
- •Uses for computers
- •Read the following words.
- •1.2. Read and translate the following word-combinations.
- •Learn key words and word-combinations.
- •Read and translate the text. What is a computer?
- •1.5 Give English equivalents of the following words and word-combinations.
- •1.6 Match the terms to their definitions.
- •1.7 Answer the questions.
- •Read and translate the following word-combinations.
- •2.2 Read and learn key words and word –combinations.
- •Read and translate the text. Computers in business
- •Give English equivalents of the following words and word-combinations.
- •Put the verb into the correct form.
- •2.6 Answer the questions.
- •3.1 Translate the following word-combinations from English into Ukrainian.
- •3.2 Learn key words and word-combinations.
- •Read and translate the text. Computers in retailing
- •4.2 Learn key words and word-combinations.
- •4.3 Read and translate the text. Computers in the arts and entertainment
- •4.8 Answer the questions.
- •5.1 Read and translate the following word-combinations.
- •5.2 Learn key words and word combinations.
- •Read and translate the text. Computers in education
- •Answer the questions.
- •Anatomy of computers
- •Read and translate the following words and word – combinations.
- •Learn key words and word-combinations.
- •Read the text and discuss the types of computers. Types of computers
- •Answer the questions.
- •2.1 Read and translate the text. Write out computer terms. Computer programs and computing concepts
- •2.2 Give English equivalents of the following words and word-combinations.
- •3.1 Translate the following word and phrases into Ukrainian.
- •3. 2 Learn key words and word-combinations.
- •Read and translate the text. Systems. Information. Codes
- •3.8 Answer the questions.
- •4.1 Read the text and translate it. Write out the computer terms and learn them.
- •Information and communication systems
- •4.2 Give the definition of the following terms.
- •Read and translate the following words and phrases.
- •Key words and word-combinations:
- •Read and translate the text. Personal computer systems. Keyboard, display and printers
- •5.4 Give synonyms.
- •Give antonyms.
- •Translate the following sentences into English.
- •5.8 Answer the questions.
- •6.1 Read and translate the following words and word-combinations.
- •Learn key words and word combinations:
- •6.3Read and translate the text. The system unit
- •Give Ukrainian equivalents of the following word – combinations.
- •6.4 Give synonyms.
- •Fill in the blanks with the words from the text.
- •6. 6 Translate the following words and phrases into English.
- •Translate the sentences into English using the necessary terms from the text
- •6. 8 As we have seen there are three types of memory used by computers: ram, rom and storage memory. Look through this list of features and decide which type of memory they refer to.
- •6.9 Answer the questions.
- •Test yourself
- •Personal computer
- •Read and translate the following words and word-combinations.
- •Learn key words and word-combinations.
- •Read and translate the text. Types of software
- •Find synonyms.
- •F rom, graphic and intuitive tools, a window, interface ill in the blanks with the words from the box.
- •Explain the following terms in your own words.
- •1.7 Translate into English off-hand. Інтерфейс користувача
- •1.8 Answer the questions.
- •2.1 Read and translate the following words and word-combinations.
- •2.2 Learn key words and expressions.
- •2.3 Read and translate the text. Operating systems
- •3.1 Read and translate the following words and word-combinations.
- •3.2 Learn key words and word-combinations.
- •3.3 Read and translate the text. Comparing operating systems
- •3.4 Find synonyms.
- •3.5 Complete the sentences with the phrases from the box. You can use the phrase more
- •3.6 Translate the following compound nouns into Ukrainian.
- •3.7 Translate into English off-hand.
- •3.8 Answer the questions.
- •3.9 Read and summarize the article.
- •4.1 Read and translate the following words and word-combinations.
- •4.2 Learn key words and word-combinations.
- •4.3 Read and translate the text. Application software
- •4.8 Answer the questions.
- •5.1 Read and translate the following words and word-combinations.
- •5.2 Learn key words and phrases.
- •5.3 Read and translate the text. Graphics and communications software
- •5.4 Give Ukrainian equivalents of the following terms and expressions.
- •5.5 Find synonyms.
- •5.7 Complete the sentences by using an appropriate gerund from those in the box.
- •Translate into English.
- •Answer the questions.
- •Read and translate the text. Write out computer terms. Desktop publishing
- •Answer the questions.
- •7.1 Read and translate the following words and word-combinations.
- •Learn key words and word-combinations.
- •7.3 Read and translate the text. Database software
- •Give English equivalents.
