- •Учебное пособие
- •My future profession
- •Look at these job advertisements. Which of them would interest you? Why?
- •Then please ring Paul a. Lawrence on 266407 or write to him at
- •Ring 45326.
- •Vocabulary List
- •Personnel Officer – руководитель отдела кадров
- •Use these clues to help you fill in the puzzle and find the hidden word. You can find all the words in the newspaper advertisements.
- •This is a questionnaire (анкета, опросный лист) for applicants. Answer the following questions:
- •How long were you in your last job?
- •Here are some thoughts of a student about his future profession. Read the text and answer the following questions:
- •Vocabulary List
- •Hobby, addiction, or future job?
- •Look through the text and divide it into logical parts. Say: What do they deal with?
- •Computer studies?
- •Vocabulary List
- •Retell the last 2 paragraphs in the reported speech.
- •Can you confess to being an information junky. How many hours a day do you spend on the Internet?
- •Output data 7
- •Vocabulary List
- •Text III
- •To your health
- •Vocabulary List eyestrain – зрительное напряжение
- •Find in the text equivalents to:
- •Fill in the table:
- •A) Translate the following recommendations. B) Give your recommendations how to cope.
- •Related Reading
- •Skim over the texts and say: What are they about?
- •Choose the text which interests you, read it and give the summary of the text. Masters of invention
- •All the news that fit to click
- •Look through the text and divide it into logical parts. Say: What do they deal with?
- •Read the text and find out if these statements correspond to the content of the text:
- •Prehistory
- •Vocabulary List
- •Look through the text and divide it into logical parts. Say: What do they deal with?
- •Read the text and find out how many stages there were in the development of computers. Complete the table containing some information about the development of computers.
- •The development of computers
- •Vocabulary List
- •True or false? Express your opinion.
- •Text III
- •Babbage's dream come true
- •Vocabulary List
- •Complete the table:
- •Translate into English
- •Related Reading
- •1. Look through the text and divide it into logical parts. Say: What do they deal with?
- •2. Answer the following questions:
- •Billion dollar brain
- •Vocabulary List
- •Topics to discuss
- •Personal computer Prereading Discussion
- •Look through the text and answer the questions.
- •Personal computer
- •Vocabulary List
- •Give the summary of the text.
- •Make up the topic “ The computers we use at the university”.
- •4. Topic to discuss.
- •Text II
- •Read the text and answer the following questions:
- •What is a computer?
- •Vocabulary List
- •Which of the listed above statements are true/ false. Specify your answer using the text.
- •Match the following:
- •Text III
- •Read the text and answer the following questions:
- •Hardware
- •Vocabulary List
- •Which of the listed below statements are true/ false. Specify your answer using the text.
- •Give definitions to the following using the vocabulary.
- •Which of the following is Hardware?
- •Match the following:
- •Discuss in groups:
- •Text IV
- •Read the text and answer the following questions:
- •Types of software
- •Vocabulary List
- •2. Which of the following is Software?
- •3. Which of the listed below statements are true/ false. Specify your answer using the text:
- •4. Find English equivalents in the text:
- •5. Give definitions to the following using the vocabulary:
- •6. Discuss in groups:
- •Operating systems Prereading Discussion
- •Read the text and answer the following questions:
- •Operating systems
- •Vocabulary List
- •Match the following:
- •Which of the listed below statements are true or false? Specify your answer using the text.
- •Translate into English:
- •5. Discuss the following in groups:
- •Text II
- •1. Read the text and answer the following questions:
- •Windows 95
- •Vocabulary List
- •2. Which of the listed above statements are true/false. Specify your answer using the text.
- •Find the equivalents in the text:
- •What is:
- •Discuss in groups:
- •The internet Prereading Discussion
- •Read the text and answer the following questions:
- •The internet
- •Vocabulary List
- •Match the phrases with their Russian equivalents:
- •Find English equivalents to the following phrases:
- •Translate the following sentences into English:
- •Express your opinion to the following statements:
- •Text II
- •1. Read the text and answer the following questions:
- •The www and the internet
- •Vocabulary List World Wide Web- “Всемирная Паутина”
- •2. Which of the listed below statements are true/ false. Specify your answer using the text.
- •3. Define the following using the vocabulary:
- •Find the equivalents:
- •5. Match the following:
- •6. Discuss in groups:
- •Text III
- •1. Read the text and answer the following questions:
- •The language of e-mail
- •Vocabulary List
- •3. Write a summary of the text. Include only the information, ignore any extra remarks. Write in a neutral rather than an informal style.
- •7. Match these smileys to their meanings listed below:
- •Discuss:
- •Computer and crime Prereading Discussion
- •Skim over the text and say: What is it about?
- •Read the text and find out if these statements correspond to the content of the text:
- •The first hackers
- •Vocabulary List
- •Text II
- •Computer crimes
- •Vocabulary List
- •Find in the text the English equivalents to:
- •Analyze the underlined grammar constructions.
- •True or false?
- •Construct other sentences in these patterns (transitional expressions):
- •Text III Prereading Discussion
- •How many generations of hackers have there been?
