
6398
.pdf18 She will come _____ Christmas day.
19 She will come _____ summer.
20 She is _____ home.
4Read the text and define if the sentences are true or false(1 балл за правильный ответ)
A computer worm is a kind of malware that is able to copy itself, and spread.
Unlike a computer virus, this is done without changing files on a computer, and without affecting the boot sector of media. Worms spread over networks, or on removable media like USB flash drives. They almost always need a helper program that is able to access the network, or that executes when a new medium is inserted. In that way, a worm could start a program to send electronic mail, and send itself on to all the addresses in the address book of the email application. A very famous worm that appeared in 2000 was called ILOVEYOU (or Love Letter), it sent a simple mail with the subject ILOVEYOU, and an attachment of a document that contained the worm code.
A trojan horse (Sometimes called a trojan) is a kind of malware. It is special computer program that pretends to do a certain thing, but in reality it does something else, such as allow a stranger to access the computer and change it and read its information. In some cases the user notices, in other cases they do not. Spyware programs are current examples of programs that work as trojans.
It is rare to get a trojan on your computer by merely visiting a website, though it can happen. Usually, though, a trojan is attached to something you download. Usually they attach themselves to music, wallpapers, backgrounds, games, and especially executable files (.exe) and so on. It was named after the Trojan Horse in Greek mythology.
1A very famous worm sent an e-mail with the body “ILOVEYOU”
2Computer worm can copy your information.
3Computer worm doesn’t change user’s information.
4Spyware programs are trojans.
5Trojan can allow stranger to use your computer and read your information.
6Trojans attach themselves to e-mails.
7User always notices that somebody reads his data.
8Worm needs access the network to work.
9Worm sends electronic mails and its copies to other users.
10You usually cannot catch a Trojan when visiting websites.
21
Зачетная контрольная работа 1 к Разделу 9 «Нелегальные виды деятельности (Illegal activities; 3-й семестр)» и Разделу 10 «Иностранный язык для специальных целей (3-й семестр)»
1 Translate the words and phrases from Russian into English. (0,5 балла за правильный ответ)
1.удовольствие и развлечение
2.перебирание
3.проникновение
4.определять
5.дорогой и неэтичный
6.жульничать в игре
7.мошенник
8.привлекать
9.смягчать, уменьшать
10.любопытный по отношению к
2 |
Match the words to make phrases. (0,5 балла за правильный ответ) |
||
1. |
federal |
|
activity |
2. |
have a |
|
advances |
3. |
make a |
|
and amusement |
4. |
take |
|
and tiresome process |
5. |
masquerade |
|
as sb/sth |
6. |
social |
|
cracking |
7. |
software |
|
engineering |
8. |
remove or disable |
|
features |
9. |
generate |
|
free call |
10.expert on |
|
large influence on |
|
11.systematic |
|
legitimate licenses |
|
12.complex |
|
number |
|
13.pleasure |
|
part in |
|
14.result in |
|
programming languages |
|
15.covering |
|
republic |
|
16.serial |
|
tracks |
|
3 |
Choose the correct adjective. (0,5 балла за правильный ответ) |
||
1 |
This wet weather is so ...... . depressed / depressing |
||
2 |
I will be very ..... if she does well in her test. surprised / surprising |
||
3 |
My new job is extremely ...... . |
tired / tiring |
4I come home extremely ..... at the end of each day. tired/ tiring
5He's such a ..... person. He never wants to go out. bored / boring
6I'm ...... I have no idea what to do. confused / confusing
7Did you hear the ..... news about the accident? shocked / shocking
8 I'm not very ..... |
in sport. interested / |
interesting |
22
9 |
I didn't find his joke very ...... . |
amused / amusing |
|||
10 |
I am ..... |
of spiders. frightened / frightening |
|||
11 |
I am ..... |
with my grade in the grammar test. disappointed / disappointing |
|||
12 |
The film is very ...... |
excited / exciting |
|||
13 |
I am ..... |
about my test grades. They are all quite bad. depressed / depressing |
|||
14 |
It was not ..... |
she failed her tests. She never studied. surprised / surprising |
|||
4 |
Read the text and define if they are true or false. (1 балл за правильный |
||||
|
ответ) |
|
|
|
|
Telephone
A telephone is an electric tool. Using a telephone, two people who are in different places can talk to each other. Early telephones needed to be connected with wires. Now telephone calls can be sent with radio. This is called wireless or cordless.
