- •Воронеж
- •Оглавление
- •Предисловие
- •Part one
- •Text 3 business world ― company of the month: microsoft
- •Virtual reality
- •Part two
- •Interactive user-friendly demonstration locate patent prototype
- •Computers in the office
- •The Internet: faQs (Frequently Asked Questions)
- •The Pros and Cons of Using the Internet
- •And now, the news ... What’s new on-line
- •Interactivity
- •Part three
- •Text 3 Effective e-mail ― How to communicate powerfully by e-mail
- •The methods of mailing lists
- •What is a mailing list?
- •Part four
- •Internet 2 ―the next step
- •Computer viruses
- •Nsa consultant’s son is computer saboteur
- •Glossary
- •Wearable computers Charmed Technology
- •Acronym Finder Acronym Finder Database http://www.Acronymfinder.Com/
- •Prefixes of size
- •Prefixes of location
- •Verb-forming suffixes
- •Список использованной литературы
- •Vocabulary
- •Glossary of technical terms and abbreviations
- •394000 Г. Воронеж, пр. Революции, 20
Computer viruses
The AVP Virus Encyclopedia http://www.avp.ch/avpve/ This website is a big database with descriptions of computer viruses.A. |
Here is a list of popular viruses. Type the names in the SEARCH BOX and find out some details about them (e.g. type of virus, effects)
|
Text 3
Nsa consultant’s son is computer saboteur
“Worm” came from graduate student
Read this news report and discuss the questions that follow.
A court heard today how a Cornell University graduate student, Robert T. Morris Jr. (25), infected a host of government and educational computer centres with a computer virus, known as a “worm”, which literally brought all computational activity to a halt in over 6,000 installations. Morris, the son of a prominent National Security Agency computer consultant, was sentenced for his offences yesterday. As punishment, he was required to spend no time in prison but, instead, serve three years' probation, contribute 400 hours of community service, and to pay a $10,000 fine along with associated court and probation costs.
How serious do you think Robert Morris's crime was?
Do you think the punishment was
too severe?
about right?
not severe enough?
Do you know of any similar incidents of computer hacking?
The words and phrases below are taken from this unit. In pairs or groups, decide if they have a “protective” or a “destructive” meaning as they are used in the unit, then put them under the correct heading.
-
detonator
infector
erase
pirated
infect
write-protect tab
worm
virus scanner
hacker
password
smart card
shield
signature
cipher
keyboard lock
access control
-
protective
destructive
How many other ways can you think of to classify them?
Oxford English for Computing
UNIT 3. FUTURE TRENDS
Text 1
What is next?
Power and speed for PCs and the Internet
PCs have broken the barrier of 1 GHz, the DVD is included in most PCs, MP3 has become the standard to compress digital music on the Net; and CD-ROM players with MP3 music are available for the car.
New portals and free services are changing the face of the Internet. Thousands of webcams offer us live views of our planet, from fascinating landscapes and monuments to shopping centres and busy streets of big cities. Conventional modems are being replaced by ISDN, ADSL and satellite connections. ADSL is a form of Digital Subscriber Line that carries data, voice, and MPEG2 video. Its downstream data flow is between 1.5 and 9 megabits per second, so music and pictures will be downloaded in the blink of an eye.
New palmtops ― the office in your pocket
Hand-held PCs come with Microsoft Pocket Office pre-installed, so you can write your project while taking the train or make calculations in the plane. They are also equipped with software to handle e-mail and surf the Web. You can hear popular MP3 music or record your ideas through its built-in voice recorder. Once at home you can synchronise data with your desktop PC.
Mobile phones ― the future of mobile computing
Not long ago, mobile phones could just transmit voice and SMS messages. Now they can display Internet information thanks to the Wireless Application Protocol or WAP. On these Web-enabled phones you can read information such as stock prices, weather, business news and sports news.
Some hybrid models combine a phone with a PDA. They look like a regular phone with a dial pad and a small screen on its front. But if you flip up the front cover you find a larger screen that is touch-sensitive. Some include a virtual keyboard which pops up when you want to enter email text or a WAP address.
But the future is called “third-generation” (3G) mobiles. They will transmit a caller’s picture and voice simultaneously. From 2001 UMTS mobile phones will deliver users information, e-commerce, games and videoconferencing via fixed, wireless and satellite networks.
Wearable computers, aren’t they chic?
Can you imagine wearing a PC on your belt and getting e-mail on your eyeglasses?
This may sound science-fiction, but the trend is very real. Charmed Technology and other companies are using fashion shows to exhibit their innovative products.
Wearable computers are battery-powered systems worn on the user’s body ― on a belt, backpack or vest. They’re designed for mobile or hands-free operations, often incorporating a microphone and a head-mounted display for viewing Internet sites.
Users of wearable technology consider themselves “cyborgs”. This term comes from “cybernetic organism”, referring to a being that is part robot, part human.
