Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
методичка-(5курс)1ч.doc
Скачиваний:
0
Добавлен:
01.05.2025
Размер:
359.94 Кб
Скачать

12. Choose the appropriate form of the modal verb:

1. My professor said we (must, can, may, could) read it if we needed extra credit.

2.Sue (might, could, should, shall) be able to help them.

3. I didn’t (must, need, should, ought) to get up early, so I didn’t.

4. We’ve got plenty of time. We (mustn`t, don`t need, shouldn’t, couldn’t) to hurry.

5. You’ve been reading all day. You (can, could, must, should) be tired.

6. I understand it very well. You (shouldn’t, wouldn’t, mustn’t, needn’t) explain further.

7. He (can, would be able to, may, will be able to, may) pass the exam if he studied harder.

8. The atom (can, may, could, must) be used for the good of mankind.

9. The engineers (might, may, could, need) have examined this device yesterday.

10. Не (couldn`t, shouldn’t, wouldn’t, mustn’t) have used this device, it was out of order.

13. Translate the following sentences into English. Pay attention to the modal verbs:

1. Атом потрібно використовувати на благо людства.

2. Інженери можуть досліджувати цей пристрій.

3. Комп'ютер може виконувати різні математичні операції.

4. Робітники повинні застосовувати нові методи на виробництві.

5. Кожен студент повинен знати різницю між автоматизацією та механізацією.

6. Вона може використовувати різні методи у своїй дослідницькій роботі.

7. Це обладнання може працювати з високою точністю.

8. Сучасні комп'ютери можуть перемножити два числа в мікросекунди.

14. Your friend recently bought a computer. He has a problem with computer security. Give him advices :

- how do you defend your computer;

- what to do to neutralize computer virus;

- what antivirus program to use.

Write a letter of at least 160 words using the next words and word combinations:

hackers / computer / thieves / software / video games / spread / specific program / spam / virus / device

15. Read the supplementary text and entitle it. Translate the text into Ukrainian and put 15 different questions.

Computer crime encompasses a broad range of activities. Generally, however, it may be divided into two categories: (1) crimes that target computers directly; (2) crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.

A computer virus is a computer program that can copy itself and infect a computer. A true virus can spread from one computer to another when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.

As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses may harm a computer system's data or performance. Some viruses have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.