Opportunity возможность (благоприятная) opportune своевременный, благоприятный to bypass обходить, не принимать во внимание unnecessary необязательный portability мобильность — КиберПедия 

Биохимия спиртового брожения: Основу технологии получения пива составляет спиртовое брожение, - при котором сахар превращается...

Своеобразие русской архитектуры: Основной материал – дерево – быстрота постройки, но недолговечность и необходимость деления...

Opportunity возможность (благоприятная) opportune своевременный, благоприятный to bypass обходить, не принимать во внимание unnecessary необязательный portability мобильность

2018-01-05 752
Opportunity возможность (благоприятная) opportune своевременный, благоприятный to bypass обходить, не принимать во внимание unnecessary необязательный portability мобильность 0.00 из 5.00 0 оценок
Заказать работу

Portable мобильный convenience удобство convenient удобный

Упражнение 15. Выделите однокоренные слова из Списка и, сравнив разные части речи в каждой группе, выделите суффиксы существительных.

Упражнение 16. Подберите из Списка синонимы к следующим словам:

up-grade (усовершенствование); chance; mobility; supplement (допол­нение); not to take into account (не принимать во внимание); supple (гиб­кий); not obligatory (не обязательный); to develop (развивать); comfort.

Упражнение 17. Назовите слова, противоположные по смыслу следующим:

hard; unfavourable (неблагоприятный); inappropriate (неподходящий, неудобный); degrade (деградировать); to subtract (отнимать, вычитать); to worsen (ухудшать); to take into account (принимать во внимание).

Упражнение 24. Теперь внимательно переведите весь Текст:

Text

Design Philosophy Before leaping into the following chapters, we should discuss the1 design philosophy behind the PC family. This will help you understand what is Jand what isn't) impor­tant or useful to you.

Part of the design philosophy of the IBM personal computer family centers around a set of ROM BIOS service routines that provide essentially all the control func­tions and operations that IBM considers necessary. The

basic philosophy of the PC family is: let the ROM BIOS do it; don't mess with direct control. In our judgment, this is a sound idea that has several beneficial results. Using the ROM BIOS routines encourages good programming practices, and it avoids some of the kludgy tricks that have been the curse of many other computers. It also increases the chances of your programs working on every member of the PC family. In addition, it gives IBM more flexibility in making improvements and additions to the line of PC computers. However, it would be naive for us to simply say to you, "Don't mess with direct control of the hardware." For good reasons or bad, you may want or may need to have your programs work as directly with the computer hardware as possible, doing what is colorfully called "programming down to the bare metal."

Still, as the PC family has evolved, programmers have had the opportunity to work with increasingly powerful hardware and system software. The newer members of the PC family provide faster hardware and better system soft­ware, so direct programming 'of the hardware does not nec­essarily result in significantly faster programs. For ex­ample, with an IBM PC running DOS, the fastest way to display text on the video display is to use assembly- language routines that bypass DOS and directly program the video hardware. Video screen output is many times slower if you route it through DOS. Contrast this with а, PC/AT or PS/2 running OS/2, where the best way to put text on the screen is to use the operating system output functions. The faster hardware and the efficient video output servic­es in OS/2 make direct programming unnecessary.

As you read the programming details we present in this book, keep in mind that you can often obtain a result or accomplish a programming task through several means, including direct hardware programming, calling the ROM BIOS, or using some service. You must always balance portability, convenience, and performance as you weigh the alternatives. The more you know about what the hardware, the ROM BIOS, and the operating system can do, the better your programs can use them.

 

 

Попробуйте перевести без словаря:

Ability; probability; compatibility; to enable; unable; programmable; reliable; disable; capable; capability; readable; testability; addressable; expandability.

The ability of a computer to do so many tasks makes it indispensable. They also enable scientists to analyze data returned by space probes.

Упражнение 7. Переведите без словаря слова, о значении которых можно догадаться. Чтение вслух облегчит перевод, вспоминайте созвучные русские слова. В русском aut- обычно передается как авт-, -tion как -ция, -cent как -цент.

Conductor; to contain; application; to automize; attraction; efficiency; creature; to extract; expansion; percent; variation; original; compres­sion; to modify; the same; to calculate; copy; to copy; memory; to alter; manufacture; routine; to detect; to invalidate; multiple; reason; author­ity; definition.

