ГоловнаРеєстраціяВхід
Вівторок, 08.07.2025
Форма входу
Меню сайту

Категорії
III курс [16]

Пошук

Головна » Файли » III курс » III курс

Зразок модульної контрольної роботи 3 курс 1 семестр
[ ] 18.05.2009, 23:59
Модульна  контрольна робота з англійської мови 
 ІІІ  курс   І   семестр

Date…………………       Group…………………          Surname …………………………………………

1.   Заповніть пропуски артиклями, де це необхідно

Throughout ……….  text we will use ……….  term architecture to refer to ……….  overall organi­zation of ……….  computer system. ……….  computer architecture is analogous to ……….  blueprint — ……….  architecture specifies ……….  interconnection among major components and ……….  overall functionality of each component without giving many details. Before ……….  digital system can be built that implements ……….  given architecture, engineers must translate ……….  overall architecture into ……….  practical design that accounts for details that ……….  architectural specifi­cation omits.

2.   Заповніть пропуски прийменниками, де це необхідно

 

The positional representation ……… binary numbers illustrated ……..Figure 3.2f is said to produce unsigned integers. That is, each of 2k combinations ………bits is associated ……….a nonnegative numeric value. Because the unsigned integers used ……a computer have fi­nite size, operations like addition and subtraction can have unexpected results. ……example, computing the difference ……….two k-bit unsigned integers can yield a nega­tive (i.e., signed) result.

(for, with, between, in, in, of, of )

3   Відкрийте дужки і поставити дієслова у відповідному часі

 

Ørsted experiments (to  discover) the relationship between electricity and magnetism in a very simple experiment.  

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

James Clerk Maxwell   (to  be) an experimenter with electromagnetic waves and developed the Maxwell equations.

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

 

This   (to be) because the laws of physics (not to work) in the same way at the level of the extremely small. 

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

But current technology   (to  reach)  its limit. 

………………………………………………………………………………………………………………..

When  you  (to start) Yahoo for personal use?

………………………………………………………………………………………………………………..

 

Знайти пiдмет, визначити його форму. Знайти присудок, визначити його часову форму та стан. Перекласти.

 

We started by noting an anomaly in the principle.

………………………………………………………………………………………………………………..

Picking the correct terminology to refer to each of the rival methods is no easy task. 

………………………………………………………………………………………………………………..

То emphasize this point was the only aim of my argumentation.

………………………………………………………………………………………………………………..

А brief discussion of some examples taken from Table VII follows.

………………………………………………………………………………………………………………..

However, no indication is given of the optimum mode.


………………………………………………………………………………………………………………..

This paper presents а complete table of such values.

………………………………………………………………………………………………………………..

As is generally true of conference volumes, the quality of these papers is uneven.

………………………………………………………………………………………………………………..

Two major reasons seem to have been Mivolvcd.

………………………………………………………………………………………………………………..

What the point seems to come to is this.

………………………………………………………………………………………………………………..

The rocket is the only power plant known to be independent of the atmosphere.

………………………………………………………………………………………………………………..

Our conclusions are thus different from those of Kehler.

………………………………………………………………………………………………………………..

But this would mean that (17) could not be considered a proper reading -a regrettable consequence, in our opinion.

………………………………………………………………………………………………………………..

This is а viewpoint I can fully agree with.

………………………………………………………………………………………………………………..

In the fumace the temperature of gases may be as high as 3,500 degrees Centigrade.

………………………………………………………………………………………………………………..

This allows one to reject the hypothesis.

………………………………………………………………………………………………………………..

This result may resemble one attained in an earlier study.

………………………………………………………………………………………………………………..

The procedure was identical to that of Study I.

………………………………………………………………………………………………………………..

The alternative is easy to state.

………………………………………………………………………………………………………………..

Translate into  Ukrainian

Privilege And Protection

The mode of execution is linked to CPU facilities for privilege and protection. That is, part of the current mode specifies the level of privilege for the CPU. For exam­ple, when it services an I/O device, a CPU must allow device driver software in the operating system to interact with the device and perform control functions. However, an arbitrary application program must be prevented from accidentally or maliciously is­suing commands to the hardware or performing control functions. Thus, before it exe­cutes an application program, an operating system changes the mode to reduce privilege. When running in a less privileged mode, the CPU does not permit direct con­trol of I/O devices (i.e., the CPU treats a privileged operation like an invalid instruc­tion).

Multiple Levels Of Protection

How many levels of privilege are needed, and what operations should be allowed at each level? The subject has been discussed by hardware architects and operating sys­tem designers for many years. CPUs have been invented that offer no protection, and CPUs have been invented that offer eight levels, each with more privilege than the next. The idea of protection is to help prevent problems by using the minimum amount of privilege necessary at any time.

 

Категорія: III курс | Додав: Ольга_Іванівна
Переглядів: 1047 | Завантажень: 0

  Час: 09:22 ™2025