- •Учебное пособие
- •My future profession
- •Look at these job advertisements. Which of them would interest you? Why?
- •Then please ring Paul a. Lawrence on 266407 or write to him at
- •Ring 45326.
- •Vocabulary List
- •Personnel Officer – руководитель отдела кадров
- •Use these clues to help you fill in the puzzle and find the hidden word. You can find all the words in the newspaper advertisements.
- •This is a questionnaire (анкета, опросный лист) for applicants. Answer the following questions:
- •How long were you in your last job?
- •Here are some thoughts of a student about his future profession. Read the text and answer the following questions:
- •Vocabulary List
- •Hobby, addiction, or future job?
- •Look through the text and divide it into logical parts. Say: What do they deal with?
- •Computer studies?
- •Vocabulary List
- •Retell the last 2 paragraphs in the reported speech.
- •Can you confess to being an information junky. How many hours a day do you spend on the Internet?
- •Output data 7
- •Vocabulary List
- •Text III
- •To your health
- •Vocabulary List eyestrain – зрительное напряжение
- •Find in the text equivalents to:
- •Fill in the table:
- •A) Translate the following recommendations. B) Give your recommendations how to cope.
- •Related Reading
- •Skim over the texts and say: What are they about?
- •Choose the text which interests you, read it and give the summary of the text. Masters of invention
- •All the news that fit to click
- •Look through the text and divide it into logical parts. Say: What do they deal with?
- •Read the text and find out if these statements correspond to the content of the text:
- •Prehistory
- •Vocabulary List
- •Look through the text and divide it into logical parts. Say: What do they deal with?
- •Read the text and find out how many stages there were in the development of computers. Complete the table containing some information about the development of computers.
- •The development of computers
- •Vocabulary List
- •True or false? Express your opinion.
- •Text III
- •Babbage's dream come true
- •Vocabulary List
- •Complete the table:
- •Translate into English
- •Related Reading
- •1. Look through the text and divide it into logical parts. Say: What do they deal with?
- •2. Answer the following questions:
- •Billion dollar brain
- •Vocabulary List
- •Topics to discuss
- •Personal computer Prereading Discussion
- •Look through the text and answer the questions.
- •Personal computer
- •Vocabulary List
- •Give the summary of the text.
- •Make up the topic “ The computers we use at the university”.
- •4. Topic to discuss.
- •Text II
- •Read the text and answer the following questions:
- •What is a computer?
- •Vocabulary List
- •Which of the listed above statements are true/ false. Specify your answer using the text.
- •Match the following:
- •Text III
- •Read the text and answer the following questions:
- •Hardware
- •Vocabulary List
- •Which of the listed below statements are true/ false. Specify your answer using the text.
- •Give definitions to the following using the vocabulary.
- •Which of the following is Hardware?
- •Match the following:
- •Discuss in groups:
- •Text IV
- •Read the text and answer the following questions:
- •Types of software
- •Vocabulary List
- •2. Which of the following is Software?
- •3. Which of the listed below statements are true/ false. Specify your answer using the text:
- •4. Find English equivalents in the text:
- •5. Give definitions to the following using the vocabulary:
- •6. Discuss in groups:
- •Operating systems Prereading Discussion
- •Read the text and answer the following questions:
- •Operating systems
- •Vocabulary List
- •Match the following:
- •Which of the listed below statements are true or false? Specify your answer using the text.
- •Translate into English:
- •5. Discuss the following in groups:
- •Text II
- •1. Read the text and answer the following questions:
- •Windows 95
- •Vocabulary List
- •2. Which of the listed above statements are true/false. Specify your answer using the text.
- •Find the equivalents in the text:
- •What is:
- •Discuss in groups:
- •The internet Prereading Discussion
- •Read the text and answer the following questions:
- •The internet
- •Vocabulary List
- •Match the phrases with their Russian equivalents:
- •Find English equivalents to the following phrases:
- •Translate the following sentences into English:
- •Express your opinion to the following statements:
- •Text II
- •1. Read the text and answer the following questions:
- •The www and the internet
- •Vocabulary List World Wide Web- “Всемирная Паутина”
- •2. Which of the listed below statements are true/ false. Specify your answer using the text.
- •3. Define the following using the vocabulary:
- •Find the equivalents:
- •5. Match the following:
- •6. Discuss in groups:
- •Text III
- •1. Read the text and answer the following questions:
- •The language of e-mail
- •Vocabulary List
- •3. Write a summary of the text. Include only the information, ignore any extra remarks. Write in a neutral rather than an informal style.
