- •Рецензенты:
- •Рекомендует к печати
- •What is a computer?
- •1. Read and learn the following words:
- •2. Answer the following questions to the text a:
- •3. Insert the necessary prepositions to the following sentences:
- •4. Choose the words that are missed in the following sentences:
- •5. Choose the ending to each question:
- •6. Ask general questions to the following sentences:
- •The use of computers
- •1. Read and remember the words from the text b:
- •2. Make up the pairs or groups of the words which are close in their meanings. Use the words given below.
- •3. Match the words with their definitions:
- •4. Put the sentences into Past Simple:
- •5. A) Give a title to the following fragment and translate it into Russian in writing:
- •6. Read the following text with the dictionary if it is necessary. Perform the tasks given below: communication (1)
- •Computers in the different sphres of our life
- •1. Answer the following questions:
- •2. Put the necessary prepositions to the following sentences:
- •3. Put the missing words to the sentences:
- •4. Discuss with your partner what you have learned about computers in general.
- •5. Make a short report “The Use of Computers”.
- •Some facts from the history of computers
- •1. Read and learn the following words:
- •2. Answer the following questions to the text a:
- •3. Insert the necessary prepositions to the following sentences:
- •4. Choose the words that are missed in the following sentences:
- •5. Choose the ending to each question:
- •6. Ask alternative questions to the following sentences:
- •The fastest computers of the world
- •1. Read and remember the words from the text b:
- •2. Form the new words from the verbs:
- •3. Translate the word-combinations with: a) Participle I and b) Participle II:
- •4. Revise Active and Passive Voice of the verb. Open the brackets and use the proper form of the verb:
- •5. A) Give a title to the following fragment and translate it into Russian in writing:
- •6. Read the following text with the dictionary if it is necessary. Perform the tasks given below: communication (2)
- •From the history of computer development
- •1. Answer the following questions:
- •2. Put in the necessary words to the following sentences:
- •3. Make up the pairs of words that are close in their meaning:
- •4. Discuss with your partner some facts from the history of computers.
- •5. Make a short report “The History of Computers”.
- •Data processing and data processing systems
- •1. Read and learn the following words:
- •2. Answer the following questions to the text a:
- •3. Insert the necessary prepositions to the following sentences:
- •4. Choose the words that are missed in the following sentences:
- •5. Choose the ending to each question:
- •6. Ask general questions to the following sentences:
- •Storage units
- •1. Read and remember the words from the text b:
- •2. Try to find in the text the words the meaning of which are close to the meaning of the following ones:
- •3. Divide the words into three groups – nouns, adjective, adverb – according to their suffixes. Translate the words, if necessary use the vocabulary:
- •4. Translate the sentences with Perfect Participle Active and Perfect Participle Passive:
- •5. A) Read the following fragment and translate it into Russian in writing:
- •6. Read the following text with the dictionary if it is necessary. Perform the tasks given below: network development
- •Computer technology
- •1. Answer the following questions:
- •2. Put the necessary prepositions to the following sentences:
- •3. Put the missing words to the sentences:
- •4. Make a short report “Storage Units of the Computers”.
- •A computer system
- •1. Read and learn the following words:
- •2. Answer the following questions to the text a:
- •3. Insert the necessary prepositions to the following sentences:
- •4. Choose the words that are missed in the following sentences:
- •5. Choose the ending to each question:
- •6. Ask special questions to the following sentences:
- •Input-output environment
- •1. Read and remember the words from the text b:
- •2. Form nouns from the following verbs using suffixes:
- •3. Open the brackets using the correct form of the verb:
- •4. Combine the words from the left part with their interpretations from the right part:
- •5. A) Give a title to the following fragment and translate it into Russian in writing:
- •6. Read the following text with the dictionary if it is necessary. Perform the tasks given below:
- •The elements of computer system
- •1. Answer the following questions:
- •2. Give the Russian equivalents of the following words and make up the sentences using them:
- •3. Say if the statements are true or false:
- •4. Discuss with your partner what you have learned about the elements of computer system.
- •What is hardware?
- •Input hardware.
- •1. Read and learn the following words:
- •2. Answer the following questions to the text a:
- •3. Insert the necessary prepositions to the following sentences:
- •4. Choose the words that are missed in the following sentences:
- •5. Choose the ending to each question:
- •6. Ask general questions to the following sentences:
- •Scanners
- •1. Read and remember the words from the text b:
- •2. Form comparative and superlative degrees of the following adjectives:
- •3. Translate the following sentences with infinitives:
- •4. Translate the following word-combinations:
- •5. A) Translate the following text into Russian in writing:
- •6. Read the following text with the dictionary if it is necessary. Perform the tasks given below:
- •Input devices
- •1. Look through the following words and then answer the following questions:
- •2. Put the necessary prepositions to the following sentences:
- •3. Put the missing words to the sentences:
- •4. Discuss with your partner different types of hardware.
