- •Contents
- •Unit I “The digital age”
- •1. Read and translate the text. Retell the text using the words in bold type. Use of Computers in Everyday Life
- •2. Find English equivalents in the text:
- •3. Complete the table, using the information from the text above and other resources. How can be computers used in different spheres of social life?
- •4. Use collocations from the box to complete these sentences:
- •5. Read and translate the text: The evolution of computers
- •6. Give an accurate translation of the listed words and word combinations:
- •7. Answer the questions:
- •8. Are these statements true or false?
- •9. Find in the text synonyms of the following words:
- •10. Read and translate the article. Learn the words in bold type by heart: Apple unveils iPad mini, new Macs at California event
- •11. Find English equivalents in the text:
- •12. Answer the questions:
- •13. Choose the right word:
- •14. Find all the samples of direct speech in the text and transform them into indirect speech:
- •15. What words from the article are defined? Choose an appropriate word from the databank:
- •16. Translate into English:
- •Grammar revision: Passive voice (consult Appendix 1)
- •17. Write past indefinite and past participle forms of the following verbs. What form is used for the formation of the passive voice?
- •18. Read the article and underline the passive voice tenses:
- •19. Complete these sentences with the present/past simple passive form of the verbs in brackets.
- •20. Complete these sentences with the present/past continuous passive form of the verbs in brackets.
- •21. Complete these sentences with the present/past perfect passive form of the verbs in brackets.
- •23. Rewrite these sentences using the passive.
- •24. Make the negative and interrogative forms of the sentences.
- •25. Choose the right form of the verb in Passive voice.
- •26. Translate into English:
- •Unit II “My future profession. Prominent computer scientists”
- •1. Read and translate the text. Learn the words in bold type by heart: Careers in Computer Science
- •2. Match the words and word combinations with their Ukrainian equivalents:
- •3. Complete the sentences from your memory:
- •4. Match the definition with the word defined? Choose the words from the databank:
- •5. Insert the words into the proper places:
- •6. Read the text silently, grasping its main idea:
- •7. True or false:
- •8. Prepare a report/Power Point Presentation about a famous computer scientist.
- •9. Read the information file about different job titles in it. What features and skills must a person possess to become an it specialist? Job titles in it
- •10. Complete these definitions with the job titles mentioned above:
- •11. Write and learn a composition “My future profession”.
- •12. Read and translate the text:
- •It people at work
- •13. Give an accurate translation of the listed word combinations:
- •14. Complete the sentences with words from the text:
- •15. Translate into English:
- •Your writing
- •16. Read a letter of application and complete a resume: Letter of application
- •Curriculum vitae
- •It skills
- •17. Read the advertisement for a webmaster:
- •18. Compose a letter of application, using the key phrases:
- •19. Write a curriculum vitae. Unit III “Basic concepts about a computer”
- •1. Read and translate the text:
- •What is a computer?
- •2. Give an accurate translation of the word combinations:
- •3. What operations can be done with data? Guess from the initial letter what word is missing:
- •4. Match the words with the correct meanings:
- •5. Answer the questions:
- •6. Read, translate and retell the text: What is inside a pc system?
