
- •Lesson 1 computer users Glossary to learn
- •Computer Users
- •Comprehension check
- •Here are some terms of computer systems. Be able to comment on them, “decode” them for a freshman in computing.
- •II. Insert the necessary words.
- •III. Find the answers to these questions in the text.
- •Discussion
- •Discuss with your partner what you have learned from the text about the structure of computer systems, types of computers and the Internet services.
- •Make up your own vocabulary on this text. Use each term of it in the sentence of your own.
- •Lesson 2
- •Computer architecture
- •Glossary to learn
- •Computer Architecture
- •Comprehension check
- •II. What do these abbreviations mean?
- •III. Complete the sentences or insert the necessary word.
- •Discussion
- •Lesson 3 computer applications Glossary to learn
- •Computer Applications
- •Comprehension check
- •Complete the sentences.
- •Make up questions for these answers.
- •Answer the questions and give reasons for your answers.
- •Discussion
- •I. Discuss with your partner what you have learned from the text about
- •II. Look at the text and decide what new expressions and abbreviations illustrate
- •Lesson 4 operating systems Glossary to learn
- •Operating Systems
- •Comprehension check
- •I. Find the answers to these questions.
- •II. Complete the gaps in this summary of the text on operating systems using these words and phrases:
- •Discussion
- •Lesson 5 applications programs Glossary to learn
- •Applications Programs
- •Comprehension check
- •II. Identify the function of the following applications programs:
- •III. Insert the necessary words or abbreviation.
- •Discussion
- •Lesson 6 networks Glossary to learn
- •Networks
- •Comprehension check
- •I. Choose the necessary definition to each sentence.
- •II. Express your agreement or disagreement with the following.
- •III. Answer the questions.
- •Discussion
- •I. Comment on the text using the following prompts.
- •II. Give a brief summary of the text.
- •Lesson 7
- •The internet
- •Glossary to learn
- •Irc (Internet relay chat)
- •The Internet
- •Comprehension check
- •II. Read the questions below and answer them.
- •III. Explain what is:
- •IV. Mark the following as true or false.
- •Discussion
- •Do you agree that the Internet is giant breakthrough in information technology field? Why? Give your reasons.
- •What in your opinion are positive and negative sides of the Internet? List your ideas and compare them with your groupmates.
- •III. Summarise the information presented in the text.
- •Lesson 8
- •Multimedia
- •Glossary to learn
- •Pronounce the words and abbreviations correctly.
- •Find the transcription for each combination of words.
- •Multimedia
- •Comprehension check
- •I. Read the questions below and find the answers in the text.
- •II. Say whether the following statements are true or false.
- •IV. Say what you have learned from the text about
- •Discussion
- •I. Do you agree that
- •II. Summarize the information presented in the text.
- •Lesson 9
- •Websites
- •Glossary to learn
- •Websites
- •Comprehension check
- •I. Mark the following statements as true or false and if they are false correct them.
- •Discussion
- •Lesson 10 communications systems Glossary to learn
- •Communications Systems
- •Comprehension check
- •I. Study these examples of abbreviations used in mobile phone text massages. Try to guess the meaning of the other abbreviations.
- •II. What do these abbreviations mean?
- •III. Read the question and find the answer in the text.
- •IV. Fill in the gap with necessary word, word-combination or abbreviation.
- •Discussion
- •Lesson 11 the world wide web Glossary to learn
- •Rewrite the underlined words in transcription in your copybooks.
- •II. Give these abbreviations a full form.
- •The World Wide Web
- •Comprehension check
- •Discussion
- •II. Try to describe to each other a process of streaming.
- •Lesson 12
- •Software engineering
- •Glossary to learn
- •Software Engineering
- •Comprehension check
- •I. Explain what is meant by the following word combinations:
- •II. Put these five stages of programming in the correct sequence.
- •III. To which stage does each of these steps belong?
- •Discussion
- •I. Work in pairs. Together decide what would be the most appropriate language to use for each of these situations.
- •II. Give a brief summary of the text.
- •Lesson 13
- •The future of it
- •Glossary to learn
- •The Future of it
- •Comprehension check
- •Give the definition of the following word-combinations and words.
- •How do you think developments in it will affect these areas of life in the next ten years?
- •Put the parts of the sentences in the right order.
- •Discussion
- •Lesson 14 data security 1 Glossary to learn
- •Data Security 1
- •Comprehension check
- •Consider the following questions on the text.
- •III. Read the short descriptions of computer crimes. Decide in your group what kind of crime is mentioned in each case. Name them.
- •Discussion
- •I. Find the other examples of computer crimes in daily newspapers. Discuss them.
- •II. Comment on the text. Tell your partner what information might be interesting and useful to you.
- •Lesson 15
- •Data security 2
- •Glossary to learn
- •I. Pronounce the combinations of words correctly.
- •II. Find the transcription for each combination of words.
- •Data Security 2
- •Comprehension check
- •I. Find words or phrases in the text which mean
- •II. Put the verbs in brackets in the correct form in this description of how smart cards work.
- •III. Decide on the relationship between these events. Then link them in the right order to make up a description of operation of anti-virus program.
- •Make up questions for these answers.
- •Discussion
Comprehension check
Consider the following questions on the text.
What is the function of a JUMP command?
What are the main parts of viruses?
Which programs do viruses normally attach themselves to?
How does a Trojan differ from a virus?
What do virus types include?
Match each virus routine to its function.
Routine |
Function |
1. misdirection |
a. does the damage |
2. reproduction |
b. attaches a copy of itself to another program |
3.trigger |
c. hides the presence of the code |
4. payload |
d. decides when and how to activate the payload |
III. Read the short descriptions of computer crimes. Decide in your group what kind of crime is mentioned in each case. Name them.
Leaving, within a completed program, an illicit program that allows unauthorized – and unknown – entry.
Using another person’s identification code or using that person’s files before he or she has logged off.
Adding concealed instructions to a computer program so that it will still work but will also perform prohibited duties. In other words, it appears to do something useful but actually does something destructive in the background.
Tricking a user into revealing confidential information such as an access code or a credit-card number.
Inundating an email address with thousands of messages, thereby slowing or even crashing the server.
Manipulating programs or data so that small amounts of money are deducted from a large number of transactions or accounts and accumulated elsewhere. The victims are often unaware of the crime because the amount taken from any individual is so small.
Unauthorised copying of a program for sale or distributing to other users.
Swamping server with large numbers of requests.
Redirecting anyone trying to visit a certain site elsewhere.
Changing the information shown on another person’s website.
Discussion
I. Find the other examples of computer crimes in daily newspapers. Discuss them.
II. Comment on the text. Tell your partner what information might be interesting and useful to you.
Lesson 15
Data security 2
Glossary to learn
controlling physical access
backing up
implementing network controls
password
firewall
encrypting data
callback system
signature verification
biometric security devices
separating and rotating the computing functions
audits
protecting against natural disasters
uninterruptible power supplies
surge protectors
protecting against viruses
antivirus program
public domain software
shareware
backup program
incremental backup
archive bit
differential backup
full backup
backup set
I. Pronounce the combinations of words correctly.
Controlling physical access, backing up, implementing network controls, separating and rotating the computing functions, protecting against natural disasters, protecting against viruses.