- •О. М. Ільченко
- •Introduction 3
- •4 Introduction
- •Позначення, якi зустрiчаються у книзi
- •Contents
- •Introduction
- •6 Contents
- •8 Chapter 1
- •Types of Science Products
- •10 Chapter
- •12 Chapter 1
- •Grammar: articles and their usage
- •General usage of articles:
- •14 Chapter 1 articles used with certain expressions
- •Articles with proper names
- •16 Chapter 1
- •18 Chapter 1
- •20 Chapter 1
- •22 Chapter 1
- •Noteworthy
- •24 Chapter 2
- •26 Chapter 2 grammar: expression of quantity.
- •I. Large quantity
- •Other expressions denoting large quantity:
- •II. Small quantity
- •28 Chapter 2
- •Other expressions:
- •Mind other expressions:
- •30 Chapter 2
- •Borrowed plural forms:
- •32 Chapter 2
- •By learning the prefixes you will understand the meaning of words.
- •34 Chapter 2
- •36 Chapter 2
- •38 Chapter 2
- •Noteworthy
- •40 Chapter 3
- •42 Chapter 3 grammar: system of tenses
- •44 Chapter 3 simple future (Future Indefinite)
- •46 Chapter 3
- •48 Chapter 3
- •Sequence of Tenses (Reported Speech)
- •50 Chapters 3
- •52 Chapter 3
- •Comment on these graphs:
- •54 Chapter 3
- •56 Chapter 3
- •Noteworthy
- •58 Chapter 4
- •60 Chapter 4
- •Grammar: structure of english sentence
- •62 Chapter 4
- •Logical connectors
- •Additional Information
- •64 Chapter 4
- •Exemplification
- •Summary
- •Contrast
- •66 Chapter 4
- •Purpose
- •Concession
- •68 Chapter 4 reason, cause and effect (result)
- •Expression of comparison
- •70 Chapter 4
- •Double comparative
- •Irregular formation
- •72 Chapter 4
- •74 Chapter 4
- •76 Chapter 4
- •78 Chapter 4
- •80 Chapter 4 Noteworthy
- •82 Chapter 5
- •84 Chapter 5 grammar: mood. Expression of conditions
- •Semantic types of conditional sentences
- •Real conditions
- •Unreal conditions
- •86 Chapter 5
- •Other expressions denoting conditions:
- •88 Chapter 5
- •90 Chapter 5
- •92 Chapter 5
- •94 Chapter 5
- •Noteworthy:
- •Internet
- •98 Chapter 6
- •100 Chapters
- •102 Chapters grammar: modal verbs and their equivalents (phrasal modals)
- •Modal verbs
- •104 Chapter 6
- •106 Chapter 6
- •108 Chapter6
- •110 Chapter 6
- •Acronyms and Initialisms
- •112 Chapter 6
- •114 Chapter 6
- •Noteworthy
- •116 Chapter 6
- •Interactive Multimedia English Suffixes
- •118 Chapter 7
- •Translate Ukrainian sentences, then match the two columns:
- •120 Chapter 7 grammar: the passive voice
- •Subject object
- •The passive is usually used:
- •1. Indirect Passive:
- •2. Prepositional Passive
- •122 Chapter 7 Other ways of expressing passive:
- •The passive is usually found with the following verbs and set phrases:
- •124 Chapter7
- •126 Chapter 7
- •Adjective suffixes
- •Verb suffixes
- •Noun suffixes
- •1. Make nouns from these words:
- •2. Make verbs from these words:
- •3. Make adjectives from these words:
- •128 Chapter7
- •130 Chapter 7
- •134 Chapter 8 grammar: verbals (Non-Finite Forms of the Verbs) participle
- •Verbals are:
- •Participle
- •Perfect Participle
- •Participles in a Sentence (a,b,c)
- •136 Chapters
- •Participal constructions
- •138 Chapters other constructions
- •140 Chapter 8
- •142 Chapter 8
- •144 Chapter 8
- •Noteworthy
- •146 Chapter 8
- •Alchemy
- •148 Chapter 9
- •Fossil fuels
- •150 Chapter 9
- •World Energy Consumption — 1970
- •154 Chapter 9 Constructions with the Infinitive
- •156 Chapter 9
- •158 Chapter 9
- •1. Green Products
- •160 Chapter 9
- •162 Chapter 9
- •164 Chapter 9
- •Noteworthy
- •166 Chapter 10
- •168 Chapter 10
- •170 Chapter 10
- •Constructions with gerund
- •172 Chapter 10
- •174 Chapter 10
- •I scored highest in _____________________________________
- •Intelligent manufacturing system
- •176 Chapter 10
- •178 Chapter 10
- •Noteworthy
- •How to Speak in Public
- •184 Chapter 11 grammar: emphasis
- •186 Chapter 11
- •188 Chapter 11
- •The Ax Story
- •A checklist for information age
- •190 Chapter 11
- •192 Chapter 11
- •II about you
- •196 Appendix II
- •198 Appendix III
- •Abstract (a short summary of a paper)
- •За змістом та методами дослідження
