
- •Часть III
- •050100.62 «Педагогическое образование»,
- •Рецензенты: Лихачева о. Е.,
- •Юдина н. В.,
- •Введение
- •Рекомендации студентам по работе с учебными текстами по специальности
- •1. Произношение и чтение
- •2. Работа с лексикой
- •3. Работа над упражнениями
- •Computing text 1
- •1. Read and translate the following international words:
- •2. Read and translate the derivatives:
- •3. Study the active vocabulary:
- •4. Read and translate the text: History of computers
- •Exercises
- •1. Translate the following words and word combinations into Russian:
- •2. Translate the following words and word combinations into English:
- •3. Fill in the gaps with the correct words.
- •4. Express agreement or disagreement with the following. Use the phrases:
- •5. Answer the following question:
- •8. Speak on the history of computers. Text 2
- •1. Read and translate the following international words:
- •2. Read and translate the derivatives:
- •3. Study the active vocabulary:
- •4. Read and translate the text: Types of computers
- •Exercises
- •1. Translate the following words and word combinations into Russian:
- •2. Translate the following words and word combinations into English:
- •3. Fill in the gaps with the correct words.
- •4. Express agreement or disagreement with the following.
- •5. Answer the following question:
- •7. Look at the computers of your fellow-students and determine their types.
- •8. Speak on the types of computers. Text 3
- •1. Read and translate the following international words:
- •2. Read and translate the derivatives:
- •3. Study the active vocabulary:
- •4. Read and translate the text: Hardware
- •Exercises
- •1. Translate the following words and word combinations into Russian:
- •2. Translate the following words and word combinations into English:
- •3. Fill in the gaps with the correct words.
- •4. Express agreement or disagreement with the following.
- •1. Read and translate the following international words:
- •2. Read and translate the derivatives:
- •3. Study the active vocabulary:
- •4. Read and translate the text: Types of Software
- •Exercises
- •1. Translate the following words and word combinations into Russian:
- •2. Find the equivalents in the text:
- •3. Express agreement or disagreement with the following:
- •4. Answer the following question:
- •5. Choose the words mean “Software”:
- •6. Put the verbs in correct tense-forms:
- •7. Make a list of your favourite software programmes on your computer.
- •8. Speak on software. Text 5
- •Operating systems
- •Exercises
- •1. Translate the following words and word combinations into Russian:
- •2. Translate the following words and word combinations into English:
- •3. Fill in the gaps with the correct words.
- •4. Express agreement or disagreement with the following.
- •5. Answer the following question:
- •6. Complete the sentences:
- •7. Find the equivalents in the text:
- •8. Speak on operating systems. Text 6
- •1. Read and translate the following international words:
- •2. Read and translate the derivatives:
- •3. Study the active vocabulary:
- •4. Read and translate the text: Programming Languages
- •Exercises
- •1 Give Russian equivalents:
- •2. Give English equivalents:
- •3. Fill in the gaps with the correct words.
- •4. Express agreement or disagreement with the following.
- •5. Complete the sentences:
- •6. Answer the following question:
- •7. Put the verbs into the correct tense form:
- •8. Translate into Russian:
- •9. Speak on the programming languages. Text 7
- •1. Read and translate the following international words:
- •2. Read and translate the derivatives:
- •3. Study the active vocabulary:
- •4. Read and translate the text: Malicious software (Malware)
- •Exercises
- •1. Translate the following words and word combinations into Russian:
- •2. Translate the following words and word combinations into English:
- •3. Fill in the gaps with the correct words.
- •4. Express agreement or disagreement with the following.
- •5. Complete the sentences:
- •6. Answer the following question:
- •7. Match the passages (1-7) of the text and their subtitles:
- •8. Speak on malware. Text 8
- •1. Read and translate the international words without using a dictionary:
- •2. Read and translate the derivatives:
- •3. Study the active vocabulary:
- •4. Read and translate the text: Careers
- •Exercises
- •1. Translate the following words and word combinations into Russian:
- •2. Translate the following words and word combinations into English:
- •3. Fill in the gaps with the correct words.
- •4. Say if the statements are true or false:
- •5. Answer the following question:
- •6. Complete the sentences:
- •7. Translate the text in written form: Problems with hand-based input/output
- •8. Speak on the history of computers. Text 9
- •1. Study the vocabulary:
- •2. Read and translate the text:
- •Volume Label
- •Exercises
- •1. Answer the questions to the above text:
- •2. Give English equivalents:
- •3. Match up:
- •4. Pick out the right definition:
- •5. Answer the questions:
- •6. Find the correct answer:
- •7. Fill in the blanks:
- •Volume label files device names spreadsheets and word processors
- •8. Translate into Russian:
- •9. Translate into English:
- •10. Give summary of the text. Text 10
- •1. Read and translate the text. The Internet
- •Exercises
- •6. Put the verbs into the correct tense form:
- •7. Fill in the blanks:
- •8. Translate into Russian:
- •Основная литература
- •Периодические издания
- •Интернет-ресурсы
8. Translate into Russian:
1. Люди передают компьютеру команды на языке символов, поэтому, чем легче такое взаимодействие, тем шире могут быть применены компьютеры.
