
- •Unit 1 computer users
- •Using Computers
- •Vocabulary Bank Unit 1
- •Text 1a. Computer users
- •Table a Table b
- •The digital age
- •Text 1b. Computers make the world smaller and smarter
- •Grammar review present forms
- •Verbs usually not used in any of the progressive tenses
- •Grammar Exercises
- •The Present Perfect and Present Perfect Continuous
- •Writing
- •Unit 2 computer architecture
- •Vocabulary Bank Unit 2
- •Text 2a. Computer architecture
- •Text 2b. Cache memory
- •How a disk cache works
- •Grammar review. Past forms
- •The present perfect and past simple
- •I have done I did
- •The present perfect continuous and present perfect
- •I have been doing I have done
- •Grammar Exercises
- •Speaking/writing
- •Even if minis and mainframes were inexpensive, why it is unlikely that you would buy one for your home.Unit 3 peripherals
- •Vocabulary Bank Unit 3
- •Advantage
- •Text a. Peripherals
- •Post-reading activity
- •Specialist reading
- •Text b. Types of Printers
- •Grammar review future forms
- •It is interesting to know:
- •Grammar Exercises
- •Exercise 10. Put the verbs in brackets into the Future Perfect or the Futures Simple.
- •Exercise 11. Put the verbs in brackets into the Future Continuous or the Future Perfect.
- •Vocabulary Bank Unit 4
- •Appliance
- •Relevance
- •Text 4a. Personal computers
- •Specialist reading
- •Text 4b.Data mining
- •Grammar review. The passive voice
- •Table of passive voice
- •Active and passive voice (compare) Active Voice
- •Passive Voice
- •Grammar Exercises
- •The Prepositions
- •Grammar Exercises prepositions
- •Prepositions of location:
- •In used to show location or destination in an area:
- •Intended goal/target
- •In is used for
- •Other common prepositions with multiple meaning
- •Writing/speaking
- •Think about advantages and disadvantages of using a desktop computer, a laptop and a palm computer. Compare them.
- •.Unit 5
- •Operating system
- •Vocabulary Bank Unit 5
- •Environment
- •Search engine
- •Text 5a. Operating systems
- •Operating Systems: Hidden Software
- •General Features of Operating Systems
- •Vms: help, directory, search, copy, rename, print, show users, show time, create/directory, phone, delete Unix: write, cp, lpr, Is, mkdir, date, rm, man, grep, rwho, mv
- •Text 5b. Linux
- •Grammar review reported speech The sequence of tenses in the subordinate clauses:
- •The sequence of tenses is:
- •Modal verbs changes
- •Indirect speech for exclamatory and imperative sentences.
- •Indirect speech of imperative sentence
- •Grammar Exercises
- •Speaking/writing
- •4. Speak about os as hidden software.Unit 6 graphical user interface
- •Vocabulary Bank Unit 6
- •To perform
- •Text 6a. The graphical user interface
- •Post-reading Exercises
- •Text b. Interface with menus
- •Grammar review nouns
- •Plural of countable nouns
- •Irregular plurals
- •Plural forms
- •The possessive case
- •Nouns determiners
- •Much, many, little, few, a lot, plenty
- •Grammar exercises Nouns
- •Some, any, much, many, a lot, few, a few, little, a little
- •Articles Revision of the Use of the Articles (in tables) Classification of Nouns
- •Functions of the Indefinite Article
- •Functions of the Definite Article
- •Don’t confuse the articles in the generic function
- •The use of articles with names of people
- •The use of articles with geographical names
- •The use of articles with other proper names
- •Numerals
- •The four operations
- •Fractional numerals Common Fractions
- •Decimal Fractions
- •Extra information
- •Exercises
- •Writing
- •Unit 7 applications programs
- •Vocabulary Bank Unit 7
- •Spreadsheet
- •Word processor Text 7a. Applications programs
- •Post-reading Activity
- •Listening and speaking
- •Vocabulary Bank. Interview. Former student
- •Environment
- •To upload
- •Exercises
- •Grammar review
- •First conditional
- •Second conditional
- •If I were you…
- •Oral Activity
- •Third conditional
- •Making a wish
- •Grammar revision
- •Writing
- •.Unit 8 multimedia
- •Vocabulary Bank Unit 8
- •Animation
- •Text 8a. Multimedia
- •Post-reading activity
- •Text 8b. New applications of the computer
- •Videodisc
- •Digital Video
- •Multimedia Authoring Systems
- •Virtual Reality
- •Grammar review. Adjectives. Adverbs. Pronouns.
