Translate the following paying attention to the Gerundial Construction.

 

1.The explanation lies in the product being more stable.

2.We knew of computer having been invented many decades ago.

3.His having advanced his idea seemed strange at that time.

4.Her having formulated the problem this way seemed rather unexpected.

5.Their having presented the problem in every detail helped us to grasp their idea.

 

 

Translate the text into Ukrainian

CYBER TERRORISM

Government officials and Information Technology security specialists have documented a significant increase in Internet problems and server scans since early 2001. But there is a growing concern among federal officials that such intrusions are part of an organized effort by cyber terrorists, foreign intelligence services, or other groups to map potential security holes in critical systems. A cyber terrorist is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attack against computers, network, and the information stored on them.

Cyber terrorism in general, can be defined as an act of terrorism committed through the use of cyberspace or computer resources. As such, a simple propaganda in the Internet, that there will be bomb attacks during the holidays can be considered cyber terrorism. As well there are also hacking activities directed towards individuals, families, organized by groups within networks, tending to cause fear among people, demonstrate power, collecting information relevant for ruining peoples' lives, robberies, blackmailing etc.

Cyber-extortion is a form of cyber terrorism in which a website, e-mail server, or computer system is subjected to repeated denial of service or other attacks by malicious hackers, who demand money in return for promising to stop the attacks. According to the Federal Bureau of Investigation, cyber-extortionists are increasingly attacking corporate websites and networks, crippling their ability to operate and demanding payments to restore their service. More than 20 cases are reported each month to the FBI and many go unreported in order to keep the victim's name out of the domain. Perpetrators typically use a distributed denial-of-service attack.

 

Контрольна робота N 2

Ex.1. Underline the correct alternatives.

1. Of all the methods available in/for/at separating signals from noise the most widely used is that involving filtering.

 

2. The principle of/upon/with sharing the same line between a number of terminals is shown in Fig.6.

 

3. Before/by/atintroducing these new elements more needs to be said about the practical uses of flowcharts.

 

4. In/upon at handling a telephone call an exchange performs three essential functions.

 

5. The first satellites were seen as a way about/in /of communicating with people who lived in isolated areas of the word.

 

Ex.2 Find the verbs in the Subjunctive Mood, underline them and translate the sentences into Ukrainian

1. If there were no frictional losses in a machine, a machine would be 1000% efficient.

2. The demand is that in modern military aircraft he fuel tank be made bulletproof.

3. It is essential that he should inform us regularly on the state of his research work.

4. The demand is that a mass spectrometer intended for an investigation of the upper atmosphere should be exceedingly reliable and simple in operation.

 

 

Ex.3 Find the Gerund, state its function and translate the sentences.

  1. Besides being small in size, equipment of the transistor is light weight.
  2. The ancient Greeks were trying to explain the movements of the planet by assuming the earth to be the centre of the Universe.
  3. The results of the test are worth mentioning.
  4. Since power is the rate of doing work, the amount of work done in a given time is the rate of doing work multiplied by the time.