- •7. Answer the questions:
- •8. Find in the text the English equivalents:
- •9. Complete the sentences from your memory:
- •10. Insert the words in bold type into appropriate places:
- •11. Note the useful language for buying a computer: Buying a computer
- •12. The specs of two computers are listed below; use them to make up a dialogue:
- •13. Make notes about the features of the computer that you would most like to have, using the following key phrases:
- •14. Translate into English:
- •Grammar revision
- •13. Decide if the -ing forms in these sentences are gerunds, present participles or adjectives:
- •14. Put the words in brackets in gerund or Infinitive forms:
- •15. Fill in the blanks with -ed or -ing form of the adjectives:
- •16. Transform the following sentences into Participle I or Participle II constructions:
- •17. Choose the right Verbal:
- •Sample test to module I
- •I. Choose the correct answer:
- •II. Translate the following into English:
- •2. Find English equivalents in the text:
- •3. Rewrite the false statements:
- •4. Put questions to the sentences, making the type of a question specified in the brackets (consult Appendix 2):
- •5. Match the words to get word combinations and make your sentences with them:
- •6. Read and translate the text: Optical storage devices
- •7. Find English equivalents in the text, learn them by heart:
- •8. Answer the questions:
- •9. What words from the text are defined? Find the word defined in the databank:
- •10. Read and translate the text: Flash memory
- •11. Match the words and their Ukrainian equivalents:
- •12. Complete the sentences from your memory:
- •Your Writing
- •15. Read about the main principles of writing an abstract for a text:
- •Unit V “Input/ output devices”
- •1. Read and translate the text: Some common input devices
- •2. Give an accurate translation of the words and word expressions:
- •3. Make up your own sentences with the verbs in bold type from the text.
- •4. Choose the right answer:
- •5. Read the information file and do the tasks below: The keyboard
- •The mouse
- •Voice input
- •6. Find in the text English equivalents of the words:
- •7. What key of a keyboard is missing? Insert appropriate words into the gaps:
- •8. Which input device would you use for these tasks?
- •9. Identify the keys described below:
- •10. Complete these sentences with the correct ‘mouse action’:
- •11. Write a summary to the article:
- •12. All about buttons. Match the word combinations with their translation:
- •About scanners
- •14. Give an accurate translation of the words and word expressions:
- •15. Answer the questions:
- •16. Read and translate the text: crTs and lcDs
- •17. Find English equivalents in the text:
- •18. Match each term with the appropriate definition:
- •19. Write several sentences about advantages and disadvantages of crTs and lcDs.
- •20. Read, translate the text. Learn the words in bold type: Printers
- •21. Find English equivalents in the text:
- •22. Are these statements true or false?
- •23. Find synonyms of the following words in the text:
- •24. Put 10 questions to the text “Printers”.
- •25. Translate into English:
- •Unit VI “The Internet”
- •1. Discuss the questions:
- •2. Read and translate the text: Main concepts about the Internet
- •Is Web and Internet the Same?
- •3. Match the words and word combinations with their Ukrainian equivalents:
- •4. Complete the definitions:
- •5. Insert the words in bold type into appropriate places:
- •7. Write an abstract to the text Main concepts about the Internet.
- •8. Write a summary to the article:
- •9. Read and translate the text:
- •Internet-based communications
- •10. Find English equivalents of the words:
- •11. Make up word expressions and write your sentences with them:
- •12. Are these statements true or false:
- •13. Answer the questions:
- •14. Get acquainted with a list of slang words:
- •15. Insert slang words into the appropriate places:
- •16. Read and translate the dialogue:
- •17. Read and translate the text. Learn the words in bold type by heart:
- •Internet threats
- •18. Find English equivalents in the text above:
- •19. Fill in the gaps with the appropriate words:
- •20. Write 10 questions to the text “Internet threats”.
- •21. Write a summary to the article:
- •22. Translate the sentences into English:
- •Your writing
- •23. Read and learn the e-mail Guidelines:
- •24. Read the message and describe it according to the criteria above, paying attention to the words in bold:
- •25. What is wrong with these e-mails? Rewrite them correctly, paying attention at spelling and grammar and using e-mail Guidelines:
- •Sample test to module 2
- •I. Choose the correct answer:
- •II. Translate into English:
- •III. Put questions to the sentences, making the type of a question specified in the brackets:
- •Unit VII “Basic Software”
- •1. Discuss the questions:
- •2. Read and translate the text: Learning About Operating Systems
- •3. Match the words and word combinations with their Ukrainian equivalents:
- •4. Write a summary to the text Learning About Operating Systems.