- •7. Match these smileys to their meanings listed below:
- •Discuss:
- •Computer and crime Prereading Discussion
- •Skim over the text and say: What is it about?
- •Read the text and find out if these statements correspond to the content of the text:
- •The first hackers
- •Vocabulary List
- •Text II
- •Computer crimes
- •Vocabulary List
- •Find in the text the English equivalents to:
- •Analyze the underlined grammar constructions.
- •True or false?
- •Construct other sentences in these patterns (transitional expressions):
- •Text III Prereading Discussion
- •How many generations of hackers have there been?
- •Read the text and find out if these statements correspond to the content of the text:
- •Hackers of today
- •Vocabulary List
- •Analyze the underlined grammar constructions.
- •Translate into English. Хакеры: плохие или хорошие?
- •What is your opinion of hackers? Have you ever tried to break into else’s computer?
- •Viruses and vaccines Prereading Discussion
- •Read the articles from a newspaper and try to select the questions to the texts given below:
- •Vocabulary List
- •Analyze the underlined grammar constructions. Explain their use.
- •Give a short answer to each question. Text II.
- •Look through the text and divide it into logical parts. Say: What do they deal with?
- •Read the text and answer the following questions:
- •Viruses and vaccines
- •Vocabulary List
- •Give a summary of the text.
- •A) Translate the following advices into English: Если вы используете компьютер в своем бизнесе, то вы должны иметь антивирусные программы и обновлять их постоянно.
- •Express your opinion to the statements:
- •Text III
- •Read the article from The Observer and find out if these statements correspond to the content of the text:
- •Viruses infect one email in every 300
- •Vocabulary List
- •Oa programmers
- •Oa программистов
- •Список использованной литературы
-
Read the text and answer the following questions:
-
What is Internet?
-
How did it start / appear?
-
How many Internet users are there in the world?
-
What is the path of the information sent over Internet?
-
What is the most popular Internet service?
-
Are Internet services expensive?
-
Why is it possible to intercept or even change the data, while they are travelling to the point of their destination?
-
Is the information sent over Internet coded?
-
What can be done with the help of Internet?
The internet
The Internet, a global computer network which embraces millions of users all over the world, began in the United States in 1969 as a military experiment. It was designed to survive a nuclear war. Information sent over the Internet takes the shortest path available from one computer to another. Because of this, any two computers of the Internet will be able to stay in touch with each other as long as there is a single route between them. This technology is called packet switching. Owing to this technology, if some computers on the network are knocked out (by a nuclear explosion, for example), information will just route around them. One such packet-switching network already survived a war. It was the Iraqi computer network which was not knocked out during the Gulf War.
Most of the Internet host computers (more than 50 %) are in the United States, while the rest are located in more than 100 other countries. Although the number of host computers can be counted fairly accurately, nobody knows exactly how many people use the Internet, there are millions, and their number is growing by thousands each month worldwide.
The most popular Internet service is e-mail. Most of the people, who have access to the Internet, use the network only for sending and receiving e-mail messages. However, other popular services are available on the Internet: reading USENET News, using the World- Wide Web, telnet, FTP, and Gopher.
In many developing countries the Internet may provide businessmen with a reliable alternative to the expensive and unreliable telecommunications systems of these countries. Commercial users can communicate over the Internet with the rest of the world and can do it very cheaply. When they send e-mail messages, they only have to pay for phone calls to their local service providers, not for calls across their countries or around the world. But who actually pays for sending e-mail messages over the Internet long distances, around the world? The answer is very simple: an user pays he/ her service provider a monthly or hourly fee. Part of this fee goes towards its costs to connect to a larger service provider. And part of the fee got by the larger provider goes to cover its cost of running a worldwide network of wires and wireless stations.
But saving money is only the first step. If people see that they can make money from the Internet, commercial use of this network will drastically increase. For example, some western architecture companies and garment centers already transmit their basic designs and concepts over the Internet into China, where they are reworked and refined by skilled- but inexpensive- Chinese computer –aided-design specialists.
However, some problems remain. The most important is security. When you send an e-mail message to somebody, this message can travel through many different networks and computers. The data is constantly being directed towards its destination by special computers called routers. Because of this, it is possible to get into any of computers along the route, intercept and even change the data being sent over the Internet. In spite of the fact that there are many strong encoding programs available, nearly all the information being sent over the Internet is transmitted without any form of encoding, i.e. “in the clear”. But when it becomes necessary to send important information over the network, these encoding programs may be useful. Some American banks and companies even conduct transactions over the Internet. However, there are still both commercial and technical problems which will take time to be resolved.