- •Організація самостійної роботи з англійської мови в навчальному закладі і-іі ступенів акредитації
- •III Semester Lesson 1 Інтернаціоналізми
- •3. Дайте відповідь на питання:
- •Конверсія
- •2. Дайте відповідь на питання:
- •Lesson 2 Скорочення
- •Робота зі словником
- •1. Read and translate the text:
- •2. Give Ukrainian equivalents to the following:
- •I. Translate the sentences paying attention to the Modal Verbs.
- •II. Translate the following sentences into Ukrainian paying attention to the Modal Verbs.
- •III. Translate into Ukrainian paying attention to the Modal Verbs.
- •IV. Translate the sentences into Ukrainian, write the figures in words.
- •V. Write the following in words:
- •VI. Translate the sentences paying attention to the words in bold type:
- •VII. Render from English into Ukrainian.
- •VIII. Title the text in the Ex. VII.
- •I. Translate into Ukrainian paying attention to the Predicates.
- •II. Put the verbs in brackets in the correct tense form, state the type of Predicates and translate the sentences into Ukrainian.
- •III. Translate the following sentences into Ukrainian paying attention to the function of the word with suffixes-ed and-ing
- •IV. Put the verbs in brackets in the required forms of the Tense and Voice and translate into Ukrainian.
- •V. Translate the following word-combinations into Ukrainian.
- •VI. Translate the following word-combinations into Ukrainian.
- •1. Read and translate the text
- •3. Answer the following questions;
- •1. Read and translate the text: more about laboratories
- •VIII. Form words of opposite meaning by adding suffixes or prefixes to the following words.
- •I. State the tense and type of Predicates and translate the sentences into Ukrainian.
- •II. Put the Verbs in the brackets in the required forms of the Tense and translate the sentences into Ukrainian.
- •III. State the functions of the words ending-ed and translate the sentences into Ukrainian.
- •IV. Put the Verbs in the brackets in the required tense form and translate the sentences into Ukrainian.
- •XI. Express the main idea of the text ( ex. VI) in one sentence. Translate the following word-combinations into Ukrainian
- •IV Semester
- •1. Read and translate the text:
- •I. Comprehension questions:
- •Revision exersices
- •I.Changethe following sentences from Active into Passive Voice
- •II. Use the Present Indefinite Passive. Mind the place of the Preposition in the sentences. Translate the sentences:
- •III. Translate the following sentences into Ukrainian paying attention to the Predicate in the Present, Past, Future Perfect Passive Voice
- •IV. Put the Verbs in brackets in the required tense form and translate the sentences into Ukrainian.
- •V. Translate the following sentences into Ukrainian paying attention to the meaning word "time":
- •VI. Translate the following sentences paying attention to the different meanings of the word "number"
- •VII. Render from English into Ukrainian
- •1. Read and translate the text:
- •2. Read b opposite. What problem do these sentences refer to?
- •The Future of Telecommunications
- •V Semester Lesson 1
- •Internet security
- •Internet crime
- •Malware: viruses, worms, trojans and spyware (b)
- •1 Identify the Internet crimes sentences (1-6) refer to. Then match them with the advice below (a-f).
- •2 Fill in the gaps in these security tips with words from the box.
- •Mobile phones: definition and technology
- •1. Complete this text about basic principles of mobile telephony with words from a opposite.
- •2. Read b opposite and decide if these sentences are True or False. If they are false, correct them.
- •Environmental Pollution
- •2. Find Ukrainian equivalents to the following word combinations:
- •3. Answer the questions:
- •Engineering Profession. Institute of Civil and Environmental Engineering.
- •II. Give Ukrainian equivalents to the following word combinations
- •2. Find English equivalents to the following word combinations:
- •2. Find English equivalents to the following word combinations:
- •3. Answer the questions:
- •1. Read and translate the text
- •Operating systems
- •II. Give Ukrainian equivalents to the following word combinations:
- •III. Answer the following questions
- •The automatic control system .
- •I. Translate the following sentences into Ukrainian paying attention to the Predicates in the Passive voice.
- •II. Translate the following sentences into Ukrainian paying attention to the Predicate in the Passive Voice.
- •Ill.Translate the following sentences into Ukrainian paying attention to the Predicates.
- •IV. Translate (he following sentences paying attention to the Tense and Voice of the Predicates.
- •V. Use the Future Indefinite Active or Passive
- •VI. Guess the meaning of international words.
- •VII. Translate the following international words into Ukrainian.
- •VIII. Render from English into Ukrainian and title.
- •XI. Arrange the following words according to:
- •X. Translate the following word-combinations
- •1. Read and translate the text:
- •1. Read and translate the text:
- •Video, animations and sound (c)
- •1. Complete this advice about web design with words from b opposite.
- •2. Look at c opposite. Match the sentence beginnings with the correct endings.
- •1. Read and translate the text:
- •Video and voice calls (c)
- •Virtual Worlds.
- •II. Solve the clues and complete the puzzle with words from the opposite page.
- •II. Complete the sentences below with words from the box.
- •III. There are certain netiquette rules you should follow if you want to use chat rooms and other communication environments correctly. Next time you enter a chat room, keep them in mind.