- •5. Insert the missing words from the text. Guess them from their initial letters:
- •6. Insert the words in bold type into appropriate places:
- •7. Choose the right answer:
- •8. Read and translate the text: Word processing
- •9. Find English equivalents in the text:
- •10. Make up word combinations:
- •11. Complete these statements with terms from the text above.
- •12. Read and translate the text: Spreadsheet basics. Database basics.
- •13. Match the words and word combinations with their Ukrainian equivalents:
- •14. Answer the questions:
- •15. A compound word is made when two words are joined to form a new word. Guess what words are meant and write them:
- •Conditionals (Consult Appendix 4)
- •18. Describe the following algorithm, using the zero conditional:
- •19. Complete the sentences with the first conditional forms:
- •20. Complete the sentences with the second conditional forms:
- •21. Match the beginnings and endings of the sentences:
- •22. Choose the right form of Conditional:
- •Unit VIII “The link of computer science with mathematics. Programming languages.”
- •1. Read and translate the text. Learn the words in bold type: Mathematical Language
- •2. Find English equivalents in the text:
- •3. What is meant by the following definitions? Choose the words from the databank:
- •4. Read the formulae. Consult Appendix 6:
- •5. Match the terms with their definitions:
- •6. Answer the questions:
- •7. Read and translate the text: Algorithms
- •8. Find English equivalents in the text:
- •9. Answer the questions:
- •10. Are these statements true or false?
- •11. Write a summary to the article:
- •12. Read and translate the text: Top 10 Most Popular Programming Languages
- •5.Vb ( or Visual Basic )
- •13. Find English equivalents in the text:
- •14. Complete the sentences with the words in bold type:
- •Interpreted – (an) interpreter – interpretable - interpretation
- •5. What is the best definition of 'c'?
- •18. Find English equivalents in the text:
- •19. What words are defined? Choose them from the databank:
- •20. Make up word combinations:
- •21. Complete the sentences with the suitable words. Guess them from the first letter:
- •22. Prepare a power point presentation on the topic “About my favourite programming language”.
- •23. Translate into English:
- •Sample test to Module 3
- •I. Choose the right answer:
- •II. Translate into English:
- •III. Open the brackets and put the verbs into the proper form of Conditional Mood:
- •Unit IX “Graphics and design”
- •1. Read and translate the text. Learn the words in bold type: Computer graphics
- •Vector graphics
- •2. Find English equivalents in the text:
- •3. Answer the questions:
- •4. Write an abstract of the text Computer graphics.
- •5. Read, translate and learn by heart the dialogue: Choosing graphics software
- •How a game is made?
- •7. Find English equivalents in the text:
- •9. Complete the idea of sentences according to the text:
- •10. Put 10 questions to the text How a game is made?
- •11. Read and translate the text. Learn the words in bold type: Why are there so many different image formats on the Web?
- •12. Find English equivalents in the text:
- •16. Find English equivalents in the text:
- •17. True or false:
- •18. What words from the text are defined? Choose them from the databank:
- •19. Translate into English:
- •Unit X “Artificial intelligence. Virtual reality. Hacking.”
- •1. Read and translate the text: Artificial Intelligence
- •2. Complete the sentences:
- •3. Make up word combinations:
- •4. Consult the dictionary and make plural form of the following nouns of Latin and Greek origin:
- •5. Read and translate the article: Robots To Clean Your Kitchen And Play a Game Of Hockey?
- •6. Match the words and word combinations with their English equivalents:
- •7. What words from the text are defined? Choose them from the databank:
- •8. Write an abstract to the article Robots To Clean Your Kitchen And Play a Game Of Hockey?
- •9. Discuss the questions:
- •10. Read and translate the abstracts from a novel:
- •11. Match the words with their translation:
- •12. Answer the questions:
- •13. Read and translate the article: Computer Hackers r.I.P.: Making Quantum Cryptography Practical
- •14. Find English equivalents in the text:
- •15. What words from the text are defined? Choose them from the databank:
- •16. Make up word combinations:
- •17. Insert the words in bold type into appropriate places:
- •Viral – (a) virus – antivirus
- •18. Translate into English:
- •19. Write a summary to the article:
- •The Objective/Subjective Infinitive Complex. The Objective/ Subjective/Absolute Participial Complex.