Alexander Graham Bell was the first person to patent the telephone, in 1876. Early telephones were wired directly to each other and could only talk to the phone that they were connected to. Later, telephone exchanges allowed connecting to other telephones. During the 20th century the machines that made the connections were automated.
There are many different types of telephone. A telephone that can be carried around is called a mobile phone or cell phone. These became popular in the late
1980s. These days’ people carry mobile phones and in some cities or countries it is unusual to not have one. Some mobile phones are able to make telephone calls using communications satellites instead of masts on the ground, which means people can make calls from anywhere in the world.
Computers can use a machine called a modem to talk to other computers over a telephone line. This allows a computer to connect to other computer networks including the Internet.
In most countries there are public telephones. To use one people have to pay with coins, a credit card or a prepaid card.
Most countries have a telephone network. In less developed countries cell phones are used as a cheaper and faster way to bring modern communications to the countryside.
1All telephones needed to be connected with wires in the past.
2Now telephone calls can be sent with radio.
3Mobile phones became popular in the late 1980s.
4There are many different types of telephone.
5Some mobile phones are not able to make telephone calls using communications satellites.
6Computers can use a modem to connect to other computers over a telephone line.
7People can make calls from anywhere in the world.
8A computer can connect to other computer networks including the Internet.
9In most countries there are public telephones.
10Few countries have a telephone network.
23
Контрольная работа 1 к Разделу 12 «Различные темы по безопасности
(Security Topics; 4-й семестр)», по темам 12.1 – 12.4
1 |
Translate the words and phrases from Russian into English. (0,5 балла за |
||
|
правильный ответ) |
|
|
1 |
огромное количество |
6 |
признавать |
2 |
изменяемый |
7 |
уязвимый |
3 |
постоянный |
8 |
подчинять(ся) |
4 |
военный |
9 |
усилие, борьба |
5 |
случай |
10 |
завоеватель |
2Put the words from the box into the correct sentences. (0,5 балла за правильный ответ)
illegal |
citizens |
incomes |
cash-flow |
entity |
|
mention |
freedom |
surveillance |
recognized |
opportunity |
1.A business is treated as a separate economic or accounting _______.
2.A French-based pharmaceuticals company ran into _______ problems and faced liquidation.
3.He found himself put under ______ by British military intelligence.
4.His work was _______ by an honorary degree from Glasgow University
5.I had an _______ to go to New York and study.
6.It is ______ to intercept radio messages.
7.Many families on low ______ will be unable to afford to buy their own home.
8.She made no ______ of her disastrous trip to Paris.
9.The life of ordinary ______ began to change.
10.Today we have the _______ to decide our own futures.
3 Translate the sentences. . (1 балл за правильный ответ)
1.If you’re looking to learn how to code, the sheer number of programming languages may be overwhelming.
2.They believe that the scope of the data breach is the biggest in US history.
3.People now believe that cyberattacks are one of the top security threats.
4.The earliest mention of the term national security goes back to 1790.
5.Economic security is the condition of having stable income and/or other resources to support a standard of living now and in the future.
4 Rewrite the sentences using reported speech. (0,5 балла за правильный ответ)
1Benjamin: "I often have a big hamburger."
Benjamin says (that) … .
2Hannah: "They live in Boston."
Hannah said (that) … .
3 Tyler: "Ian doesn't invite girls to his parties."
Tyler told me (that) … .
24
4Dominic: "She understands Japanese."
Dominic remarks … (that) .
5Sophia: "Bella doesn't collect stickers."
Sophia explains … (that) .
6Robert: "Dennis often downloads the latest tunes."
Robert added (that) … .
7Olivia: "Leroy is out riding his new waveboard today." Olivia explained (that) … .
8Luke: "I don't know what to do."
Luke added (that) … .
9Lily: "Mr Jones is rude to Samantha."
Lily thinks (that) … .
10James and David: "We have to go now."
James and David tell me (that) … .