- •I. Read and translate the text:
- •1. Solve the clues and complete the puzzle with words from the opposite page.
- •2. Complete these instructions about how to navigate with the words in the box
- •3. What are the main parts of this url? How would you say the url?
- •I. Read and translate the text.
- •II. Complete the article with words from the text
- •III. Complete the extracts with words the text
- •III. Make a list of other uses of ribits at home and at work.
- •VI Semester
- •I. Read and translate the text:
- •II. Give equivalents to the following word combinations.
- •III. Answer the following questions:
- •1. Read and translate the text.
- •2. Mind the following words and word-combination:
- •3. Answer the following questions:
- •1. Read and translate the text:
- •2. Mind the following words and word-combination:
- •3. Answer the following questions.
- •1. Read and translate the text:
- •1. Read a opposite. Choose a term from this word web to complete the sentences below.
- •2. Complete this product description with words: cd, cd-rom, cd-r, cd-rw, dvd, dvd-rom, dvd-r, dvd-rw, Portable dvd players, multi-format playback, headphones.
- •1. Read and translate the text:
- •3. What jobs in a opposite are being offered in these advertisements?
- •2. The successful candidate will be responsible for maintaining logical and physical database models as well as managing the database.
- •3. Answer the following questions:
- •2. Mind the following words and word-combination:
- •3. Answer the following questions.
- •2. Match the terms from a opposite with their definitions.
- •Internet: Voice recognition takes off
- •1. Read and translate the text:
- •2. Mind the following words and word-combination:
- •3. Answer the following questions.
- •1. Read and translate the text:
- •Intelligent Homes.
- •1. Read and translate the text:
- •2. Mind the following words and word-combination:
- •3. Answer the following questions
1 Identify the Internet crimes sentences (1-6) refer to. Then match them with the advice below (a-f).
Crackers try to find a way to copy the latest game or computer program.
A study has revealed that half a million people will automatically open an email they believe to be from their bank and happily send off all their security details.
This software's danger is hidden behind an attractive appearance. That's why it is often wrapped in attractive packages promising photos of celebrities like Anna Kournikova or Jennifer Lopez.
There is a particular danger in Internet commerce and emails. Many people believe they have been offered a special gift only to find out later they have been deceived.
'Nimda' spreads by sending infected emails and is also able to infect websites, so when a user visits a compromised website, the browser can infect the computer.
Every day, millions of children spend time in Internet chat rooms talking to strangers. But what many of them don't realize is that some of the surfers chatting with them may be sexual predators.
a People shouldn't buy cracked software or download music illegally from the Internet,
b Be suspicious of wonderful offers. Don't buy if you aren't sure,
c It's dangerous to give personal information to people you contact in chat rooms,
d Don't open attachments from people you don't know even if the subject looks
attractive,
e Scan your email and be careful about which websites you visit,
f Check with your bank before sending information.
2 Fill in the gaps in these security tips with words from the box.
digital certificate malware virus scanner spyware firewall antivirus
Malicious software, (1)………………….., can be avoided by following some basic rules.
Internet users who like cybershopping should get a (2)……………………, an electronic identity card.
To prevent crackers from breaking into your internal network and obtaining your data, install a (3) …………….. . It will protect you from (4) ……………. .
If you have been hit by a (5) ………………… , don’t panic! Download a clean-up utility and always remember to use an (6) ……………….. program, for example, a virus (7) …………………. .
Internet
users vsho like cybershoppina
should
cjet a (Z)
,
an
electronic
identity
card.
If
you have been hit by a
(5) ,
don't
panic!
Download
a clean-up utility and always remember to use an
(Q proaram,
for
example,
a
Mobile phones
Mobile phones: definition and technology
Mobile phones, or cellular phones, are devices that enable communication to all types of telephones while moving over a wide area called the coverage area.
The term 'cellular' comes from the fact that the phone calls are made through base stations, communication towers or antennas, which divide the coverage area into cells. As you move from cell to cell, the calls are transferred to different base stations belonging to the same or a different telephone company. This capability of mobile phones is called roaming. The phone is said to be out of range when it cannot communicate with a base station.
A brief history
• 1G, First Generation phones started in the 1980s when Motorola introduced the first hand-held phones. They used analogue technology and the main drawback was the small number of channels that could be used at a time.
• In the 1990s, 2G mobiles introduced digital transmission methods that converted voice into
binary information, increasing the number of channels, the speed of transmission between
the phone and the base station and enabling a reduction in size. The most common standard,
GSM, Global System for Mobile communications, started to be used at this stage. One of
the features of this technology is the use of SIM cards, a type of smart card that contains the
user's information, the connection data and the phonebook. It also enables the user to change
service provider without changing the handset.
• 3G phones offer a high-speed data transfer capability. Some of these phones are called smart
phones and combine PDA capabilities with the usual functions of a digital phone. The new
communication standard, UMTS, Universal Mobile Telecommunications System, enables the multimedia transmissions that are becoming common nowadays.
• New standards are being developed that will open the way to new 4G phones with an
emphasis on multimedia, real-time television and radio.