Упражнение 8. Переведите определения. Прочтите определения вслух, заменив знак тире гааголом-связкой is или словом means (означает), а пунктирные линии — глаголом can be (может быть) или is divided into (подразделяется на).

SOFTWARE — programs, languages and/or routines that control the op­erations of a computer in solving a given problem.

SOFTWARE ^

/ I I

SYSTEM UTILITY APPLICATION

SW ("he") SW SW

HARDWARE — the physical equipment and components in a computer system.

LIVEWARE — all people engaged in production of the computer and maintenance (сопровождение) of its work. — software for Sound Blaster Live produced by Creative Labs. FIRMWARE — a program built into the circuitry of a ROM that controls the operation of the computer.

Можете ли вы сами сделать вывод о том, что значит словообразовательный элемент ware?

Переведите:

earthenware —______________; glassware —_________;

silverware —______________; warehouse —_________;

shareware —____________.

Упражнение 9. Теперь, просмотрев Список слов на с. 11-14, вы скажете, к какой из четырех категорий — software, hardware, liveware, firmware — относятся термины. Используйте конструкцию: Term (термин)... belongs to... (HW, LW, SW, FW)

Упражнение 10. Пользуясь Списком слов, расшифруйте сокращения. Сокращать слова—любимое занятие liveware. Но заметьте, что слова сокращаются либо по первым, либо по юцдчевым буквам слова.

I

PC; PS; BASIC; ROM; ROM BIOS; KB; CPU; I/O; PC/AT; PC/XT; MB; add; char; rec; sys; sz; var; wd; t; stn; ref; rev; pt; red; rdy; ret; proc; procr; mul; div; cnt; chg; alt.

Упражнение 11. Из Списка слов подберите синонимы к данным словам:

Memory; chip; to locate; card (плата); to manage; unit (прибор); pe­ripheral; description; to run; to handle (обрабатывать); to enter; to leave; usage; aim (цель); to believe; expansion; complicated (сложный); to

project; management; to decide; to suggest (предлагать); to present; meaning; sequence (последовательность); to reach; additional part; pro­gram; accuracy.

Упражнение 12. Из Списка слов подберите слова, противоположные по смыслу данным:

external; input; to send; to enter; similarity; constantly; shortcoming (недостаток); fraction; rigid (жесткий, негнущийся); full; inaccuracy; insecure.

Упражнение 13. Переведите словосочетания. Помните, что главное слово находится в конце словосочетания, следовательно, переводить словосочетание нужно справа налево, организуя его потом правильно по-русски (это правило не касается словосочетаний с предлогами). Многие слова, приведенные здесь, производные (см. таблицы урока 4) и интернациональные.

Цифра «I» в упражнении соответствует Списку слов «I» и т. д.

I. digital signal processor; general-purpose processor; data proces­sor; support processor; self-testing chip; basis circuit; digital com­puting circuit; feedback circuit; storage selection circuit; communi­cation support; hardware support; first-line support; character rec­ognition (распознавание) device; exchange device; external device; servo drive;

II. concurrent process; predefined process; bit-by-bit transfer; internal transfer; serial transfer; alternative path; circuit path; execution path (ветвь); multiple-choice (выбор) path; address bus; check bus; control bus; child pointer; parent pointer; current-line pointer;

III. nonprocedural data access; single user access; unauthorized access; direct access application; distributed application; equipment compatibility; firmware compatibility; unit-to-unit compatibility; fail-safe feature; noiseproof feature; query enhancement; design for reliability; design for testability; file access mode; multitask mode; manual m6de; control current; pulse current; storage contents; data content; computing flexibility; computer- assisted management; network resource manager;

IV. complex integer; single precision integer; design value; fractional value; desired value; upper value of game; successive values; engi­neering solution; check Solution; machine independent solution; de­gree of freedom; double precision; single precision; mixed precision;

operational reliability; block address interrupt routine; error-control routine; debugging routine; complete routine; end-of-file routine; end- of-run routine; maintenance routine; search routine; "watchdog" rou­tine; transient routine.

Упражнение 14. Можете ли вы теперь связать термин из левого столбца и его объяснение из правого столбца? Проговорите вслух составленные пары. Если вы начинаете фразу с термина, то добавьте глашл-связку (англичане без этого не могут), а если с объяснения, то в его конце перед термином вставьте is called (называется).

_) mode 1. the main board in a computer, into which the cir-

.) drive cuits are plugged.

) access 2. a combination of physical components forming a

_) driver unit that performs a specific function, such as stor-

.) multitasking age or I/O.

