Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

14-es_1 / Анг.яз / умк_Тихонова_англ_для РТ,ВС

.pdf
Скачиваний:
52
Добавлен:
18.05.2015
Размер:
1.63 Mб
Скачать

intricacies n

Детали. подробности

endeavour UK n

Попытка, стремление

mischief n

Вред, ущерб

summon up v

Воскрешать в памяти, вызывать

malicious a

злоумышленный

trait n

черта

patch n

Вставка в программу (с целью

 

исправления или изменения)

2. Find synonyms:

1. harass

a) bother

2. defraud

b) vindictive

3. mischief

c) deceive

4. intention

d) try, attempt

5. endeavour

e) call up

6. summon up

f) harm

7. malicious

g) purpose

3.Choose the word from your vocabulary list to match the following definitions:

1.to continue to annoy or upset someone over a period of time

2.to take something illegally from a person, company, etc., or to prevent someone from having something that is legally theirs by deceiving them

3.to move slowly into a place, system or organization

4.something that you want and plan to do

5.to get into someone else's computer system without permission in order to find out information or do something illegal

6.if something, especially a quality or feeling, borders on another more extreme thing, it is almost that thing

7.something or someone that you think about all the time

8.a mistake or problem in a computer program

9. to connect computers together so that they can share information

10.(the situation of being faced with) something needing great mental or physical effort in order to be done successfully and which therefore tests a person's ability

11.to damage or destroy equipment in order to prevent the success of a competitor

12.complicated details

13.an attempt to do something

14.damage or harm

15.a small computer program that can be added to an existing program in order to make the existing program work properly

141

4. Fill suitable vocabulary list words in:

1.Stop h_____ing me!

2.They are both charged with conspiracy to d______ an insurance company of $20 000.

3.At about this time the new ideas about 'corporate management' had begun to i_______ (into) local government.

4.He's full of good i______s, but he never does anything about them!

5.A programmer had managed to h___ into some top-secret government

data.

6.Hackers have a strong sense of curiosity, which sometimes b______ on obsession.

7.He's always wanted to find his natural mother but recently it's become an o________.

8.A b___ caused the company's computer system to crash.

9.Our computer system consists of about twenty personal computers n______ed to a powerful file-server.

10.Finding a solution to this problem is one of the greatest c______s faced by scientists today.

11.The rebels had tried to s_______ the oil pipeline.

12.I enjoyed the film, but I couldn't follow all the i_______ of the plot.

13.In spite of our best e_______rs, it has proven impossible to contact her.

14.He needs a hobby to keep him busy and stop him from getting into

m______.

15.Computer h_____ing has become very widespread over the last

decade.

16.I downloaded a p____ from their website.

5. Crossmatch:

1. computer

a) reputation

2. mid

b) measures

 

 

3. bad

c) machines

 

 

4. unifying

d) system

 

 

5. to network

e) 1960s

 

 

6. security

f) trait

 

 

7. unethical

g) endeavours

 

 

6. Choose the words which can be combined with the word “computer”:

Code, intention, system, trait, virus, military, world, Bill gates, user, malicious, program, industry, skills, engineer, networks.

142

7. Fill in the prepositions and translate the phrasal verbs:

1.

The word summons … thoughts of malicious computer u

sers.

2.

The make ….only a small percentage of the hacker co

mmunity.

3.

The term computer hacker first showed … in the mid

-1960s.

4.

A hacker was a programmer – someone who hacked … co

mputer code.

5.

A unifying trait among these hackers was a strong sense of curiosity,

sometimes bordering … obsession.

 

 

6.

These hackers prided themselves … their ability

to

create new

programs.

 

 

7.

Some managed to land a job that leveraged their skills, getting paid …

what they'd happily do for free.

 

 

GRAMMAR POINT

1.Analyze the table “The Gerund” (see Appendix-2). Read and translate the sentences in which the gerund is used as:

1) subject

Model: Reading such books is necessary. – Читать (чтение) такие книги необходимо.

