- •Language work: Articles
- •Listening
- •What can computers do?
- •Language work: The Present Simple Passive
- •Living with computers
- •Other applications
- •In pairs, discuss the elements of a simple computer system.
- •Read the text, translate it and get ready to do the exercises after the text.
- •Unit 3 Types of computer system reading material
- •Study in the table the details of different types of computer.
- •Find the answers to these questions. Which type of computer is:
- •From mainframes to wearable computers
- •Language work: Comparison
- •Aids to communication
- •Problem-solving
- •Writing
- •Language work: Compound Adjectives
- •Wearable computers, aren’t they chic?
- •Inside the system reading material
- •What's inside a pc system?
- •Language work: Relative Clauses
- •Vocabulary quiz
- •Processors and memory.
- •Your ideal computer system
- •Unit 5 units of memory reading material
- •Bits - basic units of memory
- •Bytes and characters
- •The ascii code
- •Kilobytes, megabytes and gigabytes
- •Word building
- •Bits for pictures
- •Buying a computer.
- •Input devices-1 reading material
- •Work in pairs.
- •About the keyboard
- •The mouse
- •Voice input
- •Input devices-2 reading material
- •Word building
- •Language work: Instructions and Advice
- •Unit 10 magnetic drives
- •Technical details
- •World building
- •What are the advantages and disadvantages of optical disks?
- •Read the text to check your answer.
- •Connectors and modifiers
- •Products available
- •Iomega's removable drives
- •Unit 12 operatung systems and database sytems reading material
- •What is the function of os?
- •How many parts does it consist of?
- •Operating Systems
- •Language work: Countable and Uncountable Nouns
- •Systems Programs and Databases
- •Writing
- •Unit 13 The Graphical User Interface reading material
- •Language work: The Passive Voice (Present, Past)
- •Writing
- •Graphics and design
- •Writing
- •Unit 14 Word-processing facilities reading material
- •Word-processing facilities
- •Language Work: -ing forms
- •Unit 15 Databases reading material
- •Basic features of database programs
- •Unit 16 faces of the internet
- •Internet software
- •Irc, audio and video chatting
- •Unit 17 Programming languages reading material
- •Algorithm
- •Flowchat
- •Programming languages
- •Language work: Infinitive constructions.
- •Make a list of as many computer languages as you can think of.
- •Language work: The passive
- •A short description of Visual Basic
- •What is Java?
- •Language work: The Past Simple
- •Read the text and do the following exercises.
- •Support
- •Charles Graham
- •Language work: Past Activities.
- •Animator
- •Video game creator
- •Network security administrator
- •Webmaster
- •Unit 20 Electronic communications reading material
- •How can a pc be connected to another computer?
- •What data communication systems can you think of? Make a list.
- •Channels of communication
- •Word building: Prefixes
- •If you are not sure, look them up in a dictionary.
- •Unit 21
- •Internet issues reading material
- •Security and privacy on the Internet
- •Security on the Web
- •Network security
- •Virus protection
- •Preventative tips
- •Internet security
- •Internet crime
- •Hackers!
- •Language work: The Past Simple (revision)
- •Unit 22 laNs and waNs reading material
- •Network configurations
- •Language work: Predicting Consequences
- •WaNs and worldwide communications
- •Read the following text.
- •Mobile phones: definition and technology
- •A brief history
- •Features and functions
Preventative tips
Don’t open email attachments from unknown people; always take note of the file extension.
Run and update antivirus programs, e.g. virus scanners.
Install a firewall, a program designed to prevent spyware from gaining access to the internal network.
Make backup copies of your files regularly.
Don’t accept files from high-risk sources.
Use a digital certificate, an electronic way of proving your identity, when you are doing business on the Internet. Avoid giving credit card numbers.
Don’t believe everything you read on the Net. Have a suspicious attitude toward its contents.
Help box
|
Ex. 1. Find the answers to these questions.
-
Why is security so important on the Internet?
-
What security features are offered by Netscape Communicator and Internet Explorer?
-
What security standard is used by most banks to make online transactions secure?
-
How can we protect and keep our e-mail private?
-
What methods are used by companies to make internal networks secure?
-
Which ways can a virus enter a computer system?
Ex. 2. Complete these sentences by using a term from the text. Then write the words in the puzzle.
Users have to enter a p … to gain access to a network.
-
You can download a lot of f … or public domain programs from the net.
-
Hundreds of h … break into computer systems every year.
-
A computer v … can infect your files and corrupt your hard disk.
-
The process of encoding data so that unauthorized users can't read the data is known as e … .
-
A f … is a device which allows limited access to an internal network from the Internet.
-
You can include an a … as part of your e-mail message.
-
This company uses d … techniques to decode (or decipher) secret data.
Ex. 3. Fill in the gaps in these security tips with words from the box.
digital, certificate, malware, virus, scanner, spyware, firewall, antivirus |
-
Malicious software, (1) … , can be avoided by following some basic rules.
-
Internet users who like cybershopping should get a (2) … , an electronic identity card.
-
To prevent crackers from breaking into your internal network and obtaining your data, install a (3) … . It will protect you from (4) … .
-
If you have been hit by a (5) … , don’t panic! Download a clean-up utility and always remember to use on (6) … program, for example, a virus (7) ….
T E X T B
Task. Read the text and do the following exercises.