- •Учебное пособие
- •My future profession
- •Look at these job advertisements. Which of them would interest you? Why?
- •Then please ring Paul a. Lawrence on 266407 or write to him at
- •Ring 45326.
- •Vocabulary List
- •Personnel Officer – руководитель отдела кадров
- •Use these clues to help you fill in the puzzle and find the hidden word. You can find all the words in the newspaper advertisements.
- •This is a questionnaire (анкета, опросный лист) for applicants. Answer the following questions:
- •How long were you in your last job?
- •Here are some thoughts of a student about his future profession. Read the text and answer the following questions:
- •Vocabulary List
- •Hobby, addiction, or future job?
- •Look through the text and divide it into logical parts. Say: What do they deal with?
- •Computer studies?
- •Vocabulary List
- •Retell the last 2 paragraphs in the reported speech.
- •Can you confess to being an information junky. How many hours a day do you spend on the Internet?
- •Output data 7
- •Vocabulary List
- •Text III
- •To your health
- •Vocabulary List eyestrain – зрительное напряжение
- •Find in the text equivalents to:
- •Fill in the table:
- •A) Translate the following recommendations. B) Give your recommendations how to cope.
- •Related Reading
- •Skim over the texts and say: What are they about?
- •Choose the text which interests you, read it and give the summary of the text. Masters of invention
- •All the news that fit to click
- •Look through the text and divide it into logical parts. Say: What do they deal with?
- •Read the text and find out if these statements correspond to the content of the text:
- •Prehistory
- •Vocabulary List
- •Look through the text and divide it into logical parts. Say: What do they deal with?
- •Read the text and find out how many stages there were in the development of computers. Complete the table containing some information about the development of computers.
- •The development of computers
- •Vocabulary List
- •True or false? Express your opinion.
- •Text III
- •Babbage's dream come true
- •Vocabulary List
- •Complete the table:
- •Translate into English
- •Related Reading
- •1. Look through the text and divide it into logical parts. Say: What do they deal with?
- •2. Answer the following questions:
- •Billion dollar brain
- •Vocabulary List
- •Topics to discuss
- •Personal computer Prereading Discussion
- •Look through the text and answer the questions.
- •Personal computer
- •Vocabulary List
- •Give the summary of the text.
- •Make up the topic “ The computers we use at the university”.
- •4. Topic to discuss.
- •Text II
- •Read the text and answer the following questions:
- •What is a computer?
- •Vocabulary List
- •Which of the listed above statements are true/ false. Specify your answer using the text.
- •Match the following:
- •Text III
- •Read the text and answer the following questions:
- •Hardware
- •Vocabulary List
- •Which of the listed below statements are true/ false. Specify your answer using the text.
- •Give definitions to the following using the vocabulary.
- •Which of the following is Hardware?
- •Match the following:
- •Discuss in groups:
- •Text IV
- •Read the text and answer the following questions:
- •Types of software
- •Vocabulary List
- •2. Which of the following is Software?
- •3. Which of the listed below statements are true/ false. Specify your answer using the text:
- •4. Find English equivalents in the text:
- •5. Give definitions to the following using the vocabulary:
- •6. Discuss in groups:
- •Operating systems Prereading Discussion
- •Read the text and answer the following questions:
- •Operating systems
- •Vocabulary List
- •Match the following:
- •Which of the listed below statements are true or false? Specify your answer using the text.
- •Translate into English:
- •5. Discuss the following in groups:
- •Text II
- •1. Read the text and answer the following questions:
- •Windows 95
- •Vocabulary List
- •2. Which of the listed above statements are true/false. Specify your answer using the text.
- •Find the equivalents in the text:
- •What is:
- •Discuss in groups:
- •The internet Prereading Discussion
- •Read the text and answer the following questions:
- •The internet
- •Vocabulary List
- •Match the phrases with their Russian equivalents:
- •Find English equivalents to the following phrases:
- •Translate the following sentences into English:
- •Express your opinion to the following statements:
- •Text II
- •1. Read the text and answer the following questions:
- •The www and the internet
- •Vocabulary List World Wide Web- “Всемирная Паутина”
- •2. Which of the listed below statements are true/ false. Specify your answer using the text.
- •3. Define the following using the vocabulary:
- •Find the equivalents:
- •5. Match the following:
- •6. Discuss in groups:
- •Text III
- •1. Read the text and answer the following questions:
- •The language of e-mail
- •Vocabulary List
- •3. Write a summary of the text. Include only the information, ignore any extra remarks. Write in a neutral rather than an informal style.
- •7. Match these smileys to their meanings listed below:
- •Discuss:
- •Computer and crime Prereading Discussion
- •Skim over the text and say: What is it about?
- •Read the text and find out if these statements correspond to the content of the text:
- •The first hackers
- •Vocabulary List
- •Text II
- •Computer crimes
- •Vocabulary List
- •Find in the text the English equivalents to:
- •Analyze the underlined grammar constructions.
- •True or false?
- •Construct other sentences in these patterns (transitional expressions):
- •Text III Prereading Discussion
- •How many generations of hackers have there been?
- •Read the text and find out if these statements correspond to the content of the text:
- •Hackers of today
- •Vocabulary List
- •Analyze the underlined grammar constructions.
- •Translate into English. Хакеры: плохие или хорошие?