- •Give synonyms
- •Answer the questions.
- •Test yourself
- •Read and translate the following words and word-combinations.
- •1.2 Learn key-words and expressions.
- •Read and translate the text. Computer system input
- •Find synonyms.
- •Give English equivalents.
- •2.3 Read and translate the text. Keyboards
- •2.4 Find synonyms.
- •2.5 Form the plural of the following nouns.
- •2.6 Give English equivalents.
- •2.7 Match these descriptions with the names of keys on the right.
- •2.8 Translate into English.
- •2.9 Answer the questions.
- •3.1 Read and translate the following words and word-combinations.
- •3.2 Read and translate the text. Write out computer terms. Pointing devices
- •3.3 Give English equivalents of the following words and expressions.
- •3.4 Give synonyms of the following verbs. Make up sentences with some of these verbs.
- •3.5 Complete the sentences with the words from the box. You can use some words more than once.
- •3.6 Here are some basic mouse actions. Match the terms in the box with the explanations below.
- •3.7 Answer the questions.
- •4.1 Read and translate the following words and word-combinations.
- •Learn key words and word-combinations.
- •4.3 Read the text about scanners. First read it all the way through. Underline the basic methods of character recognition and compare your ideas with a partner. Scanners Part1
- •Translate into English.
- •Answer the questions.
- •Read the text about sensors and give the examples of their application. Sensors
- •Test yourself
- •Unit 5 output
- •Read and translate the following words and word-combinations.
- •1.2. Learn key words and word-combinations.
- •1. 3 Read and translate the text. Printers
- •Printers
- •Give English equivalents:
- •Fill in the blanks with the words from the text.
- •Put the verb into the correct form.
- •A) Compare impact and non-impact printers. Talk about their: speed, memory, resolution,
- •1.8 Read the passage and choose the best answer to each question.
- •2.1 Read and translate the following words and word-combinations.
- •2.2 Learn key words and word-combinations.
- •Read and translate the text. Display technology
- •Types of displays
- •2.4 Give English equivalents.
- •2.5 Translate into English the following sentences using the… the… (with two comparatives) to say that one thing depends on another thing. Find the sentences with such a structure in the text.
- •Translate the following sentences into English.
- •Fill in the blanks with the words from the text.
- •2.8 Read the passage and compare passive matrix and active-matrix lcDs.
- •Put the verb into the correct form.
- •Test yourself
- •Processors and memories
- •1.1 Read and translate the following words and expressions.
- •1.2 Learn key words and word – combinations.
- •1.3 Read and translate the text. What is a processor?
- •1.4. Complete the sentences with the words from the box.
- •Put the verb into the correct form.
- •1.6 Use the information in the text and match the terms in the box with the appropriate explanation or definition below.
- •1.7 Answer the questions.
- •2.1 Read and translate the following words and expressions.
- •2.2 Learn key words and word –combinations.
- •2.3 Read and translate the text. What is a memory?
- •Give synonyms of the following words.
- •2.5 Complete the sentences using the words from the box. You can use some words more than once.
- •2.6 Give English equivalents of the following words and word – combinations.
- •2.7 Translate into English in writing.
- •2.9 Answer the questions.
- •Test yourself Match the following terms to the appropriate definition
- •I. A technique for creating the illusion that a computer has more memory than
- •40. Which of the following is not a part of the central processing unit?
- •Mass storage
- •1.1 Read and translate the following words and word-combinations.
- •1.2 Learn key words and word-combinations.
- •Read and translate the text. Files and mass storage
- •1.4 Give English equivalents of the following words and word-combinations:
- •1.5 Complete the sentences with the words from the box.
- •Answer the questions.
- •2.1 Read and translate the following words and word-combinations.
- •2.2 Learn key-words and word-combinations.
- •2.3 Read and translate the text. Magnetic tape and disk devices
- •2.4 Give English equivalents of the following words and word-combinations.
- •2.5 Translate the following sentences into English.
- •2.6 Form the words from the followings nouns and complete the sentences with some of these words.
- •3.1 Read and translate the following words and word-combinations.
- •Learn key-words and word-combinations.
- •3.3 Read and translate the text. Hard disks
- •3.4 Give English equivalents.
- •3.6 Answer the questions.
- •4.1 Read and translate the following words and phrases.
