Example sentences of "[conj] [noun] [verb] [prep] [det] " in BNC.

  Next page
No Sentence
1 " Parole " is the particular uses of this system , or selections from the system , which the speaker or writer makes on this or that occasion .
2 Section 268(1) provides that associated operations means any two or more operations of any kind , being : ( 1 ) operations which affect the same property , or one of which affects some property and the other or others of which affect property which represents , whether directly or indirectly , that property , or income arising from that property , or any property representing accumulations of any such income ; or ( 2 ) any two operations of which one is effected with reference to the other , or with a view to enabling the other to be effected , or facilitating it being effected , and any further operations having a like relation to any of those two , and so on whether those operations are effected by the same person or different persons , and whether or not they are simultaneous .
3 It asked the troops whether they had ever been linked to a group who aimed to overthrow the authority of the State , or if they had any family members , friends or associates connected with such organisations .
4 ( b ) having entered any building or part of a building as a trespasser he steals or attempts to steal anything in the building or that part of it or inflicts or attempts to inflict on any person therein any grievous bodily harm .
5 Liability extends to damage caused in the United Kingdom , the cost of any measures reasonably taken for the purpose of preventing or reducing such damage , or damage caused by any measures so taken .
6 Certain sections of the policy contain an exclusion relating to loss or damage caused by any process of cleaning , repair or alteration .
7 We accept no liability for any loss or damage caused by either ( i ) your breach of the Conditions ( as in force at the time of the breach ) or ( ii ) failure of any services to which your Card relates due to mechanical or other reasons .
8 The Insurer may at its own expense take proceedings in the name of the Insured Person to recover compensation or secure an indemnity from any Third Party in respect of any loss or damage covered by this insurance and any amount so recovered shall belong to the Insurer .
9 If such motor car is disabled by reason of loss or damage insured under this Policy the Corporation will bear the reasonable cost of protection and removal to the nearest repairers .
10 The Companies Act 1981 also provided that in determining the aggregate amount of any item in a company 's balance sheet or profit and loss account , the amount of each individual asset or liability included in that amount shall be determined separately .
11 In time other tracks or roads developed from this central market to smaller towns and villages in the area , and so York grew in trade and importance .
12 Holders of non-British passports and those issued outside the UK should check with their own embassy with regard to any special permits or visas required for all countries they will be visiting or passing through .
13 The large urban or dockside warehouse is a building type strongly related to the grander grain and textile mills , not only because it often stored the raw materials or products processed by these latter buildings , but also in its constructional composition .
14 At worst , they merely signal a reluctance or inability to grapple with those problems .
15 Documents prepared by the solicitor for his or her own benefit or protection belong to that solicitor ; so do documents sent by the client , which are intended to pass to him or her .
16 The condition of spiritual imprisonment or freedom depends on many things , but especially on how we breathe and think .
17 There were eighty-eight photos or illustrations relating to this court case and the aftermath , virtually equalling the number found for all the other rape cases in the year .
18 If you glance inside the average modern book you will clearly see the mull or tape strips under this paste-down ( as compared with the free endpaper ) .
19 At its most extreme limits of informality the interview could be carried out with the interviewer taking no notes or tape recording at all .
20 Much is sometimes made of the rivalries or jealousies fostered by these networks ; a ‘ revolution ’ occurred in 1974 when the person appointed to head the CNET , Jean-Pierre Souviron , was not , like his predecessors , the product of ENST but of another engineering ‘ grande école ’ — l'Ecole des Mines .
21 Your policy entitles you to have the use of a hired saloon car up to 1600cc from our authorised suppliers depot , subject to availability , if your car is off the road due to damage or theft insured under this policy .
22 S 1(1) provides that ‘ a person is guilty of an offence if — ( a ) he causes a computer to perform any function to secure access to any program or data held in any computer ; ( b ) the access he intends to secure is unauthorised ; and ( c ) he knows at the time when he causes the computer to perform the function that that is the case ’ .
23 The relevant words are ‘ he causes a computer to perform any function with intent to secure access to any program or data held in any computer ’ .
24 Crime — Computer misuse — Unauthorised access — Person using one computer to obtain from it unauthorised benefit — Whether unauthorised use of single computer within statute — ‘ Access to any program or data held in any computer ’ — Computer Misuse Act 1990 ( c. 18 ) , ss. 1(1) , 2(1)
25 Held , that , in the opinion of the court , in section 1(1) ( a ) of the Act of 1990 the words ‘ causes a computer to perform any function with intent to secure access to any program or data held in any computer , ’ in their plain and ordinary meaning , were not confined to the use of one computer with intent to secure access into another computer ; so that section 1(1) was contravened where a person caused a computer to perform a function with intent to secure unauthorised access to any program or data held in the same computer ( post , pp. 437A–B , C–D , 438A , E–F ) .
26 It seems to me to be straining language to say that only one computer is necessary when one looks to see the actual wording of the subsection : ‘ Causing a computer to perform any function with intent to secure access to any program or data held in any computer . ’ ’
27 ‘ It is submitted : ( i ) the judge erred in law in his ruling on count 1 ; ( ii ) for an offence to be committed under section 1(1) of the Act there does not have to be the use by the offender of one computer with intent to secure unauthorised access into another computer ; ( iii ) there is no ambiguity in the wording of section 1(1) ( a ) of the Act which clearly refers to an intent to secure access to any program or data held in any computer ; ( iv ) section 17(2) and ( 3 ) are applicable to the alleged actions of the respondent in this case ; ( v ) the Act has been drafted so as to deal with the person who misuses a computer to which he has direct ( but unauthorised ) access , as well as a computer into which he is able to secure indirect access by operating another computer . ’
28 ‘ A person is guilty of an offence if — ( a ) he causes a computer to perform any function with intent to secure access to any program or data held in any computer ; ( b ) the access he intends to secure is unauthorised ; and ( c ) he knows at the time when he causes the computer to perform the function that that is the case .
29 ( 2 ) For the purposes of subsection ( 1 ) ( b ) above the requisite intent is an intent to cause a modification of the contents of any computer and by so doing — ( a ) to impair the operation of any computer ; ( b ) to prevent or hinder access to any program or data held in any computer ; or ( c ) to impair the operation of any such program or the reliability of any such data .
30 It seems to me to be straining language to say that only one computer is necessary when one looks to see the actual wording of the subsection ; ‘ causing a computer to perform any function with intent to secure access to any program or data held in any computer . ’
  Next page