- •20. Write the sentences, using The Objective Infinitive Complex.
- •21. Write the sentences, using The Subjective Infinitive Complex.
- •22. Create new sentences using The Absolute Participial Construction:
- •Unit XI “Computers and health”
- •1. Read and translate the text: Are video games bad for children?
- •2. Give an accurate translation to the words and word combinations:
- •3. Discuss the questions:
- •4. Translate into English: Комп'ютерні ігри: добре чи погано?
- •5. Read and translate the text: Computer ergonomics
- •6. Find English equivalents in the text:
- •7. Complete the sentences with words from the text:
- •8. Are these statements true or false?
- •Sample test to module 4
- •I. Choose the correct answer:
- •II. Translate into English:
- •III. Make your sentences with the phrases:
- •Passive voice
- •Basic Question Types
- •General (Yes/No) questions
- •Special Questions
- •Disjunctive Questions
- •Alternative Questions
- •The Gerund
- •The Infinitive
- •Present Participle (Participle I)
- •Past Participle (Participle II)
- •Conditionals (Умовні речення)
- •Об'єктний інфінітивний комплекс (The Objective Infinitive Complex)
- •Суб'єктний інфінітивний комплекс (The Subjective Infinitive Complex)
- •Суб'єктний дієприкметниковий комплекс (The Subjective Participle Complex)
- •Незалежний дієприкметниковий комплекс (The Absolute Participle Complex)
- •Symbols
- •References
- •58000, М. Чернівці, вул. І. Франка, 20, оф.18, тел. 099 73 22 544
17. Read and translate the text. Learn the words in bold type by heart:
Internet threats
A computervirus attaches itself to aprogramorfileenabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus canrange in severity: some may cause only mildly annoying effects while others can damage your hardware,softwareorfiles. Almost all viruses are attached toan executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. Because a virus is spread by human action people will unknowingly continue the spread of a computer virus by sharing infecting files or sending emailswith viruses asattachmentsin the email.
A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.
The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line.
Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or networkbandwidth), causing Webservers, network servers and individual computers to stop responding. In recent worm attacks such as the much-talked-about Blaster Worm, the worm has been designed totunnel into your system and allow malicious users to control your computer remotely.
A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful softwarebut will actually do damage once installed or run on your computer. Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing yourdesktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create abackdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.
Added into the mix, we also have what is called a blended threat. A blended threat is a moresophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious codeinto one single threat. Blended threats can use server and Internetvulnerabilities to initiate, then transmit and also spread an attack. Characteristics of blended threats are that they cause harm to the infected system or network, they propagate using multiple methods, the attack can come from multiple points, and blended threats also exploit vulnerabilities.
The first step in protecting your computer from any malicious there is to ensure that your operating system(OS) is up-to-date. This is essential if you are running a Microsoft Windows OS. Secondly, you need to haveanti-virus softwareinstalled on your system and ensure youdownloadupdates frequently to ensure your software has the latest fixes for new viruses, worms, and Trojan horses. Additionally, you want to make sure your anti-virus program has the capability to scan e-mail and files as they are downloaded from the Internet, and you also need to run full disk scans periodically. This will help prevent malicious programs from even reaching your computer.
You should also install a firewall. A firewall is a system thatprevents unauthorized use and access to your computer. A firewall can be either hardware or software. Hardware firewalls provide a strong degree of protection from most forms of attack coming from the outside world and can be purchased as a stand-alone product or in broadband routers. Unfortunately, when battling viruses, worms and Trojans, a hardware firewall may be less effective than a software firewall, as it could possibly ignore embedded worms in out going e-mails and see this as regular network traffic.
(based on: http://www.webopedia.com)