.) bus 3. a type of memory chip that can be read but cannot

.) ROM be written on or altered.

) device 4. a unit that reads and writes data on an external stor-

) motherboard age device.

) program 5. a program that controls devices or other programs.

6. the ability to store or retrieve data.

7. a circuit for the transfer of data or electrical signal between two devices.

8. a method or condition of operation.

9. the technique of concurrently executing a number of related tasks in the same partition.

( 10. a logically arranged set programming statements defining the operations to be performed by a com­puter.

Упражнение 30. Переведите:

Все компьютеры состоят из процессора, схем памяти и нескольких программируемых схем. Все основные схемы располагаются на системной плате, другие важные части располагаются на платах расширения. Системная плата содержит микропроцессор, несколько встроенных программ ПЗУ и несколько очень важных схем поддержки. Они управляют внешними устройствами и помогают микропроцессору выполнять свои задачи.

Употребительные сочетания и составные предлоги:

as far as насколько
as well as так же как
as soon as как только
such as такой, как
as for; as to что касается
as well также, тоже
at once сразу
at all вообще
at last наконец
at first сначала
at least по меньшей мере
at a/one time за один раз
before long вскоре, скоро
by far намного
by some means каким-нибудь способом
by no means никоим образом

for ever for lack of

for want of, for the purpose of for example, for instance

/

навсегда из-за недостатка с целью например в случае в связи с в связи с для того, чтобы несмотря на на самом деле

in case of in connection with in consequence of in order to in spite of in fact


 

 


с целью, преднамеренно при условии, если вследствие, из-за с одной стороны... с другой стороны наоборот

устаревшии

   

в on purpose on condition that on account of on the one hand... on the other hand on the contrary

out-of-date out of use up-to-date

ышедший из употребления современный

 

Упражнение 29. Прочтите Тексты внимательно и найдите в них ответы на вопросы. Не забывайте проговаривать вслух.

Can you prove that the Windows NT meets the requirements of modern business?

Will the MS DOS software be lost while migrating to the Windows NT? What can you say about graphical interface of the Windows NT? What means does the Windows NT provide for networking? What capabilities does the Windows NT provide to corporate users? Does the Window NT really provide secure environment?


Text I

The real success of Microsoft Windows is that millions of personal computer users have discovered something important to every business. It makes them more produc­tive than ever before.

Today's business environment places more demands on computing technology, however. Complex, line-of-busi- ness applications such as inventory management, finan­cial trading, and on-line transaction processing demand powerful hardware and reliable, responsive and secure operating systems. Just as PC hardware is rapidly ad­vancing to take on these problems, now the Microsoft Windows NT operating system gives you personal produc­tivity and the power to handle complex business demands.

Microsoft Windows NT is a robust platform, with ad­vanced features needed to build sophisticated line-of- business solutions. It provides fully 32-bit operations, preemptive multitasking, advanced security and relia­bility, built-in networking, and complete scalability across hardware platforms for users of powerful PCs, workstations and network servers.

Windows NT provides the ease of use and proven produc­tivity of the Windows intuitive, graphical interface. And it unlocks the potential of a wide range of advanced PC hardware, including machines based on the Intel® 80x86 processor family and RISC architectures such as the MIPS R3000 and R4000. It also supports symmetric multiprocessing systems.

Moreover, you have access to a host of existing appli­cations for MS-DOS® and Windows that run on this hard­ware — without modification — as well as new, powerful 32-bit Windows-based applications. The Windows NT im­plementation of the Windows operating system is a com­plement to the MS-DOS—based version, bringing high-end computing to PC systems.

As a result, the Microsoft Windows NT operating system both protects and extends your software and hardware investment.

All of which reflects Microsoft's commitment to lever­age your organization's investment in the world's most widely-used PC operating systems — MS-DOS and Windows — helping users benefit from on-going advances in the 1990's.

Text II

The Windows NT operating system takes advantage of the productive, easy to learn and use Windows graphical environment.

• Runs popular MS-DOS and Windows-based applications on both Intel and RISC based systems without modifica­tion, as well as new 32-bit Windows-based applications.

• Delivers proven productivity through the easy to learn Windows 3.1 user interface.

• Supports 0S/2®-server and POSIX-compliant applica­tions.

• Provides an ideal platform for new high-performance applications and complex processes such as inventory management, financial trading and modeling, publishing, corporate applications development, and technical ap­plications.

