- •Рецензенты:
- •Авторы:
- •1) Коммуникационные компетенции.
- •2) Коммуникативная компетенция владения иностранным языком1.
- •Часть 1
- •1.2. Lead-in Discussion. Answer the following questions.
- •2.1. Read the article and find the information about the changes, which have been introduced in Eton; explain the title of the article. A New Kind of Elite
- •2.1.1. Key Vocabulary
- •2.1.2. Comprehension Questions
- •2.2. Read the article; explain the title of the article. America’s Community Colleges: On the Ascent
- •2.2.1. Key Vocabulary
- •2.2.2. Comprehension Questions
- •3.1. Read the text and find the facts proving the great influence of educational technologies on the lives of students and teachers. U.S. Students and the Technological Evolution
- •3.1.1. Comprehension Questions
- •3.2. Read the article; explain the title of the article. The Issue of “Choice”
- •3.2.1. Key Vocabulary
- •3.2.2. Comprehension Questions
- •4.1. Read the article. A Freshman at Brown University
- •4.1.1. Notes
- •4.1.2. Key Vocabulary
- •4.2. Read the text and find the facts on the advantages of co-op education. Co-op Education in us Colleges
- •4.2.1. Key Vocabulary
- •4.2.2. Comprehension Questions
- •5.1.1. Match the words and phrases with their definitions.
- •5.1.2. Match the words and phrases with their definitions.
- •5.1.3. Match the words and phrases with their definitions.
- •5.2.1. Give the Russian equivalents for the following words and expressions from texts (Focus 2).
- •5.2.2. Give the Russian equivalents for the following words and expressions from texts (Focus 3).
- •5.2.3. Give the Russian equivalents for the following words and expressions from the texts (Focus 4).
- •5.3.1. Find the English equivalents in texts (Focus 2) for the following Russian words and phrases.
- •5.3.2. Find English equivalents in texts (Focus 3) for the following Russian words and phrases.
- •5.3.3. Find the English equivalents in the texts (Focus 4) for the following Russian words and phrases.
- •5.4.1. Paraphrase the following, using the key vocabulary of the module (focus 2).
- •5.4.2. Paraphrase the following, using the key vocabulary of the module (focus 3).
- •5.4.3. Paraphrase the following, using the key vocabulary of the module (focus 4).
- •6.1. Render the following text in English. E-learning в помощь
- •6.2. Render the following text in English. Бизнес-образование: прагматики против академиков
- •6.3. Write an essay of 300-350 words on the educational reforms in Russia. Focus on either history of reforms or present-day developments.
- •7.1. Topics for Oral Discussion
- •7.2. Topics for Round Tables
- •7.3. Surf on the Web to find information on the European educational system. To help you we state several addresses to start with.
- •7.4. Education on the Internet
- •1.2. Lead-in Discussion. Answer the following questions.
- •2.1. Scan the text below and say what its essence is.
- •Infinite editions
- •2.1.1. Key Vocabulary
- •2.1.2. Comprehension Questions
- •2.2. Skim the text and find any information on the impact media violence has on children.
- •Violence in Pop Culture
- •2.2.1. Key Vocabulary
- •2.2.2. Comprehension Questions
- •3.1. Find the facts proving that the arts in America grow out of American culture. Bringing Art to All Americans
- •3.1.1. Key Vocabulary
- •3.1.2. Comprehension Questions
- •3.2. Read the following text. The Return of Beauty
- •3.2.1. Key Vocabulary
- •3.2.2. Comprehension Questions
- •4.1. Introduction. The cinema is an art form that is accessible to most people and it is one that most people enjoy.
- •4.1.1. Answer the questions in the quiz below to find out whether you’re a film buff.
- •4.1.2. Skimming and scanning. Read through the text quickly to find out the answers to the quiz. How many did you get right?
- •4.1.3. Choose the correct title (a-j) for each paragraph of the text (1-7). Not all the headings will be needed.
- •4.1.4. The following events are all stages in the history of the film industry. Read the text again carefully and number them 1-6 according to their historical order.
- •4.1.5. Key Vocabulary
- •4.2. Scan the text below and say what its essence is. Does the Market Produce Bad Art?
- •4.2.1. Key Vocabulary
- •4.2.2. Comprehension Questions
- •5.1.1. Match the words and phrases with their definitions.
- •5.1.2. Match the words and phrases with their definitions.
