Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Unit 7.doc
Скачиваний:
12
Добавлен:
03.05.2015
Размер:
48.64 Кб
Скачать

4.Translate the following words and word combinations into Russian:

  1. potentially damaging viral activities

  2. a write-protected floppy disk

  3. to erase viruses on the boot sector

  4. current and well-designed antiviral software

  5. to predict the likelihood

  6. the state of executable programs

  7. common features of viral programs

  8. to trick the computer's operating system

  9. to follow the virus's instructions

  10. to deliver the payloads

5. Translate the following words and word combinations into English:

  1. обмен файлами

  2. удалить выявленный вирус

  3. антивирусное программное обеспечение

  4. периодически обновлять

  5. обеспечивать полную защиту от вирусов

  6. определять присутствие вируса

  7. загрузить инфицированную программу

  8. напоминать вирус

  9. излечиться от вируса

  10. легитимный источник программного обеспечения

6. Insert the necessary preposition where it is needed:

  1. to replace --- infected files --- legitimate files

  2. Virus is a computer --- program that interferes --- a computer’s hardware.

  3. A virus can attach itself --- e-mail messages.

  4. Viruses often trick --- the computer user --- running the viral program.

  5. Computer users can prepare --- a viral infection.

  6. The best prevention can be the installation --- antiviral system.

  7. Antiviral packages provide --- complete protection --- viruses.

  8. It relies --- experience --- previous viruses.

  9. Monitoring software is different --- scanning software.

  10. Checksumming is performed --- automatically --- the integrity shell.

7. Change the sentences so you could use Complex Object or Complex Subject.

    1. They say that computer viruses grew more sophisticated in the 1990s.

    2. Monitoring software is different from scanning software.

    3. Computer users can prepare for a viral infection by creating backups of legitimate original software and data files regularly.

    4. The payload may disrupt or change data files, display an irrelevant or unwanted message, or cause the operating system to malfunction.

    5. Checksumming software can detect an infection only after it has occurred.

8. Find Complex Object or Complex Subject in each sentence.

  1. A Trojan horse is a program that pretends to be something else.

  2. A Trojan horse may appear to be something interesting and harmless, such as a game, but when it runs it may have harmful effects.

  3. Like any other computer program, a virus must be executed for it to function.

  4. The Love Bug is said to have infected 1 in every 5 PCs worldwide.

  5. Viral infection is expected to be prevented by obtaining software from legitimate sources or by using a quarantined computer to test new software.

9. Answer the following questions:

  1. Where can viruses be located?

  2. What is called “the payload of the virus”?

  3. What can the payload do?

  4. What can a computer virus do?

  5. What are the ways of getting the infection?

  6. What types of antiviral software can be used to detect the presence of a virus?

  7. What can scanning software do?

  8. What is the difference between on-access scanners and on-demand scanners?

  9. What is the difference between monitoring software and scanning software?

  10. What is checksumming?

  11. What does the word “heuristics” mean?

  12. What does this technology do?

  13. What must be done to help the computer system to recover from a viral infection?

Speaking

  1. Speak about different types of computer viruses.

2. Discuss advantages and disadvantages of modern antiviral software.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]