Text III

The scalable architecture of the Windows NT operating system lets you run multiple applications more effi­ciently on the most advanced technologies of the 1990's.

• Full 32-bit internal architecture moves data around more efficiently.

■ 32-bit flat memory model does away with 64K segments to provide developers access to more memory (up to 2 GB of address space per application) and allows for easier development of programs that deal efficiently with larg­er amounts of data.

■ Multiple threads of execution allow applications to be more powerful and responsive.

• Symmetric multiprocessing support makes Windows NT scalable; you can enhance system performance by adding more CPU's.

• Memory protection provides the operating system and programs their own memory space to prevent data corrup­tion and assure data integrity.


• Preemptive multitasking allows the operating system to efficiently allocate processing time to each applica­tion.

• Expanded RAM and disk storage capacity (4 GB RAM and effectively unlimited storage) means you can work with more complex applications.

• Freedom to choose your hardware platform: Intel 80386 and above or RISC processors such as the MIPS R3000 and R4000.

Text IV

The Windows NT operating system is ready for workgroup computing.

• It includes built-in file- and print-sharing capa­bilities, along with powerful workgroup application serv­ices.

■ Developing distributed applications is easy through remote procedure calls (RPCs) for easy interprocess com­munication.

• Advanced network and systems management facilities are available through LAN Manager for Windows NT (avail­able separately).

• Open networking interface allows other network ven­dors to incorporate Windows NT into their network.

• Desktop security for sensitive data and applications is an important element in today's computing environ­ment. The Windows NT operating system delivers all the security you are likely to need.

■ Certifiable at US government C2-level for secure environments.

Упражнение 15. Просмотрите Текст, подчеркните и отметьте цифрами перевод данных словосочетаний, которые могут использоваться в профессиональном разговоре:

1) позволяют вам читать из или записывать в

2) вы не получаете исключения

3) работать таким (подобным) образом

4) (это) было бы слишком рискованно позволить

5) вся системная память

6) с одной стороны

7) с другой стороны

8) целый (весь) день напролет

9) без неблагоприятного воздействия одного на другое

10) предохраняет (оберегает) вас от

11) относительно большое количество времени

12) когда бы вы ни захотели (сделать что-то)

13) это может занять

14) зачем вам вообще нужно (делать что-то)

15) это могло бы облегчить дело

16) один из моих любимых


17) чтобы сделать это, вам нужно установить

18) приемлемый (принятый) способ достигнуть этого

19) быстрый просмотр (через)

20) это было бесполезно для

мне нужен был лучший способ Упражнение 18. Прочтите Текст и переведите его для себя как можно подробнее (as detailed as possible):


Text

Direct Port I/O and Windows NT

Undocumented features fo direct control of hardware devices.

By Dale Roberts. Dale works with data acquisition and con trol software at the Vestibu lar Laboratory of the Johns Hopkins University School of Medicine. He can be reached at [email protected].

Port I/O instructions allow all 80x86 CPUs to commu­nicate with other hardware devices in the system. For low-level, direct control of a hardware device, the С functions _inp() and _out() (implemented using the 80x86 processor's IN and OUT instructions let you read from or write to and I/O port. However, inserting _inp() or _out() in a Windows NT application gives you a privi­leged-instruction exception message and the option of terminating or debugging the offending app. If you at­tempt port I/O from a 16-bit DOS app in an NT console window, the I/O is either ignored or emulated by NT's virtual device drivers — you don't get an exception. But you don't get the direct I/O either.

This isn't a bug, NT is supposed to work this way. The NT architects decided that it would be too risky to allow applications to directly access the system hard­ware. With unrestricted I/O access an application could turn off all interrupts, take over the system, and trash the display or the hard drive. A buggy program could unintentionally do the same. NT's architecture requires that all hardware be accessed via kernel-mode device drivers - special, trusted pieces of software that essentially become part of the operating system when loaded. These device drivers have complete access to entire system memory, all hardware devices, and all privileged processor instructions. In contrast, ap­plications run in user mode, where they have restrict­ed access to memory — and where the CPU can't execute

certain privileged operating-system instructions, in­cluding I/O instructions.