- •The Adverb
- •Grammar Exercises
- •Pronouns
- •Writing
- •Unit 9 data processing
- •Vocabulary Bank Unit 9
- •Equipment
- •Text a. Data processing and data processing systems
- •Basic data processing operations
- •Data storage hierarchy
- •Text 9b. Word processing facilities start up
- •Advantages of computer data processing
- •Grammar review The Modal Verbs (mv) can/could
- •May/might
- •To have (got) to
- •Should/ought to
- •Will/would
- •Grammar exercises
- •In brackets.
- •May/might/be allowed to
- •Must/have to/need
- •Mustn’t - needn’t - don’t have to
- •Should/ought to
- •Revision exercises
- •Unit 10
- •Internet and lan technology
- •Text 10a. The internet
- •Text 10 b. The language of e-mail
- •Grammar review the verbals The forms of the Verbals or the non-finite forms of the verb
- •The Infinitive
- •Infinitive without to
- •Complex object
- •See someone do and see someone doing
- •Personal/impresonal construction (the complex subject)
- •The gerund
- •Have something done
- •Writing/speaking task
- •Unit 11 networks
- •Vocabulary Bank Unit 11
- •Text 11 a. Computer networks
- •Text 11 b. Network Communications
- •Grammar review questions
- •1. General questions
- •2. Special questions
- •3. Alternative questions
- •Grammar Exercises
- •Yes/No Questions (General Questions)
- •Exercise 3. Quiz champion Claude Jennings is answering questions. Put in these words and phrases: How Far, How Long, How Often, How Many, What, What Colour, What Kind, When, Where, Who
- •Subject/Object Questions
- •Prepositions in Wh-questions
- •Exercise 5. Put in the question. Use What? and put the preposition in brackets at the end.
- •Negative Questions
- •Exercise 9. Complete the conversations using the words in brackets.
- •Question Tags (Disjunctive Questions)
- •Exercise 12. Complete the conversation. Put in tags.
- •Earthquakes
- •Grammar revision
- •Writing
- •Unit 12 the world wide web
- •Vocabulary Bank Unit 12
- •Text 12 a. The world wide web
- •Viruses are something to worry about, but not a lot. A little common sense and the occasional virus-scan will keep you virus-free.
- •Speaking
- •Censorship on the Web
- •What do you think?
- •Grammar revision
- •Writing Projects. Perform the project given
- •Unit 13 programming languages
- •Vocabulary Bank Unit 13
- •Text 13a. Types of programming languages
- •Machine Languages
- •Assembly Languages
- •Procedural Languages
- •Natural languages
- •Verb Prefix Meaning Example
- •Vocabulary Bank Unit 14
- •Most Common Suffixes
- •Why Learn Suffixes?
- •Interviewer / trainer / employer / interviewee / trainee / employee
- •Vocabulary Bank Unit 15
- •Introductory reading
- •In the following list, the two-word forms (shown first) are still more common, but the one-word forms are starting to take hold.
- •In the following list, the one-word forms (shown first) are more common, but the spaced or hyphenated forms are still being used.
- •In the following list, the hyphenated forms (shown first) are more common, but the solid or spaced forms (if given) are used in materials aimed at industry insiders.
- •Variables and the Declaration Statement
- •Vocabulary Bank Unit 16
- •Isc2 cissp
- •Unit 17 web design
- •Vocabulary Bank Unit 17
- •1. Bad Search
- •2. Pdf Files for Online Reading
- •3. Not Changing the Color of Visited Links
- •5. Fixed Font Size
- •6. Page Titles With Low Search Engine Visibility
- •7. Anything That Looks Like an Advertisement
- •8. Violating Design Conventions
- •9. Opening New Browser Windows
- •10. Not Answering Users' Questions
- •11. Discourse markers: softening and correcting
- •Interview: Website Designer
- •Vocabulary Bank Unit 18
- •Store / hold / input / control / convert / process / provide (x2)/ speed up
- •5. Cache … (5) … extremely fast access for sections of a program and its data.
- •Imagine that you are to make a report on the following topics. While preparing it use the main information from the text.
- •Vocabulary Bank Unit 19
- •Virus protection
- •Internet crime
- •Vocabulary Bank Unit 20
- •Vocabulary Bank Unit 21
- •Information systems analysis and design
- •Vocabulary Bank Unit 22
- •If X, then y
- •Virtual reality
- •Vocabulary Bank Unit 23
- •Vocabulary Bank Unit 24
Viruses are something to worry about, but not a lot. A little common sense and the occasional virus-scan will keep you virus-free.