- •4.2 Learn the key-words and word-combinations:
- •4.3 Read the text and note in the table the points for and against the three main types of optical disks. Then make notes about their use. Optical disks
- •4.4 Translate into English the following word-combinations so that you could form compound nouns:
- •Test yourself Match the following terms to the appropriate definition:
- •Unit 8 communications
- •Read and translate the text. Computer networks
- •Translate the following words and words-combinations into English so that you could form compound nouns.
- •Give English equivalents of the following words and word-combinations.
- •Fill in the blanks with the words from the text.
- •Translate into English.
- •Substitute the underlined word or phrase with the most suitable word from the box.
- •Answer the questions.
- •Read and translate the following words and word-combinations.
- •Learn the key words and word-combinations.
- •Communication channels
- •Translate the following phrases so that you could form compound nouns.
- •Give English equivalents of the following phrases.
- •Find synonyms.
- •Fill in the blanks with the words from the text.
- •Explain the following terms in your own words.
- •Answer the questions.
- •3.1 Read and translate the following word-combinations.
- •3.2 Learn key words and word-combinations.
- •3.3 Read and translate the text.
- •3.4 Answer the questions.
- •Read and translate the text. The internet
- •4.6 Fill in the blanks with the words from the text.
- •4.7 Put the verb into the correct form.
- •4.8 Proverbs for the Internet. Try to guess what proverbs they originated from.
- •4.10 Make a report on
- •Test yourself Match the following key terms to the appropriate definition:
- •12. Circuit switching
- •13. Packet switching
- •14. Communication channel
- •Unit 9 software development
- •Read and translate the following words and word-combinations.
- •Learn key-words and word-combinations.
- •1.3Read and translate the text. The phases of sofware development
- •Give English equivalents of the following words and word-combinations.
- •Give the definition of the following terms in English.
- •1.6 Translate the following sentences into English.
- •1.7 Fill in the blanks with the words from the box. You can use the word more than once.
- •1.8 Answer the questions.
- •1.9 Write a brief report comparing two program generators.
- •2.1 Read and translate the following words and phrases.
- •Learn key words and word-combinations.
- •Read and translate the text. Structured and object-oriented programming
- •Translate the following word-combinations into English so that you could form compound nouns.
- •Translate the following sentences into English.
- •Fill in the blanks with the words from the box.
- •2.7. Explain the following terms in your own words.
- •2.8 Answer the questions.
- •Test yourself
- •Information systems and databases
- •Read and translate the following words and word-combinations.
- •1.2 Learn key-words and word-combinations.
- •1.3 Read and translate the text. Management information systems
- •Give the definition of the following terms in English.
- •1.4 Translate the following word-combinations into English.
- •1.5Translate the following sentences into English.
- •1.6 Fill in the blanks with the words from the box.
- •1.7 Answer the questions.
- •2.1 Translate the following words and word-combinations.
- •2.2 Learn key-words and word-combinations.
- •Read and translate the text. Distributed database
- •Give the definition of the following terms in English.
- •2.6 Translate the following words and phrases into English.
- •Answer the questions.
- •Test yourself Match the following key terms to the appropriate definition:
- •Is technology making us intimate strangers?
- •3. Read and discuss the article.
- •Read and discuss the article.
- •5. Read and discuss the article. Express your opinion on the issue using specific reasons and examples to support your answer.
- •Read and discuss the article. Why do you think some people are inclined to using jargon?
- •Read and discuss the article. Do you believe that the future is fuzzy? Explain your opinion, referring to scientific journals.
- •Read the information on viruses.
- •11.Read and discuss the information.
- •Internet bots.
- •12. Read and discuss the article dedicated to a new technology in communications.
- •13. Read and discuss the article . Explain your opinion on today’s contest between hd-dvd and blu-ray.
- •Read and discuss the article. Do you think that grid computing's biggest problem? Do you agree or disagree with this point of view? Use specific reasons and examples to support your answer.
- •In praise of p2p
Read the information on viruses.
ABOUT VIRUSES, WORMS & TROJANS.
What is a Computer Virus? A computer virus is a program that requires a host in order to make copies of itself on computer disks. Viruses may infect (copy to, and spread from), program files, programs in disk sectors, and files that use macros. The ability to self-replicate distinguishes viruses from programs that do not, and this parasitic nature is neither an accident, nor a computer glitch. All viruses are created by people who know how to write computer programs.
Why are they Called Viruses? The first theories about the possibility of creating a self-replicating program date back to 1949, and experimental viruses were first programmed and tested in the 1960s. They got their name in 1984, when a university professor used the term "virus" to describe them, because like a biological virus, a computer virus is small, makes copies of itself, and cannot exist without a host. When personal computers became popular, PC viruses began to appear (in 1986-1987), at first intended as jokes, or developed for research or demonstration purposes.