1.Computer-aided testing is determined by the aims of educational procedure. 2. Learning rules without examples is of little use. 3. Knowing English is helpful for any programmer. 4. Learning to use a computer is important for every educated person. 5. Manipulating this matrix requires about

80million separate multiplications.

2) part of a predicate

Model: Seeing is believing. – Увидеть значит noверить.

1.The young scientist began experimenting. 2. My hobby is reading.

3.Our aim is studying information science. 4. We started improving the device.

5.Computer-managed learning is processing and storing students' exam results, registering and timetabling.

3) direct object

Model: He likes reading English. – Ему нравится читать по-

английски.

1.We expected being given further assistance. 2. They discussed improving the program. 3. I like using BASIC and PASCAL. 4. He likes reading about the history of computers development. 5. The device needed retesting before the experiment. 6. He remembers being shown this project.

4) indirect object

Model: He insisted on adopting a new plan. Он настаивал на принятии нового плана.

1.Thank you for helping us. 2. He succeeded in solving the problem. 3. I'm sorry for being late. 4. My friend is good at speaking English. 5. I'm sure of having debugged the program. 6, Computers are used to assist in teaching and learning.

143

5) attribute

Model: I had little time for reading last week. У меня было мало времени для чтения на прошлой неделе.

1.The idea of using symbols instead of words was very helpful. 2. It was a good article for discussing at the seminar. 3. Output devices are devices for giving information back to human beings. 4. Every teacher must study the language of educational computing. 5. In the Middle Ages multiplication and division were both performed by the method of successive doubling numbers.

6) adverbial modifier

Model: Without knowing the result we can't draw a conclusion. — He

зная результата, мы не сможем сделать заключение.

1.In considering the~ development of computers we must point out the oldest forms of mechanical devices for calculation. 2. After writing an equation the next step is to find the values of unknowns. 3. In designing computers experts have developed new techniques. 4. In CAL programs are designed to encourage knowledge by finding out and learning rather than by drill and practice. 5. After

161being discussed at the seminar many problems of educational computers became clear to us. 6. He can't solve this problem without being given this program.

2.Compare the Gerund and the Participle in the sentences below. In every case state the subject and the predicate:

1.Reading such books we obtain important information. Reading such books is necessary. 2. Knowing BASIC will help you. Knowing BASIC you will write a good training program. 3. Your speaking English every day is very important if you want to master the language. Speaking English every day you will master the language. 4. In solving these equations you must be very careful with the signs. Solving these equations you must pay attention to the signs.

5.On obtaining the data the scientist went on working. Having obtained the data the scientist finished his work. 6. He likes being helped. Being helped he solves such problems easily. 7. I am fond of reading "Datamation" journal. Reading "Datamation" journal I improve my English and computer engineering knowledge.

3.Translate the sentences paying attention to the -ing -forms:

1. Educational computing is widely discussed today. 2. Computing machines are applied in many spheres of our life, 3. The computer is a good training aid in industry, business and commerce. 4. It can be used in training engineers, businessmen, managers, etc. 5. I'd like to watch computer operating. 6. The ideas underlying hierarchical structuring of software will be discussed at the next seminar. 7. Giving definitions ready makes the teacher

144

forego(отказываться) the possibility to teach his pupils creative thinking. 8. Compiling a program requires great attention of a programmer.

4. Use the gerund of the verbs in brackets.

1. Her aim is (to master) the subject in the shortest possible time. 2. I spent a lot of time in (to prepare) for the seminar. 3. (To read) English articles helped him to improve his English. 4. Input devices are devices for (to put) information into a computer, ranging from a keyboard to a microphone. 5. We'll discuss the problems of computer's way of (to think) as a model of human (to think) at this conference. 6. I'll think about (to take part) in the forthcoming conference. 7. We had much difficulty in (to write) the program. 8. He likes (to be informed) in time. 9. By (to do) this that you'll save a lot of time. 10. They approved the device after (to use) it.

