
- •Unit 1 computer users
- •Using Computers
- •Vocabulary Bank Unit 1
- •Text 1a. Computer users
- •Table a Table b
- •The digital age
- •Text 1b. Computers make the world smaller and smarter
- •Grammar review present forms
- •Verbs usually not used in any of the progressive tenses
- •Grammar Exercises
- •The Present Perfect and Present Perfect Continuous
- •Writing
- •Unit 2 computer architecture
- •Vocabulary Bank Unit 2
- •Text 2a. Computer architecture
- •Text 2b. Cache memory
- •How a disk cache works
- •Grammar review. Past forms
- •The present perfect and past simple
- •The present perfect continuous and present perfect
- •Grammar Exercises
- •Speaking/writing
- •Unit 3 peripherals
- •Vocabulary Bank Unit 3
- •Advantage
- •Text a. Peripherals
- •Post-reading activity
- •Specialist reading
- •Text b. Types of Printers
- •Grammar review future forms
- •It is interesting to know:
- •Grammar Exercises
- •Exercise 10. Put the verbs in brackets into the Future Perfect or the Futures Simple.
- •Exercise 11. Put the verbs in brackets into the Future Continuous or the Future Perfect.
- •Vocabulary Bank Unit 4
- •Appliance
- •Relevance
- •Text 4a. Personal computers
- •Specialist reading
- •Text 4b.Data mining
- •Grammar review. The passive voice
- •Table of passive voice
- •Active and passive voice (compare) Active Voice
- •Passive Voice
- •Grammar Exercises
- •The Prepositions
- •Grammar Exercises prepositions
- •Prepositions of location:
- •In used to show location or destination in an area:
- •Intended goal/target
- •In is used for
- •Other common prepositions with multiple meaning
- •Writing/speaking Think about advantages and disadvantages of using a desktop computer, a laptop and a palm computer. Compare them.
- •Unit 5 operating system
- •Vocabulary Bank Unit 5
- •Environment
- •Search engine
- •Text 5a. Operating systems
- •Operating Systems: Hidden Software
- •General Features of Operating Systems
- •Vms: help, directory, search, copy, rename, print, show users, show time, create/directory, phone, delete Unix: write, cp, lpr, Is, mkdir, date, rm, man, grep, rwho, mv
- •Text 5b. Linux
- •Grammar review reported speech The sequence of tenses in the subordinate clauses:
- •The sequence of tenses is:
- •Modal verbs changes
- •Indirect speech for exclamatory and imperative sentences.
- •Indirect speech of imperative sentence
- •Grammar Exercises
- •Speaking/writing
- •Unit 6 graphical user interface
- •Vocabulary Bank Unit 6
- •To perform
- •Text 6a. The graphical user interface
- •Post-reading Exercises
- •Text b. Interface with menus
- •Grammar review nouns
- •Plural of countable nouns
- •Irregular plurals
- •Plural forms
- •The possessive case
- •Nouns determiners
- •Grammar exercises Nouns
- •Some, any, much, many, a lot, few, a few, little, a little
- •Articles Revision of the Use of the Articles (in tables) Classification of Nouns
- •Functions of the Indefinite Article
- •Don’t confuse the articles in the generic function
- •The use of articles with names of people
- •The use of articles with other proper names
- •Numerals
- •Fractional numerals Common Fractions
- •Decimal Fractions
- •Extra information
- •Exercises
- •Writing
- •Unit 7 applications programs
- •Vocabulary Bank Unit 7
- •Spreadsheet
- •Word processor Text 7a. Applications programs
- •Post-reading Activity
- •Text 7b. Application service providers
- •Listening and speaking
- •Vocabulary Bank. Interview. Former student
- •Environment
- •To upload
- •Exercises
- •Grammar review
- •First conditional
- •Second conditional
- •If I were you…
- •Oral Activity
- •Third conditional
- •Making a wish
- •Grammar revision
- •Writing
- •Unit 8 multimedia
- •Vocabulary Bank Unit 8
- •Animation
- •Text 8a. Multimedia
- •Post-reading activity
- •Text 8b. New applications of the computer
- •Videodisc
- •Digital Video
- •Multimedia Authoring Systems
- •Virtual Reality
- •Grammar review. Adjectives. Adverbs. Pronouns.