5Complete the sentences with the appropriate relative pronoun. (0,5 балла за правильный ответ)
1A mouse is an instrument … is used for navigating on a computer screen.
2Football is a team game … is played with eleven players on each side.
3The Prime Minister is the person … is in charge of the government.
4Scotland is the country … is the most northern of the United Kingdom.
5A hospital is a place … you go if you are seriously ill or injured.
6The Pope is the person … is the head of the Roman Catholic Church.
7Albert Einstein is the scientist … is responsible for the theory of relativity.
8An oven is a machine … is used to bake in.
9The Matrix is the film … introduced the principle characters Neo, Trinity and
Morpheus.
10Manchester is the city … you can find Old Trafford stadium.
6 Put the word in the correct order to make questions. (0,5 балла за правильный ответ)
1do from? Where you come
2football? to wants Who play
3Why you late? are
4What you nervous? makes so
5today? How does he feel
6live? brother does Where your
7guitar? to likes Who the play
8do practise When tennis? you
9What do to want tonight? you do
10How their many homework? did students
25
Контрольная работа 1 к Разделу 12 “Различные темы по безопасности
(Security Topics; 4-й семестр), по темам 12.5 – 12.6 и Разделу 13
“Иностранный язык для специальных целей (4-й семестр)”
1 Translate the words and phrases from Russian into English. (0,5 балла за правильный ответ)
1частный
2курс лекций (обучения) по
3гуманитарные науки
4общественные и физические науки
5недорогое образование
6присуждать учёную степень
7получить «кредит», зачёт
8зачётная единица трудоёмкости
9обучение; плата за обучение
10заём, ссуда
2 Translate the sentences. . (1 балл за правильный ответ)
1Liberal arts institutions offer courses in the arts, humanities, languages, and social and physical sciences.
2They often get scholarships, student loans, or grants.
3Students usually earn credits for programmes they take.
4Financial security more often refers to individual and family savings and money management.
5It has replaced other concepts that described the struggle of states to overcome various external and internal threats.
3Put a/an or the into the gaps. (0,5 балла за правильный ответ)
1I want ____ apple from that basket.
2____ church on the corner is progressive.
3Miss Lin speaks ____ Chinese.
4I borrowed ____ pencil from your pile of pencils and pens.
5One of the students said, "____ professor is late today."
6Eli likes to play ____ volleyball.
7I bought ____ umbrella to go out in the rain.
8My daughter is learning to play ____ violin at her school.
9Please give me ____ cake that is on the counter.
10I lived on ____ Main Street when I first came to town.
11Albany is the capital of ____ New York State.
12My husband's family speaks ____ Polish.
13____ apple a day keeps the doctor away.
14____ ink in my pen is red.
15Our neighbors have ____ cat and ____ dog.
16I have just had __________ great idea.
26
17 Columbus was one of __________ first people to cross __________ Atlantic. 18 __________ British drink too much tea.
19 __________ Thames flows into __________ North Sea.
20 Judith earns € 2000 __________ month.
4 Read the text and define if the sentences are true or false(1 балл за правильный ответ)
The word “hacker” is derived from the verb “to hack through” that means “to break through”. The word combines two meanings: one is negative – “hacker”, and the otherpositive and is perceived as “master” or “expert”. While speaking about computers the verb “to hack” stands for two operations – to crack the system or to repair it. The idea of these both actions is the same – the mode, the computer and its programs work in.
The first hackers were the students of Massachusetts Institute of Technology (MIT). They were interested in creating innovative, stylistic and technically clever circuits. During the spring of 1959 a new course was offered at MIT – a freshman programming class. Instead of creating a better circuit, hackers began to create a faster and more efficient program – with the least number of lines of code. Soon they formed a group and worked out the first set of hacker’s rules, called the Hacker’s
Ethics. The members of this group were engaged in writing and exchanging new programs and in perfecting the hardware. They worked at MIT’s Artificial
Intelligence laboratory and over the years introduced many innovations: LIFE – a game about survival; LISP – a new kind of programming language; the first computer chess game; the CAVE – the first computer adventure and SPACEWAR – the first video game.
There are four generations of hackers in the history of computer revolution. Each generation made its contribution to computer technology.