What is a Computer Worm? As intranets and the Internet have grown in popularity, e-mail has evolved from a convenience to a necessity. Virus vandals know that, and they've invented new ways to use e-mail to spread viruses, and especially, worms. A worm program is similar to a virus. It is considered by some to be a subset of a virus in that it makes copies of itself but does so without needing to modify a host. Like viruses, worms may (or may not) do things other than replicate.
What is a Trojan horse? Trojan horse programs are named for the giant wooden horse that concealed Greek soldiers who used it to invade the ancient city of Troy. Like that famous trick, a Trojan horse program conceals hidden programming. The hidden function may just be a joke, or something annoying, but vandals often use Trojan horse programs to destroy other people's data, knowing that some people will run any program that
has an interesting file name, or promises to perform a useful function.
Are all these programs harmful? They waste disk space and memory, delay computer operations, and increase the likelihood of system crashes. They are often poorly written and may function erratically, overwrite data, and cause programs to run erratically. Many also have destructive routines to alter or overwrite data. In addition, the cost of antivirus software and the time recovering from virus damage is passed along to consumers by businesses at the cash register.
Who creates these programs - and why? Virus writers range from researchers, to pranksters, to malicious vandals. The typical virus writer is an otherwise intelligent male, between 15 and 23 years old. He may be bored, curious, or intent on doing forbidden things, just to frighten others. Some belong to organized virus-writing groups (usually shortlived), and those in the group often respond to peer pressure, trying to outdo the others. Whether in a group or not, some get satisfaction from the challenge, while others think of themselves as rebels against the "system."
How do they spread? Viruses and Trojans spread from one computer to another by using one or more methods, all of which depend on user carelessness. Some people never have a problem, but others who are not as careful (or lucky) infect their hard disk by running downloaded files, or after placing a newly-obtained floppy disk in a drive. Viruses and worms spread fastest among computers networked on a LAN, especially when e-mail file attachments are involved.
Is sharing files a problem? Sharing certain types of files with others always involves some certain risk. The medium is irrelevant; files from a LAN server, downloaded from Internet sites, from a floppy (even from shrink-wrapped software). Riskiest of all are files posted on Internet newsgroups, because there is no control or accountability. Many people have become the first victims of brand-new viruses and worms, by downloading executable files that were posted deliberately by vandals.
What about e-mail? Before the growth of the Internet, viruses used to spread more slowly, from user to user, and anti-virus vendors were usually able to distribute a remedy before things got out of hand. That's all changed, especially with worms, because some people will click on any e-mailed file that they receive. Vandals have seized their opportunity, and created programs designed to spread to all those who correspond with careless users. Because of this threat, the only 100 percent safe e-mail file attachment is a deleted e-mail file attachment.
Can cookie contain a virus? Some Web sites store information on your computer, in small text files called cookies, that can be used when you re-visit that site. Examples include items you've "selected for purchase, registration data, or your user name and password, for Web sites that require them. Since cookies are text files, they are not executable, and this fact eliminates the possibility of viruses, because they must be hosted by an executable file. It is theoretically possible to include UUencoded or MIME comments, but decoding a UUencoded or MIME file and executing it is not possible.
Do you need to worry?
Worrying will get you nowhere. Instead, take sensible precautions, to avoid losing data should you be affected by a program that was designed to cause problems. Many people are fortunate never to encounter one, but a vandal's program could be concealed in the next file you download, or in a file attached to an e-mail message. Or the threat could be on the next floppy you insert in a disk drive, especially one obtained from a friend, a co-worker, or a fellow student.
How can you tell whether your computer is infected?
Because some viruses cause strange things to happen, an odd or unexplained event may lead a user to conclude a virus must be responsible, without bothering to explore other possible causes. On the other hand, many viruses are carefully programmed to do nothing to betray their presence. The solution to this dilemma is not to assume anything, but to rely upon anti-virus software as a diagnostic tool.
How can you protect your data?
If you have files you can't afford to lose, make sure you have more than one copy of them. Programs may already be backed up on their original installation disks, but what about the files that you create? Business records, spreadsheets, manuscripts, and other important files can be lost in an instant to a virus, or to other causes, hard disk failure among them. If no other copy of your files exists, make copies of them, before it's too late.