Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Пособие ФИБ 2010 3 курс.doc
Скачиваний:
5
Добавлен:
03.11.2018
Размер:
1.19 Mб
Скачать

19. Grammar

Passive Voice

Passive

Simple

Progressive

Perfect

Perfect Progressive

Present

sometimes, every day, often, always, etc.

am

is asked

are

now, still, at the moment

am

is being asked

are

already, ever, just, never, yet

have

been asked

has

Вместо отсутствующих форм

Perfect Progressive

употребляются формы

Perfect

Past

yesterday, two years ago, in 1995, etc.

was

asked

were

when he came, at that moment, etc.

was

being asked

were

by the time, already, etc.

have

been asked

has

Future

tomorrow

will be asked

вместо отсутствующей формы

Future Progressive употребляется

Future Simple

by the time in the future

will have been asked

Инфи-

нитив

be V3

be being V3

have been V3

Task А. Choose the correct form of Passive Voice.

1. The assumed threats to security specify/ specified/are specified below.

2. The unauthorized disclosure has been prevented/has prevented/has being prevented.

4. The repeatable key based/is based/bases on the following principles.

5. Knowing about the risk, one is prepares/prepared/is prepared better.

6. A sound IRM program founds/founded/is founded on a well thought out IRM policy infrastructure.

7. An event, the occurrence of which could have an undesirable impact, is defined/define/ defines as threat.

8. A sound IRM program founds/founded/is founded on a well thought out IRM policy infrastructure.

9. The underlined secure network services installed/was installed/were installed in accordance with the operational documentation.

Task B. Put the verbs in brackets in the correct form of Passive Voice.

1. Uncertainty (measure) inversely with the respect to confidence.

2. The papers of the conference (translate) into 12 languages.

3. Both expected frequency and exposure factor for fire (increase) by not having a fire suppression system.

4. Exposure factor (express) as a percent.

5. Generally accepted Information Security Principles (base) on an Authoritative Foundation of supporting documents and guidelines.

6. It is essential that the process of analyzing and assessing risk (understand) by all sides.

7. Uncertainty (measure) inversely with the respect to confidence.

8. This work (finish) next month.

9. The papers of the conference (translate) into 12 languages.

10. Both expected frequency and exposure factor for fire (increase) by not having a fire suppression system.

11. The system (develop) in 1998.

12. Exposure factor (express) as a per cent.

13. Generally accepted Information Security Principles (base) on an Authoritative Foundation of supporting documents and guidelines.

14. It is essential that the process of analyzing and accessing risk (understand) by all sides.

Task C. Put the verbs in brackets in the correct form, Active or Passive Voice.

1. The curves (show) in figure 4.

2. Our analysis (suggest) the spheres of practical application of our technique.

3. Our ongoing work (focus) on the use of other biometric measurements.

4. If the BUSINESS module (choose) this can (use) to generate a detailed questionnaire appropriate to the system under review.

5. Nowadays real-time operating system (employ) in consumer devices.

6. These systems (share) an unmatched reputation for operating 24 hours a day, 365 a year, nonstop.

7. Back in the 90-s, Anti-virus researchers first (fight back) by creating special detection routines designed to catch each polymorphic virus, one by one.

8. By hand, line by line, they (write) special programs.

9. W.F.Friedman’s monograph «The Index of Coincidence and its Application in Cryptography» (appear) in 1918.

10. US Army and Navy (work) entirely in secret, when their specialists (begin) making fundamental advances in cryptography.

12. H.Feistel, who earlier (work) on identification friend or foe devices for the Air Force, (change) the sphere of his scientific interests.