5. Indicate the Gerundial Constructions and translate the sentences.

Models:

1.I knew nothing of your having made a report, ничего не знал о том,

что вы сделали доклад.

2.Lobachevsky 's having created a new geometry different from that of Euclid was a new stage in the development of mathematical science. – To,

что Лобачевский создал новую геометрию, отличную от геометрии Евклида, было новым этапом в развитии математической науки.

1.His having proved the advantages of the new system is very important.

2.The computer's being used in different spheres of our life is shown in the table above. 3. I know of Pascal's having built an adding machine at the age of

19.4. Your having graphed the flowchart helped you to show the structure of the program. 5. I knew nothing of their having completed the experiment. 6. Ch. Babbage's having designed his Analytical Engine was very important for the development of computer engineering. 7. The professor insisted on our comparing the results of the experiments. 8. I am surprised at your friend's knowing so many programming languages. 9. The name of M. Lomonosov became known all over the world for his having made great achievements in different branches of science. 10. We know of these properties being used in the operations of division and multiplication.

6.Translate into English using the Gerund:

1. Компьютер используется для решения сложных задач. 2. Чтение научной литературы важно для вашей будущей специальности. 3. Я пред- почитаю пользоваться Бейсиком при написании учебных программ. 4. Зна- ние английского языка полезно для каждого программиста. 5. Мы обсуж- дали составление блок-схемы программы. 6. Это очень интересная проблема для обсуждения на конференции. 7. То, что П. Л. Чебышев

145

изобрел арифмометр, сыграло важную роль для развития ЭВМ. 8. Я знаю о том, что его статья была опубликована в последнем номере журнала.

READING

Read the text and do exercises that follow.

Introduction to How Hackers Work

by Jonathan Strickland

Thanks to the media, the word "hacker" has gotten a bad reputation. The word summons up thoughts of malicious computer users finding new ways to harass people, defraud corporations, steal information and maybe even destroy the economy or start a war by infiltrating military computer systems. While there's no denying that there are hackers out there with bad intentions, they make up only a small percentage of the hacker community.

The term computer hacker first showed up in the mid-1960s. A hacker was a programmer someone who hacked out computer code. Hackers were visionaries who could see new ways to use computers, creating programs that no one else could conceive. They were the pioneers of the computer industry, building everything from small applications to operating systems. In this sense, people like Bill Gates, Steve Jobs and Steve Wozniak were all hackers – they saw the potential of what computers could do and created ways to achieve that potential.

A unifying trait among these hackers was a strong sense of curiosity, sometimes bordering on obsession. These hackers prided themselves on not only their ability to create new programs, but also to learn how other programs and systems worked. When a program had a bug – a sectio n of bad code that prevented the program from working properly – hacke rs would often create and

146

distribute small sections of code called patches to fix the problem. Some managed to land a job that leveraged their skills, getting paid for what they'd happily do for free.

As computers evolved, computer engineers began to network individual machines together into a system. Soon, the term hacker had a new meaning – a person using computers to explore a network to which he or she didn't belong. Usually hackers didn't have any malicious intent. They just wanted to know how computer networks worked and saw any barrier between them and that knowledge as a challenge.

In fact, that's still the case today. While there are plenty of stories about malicious hackers sabotaging computer systems, infiltrating networks and spreading computer viruses, most hackers are just curious – they want to know all the intricacies of the computer world. Some use their knowledge to help corporations and governments construct better security measures. Others might use their skills for more unethical endeavors.