- •5. Make a short report “a Scanner”.
- •Computer operations
- •1. Read and learn the following words:
- •2. Answer the following questions to the text a:
- •3. Insert the necessary prepositions to the following sentences:
- •4. Choose the words that are missed in the following sentences:
- •5. Choose the ending to each question:
- •6. Ask general questions to the following sentences:
- •Types of software
- •1. Read and remember the words from the text b:
- •2. Translate into English:
- •3. Translate the following sentences into Russian. Pay attention to the underlined words:
- •4. Match the words and their definitions:
- •5. A) Translate the following text into Russian in writing: memory
- •6. Read the following text with the dictionary if it is necessary. Perform the tasks given below:
- •Operating systems
- •1. Look through the following words and then put 10 questions to the text:
- •2. Put the necessary prepositions to the following sentences:
- •3. Put the missing words to the sentences:
- •4. Discuss with your partner what you have learned about the types of computer data.
- •Output devices. Printers
- •1. Read and learn the following words:
- •2. Answer the following questions to the text a:
- •3. Insert the necessary prepositions to the following sentences:
- •4. Choose the words that are missed in the following sentences:
- •5. Choose the ending to each question:
- •6. Ask general questions to the following sentences:
- •Keyboard devices
- •1. Look through the following words and then put 10 questions to the text “Keyboard devices”:
- •2. Translate the following sentences. Pay attention to the underlined words:
- •3. Translate the following sentences. Pay attention to their special formation:
- •4. A) Translate the following text into Russian in writing: magnetic media devices
- •5. Read the following text with the dictionary if it is necessary. Perform the tasks given below: higeness of the internet
- •6. Discuss with your partner what you have learned about output devices.
- •7. Make a short report “Keyboard Devices”.
- •A modem
- •1. Read and learn the following words;
- •2. Answer the following questions to the text a:
- •3. Insert the necessary prepositions to the following sentences:
- •4. Choose the words that are missed in the following sentences:
- •5. Put different types of questions to the following sentences:
- •Electronic mail
- •1. Learn the following words and make up as many sentences as you can using these words:
- •2. Translate the sentences into Russian:
- •Internet rules of safety.
- •Internet child safety.
- •1. Read and remember the words from the text c:
- •2. Read the following texts containing information about Internet and make a report “What the Internet is”.
- •3. Read and translate the text “What is Internet Explorer?” Say what else you know about other Web browsers.
- •4. Discuss with your partner what you have learned about Internet rules of safety.
- •5. Make a short report “Modems and Electronic Mail”.
- •Words and word combinations to be remembered.
- •History of the computer
- •Generations of computer
- •History of data processing
- •Digital and analog computers
- •History of programming languages
- •Words and word combinations to be remembered.
- •Computer components
- •Evolution in size
- •Microprocessor as a cpu
- •Bill gates
- •What is internet?
- •I. Translate the sentences into Russian.
- •II. Put the verbs in brackets into a correct form.
- •Translating machines
- •What is steganography?
- •Words and word combinations to be remembered.
- •Uses of the web
- •Computer-intagrated manufacturing
- •Computer graphics
- •Cryptography
- •Words and word combinations to be remembered.
- •Computer viruses
- •What is a trojan horse and what threat does it pose?
- •Increase your knowledge of computer viruses
- •You cannot get virus from
- •Antivirus software
- •Preventing a virus
- •Word and word combinations to be remembered.
- •Computers in science
- •The future of computers
- •No worms in these apples
- •Supplementary reading
- •1. Look through the words to the text “computer literacy”:
- •2. Read the text, translate it and give a brief summary. Computer literacy
- •1. Look through the words to the text “from the history of telephony”:
- •2. Read the text, translate it and give a brief summary. From the history of telephony
- •1. Look through the words to the text “the first calculating devices”:
- •2. Read the text, translate it and give a brief summary. The first calculating devices
- •1. Look through the words to the text “charles babbage”:
- •2. Read the text, translate it and give a brief summary. Charles babbage
- •1. Look through the words to the text “development of electronics”:
- •2. Read the text, translate it and give a brief summary. Development of electronics
- •1. Look through the words to the text “microelectronics and microminiaturization”:
- •2. Read the text, translate it and give a brief summary. Microelectronics and microminiaturization
- •1. Look through the words to the text “advantages of computer data processing”:
- •2. Read the text, translate it and give a brief summary. Advantages of computer data processing
- •1. Look through the words to the text “hardware, software, and firmware”:
- •2. Read the text, translate it and give a brief summary. Hardware, software, and firmware
- •1. Look through the words to the text “from the history of computer development in russia”:
- •2. Read the text, translate it and give a brief summary. From the history of computer development in russia
- •1. Look through the words to the text “functional units of digital computers”:
- •2. Read the text, translate it and give a brief summary. Functional units of digital computers
- •1. Look through the words to the text “storage devices”
- •2. Read the text, translate it and give a brief summary. Storage devices
- •1. Look through the words to the text “management information technology (it)”
- •2. Read the text, translate it and give a brief summary. Management information technology (it)
- •1. Look through the words to the text “storage devices”
- •2. Read the text, translate it and give a brief summary. One woman's experience as a global head of it a successful manager sees a wider role for women in the male-dominated world of it networks
- •English-russian dictionary
- •Contents
- •Учебное издание
- •Английский язык
- •010503.65 «Математическое обеспечение и администрирование информационных систем»; 080116.65 «Математические методы в экономике».