- •200 Appendix IV
- •Conference mini-vocabulary
- •202 Appendix IV
- •Basic criteria regarding the level of papers
- •Registration form
- •Please complete in block letters (type or print)
- •204 Appendix V
- •Tips on resume writing
- •Types of questions
- •1. General questions
- •2. Special question
- •3. Alternative questions
- •206 Appendix VI
- •4. Disjunctive questions
- •Verbs make and do
- •208 Appendix VIII
- •Irregular verbs
- •210 Appendix IX, X
- •Frequency scale
- •Probability scale
- •Toefl: first steps
- •Tips on Section 1
- •212 Appendix XI
- •214 Appendix XI
- •Tips on Section 2
- •Checklist for Section 2
- •218 Appendix XI
- •Test of written English (twe)
- •Tips on twe
- •Sample essay
- •220 Final Test Final Test
- •120 Questions
- •I. Read the passage and choose the one best answer to each question.
- •II. Complete the following sentences
- •222 Final Test
- •224 Final Test
- •226 Final Test
- •III. Choose the one word or phrase that best keeps the meaning of the original sentence if it is substituted for the underlined word or phrase.
- •228 Final Test
- •230 Final Test
- •232 Final Test
- •234 Answer key answer key chapter 1
- •Chapter 2
- •Chapter 3
- •236 Answer key
- •Chapter 4
- •Chapter 5
- •Chapter 6
- •238 Answer key chapter 7
- •Chapter 8
- •Chapter 9
- •Chapter 10
- •Chapter 11
- •240 Answer key
- •Final test
- •241 Л1тература
- •Словники
- •Навчальне видання Ільченко Ольга Михайлівна Англійська мова для науковців
56 Chapter 3
12. Actually, IBM was world's seventh largest company in 1983.
a. essentially
b. on the whole
c. finally
d. in fact
13.Walking on the grass is not allowed.
a. prohibited
b. permitted
c. proclamed
d. proposed
Noteworthy
The science of graphology tries to establish relationship between handwriting and personality. Such relationship was first noticed by the Chinese in the eleventh century, and then in 1622 a
man called Camillo Baldi maintained that each person has a characteristic handwriting. At the end of the nineteenth century graphology became a proper science. Now even figures aimless doodles are of interest to graphologists. Like dreams, doodles are products of the unconscious and can reflect |
to maintain — to assert укр. наполягати, стверджувати to doodle — to draw lines, etc. while about something |
a person's state of mind. Check out your recent doodles (for example, in memo pads) and find out what they could mean:
1. Faces: It's your personality you're showing. If features are faint, you tend to be withdrawn and self-conscious; when dark or overemphasized, you may be domineering but insecure. Small or closed eyes could mean you are introspective, even self-absorbed, while large eyes represent a suspicious or hypersensitive nature.
2. Geometric shapes: Circles signal affection. Three-dimensional boxes indicate frustration, but also a desire to solve problems. A triangle stands for aggression, high energy, and ambition;
stars are symbols of hope and achievement.
3. Lines: Very short, sketchy strokes show you're anxious or uncertain, while long, straight ones convey determination.
4. Loops: Loosely spaced — you're feeling relaxed or lazy, but tightly drawn — you're a bit anxious.
5. Animals: Domestic pets reveal a tame personality, while birds represent high-flying ideas or the wish to escape.
Chapter 4 57
Chapter 4
Focus on:
Hackers
Grammar: Structure of English Sentence. Logical Connectors
58 Chapter 4
Text A Read the text and be ready to answer the questions that follow.
Who are hackers? What is hacking? Imagine that you had a properly working program that performed one task, and you needed another program to do something slightly different. Modifying the first program to create the second one was much faster than writing a new one from scratch. In other words, that led more to an ax-hewn bench than to a piece of finely crafted furniture. Taking an ax to a program to turn it into something else became the basis of the term to hack.