- •The Adverb
- •Grammar Exercises
- •Pronouns
- •Writing
- •Unit 9 data processing
- •Vocabulary Bank Unit 9
- •Equipment
- •Text a. Data processing and data processing systems
- •Basic data processing operations
- •Data storage hierarchy
- •Text 9b. Word processing facilities start up
- •Advantages of computer data processing
- •Grammar review The Modal Verbs (mv) can/could
- •May/might
- •To have (got) to
- •Should/ought to
- •Will/would
- •Grammar exercises
- •In brackets.
- •May/might/be allowed to
- •Must/have to/need
- •Mustn’t - needn’t - don’t have to
- •Should/ought to
- •Revision exercises
- •Unit 10
- •Internet and lan technology
- •Text 10a. The internet
- •Text 10 b. The language of e-mail
- •Grammar review the verbals The forms of the Verbals or the non-finite forms of the verb
- •The Infinitive
- •Infinitive without to
- •Complex object
- •See someone do and see someone doing
- •Personal/impresonal construction (the complex subject)
- •The gerund
- •Have something done
- •Writing/speaking task
- •Unit 11 networks
- •Vocabulary Bank Unit 11
- •Text 11 a. Computer networks
- •Text 11 b. Network Communications
- •Grammar review questions
- •1. General questions
- •2. Special questions
- •3. Alternative questions
- •Grammar Exercises
- •Yes/No Questions (General Questions)
- •Exercise 3. Quiz champion Claude Jennings is answering questions. Put in these words and phrases: How Far, How Long, How Often, How Many, What, What Colour, What Kind, When, Where, Who
- •Subject/Object Questions
- •Prepositions in Wh-questions
- •Exercise 5. Put in the question. Use What? and put the preposition in brackets at the end.
- •Negative Questions
- •Exercise 9. Complete the conversations using the words in brackets.
- •Question Tags (Disjunctive Questions)
- •Exercise 12. Complete the conversation. Put in tags.
- •Earthquakes
- •Grammar revision
- •Writing
- •Unit 12 the world wide web
- •Vocabulary Bank Unit 12
- •Text 12 a. The world wide web
- •Viruses are something to worry about, but not a lot. A little common sense and the occasional virus-scan will keep you virus-free.
- •Speaking
- •Censorship on the Web
- •What do you think?
- •Grammar revision
- •Writing Projects. Perform the project given
- •Unit 13 programming languages
- •Vocabulary Bank Unit 13
- •Text 13a. Types of programming languages
- •Machine Languages
- •Assembly Languages
- •Procedural Languages
- •Natural languages
- •Verb Prefix Meaning Example
- •Vocabulary Bank Unit 14
- •Most Common Suffixes
- •Why Learn Suffixes?
- •Interviewer / trainer / employer / interviewee / trainee / employee
- •Vocabulary Bank Unit 15
- •Introductory reading
- •In the following list, the two-word forms (shown first) are still more common, but the one-word forms are starting to take hold.
- •In the following list, the one-word forms (shown first) are more common, but the spaced or hyphenated forms are still being used.
- •In the following list, the hyphenated forms (shown first) are more common, but the solid or spaced forms (if given) are used in materials aimed at industry insiders.
- •Variables and the Declaration Statement
- •Vocabulary Bank Unit 16
- •Isc2 cissp
- •Unit 17 web design
- •Vocabulary Bank Unit 17
- •1. Bad Search
- •2. Pdf Files for Online Reading
- •3. Not Changing the Color of Visited Links
- •5. Fixed Font Size
- •6. Page Titles With Low Search Engine Visibility
- •7. Anything That Looks Like an Advertisement
- •8. Violating Design Conventions
- •9. Opening New Browser Windows
- •10. Not Answering Users' Questions
- •11. Discourse markers: softening and correcting
- •Interview: Website Designer
- •Vocabulary Bank Unit 18
- •Store / hold / input / control / convert / process / provide (x2)/ speed up
- •5. Cache … (5) … extremely fast access for sections of a program and its data.