- •What is your opinion of hackers? Have you ever tried to break into else’s computer?
- •Viruses and vaccines Prereading Discussion
- •Read the articles from a newspaper and try to select the questions to the texts given below:
- •Vocabulary List
- •Analyze the underlined grammar constructions. Explain their use.
- •Give a short answer to each question. Text II.
- •Look through the text and divide it into logical parts. Say: What do they deal with?
- •Read the text and answer the following questions:
- •Viruses and vaccines
- •Vocabulary List
- •Give a summary of the text.
- •A) Translate the following advices into English: Если вы используете компьютер в своем бизнесе, то вы должны иметь антивирусные программы и обновлять их постоянно.
- •Express your opinion to the statements:
- •Text III
- •Read the article from The Observer and find out if these statements correspond to the content of the text:
- •Viruses infect one email in every 300
- •Vocabulary List
- •Oa programmers
- •Oa программистов
- •Список использованной литературы
Vocabulary List
hack – курьез, забава; забавляться (при работе с машиной); изучать, осваивать, влезать (в тонкости программы, системы)
access – доступ
authority – власть, власти
bogus – поддельный, фальшивый
encompass – окружать, обобщать
endeavor – попытка, стремление
exhilaration [ig,zil∂`rei∫(∂)n] – веселость, радостное настроение, приятное возбуждение
bonafide – истинный, настоящий
awe-inspiring [`o:in,spai(∂)riŋ] – повергающий в трепет, волнующий
reign – власть
insight – осмысление, понимание; способность проникновения в суть
survival – выживание
-
Answer the following questions:
1. Who were the first hackers?
2. What did they do?
3. What was their aim?
4. What did their activities result in?
-
Translate the Hacker’s rules and summarize the first hackers’credo.
-
True or false?
-
Those who can, do. Those who cannot, teach. Those who cannot teach, HACK!
-
The first hackers were quite different from the modern ones.
Text II
-
Skim over the text and say: What is it about? Divide the text into logical parts.
-
Read the text and answer the following questions:
1. Why are computer crimes so widespread? 2. In what areas are they most widespread? 3. Why are software programs often stolen? 4. Why are computer crimes considered to be perfect crimes? 5. Why are computer criminals often given good recommendations from their former employers?
Computer crimes
(1) More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap substantial rewards. Even worse, a number of people who have done this and been caught at it have managed to get away without punishment.
(2) These facts have not been lost on criminals or would-be criminals. A recent Stanford Research Institute study of computer abuse was based on 160 case histories, which probably are just the proverbial tip of the iceberg. After all, we only know about the unsuccessful crimes. How many successful ones have gone undetected is anybody's guess.
(3) Here are a few areas in which computer criminals have found the pickings all too easy.
(4) Banking. All but the smallest banks now keep their accounts on computer files. Someone who knows how to change the numbers in the files can transfer funds at will. For instance, one programmer was caught having the computer transfer funds from other people's accounts to his wife's checking account. Often, traditionally trained auditors don't know enough about the workings of computers to catch what is taking place right under their noses.
(5) Business. A company that uses computers extensively offers many opportunities to both dishonest employees and clever outsiders. For instance, a thief can have the computer ship the company's products to addresses of his own choosing. Or he can have it issue checks to him or his confederates for imaginary supplies or services. People have been caught doing both.
(6) Credit Cards. There is a trend toward using cards similar to credit cards to gain access to funds through cash-dispensing terminals. Yet, in the past, organized crime has used stolen or counterfeit credit cards to finance its operations. Banks that offer after-hours or remote banking through cash-dispensing terminals may find themselves unwillingly subsidizing organized crime.
(7) Theft of Information. Much personal information about individuals is now stored in computer files. An unauthorized person with access to this information could use it for blackmail. Also, confidential information about a company's products or operations can be stolen and sold to unscrupulous competitors.
(8) Software Theft. The software for a computer system is often more expensive than the hardware. Yet this expensive software is all too easy to copy. Crooked computer experts have devised a variety of tricks for getting these expensive programs printed out, punched on cards, recorded on tape, or otherwise delivered into their hands. This crime has even been perpetrated from remote terminals that access the computer over the telephone.
(9) Theft of Time-Sharing Services. When the public is given access to a system, some members of the public often discover how to use the system in unauthorized ways. For example, there are the "phone freakers" who avoid long distance telephone charges by sending over their phones control signals that are identical to those used by the telephone company.
(10) Of course, most systems use account numbers and passwords to restrict access to authorized users. But unauthorized persons have proved to be adept at obtaining this information and using it for their own benefit. For instance, when a police computer system was demonstrated to a school class, a precocious student noted the access codes being used; later, all the student's teachers turned up on a list of wanted criminals.
(11) Perfect Crimes. It's easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.
(12) Of course, we have no statistics on crimes that go undetected. But it's unsettling to note how many of the crimes we do know about were detected by accident, not by systematic audits or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.
(13) Unlike other embezzlers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes brazen it out, demanding not only that they not be prosecuted but also that they be given good recommendations and perhaps other benefits, such as severance pay. All too often, their demands have been met.
(14) Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They cringe at the thought of a criminal boasting in open court of how he juggled the most confidential records right under the noses of the company's executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his exploits elsewhere.