cExams.net

Prepositions - In

1. In indicates location inside or within something else.

Pattern 1: verb + in + noun
We live in that house.
The pencils are in the box.

Nouns commonly used after in:

Geographical areas:
city, continent, country, state, town
He lives in Seattle, Washington, in the U.S.A.

Comfortable, protected places:
alcove, large chair, cocoon, nest
He sat down in the chair and read his novel.

Inside areas:
attic, balcony, basement, building, corner, hall, kitchen, office, room She is in her office, in that building, in room 302, in the corner.

Vehicles where the passengers cannot walk around: car, canoe, helicopter, small airplane, small boat We went in the car, but they went in a helicopter.

Publications and speeches
article, book, dictionary, encyclopedia, lecture, magazine, newspaper, speech
He didn't say that in his speech, but I read it in the newspaper.

Pattern 2: be + in + 0 noun
He can't come to the phone because he's in bed.

Nouns commonly used after in:
bed, church, class, jail, place, school, town

Pattern 3: verb + noun + in + noun
Put the pencils in the box.

Typical verbs:
drop, get, insert, lay, place, push, put

Typical nouns:
bag, box, drawer, file, folder, notebook, sack, suitcase, trunk, wallet

2. In indicates membership of a group or category.

Pattern: be + noun + in + noun
There are seven people in our family.
Your brother is the expert in that office.

Nouns commonly used after in:
association, category, choir, chorus, club, family, fraternity, group, office, society, sorority

3. In can indicate a period of time.

Pattern: be + in + time period
century in + the She was born in the 1800s.
--- >>>
  • Prepositions - About
  • Prepositions - Above
  • Prepositions - Across
  • Prepositions - After
  • Prepositions - Against
  • Prepositions - Ahead Of
  • Prepositions - Along
  • Prepositions - Among
  • Prepositions - Around
  • Prepositions - As
  • Prepositions - At
  • Prepositions - Back to/Back From
  • Prepositions - Before
  • Prepositions - Behind
  • Prepositions - Below
  • Prepositions - Beneath
  • Prepositions - Beside
  • Prepositions - Besides
  • Prepositions - Between
  • Prepositions - Beyond
  • Prepositions - But
  • Prepositions - By
  • Prepositions - Close To
  • Prepositions - Despite/In Spite Of
  • Prepositions - Down
  • Prepositions - During
  • Prepositions - Except
  • Prepositions - Far From
  • Prepositions - For
  • Prepositions - From
  • Prepositions - In
  • Prepositions - In Back Of
  • Prepositions - In Front Of
  • Prepositions - Inside
  • Prepositions - Instead Of
  • Prepositions - Into
  • Prepositions - Like
  • Prepositions - Near
  • Prepositions - Next To
  • Prepositions - Of
  • Prepositions - Off
  • Prepositions - On
  • Prepositions - On Top Of
  • Prepositions - Onto
  • Prepositions - Opposite
  • Prepositions - Out
  • Prepositions - Outside
  • Prepositions - Over
  • Prepositions - Past
  • Prepositions - Through
  • Prepositions - Throughout
  • Prepositions - To
  • Prepositions - Toward
  • Prepositions - Towards
  • Prepositions - Under
  • Prepositions - Underneath
  • Prepositions - Until
  • Prepositions - Up
  • Prepositions - With
  • Prepositions - Within
  • Prepositions - Without
  • Shanghai
  • Synonyms
  • Summer Health Foods
  • Worlds Most Beautiful National Parks
  • What to Eat in Tamil Nadu
  • Puff Pony Hairstyles

  • Expert Tips on Integrating Mobile and Cloud Strategies

    Secure mobile device data at all stages

    The old static security principles assume there is a beginning and an end, but now they all blend into our new always connected and always on world, said Jeff M. Spivey (@spiveyjms), VP of strategy, RiskIQ. Expand past old constructs and limits with a more holistic approach to risk management not a siloed approach of cloud or mobile. The trick is to find seamless layers of security and encryption that protect data end to end at rest, in transit, and on device and are so transparent that they're as easy to use as the cloud is by itself, said Asaf Cidon (@asafcidon), CEO and co founder, Sookasa. Too often, we see security solutions that disrupt the best parts of cloud or mobile computing, such as by disabling features like sync or blocking data from getting to the cloud or devices. But that isn't the answer, because that won't enhance productivity or help prevent user errors. The real solution lies in protecting the data itself, such as with file level encryption, so that your security measures follow the data wherever it goes.


    Chourishi Systems