- •Imagine that you are to make a report on the following topics. While preparing it use the main information from the text.
- •Vocabulary Bank Unit 19
- •Virus protection
- •Internet crime
- •Vocabulary Bank Unit 20
- •Vocabulary Bank Unit 21
- •Information systems analysis and design
- •Vocabulary Bank Unit 22
- •If X, then y
- •Virtual reality
- •Vocabulary Bank Unit 23
- •Appropriate
- •Vocabulary Bank Unit 24
Internet crime
The Internet provides a wide variety of opportunities for communication and development, but unfortunately it also has its dark side.
Crackers, or black-hat hackers, are computer criminals who use technology tо perform a variety of crimes: virus propagation, fraud, intellectual property theft, etc.
Internet-based crimes include scam, email fraud to obtain money or valuables, and phishing, bank fraud, to get banking information such as passwords of Internet bank accounts or credit card details. Both crimes use emails of websites that look like those of real organizations.
Due to its anonymity, the Internet also provides the right environment for cyberstalking, online harassment or abuse, mainly in chat rooms or newsgroups.
Piracy, the illegal copying and distribution of copyrighted software, information, music and video files, is widespread.
But by far the most common type of crime involves malware.
Malware: viruses, worms, trojans and spyware
Malware (malicious software) is software created to damage or alter the computer data or its operations. These are the main types.
Viruses arc programs that spread by attaching themselves to executable files or documents. When the infected program is run, the virus propagates to other files or programs on the computer. Some viruses are designed to work at a particular time or on a specific date, e.g. on Friday 13th. An email virus spreads by sending a copy of itself to everyone in an email address book.
Worms are self-copying programs that have the capacity to move from one computer to another without human help, by exploiting security flaws in computer networks. Worms are self-contained and don't need to be attached to a document or program the way viruses do.
Trojan horses are malicious programs disguised as innocent-looking files or embedded within legitimate software. Once they are activated, they may affect the computer in a variety of ways: some are just annoying, others are more ominous, creating a backdoor to the computer which can be used to collect stored data. They don't copy themselves or reproduce by infecting other files.
Spyware, software designed to collect information from computers for commercial or criminal purposes, is another example of malicious software. It usually comes hidden in fake freeware or shareware applications downloadable from the Internet.
Task 14. Identify the Internet crimes sentences (1-6) refer to. Then match them with the advice below (a-f).
Crackers try to find a way to copy the latest game or computer program.
A study has revealed that half a million people will automatically open an email they believe to be from their bank and happily send off all their security details.
This software's danger is hidden behind an attractive appearance. That's why it is often wrapped in attractive packages promising photos of celebrities like Anna Kournikova or Jennifer Lopez.
There is a particular danger in Internet commerce and emails. Many people believe they have been offered a special gift only to find out later they have been deceived.
'Nimda' spreads by sending infected emails and is also able to infect websites, so when a user visits a compromised website, the browser can infect the computer.
Every day, millions of children spend time in Internet chat rooms talking to strangers. But what many of them don't realize is that some of the surfers chatting with them may be sexual predators.
People shouldn't buy cracked software or download music illegally from the Internet.
Be suspicious of wonderful offers. Don't buy if you aren't sure.
It's dangerous to give personal information to people you contact in chat rooms.
Don’t open attachments from people you don't know even if the subject looks attractive.
Scan your email and be careful about which websites you visit.
Check with your bank before sending information.
LANGUAGE SKILLS DEVELOPMENT
Exercise 1. Put each verb into the correct form.
He (have) a bath when the phone rang.
He suddenly realized that he (travel) in the wrong direction.
He (talk) to people over the Internet at 8 o’clock yesterday.
You looked very busy when I saw you last night. What you (do)?
The boys (play) computer games when they (hear) their father’s steps. They immediately (switch) off the computer and (take) out their text-books.
When I (hear) the knock I (go) to the door and (open) it, but I (not recognize) him at first because he (wear) dark glasses.
A private e-mail account (cost) Ј10 a month last year.
They (visit) cybercafй very often last week.
Exercise 2. Choose the right variant.
