
- •Lesson 1 computer users Glossary to learn
- •Computer Users
- •Comprehension check
- •Here are some terms of computer systems. Be able to comment on them, “decode” them for a freshman in computing.
- •II. Insert the necessary words.
- •III. Find the answers to these questions in the text.
- •Discussion
- •Discuss with your partner what you have learned from the text about the structure of computer systems, types of computers and the Internet services.
- •Make up your own vocabulary on this text. Use each term of it in the sentence of your own.
- •Lesson 2
- •Computer architecture
- •Glossary to learn
- •Computer Architecture
- •Comprehension check
- •II. What do these abbreviations mean?
- •III. Complete the sentences or insert the necessary word.
- •Discussion
- •Lesson 3 computer applications Glossary to learn
- •Computer Applications
- •Comprehension check
- •Complete the sentences.
- •Make up questions for these answers.
- •Answer the questions and give reasons for your answers.
- •Discussion
- •I. Discuss with your partner what you have learned from the text about
- •II. Look at the text and decide what new expressions and abbreviations illustrate
- •Lesson 4 operating systems Glossary to learn
- •Operating Systems
- •Comprehension check
- •I. Find the answers to these questions.
- •II. Complete the gaps in this summary of the text on operating systems using these words and phrases:
- •Discussion
- •Lesson 5 applications programs Glossary to learn
- •Applications Programs
- •Comprehension check
- •II. Identify the function of the following applications programs:
- •III. Insert the necessary words or abbreviation.
- •Discussion
- •Lesson 6 networks Glossary to learn
- •Networks
- •Comprehension check
- •I. Choose the necessary definition to each sentence.
- •II. Express your agreement or disagreement with the following.
- •III. Answer the questions.
- •Discussion
- •I. Comment on the text using the following prompts.
- •II. Give a brief summary of the text.
- •Lesson 7
- •The internet
- •Glossary to learn
- •Irc (Internet relay chat)
- •The Internet
- •Comprehension check
- •II. Read the questions below and answer them.
- •III. Explain what is:
- •IV. Mark the following as true or false.
- •Discussion
- •Do you agree that the Internet is giant breakthrough in information technology field? Why? Give your reasons.
- •What in your opinion are positive and negative sides of the Internet? List your ideas and compare them with your groupmates.
- •III. Summarise the information presented in the text.
- •Lesson 8
- •Multimedia
- •Glossary to learn
- •Pronounce the words and abbreviations correctly.
- •Find the transcription for each combination of words.
- •Multimedia
- •Comprehension check
- •I. Read the questions below and find the answers in the text.
- •II. Say whether the following statements are true or false.
- •IV. Say what you have learned from the text about
- •Discussion
- •I. Do you agree that
- •II. Summarize the information presented in the text.
- •Lesson 9
- •Websites
- •Glossary to learn
- •Websites
- •Comprehension check
- •I. Mark the following statements as true or false and if they are false correct them.
- •Discussion
- •Lesson 10 communications systems Glossary to learn
- •Communications Systems
- •Comprehension check
- •I. Study these examples of abbreviations used in mobile phone text massages. Try to guess the meaning of the other abbreviations.
- •II. What do these abbreviations mean?
- •III. Read the question and find the answer in the text.
- •IV. Fill in the gap with necessary word, word-combination or abbreviation.
- •Discussion
- •Lesson 11 the world wide web Glossary to learn
- •Rewrite the underlined words in transcription in your copybooks.
- •II. Give these abbreviations a full form.
- •The World Wide Web
- •Comprehension check
- •Discussion
- •II. Try to describe to each other a process of streaming.
- •Lesson 12
- •Software engineering
- •Glossary to learn
- •Software Engineering
- •Comprehension check
- •I. Explain what is meant by the following word combinations:
- •II. Put these five stages of programming in the correct sequence.
- •III. To which stage does each of these steps belong?
- •Discussion
- •I. Work in pairs. Together decide what would be the most appropriate language to use for each of these situations.
- •II. Give a brief summary of the text.
- •Lesson 13
- •The future of it
- •Glossary to learn
- •The Future of it
- •Comprehension check
- •Give the definition of the following word-combinations and words.
- •How do you think developments in it will affect these areas of life in the next ten years?
- •Put the parts of the sentences in the right order.
- •Discussion
- •Lesson 14 data security 1 Glossary to learn
- •Data Security 1
- •Comprehension check
- •Consider the following questions on the text.
- •III. Read the short descriptions of computer crimes. Decide in your group what kind of crime is mentioned in each case. Name them.
- •Discussion
- •I. Find the other examples of computer crimes in daily newspapers. Discuss them.
- •II. Comment on the text. Tell your partner what information might be interesting and useful to you.
- •Lesson 15
- •Data security 2
- •Glossary to learn
- •I. Pronounce the combinations of words correctly.
- •II. Find the transcription for each combination of words.
- •Data Security 2
- •Comprehension check
- •I. Find words or phrases in the text which mean
- •II. Put the verbs in brackets in the correct form in this description of how smart cards work.
- •III. Decide on the relationship between these events. Then link them in the right order to make up a description of operation of anti-virus program.
- •Make up questions for these answers.
- •Discussion
Comprehension check
I. Find words or phrases in the text which mean
copies of changes to files made to reduce the risk of loss of data
software available for a short time on a free trial basis; if adopted a fee is payable to the author
cannot be disrupted or cut
protect data by putting it in a form only authorized users can understand
a combination of hardware and software to protect networks from unauthorized users
measuring physical characteristics such as distance between the eyes
II. Put the verbs in brackets in the correct form in this description of how smart cards work.
Smart cards prevent unauthorized users … 1(access) systems and permit authorised users … 2(have) access to a wide range of facilities. Some computers have smart card readers … 3(allow) you … 4(buy) things on the Web easily and safely with digital cash. A smart card can also send data to a reader via an antenna … 5(coil) inside the card. When the card comes within range, the reader’s radio signal … 6(create) a slight current in the antenna … 7(cause) the card 8(broadcast) information to the reader which … 9(allow) the user, for example … 10(withdraw) money from an ATM or … 11(get) access to a system.
III. Decide on the relationship between these events. Then link them in the right order to make up a description of operation of anti-virus program.
Anti-virus program
The user removes the virus or deletes the infected file.
Coding is matched to a known virus in a virus database.
A user runs anti-virus software.
A message is displayed to the user that a virus has been found.
The virus cannot spread or cause further damage.
The software checks files for virus coding.
Make up questions for these answers.
There are several ways of implementing network controls: using passwords, installing a firewall, encrypting data, installing a callback system, using signature verification or biometric security devices.
A smart card is a plastic card containing a processor and memory chip.
Yes. This program stores a copy of data on a storage device to keep it safe.
There are three different kinds of backup.
Discussion
Consider these examples of computer disasters. How could you prevent them or limit their effects? Discuss answers within your group.
You open an email attachment which contains a very destructive virus.
Someone guesses your password (the type of car you drive plus the day and month of your birth) and copies sensitive data.
Your hard disk crashes and much of your data is lost permanently.
Someone walks into your computer lab and steals the memory chips from all the PCs.
Your backup tapes fail to restore properly.