- •Английский язык
- •1 Terms to learn
- •2 Read the text Everyday uses of computers
- •3 Answer the questions.
- •1 Terms to learn
- •2 Read the text Types of Computer
- •3 Answer the questions.
- •1 Terms to learn
- •2 Read the text Parts of a computer
- •3 Answer the questions
- •1 Terms to learn
- •2 Read the text Keyboard and Mouse
- •3 Answer the questions
- •1 Terms to learn
- •2 Read the text
- •Interview: Student
- •3 Answer the following questions:
- •1 Terms to learn
- •2 Read the text
- •Input Devices
- •Optical input devices
- •3 Answer the following questions
- •1Terms to learn
- •2 Read the text Output devices
- •3 Answer the following questions.
- •1 Terms to learn
- •2 Read the text Storage devices
- •3 Answer the following questions.
- •Supplementary Reading
- •1Terms to learn
- •2 Read the text Graphical User Interface
- •3 Answer the following questions.
- •Unit 10
- •1 Terms to learn
- •2 Read the text Computing Support Assistant
- •3 Answer the following questions.
- •Unit 11
- •1 Words to know
- •2 Read the text Networks
- •3 Answer the following questions
- •Unit 12
- •1 Words to learn
- •2 Read the text Communications
- •3 Answer the following questions:
- •Unit 13
- •1 Words to know
- •2 Read the text The Internet 1: email and newsgroups
- •3 Answer the following questions
- •Unit 14
- •1 Words to know
- •2 Read the text
- •Internet 2: the World Wide Web
- •3 Answer the following questions:
- •Unit 15
- •1 Words to know
- •2 Read the text
- •Interview: Website Designer
- •3 Answer the following questions:
- •Unit 16
- •1 Terms to know
- •2 Read the text Word processing
- •3 Answer the following questions:
- •Test 10
- •Unit 17
- •1 Words to know
- •2 Read the text Databases and spreadsheets
- •3 Answer the following questions:
- •Unit 18
- •1 Words to know
- •2 Read the text Graphics and Multimedia
- •3 Answer the following questions:
- •Test 11
- •Unit 19
- •1 Words to know
- •2 Read the text Programming
- •3 Answer the following questions:
- •Unit 20
- •1 Words to know
- •2 Read the text
- •Interview: Analyst/Programmer
- •3 Answer the following questions:
- •Test 12
- •Unit 21
- •1 Words to know
- •2 Read the text Languages
- •3 Answer the following questions:
- •Unit 22
- •1 Words to know
- •2 Read the text
- •3 Answer the following questions:
- •Test 13
- •Unit 23
- •1 Words to know
- •2 Read the text Future Trends 1
- •3 Answer the following questions:
- •Test 14
- •Unit 24
- •1 Words to know
- •2 Read the text Future Trends 2
- •3 Answer the following questions:
- •Unit 25
- •1 Words to know
- •2 Read the text
- •Interview: it Manager
- •Unit 26
- •2 Read the text
- •Issues in computing
- •3 Answer the following questions:
- •Test 15
- •Unit 27
- •1 Words to know
- •2 Read the text Careers in computing
- •Unit 28
- •1 Words to know
- •2 Read the text
- •Interview: Systems Manager
- •3 Answer the following two questions:
- •Test 16
- •List of english-russian terms
- •Английский язык
Unit 26
1 Words to know
activate, v |
активизировать, активировать, приводить в действие, вызывать |
dormant, adj. |
нереализуемый; отложенный, дремлющий, спящий |
hacking, n |
хакерство |
pirating, n |
пиратство, пиратская деятельность |
prevention, n |
предупреждение |
virus, n |
(компьютерный) вирус |
anti-virus, n |
1) антивирус 2) противовирусный, антивирусный |
a backup system, n |
система создания копий |
security system, n |
система безопасности |
plastic swipe card, n |
пластиковая карточка |
bulletin board, n |
доска объявлений (напр. электронная) |
2 Read the text
Issues in computing
Because faults can develop in computer systems, it is important to keep copies of valuable data using a backup system. This is especially important in a network where many users are storing vast amounts of data. Networks also require security systems to control access. Login names and passwords are often used, but these may be combined with the use of plastic swipe cards containing a user identification number. Some computer systems use recognition systems that scan and identify characteristics of the user such as their fingerprints, facial features, voice, or eyes.
Computer crimes include:
hacking – unauthorized access to computer systems and tampering with other users’ data.
pirating, i.e. illegally copying and selling programs.
intentionally attempting to spread viruses.
Viruses are programs that have been written to make a computer behave in an unexpected and undesired way. Although they are often relatively harmless, they sometimes cause a lot of damage. They are usually designed to remain hidden and dormant until a particular time, or until the user performs a particular action, such as pressing a particular combination of keys. They can replicate themselves, and often attach themselves to other programs. It is common for a user to have a virus program on their disk without being aware of it.
Viruses can be found and removed by anti-virus programs, which scan disks and files looking for programming code that is known to belong to particular virus programs. When a piece of virus code is found, the virus can be identified, and an appropriate program run to delete the virus code from the disk or file. Plane text email messages cannot contain a virus, but viruses can be carried in email attachments, i.e. files attached to email messages. Some viruses are much more common than others and are often unknowingly downloaded from a network system such as the Internet. Care should be taken to check for viruses when using removable disks or when transferring files.
3 Answer the following questions:
1. Is it important to keep copies of valuable data using a backup system? Why?
2. Do networks require security systems to control access?
3. What computer crimes do you know?
4. What are viruses written for?
5. What is the principle of operation of anti-virus programs?
6. Can plane text email message contain a virus?