The first generation hackers came into being in the late 1960s – the early 1970s. They were university students of computer science departments. Using the time-sharing mode these hackers converted general-purpose computers (mainframes) into virtual personal computers.
The second generation hackers refer to the late 1970s. Their names are associated with the invention and production of personal computers. Following the
Hacker’s Ethics they opposed the commercialism of the Internet by creating programs and making them available to everybody, the so-called “freeware” or “shareware”.
The third generation hackers appeared in the early 1980s. They created a lot of educational, application and video games and programs for personal computers.
The present generation of hackers is the fourth generation. It is this generation that transformed the military Arpanet into a total digital world called the Internet.
But in the late 1990s the word “hacker” began to associate with the word “cracker”. Today it refers to the people who intentionally crack the access control and penetrate into other people’s computers in unauthorized ways. Such hackers read
27
private e-mails, steal confidential information, misappropriate the program. They cause great damage to economics, business, banking and many other aspects of people’s relations. Moreover, it is unsetting to know that a great deal of computer crimes go undetected and a lot of computer criminals remain uncaught.
1Creation, use and spreading harmful programs for PCs is a criminal offence.
2It was the first-generation hackers who made computer programs available to everybody.
3In the early 1990s the word “hacker” began to associate with the word “cracker”.
4The second-generation hackers came into being in the late 1970s.
5Modern “hackers” are only interested in creating innovative and technically clever circuits.
6The first set of hacker’s rules was worked out by the teachers of MIT.
7There are three generations of hackers in the history of computer revolution
8The first hackers stole confidential information and read private E-mails.
9The present-generation hackers make great contribution to all the aspects of people’s relations.
10The word “hacker” only means ‘master” or “expert”.
28

Экзаменационная контрольная работа к Разделам 12-14
1Translate the following words from Russian into English. (0,5 балла за правильный ответ)
1 |
рекламное ПО |
6 |
ссылка |
2 |
доступность |
7 |
вредоносное ПО |
3 |
конфиденциальность |
8 |
надоедливое ПО |
4 |
исследовать |
9 |
одержимость |
5 |
целостность |
10 шпионское ПО |
2Complete the following sentences with the correct phrases. (0,5 балла за правильный ответ)
exchanging information |
install programmes |
instant messaging |
||
make free calls |
malicious intent |
prevents and detects serial number |
||
software cracking |
|
the HTML |
the World Wide Web |
1Computer security __________ unauthorized use of your computer.
2Intruders can use your computer resources with __________ or for their own gain.
3During the covering tracks step hackers __________.
4__________ is the modification of software.
5Crackers use a stolen __________ or a tool.
6Phreaks crack the phone network and gain unauthorized access to telecommunication systems, especially to __________.
7Tim Berners-Lee from the UK created __________ in Switzerland in 1989.
8Most webpages are in __________ format.
9We use the Internet for electronic mail (email), online chat (__________), file transfer, working from home, and many other things.
10The Internet is an insecure channel for __________.
3Complete the sentences with the correct verb form, to … or -ing. (0,5 балла за правильный ответ)
1The Internet helps you ________ (find) information.
2I think I’ll finish ________ (write) the article at the weekend.
3Stop ________ (use) that pirate software. It’s illegal.
4Do you mind ________ (wait) for half an hour?
5We can’t afford ________ (go) abroad this summer.
6I think Pauline will fail ________ (enter) the college.
7Mark doesn’t enjoy ________ (play) computer games.
8John needs ________ (change) the password.
9I must remember ________ (send) Christopher an email tonight.
10I try to avoid ________ (spend) more than two hours a day at the computer.
29
4 Write questions from the words in brackets. Put the words in the right order.
(0,5 балла за правильный ответ)
1(websites / do / consist of / what?)
2(does / how much / cost / a tablet computer?)
3(a programmer / or / you / a web designer / are?)
4(next / where / we / go / summer / will?)
5(you / to / abroad / are / move / going?)
5 Make tag questions from these statements. (0,5 балла за правильный ответ)
1Your father works as an engineer.
2Phishing is a common threat on the Internet.
3Hackers often do phishing by email
4We usually use antivirus software on home computers.
5You can find web browsers on all modern computers.
30