1. There______too much bad news on TV yesterday.
a) was c) is
b) are d) has been
2. Could you give me______glass of______milk with______sandwich?
a) a, -, a c) a, the, -
b) the, the, - d) -, the, -
3. On our trip to______Australia we crossed______Pacific Ocean.
a) the, - c) -, the
b) an, the d) -, -
4.______you introduce me to your friend as soon as she?
a) do, comes c) will, comes
b) will, come d) are, comes
5. There is no school uniform. The pupils can wear______they like.
a) whoever c) whenever
b) however d) whatever
6. I'm going on a diet tomorrow. I need______some weight.
a) to lose c) to have lost
b) lose d) losing
7. I spent______money last month that I had to go to the bank.
a) much c) so much
b) little d) so many
8. When I was a child I______play football everyday.
a) use b) am used
c) was used d) used to
9. I didn't need any help. I did it______my own.
a) for c) on
b) with d) by
10. The party______by the time I______there.
a) had finished, get c) had finished, got
b) finished, got d) finished, had got
11. We are thinking seriously______here if we can find a job.
a) move c) moving
b) of moving d) to move
12. She______the key so I climbed through a window.
a) didn't leave c) had left
b) hasn't left d) hadn't left
13. The landlord was not______about all the repairs.
a) satisfied c) think
b) worried d) prepared
14. By the time I retire I______here for twenty years.
a) '11 be working c) '11 have worked
b) '11 work d) work
15. I'll cook______that you wash up.
a) if c) even if
b) provided d) if only
16. The plane is expected______an hour ago.
a) to land c) landing
b) to have landed d) land
17 I'm looking______passing all my exams.
a) forward c) forward to
b) to d) into
18. I'd rather you______anyone what I said.
a) not tell c) not to tell
b) didn't tell d) don't tell
19. We live in______small flat near______centre of______city.
a) a, the, the c) a, the, a
b) the, a, the d) a, a, a
20. She is very secretive. She never tells_____________.
a) somebody anything c) nobody nothing
b) anybody something d) anybody anything
21. My salary isn't______yours.
a) as high c) so high
b) as high as d) so high as
22. Finally they managed to______him to change his mind.
a) advise c) make
b) insist d) persuade
23.I could arrive on time______of the traffic jam.
a) despite c) although
b) in spite d) however
24. Her father wouldn't let me______to her.
a) speak c) to speak
b) speaking d) to have spoken
Exercise 3. Translate into English:
Ще в школі Білл Гейтс зумів підібрати ключ до системи захисту і постійно крав час експлуатації машини.
Порушення авторського права - незаконне копіювання, зокрема, програми.
Пароль - це набір символів, що використовуються в якості коду до обчислювальної системи або базі даних. Комп'ютерні хулігани можуть легко підібрати пароль, якщо він являє собою ініціали або послідовні ряди чисел.
Тягнуть все: особисті коди кредитних карток, авторські музичні твори, останні комп'ютерні ігри. Хакери називають це дільбою, решта - відвертим злодійством.
Якщо ви використовуєте комп'ютер в своєму бізнесі, то ви повинні мати антивірусні програми і оновлювати їх постійно.
Є два способи уникнути зараження комп'ютерними вірусами: не встановлювати нове програмне забезпечення без перевірки і не завантажувати безкоштовну інформацію з мережі.
Найшвидшими способами нелегального розповсюдження програмного забезпечення зараз є: крадіжка, злом і торгівля краденим.
WRITING
Look at the list of cybercrimes. Discuss these questions in small groups.
Crimes on the Internet
Virus propagation
Software piracy
Stealing data and passwords by using a sniffer program
IP spoofing (making one computer look like another to gain unauthorized access)
Fraudulent use of credit card numbers
Child pornography
Violence and racist propaganda
Discuss these questions in small groups.
1. What type of crime is more dangerous?
2. What measures can be taken by governments against computer crime?
3. Personal information - address, salary, civil and criminal records - is usually kept or sold by governments and industries in electronic databases. Is personal privacy in danger?
4. Is it right to put restrictions on the contents of the Internet?
Write a summary of the discussion. Then present your view to the rest of the class.
Write a report “The best protection of information system”, using the connectors given below.
UNIT 20
Data Backup and restore procedures