Ex. 26. POSSESSIVE CASE. Pay attention to the -s endings and translate the sentences.

1. Her boss's notebook was stolen from the car.

2. This network allows you to send email messages from your computer to your friends’ computers.

3. Connie left copies of the document on Mike's desk.

4. In an effort to sabotage [ïîâðåæäàòü, âûâîäèòü èç ñòðîÿ] other people’s computers, some users (sometimes called hackers) write software that controls or destroys another computer’s programs or data.

5. Besides copiers, the Xerox company’s products include facsimile machines, printers, scanners, and software.

6. A computer’s operating system consists of a set of programs that control all of the computer’s resources.

7. Complex computer graphics (=pictures and images created by computers) were used to create the film's special effects.

8. Babbage’s computing machine was the basis for today’s computers.

9. The first PC (the Altair), which used the Intel Corporation's 8080 microprocessor was developed in 1974.

10. The library's database can be accessed via workstations in the reference room.

11. Hacker is someone who secretly uses or changes the information in other people's computer systems.

12. The solution to this puzzle will be published in next week's magazine.