The restriction on I/O port access is both a blessing and a curse. On one hand, it makes NT exceptionally stable. Generally, application programmers can write and crash and debug programs all day long without shak­ing NT. Several applications, can run without adversely affecting one another. On the other hand, I/O restric­tions prevent you from communicating directly and quick­ly with the hardware without taking the relatively large amount of time required for a call to a device driver. Whenever you want to communicate with a device driver, you must send a request through NT's I/O subsystem. This can take about 30 clock cycles.

Why1 would you ever need to put I/O instructions in user mode code? When writing a device driver, it might make things easier if you could write a quick program to interact with the device, sprinkling printt()s and getchar()s among port I/O instructions so that you could verify that you are driving the device correctly before you put the code into an actual device driver and chance a system lockup. Or you may want to write a portion of a driver in a user-mode DLL (as with video drivers, for instance) to achieve a desired level of performance. One of my favorite uses of I/O is for using an oscilloscope to debug programs and time sec­tions of code. To do this, you need to set and clear a bit in a digital output port and monitor the voltage on a scope.

Since direct, user-mode port I/O in NT seems so use­ful, you'd think there would be ah accepted way to achieve it. A quick look through the sample source code in the Windows NT Device Driver Kit (DDK) reveals a program called «PORTIO». Initially, I thought this would provide direct port I/O from an app. However, PORTIO is merely an example showing how to use Win32 DeviceloCon- trol() calls to kernel-mode device driver, which imple­ments the actual I/O. Using PORTIO, each I/O operation requires a costly, time-consuming call to the device driver. This was useless for my oscilloscope timings. I needed a better way.


Упражнение 19. Это упражнение для тренировки «быстрого», просмотрового чтения. Просмотрите параграфы и поставьте их в нужном порядке, обращая внимание на подчеркнутые слова:

(Look through the paragraphs and arrange them in proper order paying attention to the un­derlined words):

Welcome to the Official Red Hat Linux Getting Started Guide!

A. Inside, you'll find valuable tips which will help you get acquainted with GNOME, your new default desktop environment. You'll also learn the fundamentals of navigating and managing files and directories from the shell prompt, or console. Among the new features of Red Hat Linux 6.1 you'll find the RH PPP Dialer, also called RP3; inside, you'll learn how to use this application to get online quickly and easily.

B. if you count yourself among the many who are discovering Red Hat Linux for the first time, this book is for you!

C. But first, a little background...

D. In short this guide picks up where the Official Red Hat Linux Instal­lation Guide leaves off: helping you understand a bit about your new operating system.

E. At Red Hat, we believe we offer the best Linux distribution on the market. We hope you'll agree that the time and the money you spent to install and work with Red Hat Linux was well spent, indeed.


F. Список слов к тексту урока

G. Прочтите вслух и допишите перевод однокоренных слов, используя знание суффиксов.

H. to figure out вычислять, постигать, разгадывать to trap захватывать to define определять

I. definition

J. defining

K. level уровень, степень

L. current ток; текущая запись, текущий

M. to store запоминать, хранить

N. storage

O. significant значительный, существенный

P. significance

Q. value ценность, стоимость, оценка, значение free свободный, вольный, добровольный

R. freely

S. to set устанавливать, монтировать

T. set, subset

U. offset

V. flexible гибкий

W. flexibility

X. task задача

Y. to accomplish совершать, выполнять, достигать

Z. bitmask битовая маска

AA. array матрица, массив, таблица

BB. to correspond to... соответствовать, быть аналогичным чему-л.

CC. particular специфический, особый, частный, детальный, тщательный

DD. to encompass окружать, заключать

EE. to hold удерживать; выполняться (об условии)

FF. to provide обеспечивать, снабжать

GG. to choose выбирать, избирать, предпочитать

HH. to assume принимать (на себя); предполагать

II. permission разрешение

JJ. main главный, основной

KK. integer целое число

LL. Упражнение 8. Переведите следующие слова без словаря, а затем по словарю проверьте произношение:

MM. to grant; code; segment; to determine; statically; to pack; to contain; location.

NN. Упражнение 9. Вспомните перевод следующих служебных слов:

OO. Always; one of these; rather than; against; through; less than; all-or-noth- ing; each; whenever; any; anywhere; therefore; which; within; by; for.

PP. Упражнение 17. Подчеркните в предложениях сказуемые (действия) и подлежащие (то, о чем идет речь в предложении). Переведите предложения.

QQ. То figure out how to grant I/O access to a user mode app, you have to understand how I/O protection is implemented in Windows NT.

RR. The first mechanism that must be understood is the privilege-level sys­tem used by the 80x86 processors Text.

