- •Language work: Articles
- •Listening
- •What can computers do?
- •Language work: The Present Simple Passive
- •Living with computers
- •Other applications
- •In pairs, discuss the elements of a simple computer system.
- •Read the text, translate it and get ready to do the exercises after the text.
- •Unit 3 Types of computer system reading material
- •Study in the table the details of different types of computer.
- •Find the answers to these questions. Which type of computer is:
- •From mainframes to wearable computers
- •Language work: Comparison
- •Aids to communication
- •Problem-solving
- •Writing
- •Language work: Compound Adjectives
- •Wearable computers, aren’t they chic?
- •Inside the system reading material
- •What's inside a pc system?
- •Language work: Relative Clauses
- •Vocabulary quiz
- •Processors and memory.
- •Your ideal computer system
- •Unit 5 units of memory reading material
- •Bits - basic units of memory
- •Bytes and characters
- •The ascii code
- •Kilobytes, megabytes and gigabytes
- •Word building
- •Bits for pictures
- •Buying a computer.
- •Input devices-1 reading material
- •Work in pairs.
- •About the keyboard
- •The mouse
- •Voice input
- •Input devices-2 reading material
- •Word building
- •Language work: Instructions and Advice
- •Unit 10 magnetic drives
- •Technical details
- •World building
- •What are the advantages and disadvantages of optical disks?
- •Read the text to check your answer.
- •Connectors and modifiers
- •Products available
- •Iomega's removable drives
- •Unit 12 operatung systems and database sytems reading material
- •What is the function of os?
- •How many parts does it consist of?
- •Operating Systems
- •Language work: Countable and Uncountable Nouns
- •Systems Programs and Databases
- •Writing
- •Unit 13 The Graphical User Interface reading material
- •Language work: The Passive Voice (Present, Past)
- •Writing
- •Graphics and design
- •Writing
- •Unit 14 Word-processing facilities reading material
- •Word-processing facilities
- •Language Work: -ing forms
- •Unit 15 Databases reading material
- •Basic features of database programs
- •Unit 16 faces of the internet
- •Internet software
- •Irc, audio and video chatting
- •Unit 17 Programming languages reading material
- •Algorithm
- •Flowchat
- •Programming languages
- •Language work: Infinitive constructions.
- •Make a list of as many computer languages as you can think of.
- •Language work: The passive
- •A short description of Visual Basic
- •What is Java?
- •Language work: The Past Simple
- •Read the text and do the following exercises.
- •Support
- •Charles Graham
- •Language work: Past Activities.
- •Animator
- •Video game creator
- •Network security administrator
- •Webmaster
- •Unit 20 Electronic communications reading material
- •How can a pc be connected to another computer?
- •What data communication systems can you think of? Make a list.
- •Channels of communication
- •Word building: Prefixes
- •If you are not sure, look them up in a dictionary.
- •Unit 21
- •Internet issues reading material
- •Security and privacy on the Internet
- •Security on the Web
- •Network security
- •Virus protection
- •Preventative tips
- •Internet security
- •Internet crime
- •Hackers!
- •Language work: The Past Simple (revision)
- •Unit 22 laNs and waNs reading material
- •Network configurations
- •Language work: Predicting Consequences
- •WaNs and worldwide communications
- •Read the following text.
- •Mobile phones: definition and technology
- •A brief history
- •Features and functions
Hackers!
Sept ‘70 John Draper, also known as Captain Crunch, discovers that the penny whistle offered in boxes of Cap'n Crunch breakfast cereal perfectly generates the 2,600 cycles per second (Hz) signal that AT&T used to control its phone network at the time. He starts to make free calls.
Aug ‘74 Kevin Mitnick, a legend among hackers, begins his career, hacking into banking networks and destroying data, altering credit reports of his enemies, and disconnecting the phone lines of celebrities. His most famous exploit – hacking into the North American Defense Command in Colorado Springs – inspired War Games, the 1983 movie.
Jul ’81 Ian Murphy, a 23-year-old known as Captain Zap on the networks, gains instant notoriety when he hacks into the White House and the Pentagon.
Dec ’87 IBM international network is paralysed by hacker's Christmas message.
Jul ’88 Union Bank of Switzerland 'almost' loses £32 million to hacker
criminals. Nicholas Whitely is arrested in connection with virus propagation.
Oct ’89 Fifteen-year-old hacker cracks US defence computer.
Nov ’90 Hong Kong introduces anti-hacking legislation.
Aug ’91 Israelis arrest 18-year-old for hacking foreign banking and credit card networks.
Dec ’92 Kevin Poulsen, known as 'Dark Dante' on the networks, is charged with stealing tasking orders relating to an Air Force military exercise. He is accused of theft of US national secrets and faces up to 10 years in jail.
Feb ‘97 German Chaos Computer Club shows on TV the way to electronically obtain money from bank accounts using a special program on the Web.
May ’99 Computer criminals propagate a lot of viruses through the Internet.
Feb ’00 A massive 'denial of service’ attack is launched against websites like Yahoo, Amazon and eBay.
Aug ’01 'Code Red' computer worm infects many PCs through the Internet.
Ex. 1. Answer the following questions.
-
Which hacking case inspired the film War Games?
-
Why was Nicholas Whitely arrested in 1988?
-
How old was the hacker that cracked the US defence computer in October 1989?
-
Who was known as 'Dark Dante' on the networks? What was he accused of?
-
Which computer club showed on TV a way to attack bank accounts?
-
What type of virus infected thousands of PCs in 2001?
Language work: The Past Simple (revision)
Ex. 1. . Look at the text C again and put the verbs into the past.
Example In September 1970, John Draper discovered that the penny whistle ... generated … He started to make free calls.
Ex. 2. . Put each verb given into either Past simple or Past continuous.
-
They (visit) cybercafé very often last week.
-
He (have) a bath when the phone rang.
-
He suddenly realized that he (travel) in the wrong direction.
-
He (talk) to people over the Internet at 8 o’clock yesterday.
-
You looked very busy when I saw you last night. What you (do)?
-
The boys (play) computer games when they (hear) their father’s steps. They immediately (switch) off the computer and (take) out their text-books.
-
When I (hear) the knock I (go) to the door and (open) it, but I (not recognize) him at first because he (wear) dark glasses.
-
A private e-mail account (cost) £10 a month last year.
Task 1. a) Look at the list of cybercrimes. Discuss these questions in small groups.
Crimes on the Internet
-
Virus propagation
-
Software piracy
-
Stealing data and passwords by using a sniffer program
-
IP spoofing (making one computer look like another to gain unauthorized access)
-
Fraudulent use of credit card numbers
-
Child pornography
-
Violence and racist propaganda
b) Discuss these questions in small groups.
1. What type of crime is more dangerous?
2. What measures can be taken by governments against computer crime?
3. Personal information - address, salary, civil and criminal records - is usually kept or sold by governments and industries in electronic databases. Is personal privacy in danger?
4. Is it right to put restrictions on the contents of the Internet?
Task. 2. Write a summary of the discussion. Then present your view to the rest of the class.