Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Unit 7.doc
Скачиваний:
12
Добавлен:
03.05.2015
Размер:
48.64 Кб
Скачать

Unit 7

Grammar focus: Complex Object, Complex Subject (Revision)

Find Complex Object or Complex Subject in the following sentences and translate them:

  1. He wants you to help him.

  2. He is expected to come.

  3. She expected me to follow her advice.

  4. He is said to live in Moscow.

  5. Everybody thought him to be a real professional.

  6. He was considered to be writing a new program.

  7. We didn’t expect you to do this work so early.

  8. The delegation is reported to have already arrived.

  9. I knew him to be a good programmer.

  10. They were believed to be on their way to Moscow.

  11. I find him to be very witty.

  12. He was expected to arrive in the evening.

  13. Do you consider him a good student?

  14. A car was heard to arrive.

  15. Everybody found the film exciting.

  16. She was seen to leave the house.

  17. He forced his son to give up smoking.

  18. The water seems to be boiling.

  19. I haven’t heard anyone call me.

  20. He turned out to be a good engineer.

Word formation

Derive nouns from the following verbs:

To interfere, to duplicate, to replicate, to disrupt, to infect, to spread, to trick, to resemble, to design, to execute, to function, to instruct, to locate, to execute, to disrupt, to change, to operate, to attach, to spread, to use, to prepare, to prevent, to recover, to test.

Reading

Viruses

1. Answer the questions:

  1. What is a computer virus?

  2. What are they designed for?

  3. How can a viral infection be prevented?

  4. What antivirus programs do you know?

Lexis

2. Explain the meaning of the following words:

Self-duplicating, to avoid detection, payload, malfunction, executable code, legitimate computer programmes, professional mainframe systems, viral programme, backup, legitimate source, antiviral software, scanning software, to update, on-access scanner, on-demand scanner, check summing software, to evade, heuristics, monitoring software, integrity-shell software, isolating computer, boot sector.

3. Read the text and answer the question: Why is it necessary to protect your computer from viruses?

Virus (computer), self-duplicating computer program that interferes with a computer's hardware or operating system (the basic software that runs the computer). Viruses are designed to duplicate or replicate themselves and to avoid detection. Like any other computer program, a virus must be executed for it to function—that is, it must be located in the computer's memory, and the computer must then follow the virus's instructions. These instructions are called the payload of the virus. The payload may disrupt or change data files, display an irrelevant or unwanted message, or cause the operating system to malfunction.

How infections occur.

Computer viruses activate when the instructions—or executable code—that run programs are opened. Once a virus is active, it may replicate by various means and tries to infect the computer’s files or the operating system. For example, it may copy parts of itself to floppy disks, to the computer’s hard drive, into legitimate computer programs, or it may attach itself to e-mail messages and spread across computer networks by infecting other shared drives. Infection is much more frequent in PCs than in professional mainframe systems because programs on PCs are exchanged primarily by means of floppy disks, e-mail, or over unregulated computer networks.

Viruses operate, replicate, and deliver their payloads only when they are run. Therefore, if a computer is simply attached to an infected computer network or downloading an infected program, it will not necessarily become infected. Typically a computer user is not likely to knowingly run potentially harmful computer code. However, viruses often trick the computer's operating system or the computer user into running the viral program.

With the widespread use of e-mail and the Internet, viruses can spread quickly. Viruses attached to e-mail messages can infect an entire local network in minutes.

Anti-viral tactics.

Preparation and prevention.

Computer users can prepare for a viral infection by creating backups of legitimate original software and data files regularly so that the computer system can be restored if necessary. Viral infection can be prevented by obtaining software from legitimate sources or by using a quarantined computer to test new software—that is, a computer not connected to any network. However, the best prevention may be the installation of current and well-designed antiviral software. Such software can prevent a viral infection and thereby help stop its spread.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]