State grammar tenses. Put questions and write negative sentences.

1. Most people measure the cost of security high.

2. The evaluation helped consumers to determine the level of security of IT product or system.

3. Computer systems security will protect the system against intentional acts.

4. Security officers have to develop an effective policy.

5. Computer security has played an important role in any organization policy for the last 30 years.

6. Business functions become increasingly dependent on small computer systems.

7. Responsibility for the business functions lies with senior executives.

8. A successful security program consists of a number of interrelated key elements.

Choose the correct form of the verb (Present Perfect/Past Simple).

1. We worked/have worked over this project since I came/have come to the department.

2. We developed/have developed this program in 2005.

3. At last he presented/has presented his report.

4. When did you finish/have you finished this work?

5. This laboratory specialized / has specialized on the development of electronic protection means and they just signed / have just signed a contract.

6. Security police successfully completed / have successfully completed the evaluation of the risk.

7. The specialists of Risk Protection recently published / have recently published the results of their research.

8. Our engineers tested / have tested this device last week and didn’t get / haven’t got satisfactory results.

Task B. Put the verbs in brackets in the correct form.

1. Since the early efforts to conduct quantitative risk assessment, it (gain) its supporters and opponents.

2. The National Bureau of Standards (publish) this document in 1979.

3. The article (deal) with artificial intelligence.

4. Your company (realize) the value of developing enterprise-wide security?

5. First some developers (launch) and (develop) quantitative approaches.

6. Custom applications (require) writing unique security code?

7. Dishonest employees (not want) their acts to be discovered.

6. An honest employee (not make) mistakes in data entry.

8. They already (present) their recommendations of information security.

9. A disgruntled employee is one, who (work) for an organization and (want) to cause harm to it.

10. Enterprises around the world (undergo) transformations.

11. Hi! Where (go)? – I (see) my partners in 20 minutes.

12. What you (do)? – I (be) an engineer, but now I (work) as a manager.

13. The train (leave) at 8.48. Hurry up. – OK. I (come).

14. What you (look) for? – I (try) to find my papers.

Task C. Translate into English using Present Perfect or Past Simple.

1. Привет! Давно тебя не видел. Где ты был?

2. Я был в командировке в Лондоне. - Когда вернулся? - Два дня назад.

3. Мы изучили ваше заявление.

4. Мы провели полный анализ рисков на этом предприятии.

5. Ученые разработали этот шифр в 1993 году.

6. Вы расшифровали этот текст? – Еще нет.

7. Стеганографию использовали в древности.

8. Этот алгоритм был запатентован в США.

9. С 2000 года он используется свободно.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]