- •Подписано в печать Формат 60х84
- •410003, Саратов, ул. Радищева, 89. Сгсэу
What is a trojan horse and what threat does it pose?
Since "Trojan Horses" (or Backdoors) have been in the news just recently, the term probably sounds familiar to you. But perhaps you're not quite sure what a Trojan Horse is and what damage it is capable of doing to your system. Trojan Horses, of which there are now more than one thousand in circulation (including modifications and variants), are a relatively new and probably the most dangerous strain of viruses that have appeared in recent times. They also threaten to overwhelm systems that only run anti-virus applications and firewalls as a means of combating the threat.
Today's Trojans as they are commonly referred to as, have now attained such a degree of sophistication that they pose a real threat to any user who hasn't taken adequate precautions to protect their data.
The name "Trojan Horse" derives itself from a page in Greek history when the Greeks had lain siege to the fortified city of Troy for over ten years. Their spy, a Greek called Sinon offered the Trojans a gift in the form of a wooden horse and convinced them that by accepting it, they would become invincible. The horse though was hollow and was occupied by a contingent of Greek soldiers. When they emerged in the dead of night and opened the city gates, the Greeks swarmed in, slaughtered its citizens and subsequently pillaged, burned and laid waste to the city. In the IT environment, the Trojan Horse acts as a means of entering the victim's computer undetected and then allowing a remote user unrestricted access to any data stored on the user's hard disk drive whenever he or she goes online. In this way, the user gets burned and like the unfortunate citizens of Troy, may only discover that fact when it is too late.
These types of viruses were originally designed as a means of self expression by gifted programmers and did little more than to cause the system to lock up, behave abnormally in a specific way or perhaps cause loss of data on the user's machine.
TEXT 3
Increase your knowledge of computer viruses
What is a virus?
In 1983, researcher Fred Cohen defined a computer virus as “a program that can “infect” other programs by modifying them to include a version of itself.” This means that viruses copy themselves, usually by encryption* or by mutating** slightly each time they copy. There are several types of viruses, but the ones that are the most dangerous are designed to corrupt your computer or software programs. Viruses can range from an irritating*** message flashing on your computer screen to eliminating data on your hard drive. Viruses often use your computer's internal clock as a trigger. Some of the most popular dates used are Friday the 13th and famous birthdays. It is important to remember that viruses are dangerous only if you execute (start) an infected program. There are three main kinds of viruses. Each kind is based on the way the virus spreads.
1. Boot Sector Viruses - These viruses attach themselves to floppy disks and then copy themselves into the boot sector of your hard drive. (The boot sector is the set of instructions your computer uses when it starts up.) When you start your computer (or reboot it; your hard drive gets infected. You can get boot sector viruses only from an infected floppy disk. You cannot get one from sharing files or executing programs. This type of virus is becoming less common because today's computers do not require a boot disk to start, but they can still be found on disks that contain other types of files.
One of the most common boot sector viruses is called "Monkey”, also known as "Stoned".
2. Program Viruses - These viruses (also known as traditional file viruses) attach themselves to programs' executable files. They can infect any file that your computer 113 runs when it launches a program. When you start a program that contains a virus, the virus usually loads into your computer's memory. When the virus is in your computer's memory, it can infect any other program that is started. Program viruses that have circulated recently are "SKA" and "Loveletter." 3. Macro Viruses - These viruses attach themselves to templates that are used to create documents or spreadsheets. Once a template is infected, every document or spreadsheet you open using that program also will become infected. Macro viruses are widespread because they infect commonly used office applications and spread between PCs and Macintoshes. Macro viruses include “Concept”, “Melissa”, and “Have a Nice Day”.
Notes:
*encryption - кодирование
**mutating - мутация
***irritating – раздражающий
Exercise 1. Say what you have learned about:
a) boot sector viruses
b) program viruses
c) macro viruses
Exercise 2. Compare this subdivision with the subdivision of viruses in the main text.
TEXT 4
Read the text and answer the questions asked in the text.
