- •Учебное пособие
- •My future profession
- •Look at these job advertisements. Which of them would interest you? Why?
- •Then please ring Paul a. Lawrence on 266407 or write to him at
- •Ring 45326.
- •Vocabulary List
- •Personnel Officer – руководитель отдела кадров
- •Use these clues to help you fill in the puzzle and find the hidden word. You can find all the words in the newspaper advertisements.
- •This is a questionnaire (анкета, опросный лист) for applicants. Answer the following questions:
- •How long were you in your last job?
- •Here are some thoughts of a student about his future profession. Read the text and answer the following questions:
- •Vocabulary List
- •Hobby, addiction, or future job?
- •Look through the text and divide it into logical parts. Say: What do they deal with?
- •Computer studies?
- •Vocabulary List
- •Retell the last 2 paragraphs in the reported speech.
- •Can you confess to being an information junky. How many hours a day do you spend on the Internet?
- •Output data 7
- •Vocabulary List
- •Text III
- •To your health
- •Vocabulary List eyestrain – зрительное напряжение
- •Find in the text equivalents to:
- •Fill in the table:
- •A) Translate the following recommendations. B) Give your recommendations how to cope.
- •Related Reading
- •Skim over the texts and say: What are they about?
- •Choose the text which interests you, read it and give the summary of the text. Masters of invention
- •All the news that fit to click
- •Look through the text and divide it into logical parts. Say: What do they deal with?
- •Read the text and find out if these statements correspond to the content of the text:
- •Prehistory
- •Vocabulary List
- •Look through the text and divide it into logical parts. Say: What do they deal with?
- •Read the text and find out how many stages there were in the development of computers. Complete the table containing some information about the development of computers.
- •The development of computers
- •Vocabulary List
- •True or false? Express your opinion.
- •Text III
- •Babbage's dream come true
- •Vocabulary List
- •Complete the table:
- •Translate into English
- •Related Reading
- •1. Look through the text and divide it into logical parts. Say: What do they deal with?
- •2. Answer the following questions:
- •Billion dollar brain
- •Vocabulary List
- •Topics to discuss
- •Personal computer Prereading Discussion
- •Look through the text and answer the questions.
- •Personal computer
- •Vocabulary List
- •Give the summary of the text.
- •Make up the topic “ The computers we use at the university”.
- •4. Topic to discuss.
- •Text II
- •Read the text and answer the following questions:
- •What is a computer?
- •Vocabulary List
- •Which of the listed above statements are true/ false. Specify your answer using the text.
- •Match the following:
- •Text III
- •Read the text and answer the following questions:
- •Hardware
- •Vocabulary List
- •Which of the listed below statements are true/ false. Specify your answer using the text.
- •Give definitions to the following using the vocabulary.
- •Which of the following is Hardware?
- •Match the following:
- •Discuss in groups:
- •Text IV
- •Read the text and answer the following questions:
- •Types of software
- •Vocabulary List
- •2. Which of the following is Software?
- •3. Which of the listed below statements are true/ false. Specify your answer using the text:
- •4. Find English equivalents in the text:
- •5. Give definitions to the following using the vocabulary:
- •6. Discuss in groups:
- •Operating systems Prereading Discussion
- •Read the text and answer the following questions:
- •Operating systems
- •Vocabulary List
- •Match the following:
- •Which of the listed below statements are true or false? Specify your answer using the text.
- •Translate into English:
- •5. Discuss the following in groups:
- •Text II
- •1. Read the text and answer the following questions:
- •Windows 95
- •Vocabulary List
- •2. Which of the listed above statements are true/false. Specify your answer using the text.
- •Find the equivalents in the text:
- •What is:
- •Discuss in groups:
- •The internet Prereading Discussion
- •Read the text and answer the following questions:
- •The internet
- •Vocabulary List
- •Match the phrases with their Russian equivalents:
- •Find English equivalents to the following phrases:
- •Translate the following sentences into English:
- •Express your opinion to the following statements:
- •Text II
- •1. Read the text and answer the following questions:
- •The www and the internet
- •Vocabulary List World Wide Web- “Всемирная Паутина”
- •2. Which of the listed below statements are true/ false. Specify your answer using the text.
- •3. Define the following using the vocabulary:
- •Find the equivalents:
- •5. Match the following:
- •6. Discuss in groups:
- •Text III
- •1. Read the text and answer the following questions:
- •The language of e-mail
- •Vocabulary List
- •3. Write a summary of the text. Include only the information, ignore any extra remarks. Write in a neutral rather than an informal style.
- •7. Match these smileys to their meanings listed below:
- •Discuss:
- •Computer and crime Prereading Discussion
- •Skim over the text and say: What is it about?