2. В настоящее время существует тенденция к переходу к языкам более высокого уровня, называемым языком спецификаций, а также к использованию инструментов программного обеспечения.
3. Многие программисты используют С для написания коммерческих прикладных программ для мини-, макро- и персональных компьютеров.
4. Это означает, что язык высокого уровня удобен и прост в описании информационных структур и порядка действий, необходимых для выполнения определенного задания.
9. Speak on the programming languages. Text 7
При работе над текстом “Malware” формируется компетенция ОК-10: владеет одним из иностранных языков на уровне, позволяющем получать и оценивать информацию в области профессиональной деятельности из зарубежных источников.
В рамках формирования компетенции у студентов вырабатываются следующие умения, навыки:
Уметь
понимать информацию текстов из учебной литературы в соответствии с конкретной целью;
выступать с подготовленным сообщением.
Владеть
навыками оформления речевых высказываний в соответствии с грамматическими и лексическими нормами устной и письменной речи, фонетическими нормами (устная речь) и основными правилами орфографии и пунктуации (письменная речь) иностранного языка, не допуская ошибок, препятствующих речевому общению;
навыком использования двуязычных словарей при чтении различного типа текстов;
профессиональными основами речевой коммуникации с использованием терминологии данной дисциплины.
Применяются интерактивные технологии: работа малыми группами, решение ситуационных задач.
1. Read and translate the following international words:
category, design, computer, system, type, Trojan, virus, program, copy, original, disk, file, contrast, code, text, video, audio, problem, result.
2. Read and translate the derivatives:
to permit - permission
to infect – infected - uninfected
harm - harmless
to ride – ridden – bugridden
net – network
spread – spreadsheet
able – ability
3. Study the active vocabulary:
to infiltrate - проникать
damage - вредить
spyware — шпионящее ПО
adware — рекламное ПО
worm - «червь», самораспространяющаяся вирусная программа
threat - угроза
infect — заражать, инфицировать
spread - распространяться
host - хозяин
to access – иметь доступ
harmless - безвредный
to execute - выполнять
to insert - вставлять
to delete –удалять
a system crash – полный отказ системы
bug — ошибка в программе
a boot sector – загрузочный сектор
spreadsheet – электронная таблица
4. Read and translate the text: Malicious software (Malware)
Malware is a broad category of software designed to infiltrate or damage a computer system. Types of malware include spyware, adware, Trojan horses, worms, and true viruses.
A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The original may modify the copies or the copies may modify themselves. A virus can spread from one computer to another when its host (as a floppy disk, CD, or USB drive) is taken to the uninfected computer. Viruses can also spread to other computers by infecting files on a network file system or a file system that is accessed by another computer.
Viruses are sometimes confused with computer worms and Trojan horses. A worm, however, can spread itself to other computers as part of a host. A Trojan horse is a file that is harmless until executed. In contrast to viruses, Trojan horses do not insert their code into other computer files.
Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Others simply replicate themselves and perhaps make their presence known by presenting text, video, or audio message. Even these benign viruses can create problems for the computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause erratic behavior and can result in system crashes. In addition, many viruses are bugridden, and these bugs may lead to system crashes and data loss.
Many personal computers are now connected to the Internet and to local-area networks. There are many viruses operating in the Internet today, and new ones are discovered every day. The first PC virus was a boot sector virus called Brain, created in 1986 by two brothers from Pakistan. The brothers reportedly created the virus to deter pirated copies of software they had written.
Since the mid-1990s, macro viruses have become common. Most of these viruses are written in the scripting languages for Microsoft programs such as Word and Excel. These viruses spread in Microsoft Office by infecting documents and spreadsheets. Since Word and Excel were also available for Mac OS, most of these viruses were able to spread on Macintosh computers as well. Most of these viruses did not have the ability to send infected e-mail. Those viruses which did spread through e-mail took advantage of the Microsoft Outlook COM interface.
A virus may also send a web address link as an instant message to all the contacts on an infected machine. If the recipient, thinking the link is from a friend follows the link to the website, the virus at the site can infect this new computer and continue propagating.