
- •Contents
- •Introductory discussion
- •1. Answer the question.
- •2. This quiz will help you "hack" terms you may encounter while surfing the Internet.
- •Topic I. Computer systems
- •1. Answer the following questions:
- •2. Match each component in column a with its function in column b:
- •3. Complete the table:
- •4. Label the diagram of a computer system using these terms:
- •Topic II. Prehistory of the computer
- •Vocabulary list
- •1. True or false?
- •Give synonyms to:
- •3. Give antonyms to:
- •Topic III. The analytical engine
- •1. Find in the text the English equivalents to:
- •Answer the following questions:
- •3. Put the proper words into sentences:
- •Topic IV. Babbage's dream comes true
- •1. Find in the text the English equivalents to:
- •2. Give synonyms to:
- •3. Give antonyms to:
- •4. Put the proper words into sentences:
- •5. Answer the following questions:
- •6. Translate into English:
- •Topic V. The early years of pc
- •Vocabulary list
- •1. Find in the text the English equivalents to:
- •2. True or false?
- •3. Give a synonym for words in parentheses;
- •5. Describe the relationship between each of the following pairs of words (antonyms, synonyms, neither):
- •6. Choose the word to complete each of the following sentences:
- •7. Cross out the one word that does not have the same meaning as the other three words:
- •8. Complete the paragraph below:
- •Topic VI. Computer crimes
- •1. Find in the text the English equivalents to:
- •2. True or false?
- •3. Give synonyms to:
- •4. Give antonyms to:
- •Topic VII. Security: playing it safe
- •Vocabulary list
- •1. Give synonyms to:
- •2. Give antonyms to:
- •3. Answer the questions:
- •4. Put the proper words into sentences:
- •Topic VIII. Checking your own security
- •1. Find in the text the English equivalents to:
- •2. Answer the following questions:
- •3. Translate into English:
- •Topic IX. Viruses and vaccines
- •Topic X. Strap on some eyephones and you are virtually there
- •Vocabulary list
- •1. True or false?
- •2. Read the words as they are used in the following sentences and try to come up with your own definition:
- •3. Put the proper words into sentences:
- •4. Guess the meaning of the italicized words:
- •Topic XI. Surfing the net
- •Vocabulary list
- •8. Put the proper words into sentences:
- •Topic XII. The language of e-mail
- •1. Answer the questions:
- •4. Discuss:
- •5. Write an e-mail message to your friend (on paper). Use an appropriate format and a chatty style. Try to use at least one smiley and some abbreviations. Topics for essays, oral or written reports
- •English computer glossary
- •Reference literature
1. Give synonyms to:
to encrypt, to secure, confidential, biometric, recognition, imposter, to meet requirements, to detect, to lose business, appearance, to incorporate, unless, to circumvent.
2. Give antonyms to:
convenient, advocate, to reject, to encrypt, legitimate, messy, authorized, white-collar crime, to safeguard info, sensitive, to retrieve data, practical, by chance, private.
3. Answer the questions:
What is computer security?
What is the most serious problem: the loss of hardware, software, or the loss of data?
How does a computer system detect whether you are the person who should be granted access to it?
What are the shortcomings of each biometric means?
What is to prevent any user from copying PC software onto diskettes?
What steps can be taken to prevent theft or alteration of data?
What is the weakest link in any computer system?
Should a programmer also be a computer operator?
What is a security matrix?
Can the computer industry risk being without safeguards for security and privacy?
4. Put the proper words into sentences:
foolproof, complicated, virus, unauthorized, crime, fingerprint, altering, messages.
Computer security is more ... today than it was in the past.
International literature tells lurid stories about computer viruses ... — about bank swindles, espionage, ... sent from one computer to destroy the contents of others.
Movies like War Games have dramatized the dangers from ... entry to the computer systems that control nuclear weapons.
Methods used in computer-based criminal activity range from switching or ... data as they enter the computer, to pulling self-concealing instruction into the software.
The person who develops a ... lock for the computer data will make a fortune.
.... is the name generally given to software that causes ... of computer files.
People must be taught that some kinds of help, such as assisting ... users with passwords are inappropriate.
According to a published article, the Mafia has kidnapped an IBM executive and cut off his finger because it needed his ... to breach a computer security system.
Data sent over communication lines can be protected by encryption, the process of scrambling ...
Topic VIII. Checking your own security
A Personal Checklist for Hardware. With the subject of security fresh in your mind, now is a good time to consider a checklist for your own personal computer and its software. We will confine this list to a computer presumed to be in the home.
No eating, drinking, or smoking near the computer.
Do not place the computer near open windows or doors.
Do not subject the computer to extreme temperatures.
Clean equipment regularly.
Place a cable lock on the computer.
Use a surge protector.
Store diskettes properly in a locked container.
Maintain backup copies of all files.
Store copies of critical files off site.
A Personal Checklist for Software. A word of prevention is in order. Although there are programs that can prevent virus activity, protecting yourself from viruses depends more on common sense than on building a "fortress" around the computer. Here are a few common-sense tips:
If your software allows it, follow write-protect measures for your floppy disks before installing any new software. If it does not allow it, write-protect the disks immediately after installation.
Do not install software unless you know it is safe. Viruses tend to show up on free software acquired from sales representatives, resellers, computer repair people, power users, and consultants.
Make your applications (and other executable files) read-only. This will not prevent infection, but it can help contain those viruses that attack applications.
Stop the so-called sneakernet crowd. This is the group that moves around the office (in sneakers, of course) and prefers to transfer files quickly via floppy disk.
Make backups. This is a given: Always back up your hard disk and floppies.
EXERCISES