- •Read the text and find out if these statements correspond to the content of the text:
- •Hackers of today
- •Vocabulary List
- •Analyze the underlined grammar constructions.
- •Translate into English. Хакеры: плохие или хорошие?
- •What is your opinion of hackers? Have you ever tried to break into else’s computer?
- •Viruses and vaccines Prereading Discussion
- •Read the articles from a newspaper and try to select the questions to the texts given below:
- •Vocabulary List
- •Analyze the underlined grammar constructions. Explain their use.
- •Give a short answer to each question. Text II.
- •Look through the text and divide it into logical parts. Say: What do they deal with?
- •Read the text and answer the following questions:
- •Viruses and vaccines
- •Vocabulary List
- •Give a summary of the text.
- •A) Translate the following advices into English: Если вы используете компьютер в своем бизнесе, то вы должны иметь антивирусные программы и обновлять их постоянно.
- •Express your opinion to the statements:
- •Text III
- •Read the article from The Observer and find out if these statements correspond to the content of the text:
- •Viruses infect one email in every 300
- •Vocabulary List
- •Oa programmers
- •Oa программистов
- •Список использованной литературы
Vocabulary List
to sweep – уничтожать
attachment – присоединение, подсоединение
interaction – взаимодействие
to replicate – копировать, повторять
vulnerability – уязвимость, чувствительность
to clog up – застопориваться
to trigger – инициировать, давать начало
hard drive – накопитель на жестких магнитных дисках
it doesn’t matter – не имеет значения, неважно
by virtue of – посредством ч.-л.; благодяря ч.-л.
software package – система программного обеспечения, пакет программ
double-barrelled – двуствольный; двусмысленный
body text – основной текст
alert – предупреждение
to forward – отправлять, посылать
hoax – обман, ложь, мистификация
-
Analyze the underlined grammar constructions. Explain their use.
-
Give a short answer to each question. Text II.
-
Look through the text and divide it into logical parts. Say: What do they deal with?
-
Read the text and answer the following questions:
What is a virus? What types of viruses are there? 2. How is the virus transmitted? 3. How do the viruses act? 4. What is the most widespread way of infection? 5. What shortcomings do the antivirus programs have?
Viruses and vaccines
The terms viruses and vaccines have entered the jargon of the computer industry to describe some of the bad things that can happen to computer systems and programs. Unpleasant occurrences like the March 6, 1991, attack of the Michelangelo virus will be with us for years to come. In fact, from now on you need to check your IBM or IBM-compatible personal computer for the presence of Michelangelo before March 6 every year — or risk losing all the data on your hard disk when you turn on your machine that day. And Macintosh users need to do the same for another intruder, the Jerusalem virus, before each Friday the 13th, or risk a similar fate for their data.
A virus, as its name suggests, is contagious. It is a set of illicit instructions that infects other programs and may spread rapidly. The Michelangelo virus went worldwide within a year. Some types of viruses include the worm, a program that spreads by replicating itself; the bomb, a program intended to sabotage a computer by triggering damage based on certain conditions — usually at a later date; and the Trojan horse, a program that covertly places illegal, destructive instructions in the middle of an otherwise legitimate program. A virus may be dealt with by means of a vaccine, or antivirus, program, a computer program that stops the spread of and often eradicates the virus.
Transmitting a Virus. Consider this typical example. A programmer secretly inserts a few unauthorized instructions in a personal computer operating system program. The illicit instructions lie dormant until three events occur together: 1. the disk with the infected operating system is in use; 2. a disk in another drive contains another copy of the operating system and some data files; and 3. a command, such as COPY or DIR, from the infected operating system references a data file. Under these circumstances, the virus instructions are now inserted into the other operating system. Thus the virus has spread to another disk, and the process can be repeated again and again. In fact, each newly infected disk becomes a virus carrier.
Damage from Viruses. We have explained how the virus is transmitted; now we come to the interesting part — the consequences. In this example, the virus instructions add 1 to a counter each time the virus is copied to another disk. When the counter reaches 4, the virus erases all data files. But this is not the end of the destruction, of course; three other disks have also been infected. Although viruses can be destructive, some are quite benign; one simply displays a peace message on the screen on a given date. Others may merely be a nuisance, like the Ping-Pong virus that bounces a "Ping-Pong ball" around your screen while you are working. But a few could result in disaster for your disk, as in the case of Michelangelo.
Prevention. A word about prevention is in order. Although there are programs called vaccines that can prevent virus activity, protecting your computer from viruses depends more on common sense than on building a "fortress" around the machine. Although there have been occasions where commercial software was released with a virus, these situations are rare. Viruses tend to show up most often on free software acquired from friends. Even commercial bulletin board systems, once considered the most likely suspects in transferring viruses, have cleaned up their act and now assure their users of virus-free environments. But not all bulletin board systems are run professionally. So you should always test diskettes you share with others by putting their write-protection tabs in place. If an attempt is made to write to such a protected diskette, a warning message appears on the screen. It is not easy to protect hard disks, so many people use antivirus programs. Before any diskette can be used with a computer system, the antivirus program scans the diskette for infection. The drawback is that once you buy this type of software, you must continuously pay the price for upgrades as new viruses are discovered.