Whereas programming is like cooking in your own kitchen — a personal act of creation — hacking is like cooking in a stranger's kitchen in the dead of night. Hacking is not for the beginners. As one might guess, The New Hacker's Dictionary, a collection of «in crowd» terms compiled at MIT, is full of definitions of the term «hacker»: 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users who prefer to learn Only the minimum necessary. 2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming... 3. An expert or enthusiast of any kind. One might be an astronomy hacker, for example. In «Hackers» (1984), one of the best books on the subject, Steven Levy noted in early 1960's, «a project undertaken or a product built not solely to fulfill some constructive goal, but with some wild pleasure taken in mere involvement, was called a «hack». «Secrets of Super Hacker» (1994) by Knightmare, pseudonym for Dennis Fiery (which is itself another pseudonym) offers this: «A hacker is a person with an intense love of something, be it computers, writing, nature or sports. A hacker is a person, who, because he or she has this love, also has a deep curiosity about the subject in |
* from scratch (informal) — starting from the beginning or with nothing to hew — to cut using an ax or other cutting tool укр. рубати (сокирою) to hack — to cut, especially roughly, violently or in uneven pieces, укр. рубати MIT — Massachusetts Institute of Technology obsession — a fixed and often unreasonable idea with which the mind is continually concerned укр. нав'язлива ідея early — happening towards the beginning of a period of time укр. на початку. Compare: late — happening towards the end of a period of time укр. наприкінці solely — only, hot including anything else укр. лише, виключно mere —nothing more than; only укр. просто, не більш ніж subject in question — under consideration, being talked about укр. питання, що розглядається intentional — done on purpose, deliberate укр.навмисний to meddle (in, with) — to take too much interest or take action about other people's private affairs. Synonym: to interfere (in) укр. утручатися malicious meddler — укр. той, хто зловмисно утручається * to poke around — to nose about, to search (in or for something) by examining other people's business укр. вишукувати pretty harmless — укр. досить безпечний, нешкідливий to tempt — to persuade or attract (someone) to do something that seems pleasant or advantageous but may be unwise or immoral. Noun — temptation Synonyms: entice, lure, allure, seduction укр. спокуса |
question... For a computer hacker that means he respects the ability of computers to put him in contact with a universe of information and other people, and it means he respects those other people, and does not intentionally use knowledge of computers to be destructive. Such a definition differs a lot from the final definition in the dictionary mentioned above:
4. A malicious meddler who tries to discover sensitive information by poking around. Hence password hacker, network hacker.
But many people really forget that hacking is pretty harmless as long as the hacker avoids the temptation to cross the line and become a «malicious meddler».
In order to counteract the bad press, the hacking community tried to divide itself into good guys and bad guys. In general, those people who just liked to play and learn tried to retain the name HACKER by creating the term CRACKER for the bad guys. For crackers a major motivating force is definition number eight of «The New Hacker's Dictionary» — breaking into systems
Chapter 4 59
without authorization and with malicious intent. In any event, the distinction has failed to catch on outside the hacking community. All are still known as hackers. The culture that we live in is being threatened by an oversimplified image of hackers as criminals or vandals. Anyhow, a computer hacker needs to understand how computers work, to study them, to learn programming. To hack means to be on the frontier, to be on the border. In computer science and technology this border is |
in any event — in any case укр. у будь-якому разі (випадку) * to catch on — (informal) to become popular укр. набувати популярності threat — an expression of an intention to hurt, punish, cause pain etc.. Synonym: menace укр. загроза frontier — the border, the limit or edge укр. край pace — rate or speed укр. швидкість, темп * to come up with — to have an idea about укр. спадати на думку |
constantly being pushed back, and at a tremendous pace. As science becomes more and more computational, we need to come up with a better understanding of the nature of human activity in the information age.
1. What is the subject of this passage?
2. Longman Dictionary of Contemporary English provides the following definition of the word «hacker» — someone who is able to use or change the information in other people's computers without their permission». Do you agree with this definition? Why?
3. What is the difference between hackers and crackers?
4. What are the positive and the negative sides of hacking? Express your opinion.
5. What is specific about subculture of hackers?
6. Why hackers are sometimes called «every security manager's worst nightmare» ? Give your reasons.
7. Why is the word «hacker» sometimes used as honorable connotation of the word «lawyer»? Give your reasons.
|