Example sentences of "to [pron] by [verb] [art] " in BNC.

  Next page
No Sentence
1 First , it distanced the riots from the social , economic , political , and other grievances which had been linked to them by locating the cause outside the ‘ social problems ’ of inner-city dwellers and in the ‘ simple greed ’ of the drug barons to accumulate ‘ loot ’ .
2 Robins slightly endeared herself to me by going a little pink and gazing at the ceiling .
3 Then make that place special to you by conducting a ritual , in whatever form you feel happiest with .
4 Key Points : Pull the board close to you by using the back foot ; maintain an upright rig ; kick hard with the front foot ; lean forwards applying weight to mast foot .
5 ( 6 ) Mark any point that at the time of perusing the abstracted deed does not appear clear to you by scoring the margin heavily against your note , or in any other manner that will catch your attention .
6 As before , rank them in order of importance to you by placing a ( 1 ) next to the most important , and so on downwards .
7 GOLFING taxi driver Derek Funcks defied odds of several millions to one by hitting a hole in one … and then hitting another hole in one on the same round .
8 In whatever form the respondent 's case is pleaded he must prove not only that the appellants acted fraudulently but also that their fraud caused damage to him by causing the enactment of section 18 .
9 So when the male of such a species approaches a female hanging , large and menacing , on her web , or lurking hidden beside it , he signals to her by twanging the threads at one side in a special and meaningful way which he trusts the female will recognise .
10 The same sentiment appears in Lagunas Nitrate Company v Lagunas Syndicate , where it is suggested , somewhat eccentrically , that effect might be given to it by allowing the directors to plead the defence of volenti non fit iniuria .
11 If access to a package or module is denied to the user , the procedure attempts to gain access to it by supplying the password specified in ROOT_PACKAGE_REQUIRED .
12 If access to a module is denied to the user , the procedure attempts to gain access to it by supplying the password specified in ROOT_PACK .
13 If access to the module is denied to the user , the procedure attempts to gain access to it by supplying the password specified in MODULE .
14 If you have previously run BBCBASIC(Z80) , you can return to it by using the cursor keys to select BASIC from the list of suspended activities in the index .
15 Each of the six main sections of the programme starts with a brief analysis of the situation , and then responds to it by proposing a series of study processes .
16 It was held that the agreement was void and that effect could not be given to it by rejecting the general restraint which appeared in it and limiting the agreement for the purposes of the action to carrying on the business of a tailor .
17 But taxpayers can improve the benefit of their subscription at no extra cost to themselves by making a covenant .
18 It is possible to get round the need to refer to yourself by using the following devices , which can be varied in order to avoid any over-formulaic effect : — Adverbs and adverbial expressions Instead of " I think it is likely that … " use " Arguably … " ( but bear in mind what we have said about " arguably " above , Chapter 3 , p. 68 ) .
  Next page