Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Методичка Английский.doc
Скачиваний:
6
Добавлен:
10.11.2019
Размер:
962.05 Кб
Скачать

VII. Make your plan to the text.

VIII. Imagine! You are the participant of the international conference "Viruses". Choose one of the types of viruses. Tell about them and about programs which help to destroy this type of viruses.

Tests Module II Variant 1 I. Match the definitions and the words.

1. simultaneous

a)

a machine that shows and records

2. access

the amount of money received for

3. versatile

each things tliat is sold.

4, encode

b)

to change information into a form

5. to log in

that can be processed by a

6. register

computer.

7. erasable

0

happening or done at the same

8. victim

time as stli else.

9. to intercept

d)

unkind and making you feel upset

10. hurtful

and offended.

e)

having many different things.

n

to open a computer file in order to get or add information.

g)

to stop sb or sth that is going from one place to another from arriving.

h)

to perform actions that allow you to begin using a computer system.

i)

something that сад be destroyed,

J)

a person or tiling who has been

I

attacked or injured.

II. Match sentences on the left with the suitable one on the right.

1. The number of host computers can

a

) to the expensive and unreliable

be counted fairly accurately,

telecommunication systems of these

2. In many developing countries Йк

countries.

III. Complete the passages using the words.

According to the habitat all viruses can be divided into four large groups.

File viruses. These viruses were most before appearance of the

Internet. Today the programs infect all types of objects of any

system. In case with Windows files, drivers, executable files,

dynamic libraries, etc, are in danger. At first virus writes down its code in a file - victim. As a result of this when the operating system addresses to it the control is transferred to the virus code, which can execute any actions set to it

by a creator (to load into the memory, to infect other programs, etc.)

That's why if there is no software on the user's computer, he can't guess

about infection for a long time.

Words: main, widespread, executable, special, operating, harmful, batch.