- •5.1.3. Match the words and phrases with their definitions.
- •5.2.1. Give the Russian equivalents for the following words and expressions from texts (Focus 2).
- •5.2.2. Give the Russian equivalents for the following words and expressions from texts (Focus 3).
- •5.4.2. Paraphrase the following, using the key vocabulary of the module (focus 3).
- •5.4.3. Paraphrase the following, using the key vocabulary of the module (focus 4).
- •6.1. Render the following text into English. Дитя и волшебство
- •6.2. Sum up the English version of 6.1.
- •6.3. Write an essay of 250 words on your favourite director’s creative work.
- •If you so desire, you may focus on either history of arts or present-day developments.
- •7.1. Discuss the following.
- •7.2. Look into the following statements and prove your own point of view.
- •7.3. Surf on the Web to find information on Hollywood. What kind of sites do they offer? Which do you like most?
- •7.4. Culture on the Internet
- •1.2. Lead-in Discussion. Answer the following questions.
- •2.1.1. Key Vocabulary
- •2.1.2. Comprehension Questions
- •2.2.1. Key Vocabulary
- •2.2.2. Comprehension Questions
- •3.1.1. Key Vocabulary
- •3.1.2. Comprehension questions
- •3.2. Read the article; explain the title of the article. Scan the text and say what its essence is. Explain the author’s point of view on the problem. A Fading Taboo
- •3.2.1. Key Vocabulary
- •3.2.2. Comprehension questions
- •4.1. Read the article. Scan the text below and say what its essence is. Explain the author’s point of view. Where Free’s a Crowd
- •4.1.1. Key Vocabulary
- •4.1.2. Comprehension Questions
- •4.2.1. Key Vocabulary
- •4.2.2. Comprehension Questions
- •5.1.1. Match the words and phrases with their definitions (Focus 2).
- •5.1.2. Match the words and phrases with their definitions (Focus 3).
- •5.1.3. Match the words and phrases with their definitions (Focus 4).
- •5.2.1. Give the Russian equivalents for the following words and expressions from texts (Focus 2).
- •5.4.2. Paraphrase the following, using the key vocabulary of the module (Focus 3).
- •5.4.3. Paraphrase the following, using the key vocabulary of the module (Focus 4).
- •6.1. Render the following text in English. Современная пресса Автограда
- •6.2. Sum up the English version of 6.1.
- •6.3. Render the following text in English. Проект "Карта российской прессы"
- •6.4 Write an essay of 300 words on advertising in Russia.
- •7.1. Topics for Oral Discussion
- •7.2. Look into the following statements and prove your own point of view.
- •7.3. Surf on the Web to find the information on the history of electronic media. Brief your group mates on your findings.
- •7.4. Mass Media on the Internet
- •1.2. Lead-in Discussion. Answer the following questions.
- •2.1. Scan the text to find facts proving that face-to-face communication is as widespread as ever. Skim the text and sum up the evidence in favour of electronic communication. Keep It Real
- •2.1.1. Notes
- •2.1.2. Key Vocabulary
- •2.1.3. Comprehension Questions
- •2.2. Scan the article to find all definitions of blog. Find the dates important for blogosphere. Skim the text to find out what blogs and blogging are.
- •It’s the links, stupid
- •2.2.1. Key Vocabulary
- •2.2.2. Comprehension Questions
- •2.3. Skim the article to find what the wiki principle is.
- •The wiki principle
- •2.3.1. Key Vocabulary
- •2.3.2. Comprehension Questions
- •3.1. Skim the article to define the new way of governing. Scan the text to illustrate the definition by some impressive statistics. A New Way of Governing in the Digital Age
- •3.1.1. Key Vocabulary
- •3.1.2. Comprehension Questions
- •3.2. Skim the text to decide whether it can be really safe in the cyberspace. Scan the dangers described and precautions taken. Staying Safe in Cyberspace
- •3.2.1. Key Vocabulary
- •3.2.2. Comprehension Questions
- •4.1. Skim the text to enumerate all aspects of the digital divide. Read the text to sum up what it is about. Bringing the Digital Divide
- •4.1.1. Key Vocabulary
- •4.1.2. Comprehension Questions
- •4.2. Look through the text to decide why it is headlined ‘Snooping Bosses’. Skim the article to find the percentage of employers who control their employees’ electronic behaviour. Snooping Bosses
- •4.2.1. Key Vocabulary
- •4.2.2. Comprehension Questions
- •5.1.1. Match the words and phrases with their equivalents (focus 2).