Task 9. Match the words and definitions listed below
1) |
a detonator |
a) |
a protective device |
2) |
an infector |
b) |
to remove all traces of something |
3) |
to boot destructive |
c) |
a device used to set off an explosion or other process |
4) |
to trigger |
d) |
to discover or recognize that something is present |
5) |
to erase |
e) |
to set a process in motion |
6) |
pirated |
f) |
something which transmits a disease or virus |
7) |
a shield |
g) |
stolen, obtained without the owner’s consent |
8) |
to detect |
h) |
to load the operating system into memory |
Task 10. Decide whether the following statements are true [T] or false [F] in relation to the information in the text. If you feel a statement is false, change it to make it true
Viruses cannot be spread through a computer network, only via flash cards transported from computer to computer. [ ]
The virus will spread as soon as you put the infected flashcard in your PC. [ ]
The infector works by interfering in some way with the normal use of your computer. [ ]
Most viruses spread through pirated games. [ ]
You should run an antivirus program every time you use your computer. [ ]
There are not very many viruses in circulation. [ ]
Virus shields are more effective than virus scanners. [ ]
Task 11. Translate the following sentences from Ukrainian into English. Mind grammar
1. Комп'ютерні віруси, як і справжні біологічні віруси, є переносниками елементарної інформації, яка при вбудовуванні (to embed) в логічну структуру програми змушує її виконувати шкідливі дії, або просто уповільнює її роботу.
2. Лікування комп'ютерних вірусів — досить непросте завдання, адже далеко не у всіх випадках програму можна вилікувати, не пошкодивши її.
3. Кожен рік збільшення числа комп'ютерних вірусів змушує виробників антивірусних програм випускати доповнення для вірусних баз, а також оновлення програм-ревізорів.
4. Для профілактики (preventive measures) зараження вірусом рекомендується не запускати на комп'ютері програми, джерело яких ненадійний або невідомий, а також проводити регулярне сканування жорсткого диска і пам'яті.
5. Активізація багатьох вірусів відбувається в будь-які певні дні — в п'ятницю 13-го, в свята, в інші пам'ятні дати або навіть в день народження автора вірусу.
Speaking
Critical thinking. Read the article and express your opinion on the problem.
Censorship on the Web
The Internet offers instant access to information across national and cultural borders, but along with helpful information the Internet hosts a disturbing amount of unsavory material. Militias and hate groups use Web sites to recruit new members and spread their views. International terrorists use Web sites as recruiting tools and for boasting about suicide bombings. Criminals, anarchists and dissenters post guidebooks and tips on how to do all kinds of illegal activities, from making suitcase bombs to spreading viruses.
Some advocate cyber censorship to irresponsible Web sites, blogs and discussion groups. Cyber censorship typically means blocking access to Web sites, but it can also mean closing sites and removing them from host servers. Censorship advocates are opposed by free speech supporters. The controversy over censorship is not new. In most cases words are acceptable, whereas actions can be punishable. But in some cases, words are punishable, too.
A second censorship guideline hinges on local standards of morality. Local communities can apply their own standards to determine whether material is obscene.
However, local standards are difficult to sort out on the Internet where a Web surfer in Tennessee can easily access Web sites, bulletin boards and chart groups that originate from anywhere in the world.
The U. S. Supreme Court supports the concepts of cyber zones that limit Net access to certain materials. It is possible to construct barriers in cyberspace and use them to screen for identity, making cyberspace more like the physical world and more amenable to zoning laws. As an example, AOL is trying to develop a family - friendly Internet portal by enforcing policies against offensive speech.
But in some countries cyber citizens have no choice but to use a government-controlled ISP. In many countries, free speech is not a basic right conferred to all citizens. Many dictatorial regimes want their citizens to receive news from the outside world only after government censor has screened it. Officials in more than 20 countries use sophisticated tools to block Web sites, filter e-mail, and censor discussion groups.
China has some of the most rigorous Internet censorship in the world. The “Great Firewall of China” as it is sometimes called, blocks Internet content by preventing IP addresses of objectionable sites from being routed through its gateways into China. In Iran, government censors monitor political and news Web sites. In Saudi Arabia if you tried to open “Rolling Stone” magazine’s Web site, you would find that access has been denied. The Saudi government claims it censors the Internet to preserve culture and heritage.
That argument in many ways reflects the concept of cyber zones that conform to local standards of morality. Even free-speech activists seem to agree. They say, “We do think that information should be free, but we do need to find a balance for respect for sovereign states to preserve their own culture.”
Despite such cultural sensitivity, technology giants, such as Microsoft, Yahoo! and Cisco Systems have been criticized for providing foreign government with tools for blocking culturally objectionable sites.