- •Unit 1 Computer users
- •Vocabulary and reading comprehension exercises
- •Could computer games be good for you after all?
- •A career in computers
- •Are you a blogger too?
- •Unit 2 Computer Architecture
- •Floppy drive and cd drive are input or output devices?
- •Vocabulary and reading comprehension exercises
- •Addiction to Internet ‘is an illness’
- •1. Find the answers to the questions in the article.
- •2. Find words in the text that mean the following.
- •3. Answer these questions for yourself or for someone you know and discuss the results. Do you think these test questions are a good indicator of Internet addiction?
- •If you answer ‘yes’ to five or more of these questions, you may have an Internet addiction!
- •Unit 3 Computer Applications
- •Vocabulary and reading comprehension exercises
- •Information Society by Richard Sidaway
- •Unit 4 Peripherals
- •Vocabulary and reading comprehension exercises
- •3) Forms used when comparing ideas
- •4. Conjunctions and connectors
- •Interview. Former student
- •Tiny devices may help reinvent wireless technology
- •Vocabulary and grammar work
- •1. Translate the sentences paying special attention to the words in italics.
- •2. Match the words and their meaning.
- •3. Insert prepositions necessary.
- •4. Supply the proper form of a verb in the sentences.
- •5. Fill in each blank with the words from the text.
- •6. Match the parts together.
- •1. State whether the sentences given below are true or false according to the text.
- •2. Test your understanding of the text.
- •Discussion
- •Discuss the questions above.
- •2. Imagine you are an inventor. Describe an invention you are working on. Think about:
- •Unit 6 Operating systems
- •Vocabulary and reading comprehension exercises
- •No more downtime due to kernel patching
- •Computer diagnosis
- •Wearable computers
- •1) The gerund as a subject
- •2) Gerund after prepositions
- •Unit 7 Graphical user interface
- •Vocabulary and reading comprehension exercises
- •Computers in our life
- •Five steps to a good password
- •Unit 8 Applications programs
- •Vocabulary and reading comprehension exercises
- •Cyber café
- •1) Asking for instructions
- •2) Giving instructions
- •Imperative form in English
- •1. Complete each gap in this text with a suitable word from this list .
- •2. Put the verbs in brackets in the correct form in this description of gps. .
- •3. Rewrite each of these statements by replacing the words in italics with en-/-en or phrasal verbs of a similar meaning.
- •4. Translate into Ukrainian.
- •6. Complete the text with discourse markers from the box.
- •7. Read the text below. For each of the empty space choose the correct variant.
- •8. For questions 1-12, read the following text and decide which answer (a, b, c or d) best fits each gap.
- •Something not for everyone
1) Asking for instructions
How do you (do this)? How do I . . . ?
What is the best way to . . . ? How do I go about it?
What do you suggest? How do you suggest I proceed?
What is the first step?
2) Giving instructions
Sequencing First, (you) . . .
Then, (you) . . . Next, (you) . . .
Lastly, (you) . . . 3) Starting out
Before you begin, (you should . . .) The first thing you do is . . . .
I would start by . . . The best place to begin is . . .
To begin with, 4) Continuing
After that, The next step is to . . .
The next thing you do is . . . Once you've done that, then . . .
When you finish that, then . . . 5) Finishing
The last step is . . . The last thing you do is . . .
In the end, When you've finished,
When you've completed all the steps,
Example: How to Use a Photocopier
First, you need to turn on the photocopier. Then you put the face of the paper that you want to copy, on the screen of the copier. Next, you need to select the paper size and how many number you want. After that, you push the start button and the copier starts working. Finally, you get the papers that you want.
Imperative form in English
We use the imperative form to give orders, warnings and advice:
Be quiet!
Take care!
Listen to me carefully!
Because it can sound rude to give direct orders (especially if you are talking to an adult), we "soften" the imperative form with "let's" or "please":
Let's go now.
Please listen to what I'm saying.
Exercise 1. Match the parts of the sentences.
a) Stand behind me 1) down.
b) Tell me all 2) three times a day.
c) Shut 3) line, please.
d) Come 4) in.
e) Take your feet off 5) about it.
f) Turn to 6) up.
g) Take one pill 7) turn left.
h) Go to the traffic lights and 8) me next week.
i) Come and see 9) page 69.
j) Put that 10) the sofa.
Exercise 2. Complete these sentences using one of these verbs.
pour add/2 serve mix in beat
cook preheat remove
_________ your oven to 200 degrees C.
_________ the stones from 750 grams of ripe cherries.
_________ six eggs with a pinch of salt.
_________ 90 grams of sugar and 100 grams of flour mixed with a few drops of vanilla essences.
Gradually _________ litre of milk.
_________ the mixture into a greased flan dish and then _________ the cherries on top.
_________ for 45 minutes and _________ warm.
Additional exercises
1. Complete each gap in this text with a suitable word from this list .
about software malicious executable common using run divide addresses spread more infected computers virus mail environment boot types networks macrolanguage |
Your computer could be………. 1 by many different viruses. There are probably ………..2 than 30,000 in existence but only………..3 200 to 300 are present in sufficient numbers to be a threat to your PC. We can ………4 viruses into a small number of basic …………5. Boot sector viruses infect a computer when you ………..6 it. File viruses infect………..7 files and the system when the files are ………8. These are less …………9 now that PCs mainly run Windows.
The most common viruses now work in the Windows …………10 and are spread using …………..11, including the Internet. Most are macro-viruses. Melissa is an example. Melissa ………..12 using email. It operated by……………..13 the Visual Basic for Applications (VBA) ………..14 to automate the Microsoft Outlook …………..15 client to send itself to the first fifty …………..16 in the Outlook address book. In this way it infected millions of …………..17. in a few days.
A worm is not a…………18 but it is a …………..19 program. It infiltrates your system’s network ……….. 20 and from there infects other systems.
