- •Task 2. Translate the sentences, paying attention to rendering the proper and geographical names.
- •Task 3. Translate the following geographical names into Ukrainian and define the method each of them is rendered in part a) and part b):
- •Task 4. Define the methods in which the following geographical names below have to be translated into English.
- •Task 5. Translate the words and words combinations. Explain your choice of the types of equivalent.
- •Task 6. Translate the sentences, paying attention to the meaning of neologisms.
- •Task 7. Translate the sentences, paying attention to adequate rendering of equivalent-lacking words.
- •Task 8. Analyze the meaning of English and Russian words, keeping in mind that they are the «translator’s false friends».
- •Task 9. Translate the sentences, paying attention to the translation of the “translator’s false friends”
- •Task 12. Determine the meaning of polysemantic words, analyzing the dictionary equivalents. If necessary, find contextual equivalents. Translate the sentences.
- •Task 13. Translate the sentences, finding appropriate equivalents to the word «record».
- •Task 14. Find the appropirate contextual equivalents to the underlined words and translate the sentences.
- •Task 14. Translate paying attention to rendering emphatic structures.
- •Task 15. Translate the sentences, pay attention to rendering equivalent-lacking syntactical structures.
- •Task 17. Translate the sentences, pay attention to rendering causative structures.
- •Task 18.Translate the sentences, pay attention to rendering condition.
- •Task 19. Translate the sentences, pay attention to rendering causative tructures.
- •Leave the coverage to us
- •Task 23. Translate the texts, determining their styles.
- •In the countryside, housing conditions continue to be marked by mass poverty, malnutrition, dilapidated housing, -poor water supply, inadequate sanitation, and a lack of services.
Leave the coverage to us
Travelers heading for the sun or the slopes this winter will probably notice a jump in the price of getting away from it all. The culprits this time are not the airlines but the leading U.S. car-rental agencies, which are imposing their first significant price increases in several years. Last week Hertz increased its rates as much as 5%, and Avis said it plans to do likewise within the year. Other rental agencies are expected to follow the industry leaders before long.
The car rental companies are responding in part to a loss of revenue from one of their most expensive options: collision insurance. Until recently many car-rental customers paid as much as $ 13 a day for so-called collision-damage waivers to protect themselves against liability for any repair costs in case their vehicles were damaged. But many mat or credit-card companies now offer such coverage to their cardholders at no cost whenever they charge a rental. As a result, more and more consumers decline the pricey waivers. In the most sweeping move so far, American Express began offering the collision coverage last week to its more than 11 million green-card holders. The American Express action, says Joseph Russo, a Hertz-vice president, "begins the de facto elimination of the CDW by car-rental companies".
Rental-car firms have long maintained that CDW are reasonably priced, and that most of the revenues from them go toward repairing vehicles. But now at least, some car-rental executives consider that the CDW has been money-maker all along. The Hertz rate increase, says Russo, is "primarily, designed to take care of the revenue loss" that will follow American Express green-card coverage.
Task 22. Translate the text.
Taking a byte out of crime: some guidelines on computer theft prevention
BY SALLY J. BLANK
Business computers have lent a pernicious sophistication - even a glamor -to white-collar crime in its myriad forms. We hear awe-in spiting stories of slick data processing bandits who embezzle fortunes at the touch of a button, and then publish spectacular memoirs from their minimum-security cells - or then" Swiss retreats - to the shock of the business world.
But when you look at the hard figures of computer crime, they are anything but glamorous. The theft of information committed more often than not through a computer - costs us as much as $20 billion a year, reports the National Institute of Justice. And where the average bank robbery pulls in a mere $15,000, the average computer theft nets a neat $400,000, and can be committed in less than three milliseconds.
Such efficiency is enhanced by incredible post-crime odds. According to August Bequal, white-collar crime expert and author of How to Prevent Computer Crime (Wiley, 1983), the likelihood of a computer crime being discovered by the authorities is one in a hundred. Technological advances grow at a rate leaps and bounds ahead of law enforcement's ability to keep up, says Bequal. And hard evidence is a scarce commodity in computer capers, where a thief can cover his or her tracks with the touch of a button, making prosecution very difficult for victimized companies.
What, then can management do to protect itself against such costly ripoffs? Data security experts all cite four main activities for employers and managers: keep your eyes open and know the danger signals; install and maintain strict prevention measures; know how to effectively investigate possible crimes in-house; and know what laws might apply, if worse comes to worst and you must "sell" your case to government prosecutors.
Warning signals
Several red flags can signal alert managers that a fellow employee could be a "'wolf in sheep's clothing", says Louis Scoma, founder and CEO of Houston-based Data Processing Security, Inc., which has aided over 650 companies with their computer security systems since 1970. Consider the following:
Does one of your employees consistently come in early and stay after hours -with no visible results from the extra hours of work?
Have you recently fired an employee who had access to sensitive information? Do you have any such workers on staff who are disgruntled with the company for any reason?
Do any of your employees with access to sensitive data to the personal microcomputers to and from the office in order to do extra work?
Did an employee you transferred from headquarters to a branch office come back to "clean out his desk" or "visit old friends" even though he knew the security codes had been change?
Has your company experienced a recent increase in data processing needs, while you have not upgraded your security system to accommodate the change?
"If you have answered yes to two or more of these questions," says Scoma, "double-check your security system and the people responsible for keeping it intact. If you don't, you could be headed for high-tech trouble."
An ounce of prevention
According to the Better Business Bureau, the vast majority of computer crimes are preventable. Managers must be aware that technology creates myriad opportunities for crime, and that installation of computer equipment and installation of security measures should go hand in hand. Although the following measures may seem like common sense, consider them in light of your company's own practices. How many are fully followed?
Employee hiring. Conduct thorough background checks on all potential EDP employees. Check with former employers; get references - both professional and personal. Verify technical skills, and check credit histories.
Controlling access to facilities. Maintain a log book with times and names of all who have access to the computer facilities. Allow only employees who work with the computer to sign it. Confirm and verify any service calls, and have a company employee accompany any technician to the worksite.
Physical security. Separate computer facilities from other departments, in a secure, isolated area with few windows or doors, adequate lighting, secure locks, and, if possible, a security guard at each entrance. Provide the appropriate personnel with proper identification that can be verified at the entrance, such as photo or fingerprint IDs.