Example sentences of "[n mass] can be [vb pp] " in BNC.

  Next page
No Sentence
1 The classic bob can be swept back to ring the changes .
2 In ballbarrows , the 3cu ft Hozelock Husbender at £46.95 can be fitted with a useful grass box extension , price £20.95 .
3 You and Amaryllis can be married in a trice ! ’
4 Even in a cave , or a nest , some fry can be lost , but mouthbrooders go one step further .
5 The fry can be housed in a large ice-cream or margarine container .
6 If the sectional open type of plate is used , then the fry can be trapped beneath them if the gaps where the water flow goes through are too large — the strength of the turnover rate can add to this problem .
7 Progress has been so good , they tell me , that there is now every chance the gasworks can be opened to the public on Sundays during June , July and August .
8 That most attractive bird , the heron can be observed more easily now in the reed beds and overhead some geese search for new feeding grounds .
9 O. purpureus can be distinguished by the presence of dorsal arm plates , the arrangement of the tentacle scales of the second oral tentacle pore , the presence of one long flat tentacle scale on each arm pore and the transformation of the dorsal spines into hooks .
10 An impression of the extent of expansion and subsequent volume of data can be gathered from the illustration in Fig 11.9 , which also summarises the stages of the exercise up to this point .
11 Family trees based on molecular data can be festooned with fossils but this is perhaps rather premature .
12 These devices in effect increase the size of program which can be run on a given machine , because much of the required data can be stored externally until needed .
13 Thus confidential data can be stored on such a disk and the user of this data can physically remove it , even take it home with him if he so desires , thereby ensuring that the information can not be seen by any unauthorised persons This control over sensitive data coupled with the fact that the computer is personal to one user at a time gives the operator a greater sense of confidence in , and control over , the machine he is using .
14 As a result of these fears , the Data Protection Act which came into operation in 1986 seeks to regulate the ways in which personal data can be stored by electronic means and gives the individuals concerned rights to challenge accuracy . )
15 No I do n't think that 's , sorry , I think it is perfectly possible for Stella to make this assumption to get them changed and to come with the revised version which says , which is apparently what Jenny has done here , this looks to me , in a not unreasonable way , it looks , she is saying something is there , this must be an example of what Stella means , data can be stored in three different ways where clearly previously that said four different ways .
16 The lead isotope data can be explained if the U/Pb ratios in the sources are comparable to those observed for the lavas and the U/Pb fractionation occurred at the time of formation of the local oceanic lithosphere .
17 The other major problem caused by a CAD system arises from the ease with which data can be created and stored .
18 In addition , the cartographic data can be manipulated in a variety of ways including projection transformation , scale change , mosaicing of adjacent map sheets , polygon extraction , overlay of maps showing different themes and the delineation of buffer zones .
19 National and international bibliographic data can be fed into computers in machine-readable form .
20 IF an unforeseen problem occurs , extreme weather conditions say , this data can be fed into the computer and a revised target date instantly given .
21 The data can be analysed using a x 2 test .
22 Such data can be obtained not only from military reconnaissance satellites , of which China launched three between 1975 and 1978 , but also from the latest civilian satellites .
23 Details of all non-confidential data can be obtained from the GSNI .
24 Since coalification and oil and gas generation depend on the same diagenetic factors , namely temperature and heating time , coalification data can be matched with stages of oil and gas maturation .
25 The participant-observer may gather data on interactive behavior with a minimum of observer effect , but very little linguistic data can be recorded accurately in journals several hours after the event .
26 As far as the programmer is concerned , data can be written to and read from a file a data item or a character ( byte ) at a time .
27 On top of that there 's a data encryption facility so data can be saved to disk in encoded form .
28 There are several further ways in which the database of module timetable data can be exploited .
29 The fact that microcomputers can communicate with larger computers means that data can be prepared on the micro and then sent to the mainframe at a convenient moment .
30 Obviously , entering data can be done whenever there is more to add — and you can add columns as well as rows — but you will need to update the database definition accordingly .
  Next page