- •Contents
- •Module 1
- •1. What is a Computer? Word List
- •III. Understanding words
- •IV. Content review
- •V. Translate the sentences from Ukrainian into English using new vocabulary.
- •VI. Discussion.
- •2. Types of Computer Word list
- •"Types of computer"
- •III. Match types of computer with their definitions.
- •IV. Understanding
- •V. Choose the correct adjective. Then fill in the gaps with the correct form of the adjective.
- •VI. Translate from Ukrainian into English.
- •VII. Make up dialogue between a shop assistant and a customer.
- •VIII. Prepare a report about ibm pc and Apple Macintosh (Mac).
- •3. Early Computing Machines and Inventors Word list
- •Exercises
- •I Match words with definitions
- •II Sequencing of events
- •IV. Understanding the text
- •V. Categorization
- •VI. Make the degrees of comparisons of adjectives and adverbs from the exercise V.
- •VIII. Make up questions to the text.
- •IX. Imagine! You are the guide at the Computer History Museum.
- •4. Five Generations of Modern Computers Word list
- •First Generation (1945-1956)
- •Fourth Generation (1971-Present)
- •III. Locating information
- •V. Replace the pronouns with the corresponding nouns.
- •VI. Give the main characters of the computers of each generation.
- •5. The Parts of Computer Word list
- •IV. Understanding the text
- •V. Replace the pronouns with the corresponding nouns.
- •VI. Make up questions to the text.
- •VII. Translate the following sentences from Ukrainian into English.
- •VIII. Retell the text using exercise VI as a plan.
- •6. The Central Processing Unit Word list
- •I. Main idea
- •II. Understanding the passage
- •III. Locating information
- •V. Understanding words
- •VI. Word forms
- •VII. Content review
- •7. Types of Hardware Word list
- •Hardware
- •III. Complete the passages using the words.
- •Module 1 Variant 2
- •III. Complete the passages using the words.
- •IV. Choose the appropriate form of the words to complete the sentences.
- •Module 1 Variant 3
- •III. Complete the passages using the words.
- •Module 2
- •1. Types of Software Word List
- •I. Main idea
- •Types of software
- •IV. Which of the listed below statements are true/false.
- •V. Find English equivalents in the text:
- •VI. Give definitions to the following using the vocabulary:
- •2. Operating Systems Word List
- •IV. Complete the following sentences using information given in the text
- •VI. Answer the questions
- •3. Linux Text a
- •Exercise
- •1. Find equivalents
- •Exercises
- •I. Answer the following questions:
- •II. Understanding words
- •III. Complete the sentences with the words given bellow:
- •Why use Linux? Word list
- •Advantages of Using Linux
- •Retell these texts using your plan.
- •II. Understanding the passage
- •IV. Contextual reference
- •V. Understanding words
- •VI. Word forms
- •5. Memory Word list
- •Exercises
- •I. Find in the text adjectives which are used with the following nouns. Translate the word combinations.
- •II. Fill in the gaps with the appropriative words.
- •Find the passive constructions in the 4th and 5"' paragraphs and put them into past and future forms.
- •Give the main idea of the text in one sentence.
- •V. Decide whether the following statements are true or false.
- •VI. Translate from Ukrainian into English.
- •6. Internet Word List
- •II. Read the text "Internet"
- •IV. Find in the text Passive Constructions and make them Present, Past or Future Simple Passive
- •V. Change the following sentences into Passive Voice
- •VI. Understanding the text
- •VII. Translate the sentences from Ukrainian into English
- •VIII. Give the definitions of the following words
- •IX. Retell the text using sentences of exercise VI as a plan.
- •7. Viruses Word List
- •I. Refer back to the text and find synonyms for the following words
- •II. Name the words using the definitions
- •VII. Make your plan to the text.
- •III. Complete the passages using the words.
- •VI. Choose the appropriate form of the words to complete the sentences.
- •III. Complete the passages using the words.
- •IV. Choose the appropriate form of the words to complete the sentences.
- •III. Complete the passages using the words.
- •3. Nanorobots
- •4. Types of Networks. Neural Networks.
- •5. Artificial Intelligence
- •6. Digit that Means Nothing
- •7. Types of Error
- •9. Mineral Industry Software
- •10. Advantages of Electronic Detonator Application
VII. Make your plan to the text.
VIII. Imagine! You are the participant of the international conference "Viruses". Choose one of the types of viruses. Tell about them and about programs which help to destroy this type of viruses.
Tests Module II Variant 1 I. Match the definitions and the words.
1. simultaneous |
a) |
a machine that shows and records |
|
|
2. access |
|
the amount of money received for |
|
|
3. versatile |
|
each things tliat is sold. |
|
|
4, encode |
b) |
to change information into a form |
|
|
5. to log in |
|
that can be processed by a |
|
|
6. register |
|
computer. |
|
|
7. erasable |
0 |
happening or done at the same |
|
|
8. victim |
|
time as stli else. |
|
|
9. to intercept |
d) |
unkind and making you feel upset |
|
|
10. hurtful |
|
and offended. |
|
|
|
e) |
having many different things. |
|
|
|
n |
to open a computer file in order to get or add information. |
|
|
|
g) |
to stop sb or sth that is going from one place to another from arriving. |
|
|
|
h) |
to perform actions that allow you to begin using a computer system. |
|
|
|
i) |
something that сад be destroyed, |
|
|
|
J) |
a person or tiling who has been |
|
|
I |
attacked or injured. |
|
||
II. Match sentences on the left with the suitable one on the right. |
|
|||
1. The number of host computers can |
a |
) to the expensive and unreliable |
||
be counted fairly accurately, |
|
telecommunication systems of these |
||
2. In many developing countries Йк |
|
|
countries. |
|
III. Complete the passages using the words.
According to the habitat all viruses can be divided into four large groups.
File viruses. These viruses were most before appearance of the
Internet. Today the programs infect all types of objects of any
system. In case with Windows files, drivers, executable files,
dynamic libraries, etc, are in danger. At first virus writes down its code in a file - victim. As a result of this when the operating system addresses to it the control is transferred to the virus code, which can execute any actions set to it
by a creator (to load into the memory, to infect other programs, etc.)
That's why if there is no software on the user's computer, he can't guess
about infection for a long time.
Words: main, widespread, executable, special, operating, harmful, batch.