READING COMPREHENSION

1. Finish up the sentences:

1.The term computer hacker first…

2.A hacker was…

3.Hackers were the pioneers of …

4.Computers evolved and computer engineers began…

5.Soon, the term hacker had a new meaning…

WRITTEN ASSIGNMENT

1. Fill in the gaps with suitable nouns. You may use the text.

Sometimes the term "______" has a bad reputation. Really there are some computer ______ with bad _______ who _______ corporations, steal information, and ________ military computer systems. But they make up only a small percentage of hacker _______. A unifying _______ among other hackers is a strong sense of ________, sometimes bordering on ________.

2. a) Revise Present/Past Simple (see Appendix-2 УБ-4). Fill in the table, using the verb “to hack”:

Present Simple

Past Simple

Positive

Negative

Question

147

b) Now read the second paragraph in Present Simple.

4. Look through the last paragraph and complete the table:

Types of hackers

Things they do

What they use their knowledge for

5. Entitle each paragraph and make an outline of the text. Write a précis according to your outline.

INTERACTION

Read the text “Hackers and crackers” below. Discuss it with your friend. Start like this “Do you know that…?”

Hackers and Crackers

Many computer programmers insist that the word "hacker" applies only to law-abiding enthusiasts who help create programs and applications or improve computer security. Anyone using his or her skills maliciously isn't a hacker at all, but a cracker.

Crackers infiltrate systems and cause mischief, or worse. Unfortunately, most people outside the hacker community use the word as a negative term because they don't understand the distinction between hackers and crackers.

SPEAKING

1. Take turns asking each other the following questions:

1.What thoughts does the word “hacker” usually summon s up?

2.Do they make up a large percentage?

3.When does the term “computer hacker” first show up?

4.What kind of people were hackers?

5.What are some famous people who can be regarded as hackers?

6.What was a unifying trait of those hackers?

7.What is a bug?

8.What is a patch?

9.What are two different types of hackers?

148

2.Render the text using the following expressions:

1.- The head-line/title of the article I have read is ...

2.- The article is written by…

3.- The main idea of the article is ...

-The aim of the text is to provide the reader with some data on ...

-The article is devoted to the problem of ...

4.- The author starts by telling the reader (about) that ...

-The author thinks that…

5.-Further the author says that…

-The article goes on to say that ...

6.- The author comes to the conclusion that ...

7.- I found the text interesting (important, disputable, informative, dull, too hard to understand) because …

-I agree ( disagree) with the author that …

-The text will be useful for those who take interest in …

POST-READING ACTIVITIES

1.Read the text The Hacker Toolbox” in the block f or supplementary reading (Appendix-1) and translate it with the dictionary.

2.Read the text “ Правила поведения в Интернете” in the block for

supplementary reading (Appendix-1) and give a short summary in English.

3. Read the text “Famous Hackers” in the block for supplementary

reading (Appendix-1) and speak about famous people in hacking.

Вернитесь к учебным целям УБ-7 и сопоставьте их с вашими новыми знаниями и умениями. Удостоверьтесь, что вы достигли этой цели.

149

УЧЕБНЫЙ БЛОК P (УБ-Р) Обобщение по модулю

1.Вернитесь к учебным целям УБ-0. Проверьте себя, достигли ли вы поставленных целей. Если вы в чем-то сомневаетесь, то вернитесь к соот- ветствующим разделам проработанных учебных блоков.

2.Обобщите наиболее существенные знания по модулю и выразите их в форме краткого резюме. Для этого ответьте на следующие вопросы:

1.What are the fundamental principles of programming connected with?

2.What is the difference between the terms “coding ” and “programming”?

3.What are the main types of programming languages? Give examples.

4.What is technophobia?

5.What do you know from the history of the Internet service?

6.What are some symptoms of an IAD?

7.Is there any difference between hackers, crackers and virus builders?

8.What is a virus?

9.How do worms work?

3.Если вы испытали трудности, отвечая на поставленные вопросы, то изучите соответствующий учебный материал повторно и обсудите его с одногруппниками. Используйте также консультации у преподавателя.

4.Если вы уверены в своих знаниях, то приступайте к выполнению обзорного теста УБ-К.

150