SS. Rather than statically defining which privilege levels can have access, the CPU defines an I/O privilege level value, which is compared against the CPL to determine if I/O instructions can be used freely.

TT. Because the IOPL cannot be less than 0, programs running at privilege level 0(like kernel-mode device drivers) will always have direct port I/O access.

UU. Any part of the bitmask that you do not provide is assumed to be 1, and therefore access is not granted to those ports.

VV. Теперь вы можете прочесть Текст, хорошо понимая его.

WW. Text

XX. Accomplishing I/O Protection in NT To figure out how to grant I/O access to a user mode app, you have to understand how I/O protection is imple­mented in Windows NT. NT doesn't actually implement the

YY. I/O' protection on its own. Since the CPU can trap at­tempted I/O port access, NT depends on this feature. The first mechanism that must be understood is the privi­lege-level system used by the 80x86 processors. Four privileged levels are defined by the processor - 0, 1, 2, and 3 - and the CPU always operates at one of these levels. The most privileged level is 0; the least privi­leged, 3. NT uses only levels 0 and 3. Privilege level 0 is used for the full-access kernel mode and 3 for the more-restrictive user mode. The current privilege level (CPL) of the processor is stored in the two least- signifi cant bits of the CS (code segment) register.

ZZ. Rather than statically defining which privilege lev­els can have I/O access, the CPU defines an I/O privi­lege level (IOPL) value, which is compared against the CPL to determine if I/O instructions can be used freely. The IOPL is stored in two bits, of the processor's EFLAGS register. Any process with a CPL that is numeri­cally greater than the IOPL must go through the I/O protection mechanism when attempting port I/O access. Because the IOPL cannot be less than 0, programs running at privilege level '0 (like kernel-mode device drivers) will always have direct port I/O access. NT sets the IOPL to 0. User-mode code always has a CPL of 3, which is larger than the IOPL. Therefore, user-mode port I/O access attempts must go through the protection mecha­nism. Determining if CPL>IOPL is the first step in the protection mechanism. I/O protection is not all-or-noth­ing. The processor uses a flexible mechanism that allows the operating system to grant direct access to any sub­set of I/O ports on a task-by-task basis.

AAA. The CPU accomplishes this by using a bitmask array, where each bit corresponds to an I/O port. If the bit is a 1, access is disallowed and an exception occurs when­ever access to the corresponding port is attempted. If the bit is a 0, direct and unhampered access is granted to that particular port. The I/O address space of the 80x86 processors encompasses 65,536 8-bit ports. The bitmask array is 8192 (0x2000) bytes long, since the bitmask array is packed so that each byte holds eight bits of the array. There is even flexibility in how much of the bitmask array must be provided. You can provide anywhere from 0 to the full 8192 bytes of the table. The


BBB. table always starts from I/O address 0, but you can choose not to provide the bitmask for upper I/O address­es. Any part of the bitmask that you do'not provide is assumed to be 1, and therefore, access is not granted to those ports.

CCC. The bitmask array, called the I/O Permission bit Map (IOPM), is stored in the Task State Segment (TSS) struc­ture in main memory, which is contained in a special, segment referenced by the segment selector in the proc­essor' s Task Register (TR). The location of the IOPM within the TSS is flexible. The offset of the IOPM within the TSS is stored in a 2-byte integer at location Охбб in the TSS.

DDD. Упражнение 18. Вы внимательно читали Тексты (урок 5 и 6)? Можете ли теперь расшифровать сокращения?

EEE. DDK; CPL; CS; IOPL; TSS; TR; IOPM;

FFF. Предлоги после существительного: An advantage/disadvantage of


Поделиться с друзьями:

Особенности сооружения опор в сложных условиях: Сооружение ВЛ в районах с суровыми климатическими и тяжелыми геологическими условиями...

Археология об основании Рима: Новые раскопки проясняют и такой острый дискуссионный вопрос, как дата самого возникновения Рима...

Индивидуальные и групповые автопоилки: для животных. Схемы и конструкции...

Семя – орган полового размножения и расселения растений: наружи у семян имеется плотный покров – кожура...



© cyberpedia.su 2017-2024 - Не является автором материалов. Исключительное право сохранено за автором текста.
Если вы не хотите, чтобы данный материал был у нас на сайте, перейдите по ссылке: Нарушение авторских прав. Мы поможем в написании вашей работы!

0.143 с.