- •5.1.2. Match the words and phrases with their equivalents (focus 3).
- •5.1.3. Match the words and phrases with their equivalents (focus 4).
- •5.2.1. Give the Russian equivalents for the following words and expressions from texts (Focus 2).
- •5.4.2. Translate the following, using the key vocabulary of the module (focus 3).
- •5.4.3. Translate the following, using the key vocabulary of the module (focus 4).
- •6.1.1. Интернет будущего: "Чего изволите?"
- •6.1.2. «Всемирная паутина» (www или Web)
- •6.2. Sum up the English versions of 6.1.1 and 6.1.2.
- •6.3. Render the text in English. Понятие информационной безопасности
- •6.4. Write an essay of 300 words on the Internet in modern life.
- •Hatched, Matched and Dispatched
- •The Hard Turn
- •Taming the Wild Web
- •2. Render the following text into English.
- •Двойная игра – двойные ставки Британская система образования
- •Неподражаемый
- •Информационный террор
- •Vocabulary Index
3.2. Skim the text to decide whether it can be really safe in the cyberspace. Scan the dangers described and precautions taken. Staying Safe in Cyberspace
A computer security specialist offers instruction and guidance on how to prevent intruders and infected software from getting into your home computer system.
The Internet is a great communications and research tool as well as a source of entertainment for millions of people around the world. It is also a security risk. Malicious computer programs have been used to attack computer systems hooked up to the worldwide Internet, damaging computer programs and gaining access to confidential information. News reports of these attacks have brought to the world new meanings for old words such as "virus," "worm," "infection," and "crash"—part of a frightening vocabulary that can intimidate those just beginning to use this new technology. What does it all mean and how can those less experienced Internet travelers navigate the hazards more safely?
Computer security has its similarities to the precautions most people take to secure their home, family, property, and person in an uncertain and sometimes dangerous world. Locking the doors at night, avoiding dangerous neighborhoods, and keeping an eye on one’s wallet have their corollaries in sensible computer use.
Your home computer is a popular target for intruders, because they want what you may have stored there: credit card numbers, bank account information, personal background information, and anything else they can find. With such information, intruders can take your money, even steal your identity. But it is not just money-related information they may be after. Intruders also want your computer's resources, meaning your hard disk space, your fast processor, and your Internet connection. They use these resources to attack other computers on the Internet. In fact, intruders go after home computers because typically they are easy targets. When connected to high-speed Internet connections that are always turned on, these computers are all the easier for intruders to find and attack.
How do intruders break into your computer? In some cases, they send you e-mail with a virus. Reading that e-mail activates the virus, creating an opening that lets intruders see what is inside your computer. In other cases, they take advantage of a flaw or weakness in one of your computer's programs—a vulnerability—to gain access. Once inside, they often install new programs that let them continue to use your computer—even after you have plugged the holes they used to get into your computer in the first place. These so-called backdoors are usually cleverly disguised to blend in with the other programs running on your computer.
So, think of your computer as you would of your house or your apartment. For example, you know that if you have a loud conversation, someone next door can probably hear you. You probably routinely lock the doors and close the windows when you leave, and you don't give the keys to just anyone. If a stranger shows up at the door, you don't invite him inside until you have made some discriminating judgments about his intentions. If you're approached by a salesperson, you don't start handing him money until you've decided whether he's legitimate and his product or service is reliable and desirable. These are the same kinds of judgments that you must make when browsing the World Wide Web on the Internet and deciding whether the information you encounter and the messages you receive are helpful or harmful.
Today's Internet evolved from a 1960s project that was designed to allow scientists and researchers to share ideas and resources via computer technology. The element of trust was key to the endeavor, shaping many of the practices, procedures, and technologies that are still in place today. As the Internet has become a global forum for communications and commerce, relying principally on trust has proven to be inadequate. Today's users must treat the Internet with the same wariness and caution they would carry into any unknown environment. While the Internet superhighway still has many sharp bends, and occasional accidents, today's users can safely journey through those hazards when they apply the types of cautions they already know and use in everyday life.
Source: Global Issues. An Electronic Journal of
the US Department of State, 2003.
Size: 4,404 characters with spaces.