- •Read the text and find out if these statements correspond to the content of the text:
- •The first hackers
- •Vocabulary List
- •Text II
- •Computer crimes
- •Vocabulary List
- •Find in the text the English equivalents to:
- •Analyze the underlined grammar constructions.
- •True or false?
- •Construct other sentences in these patterns (transitional expressions):
- •Text III Prereading Discussion
- •How many generations of hackers have there been?
- •Read the text and find out if these statements correspond to the content of the text:
- •Hackers of today
- •Vocabulary List
- •Analyze the underlined grammar constructions.
- •Translate into English. Хакеры: плохие или хорошие?
- •What is your opinion of hackers? Have you ever tried to break into else’s computer?
- •Viruses and vaccines Prereading Discussion
- •Read the articles from a newspaper and try to select the questions to the texts given below:
- •Vocabulary List
- •Analyze the underlined grammar constructions. Explain their use.
- •Give a short answer to each question. Text II.
- •Look through the text and divide it into logical parts. Say: What do they deal with?
- •Read the text and answer the following questions:
- •Viruses and vaccines
- •Vocabulary List
- •Give a summary of the text.
- •A) Translate the following advices into English: Если вы используете компьютер в своем бизнесе, то вы должны иметь антивирусные программы и обновлять их постоянно.
- •Express your opinion to the statements:
- •Text III
- •Read the article from The Observer and find out if these statements correspond to the content of the text:
- •Viruses infect one email in every 300
- •Vocabulary List
- •Oa programmers
- •Oa программистов
- •Список использованной литературы
-
Read the articles from a newspaper and try to select the questions to the texts given below:
-
My elderly aunt Agatha just forwarded me a virus warning. What should I do?
-
How can I avoid getting viruses?
-
What is a virus?
-
What is the difference between a virus and a worm?
-
I have a virus in my inbox. Now what?
-
I seem to have a lot of emails in my inbox with the same subject heading. What's going on?
(1) It sounds like you have an email virus. Two very successful ones are sweeping the wired world at the moment: BadTrans and Goner. BadTrans will have emailed itself on to your friends, colleagues and relations, but you can avoid Goner infection simply by deleting the emails without clicking on the attachment.
There are thousands of viruses out there, but only a handful account for most of the problems, and these two are the most prominent at the moment.
(2) A virus is a programme that self-replicates, and they are written by people who want them spread as widely as possible. Some viruses, such as Anna Kournikova or love bug, require user interaction to self-replicate - usually this means clicking on an attachment - while others, such as Code Red, can trawl networks looking for computers with a specific vulnerability to exploit.
All viruses clog up networks and slow down the performance of your PC, but many also have payloads, or code that triggers an action on the infected machine. These payloads can be anything from wiping your hard drive to emailing confidential documents to public newsgroups to installing a "Trojan horse" on your computer that allows hackers to access your data.
(3) A virus is parasitic code that attaches to another programme, such a visual basic (.vbs files) or an executable (.exe). A worm does not attach itself to other programmes and spreads without any user interaction. It is a technical distinction that does not really matter to the average computer user.
(4) Do not open it. Some viruses will activate simply by opening the email, whether you double click on the attachment or not. Others require no user interaction and will already have infected your computer, simply by virtue of having been sent to you.
If you are at work, ask your IT service desk what to do about the virus. If you are at home, you can look on the website of your anti-virus software company, or call their help desk. Your ISP may also be able to help.
Do not send a universal email warning everyone in your company about the virus, as that will only clog networks already suffering from the virus attack. Send one email to your IT support desk, and let them take it from there.
(5) Anti-virus software is a good place to start, but it is by no means a guarantee, as anyone running a popular anti-virus software package and yet still clearing the recent Badtrans worm from their system can tell you.
Most email viruses will appear to be sent to you by someone you know. Beware of emails with "double-barrelled" attachments, such as filename.txt.vbs, and do not double click on them. Do not open executable (.exe) files or documents (.doc) without putting them through a virus scan first. If you need the information in the document, tell the sender to resend it as part of the email body text.
If you run Microsoft software, you should keep a look out for security alerts that the company posts on its website. Often the company discovers a hole in its software, posts a fix for it, and then weeks later a virus exploiting that very flaw infects thousands of users. This happened with the Code Red worm, which exploited a flaw in Microsoft's US software.
-
Assuming Agatha is not a computer expert, she has probably just sent you one of the numerous virus hoaxes that endlessly do the email rounds. Tell her to stop forwarding on any information if she has not checked it out. Vmyths is a good first stop to check the veracity of an emailed virus alert.