
- •Английский язык
- •Contents
- •4. Answer the questions using to the text:
- •5. Give your ideas about the future of computers.
- •6. Read the dialog “Hooking Up My Computer” and make the task following it:
- •7. Choose the correct answer to these questions based on the dialog:
- •Q: What's Peter having problems with?
- •8. Retell the dialog in indirect speech. Text 2. Supermarket checkout
- •1. Discuss the following questions in pairs:
- •3. Read the text and give the main idea of each paragraph:
- •4. Find sentences with the following phrases in the text. Arrange them as they appear in the text:
- •5. Answer the questions using the information in the text:
- •6. Decide if the following statements are true or false. Correct the false ones:
- •7. Find words in the text with the following meaning:
- •8. Arrange the steps in the operation of a supermarket checkout system (a till) in the right order. Prepare a description of its operation in the Present Passive:
- •Text 3. Netbooks
- •1. Discuss the following questions in pairs:
- •2. Match the following words and word combinations with their definitions and translate them into Russian:
- •3. Using the synonyms, try to guess the meaning of the following words and word combinations:
- •4. Read the text:
- •5. Find the sentences with adjectives that describe netbooks and translate them.
- •6. Decide if the following statements are true or false. Correct the false ones:
- •7. Work in groups:
- •Text 4. Green pc
- •1. Discuss the following questions in pairs:
- •2. Match the following words and word combinations with their Russian equivalents:
- •3. Read the text and choose the most suitable heading from the list (1-8) for each paragraph. There is one extra heading which you don’t need to use:
- •4. Find sentences with the following expressions in the text:
- •5. Answer the questions to the text:
- •6. Decide if the following statements are true or false. Correct the false ones:
- •7. Fill in the gaps using the actual information from the text:
- •Text 5. Webcams
- •1. Discuss the following questions in pairs:
- •2. Match the following words and word combinations with their definitions and translate them into Russian:
- •3. Using the synonyms, try to guess the meaning of the following words and word combinations:
- •4. Read the text and give the main idea of each part:
- •5. Answer the questions using the information in the text:
- •6. Work in groups and retell the text from the point of view of: a. The student; b. The school administration; c. The judge:
- •Text 6. Interactive whiteboard (iwb)
- •1. Discuss the following questions:
- •3. Study the following list of synonyms and match them with the underlined words in the text:
- •4. Read and translate the following text:
- •5. Complete the statements using the information from the text:
- •6. Answer the questions to the text:
- •7. Work in groups:
- •Text 7. Laser printer inventor
- •1. Match the names of these famous people on the left with their inventions (or discoveries) on the right:
- •2. Read the words and their definitions and translate them into Russian:
- •3. Read the following text and give the main idea of each paragraph. Make questions to the underlined sentences:
- •4. Find in the text the synonyms to the following words:
- •5. Decide if the following statements are true or false:
- •6. Complete the sentences and translate them into Russian:
- •Computers for the disabled
- •1. Working in pairs, discuss the following questions:
- •2. Read Text a:
- •3. Per aspera ad Astra…Do you know what these well-known Seneca’s words means? Can we use them to describe Stephen Hawking’s life?
- •4. Work in pairs. Ask different types of questions to the text and answer your partner’s questions.
- •5. Read Text b and match the Russian equivalents to the English words and word combinations:
- •Text b. Communication system
- •6. Answer the following questions:
- •4. Read the definitions of the following words. Find them in the text and translate the sentences with these words:
- •6. Answer the questions:
- •Text 9. Hd-dvd vs. Blu-ray: who cares?
- •1. Discuss the following questions:
- •2. Read the definitions of the following words and translate them into Russian:
- •3. Read the following text and answer what discs (Blu-rays or hd-dvDs) you would like to have at home and explain why:
- •4. Arrange the following sentences as they appear in the text and translate them into Russian:
- •5. Mark the following statements as True or False:
- •6. Choose one quotation you agree or disagree with. Use at least 10 sentences to prove your point of view:
- •Text 10. Linux
- •1. Translate these definitions:
- •2. Before you read the text, try to answer the following questions:
- •3. Read the text and check your answers:
- •4. Complete the sentences and translate them into Russian:
- •5. Answer the questions to the text:
- •7. Mark the following statements as True or False, correct the false ones:
- •Text 11. Microsoft's docs for facebook
- •1. Discuss the following questions:
- •2. Read the definitions of the following words. Translate them into Russian:
- •3. Read the following text and be ready to tell if you would like to use such a service or not. Explain why:
- •4. Correct the mistakes where necessary:
- •5. Match the sentences and translate them into Russian:
- •6. Answer the questions to the text:
- •Text 12. Why social networking?
- •3. Read the following text and be ready to answer if you observe networking safety rules:
- •4. Do you agree? Prove your point of view using the information in the text:
- •5. Restore the original sentences and translate them into Russian:
- •6. Work in pairs and ask each other as many questions as you can about Networking Safety Tips. Make a list of online safety rules.
- •3. Read the text and choose the most suitable heading from the list (1-7) for each paragraph. There is one extra heading which you don’t need to use:
- •4. Find synonyms of the following words in the text:
- •5. Answer the questions to the text:
- •6. Decide if the following sentences are true or false and correct the false ones:
- •7. Complete the following sentences using the information in the text:
- •Text 14. Digital rights management
- •1. Discuss the following questions in pairs:
- •2. A) Match the following words and word combinations with their Russian equivalents:
- •3. Read the text and arrange the sentences from Task 2 b) in the right order:
- •4. Find English equivalents for the following phrases in the text:
- •5. Answer the questions using the information in the text:
- •6. Prove that the following statements are true using the information in the text:
- •7. A) Make up a plan of the text and compare it with your partner’s. Write a summary of the text on the basis of your plan (no more than 7-10 sentences).
- •Text 15. Iloveyou worm
- •1. Translate these keywords:
- •2. Discuss the following questions in pairs:
- •Effects
- •Authorship
- •Detection
- •Architecture of the worm
- •Variants
- •Legislative aftermath
- •4. Answer the questions to the text:
- •Text 16. The changing image of a hacker
- •1. Discuss the following questions in pairs:
- •2. Match the synonyms:
- •3. Read the text and arrange the paragraphs (a-f) in the logical order:
- •4. Find words and word combinations with the following meaning in the text:
- •5. Answer the questions using to the text:
- •6. Decide if the following sentences are true or false. Correct the false ones:
- •1. Translate these definitions:
- •2. Answer the questions:
- •3. Read the text:
- •How Video Travels Across the Internet
- •Television
- •Telephone
- •Internet Basics
- •The Internet Backbone
- •Public Exchange Points
- •Peering
- •Private Peering
- •Internet Complexity
- •Packet Loss
- •Different Routes
- •Delay (Latency)
- •4. Answer the questions to the text:
- •3. Discuss the following questions in pairs:
- •Text 19. Graphic design vs. Desktop publishing
- •1. Working in pairs, discuss the following questions:
- •2. Read the text and give the main idea of each paragraph:
- •3. Answer the questions using the information in the text:
- •3. Read the text and choose the most suitable heading from the list (1-5) for each paragraph:
- •4. Find English equivalents for the following phrases in the text:
- •5. Answer the questions using the information in the text:
- •6. Prove that the following statements are true using the information in the text:
- •7. Find some information about the distance education courses in South Ural State University and share this information with the rest of the group. Text 21. Blogs and blogging
- •1. Working in pairs, discuss the following questions:
- •2. A) Match the following words and word combinations with their Russian equivalents:
- •3. Read the text and give the main idea of each paragraph. Organize the main ideas in the form of a plan:
- •4. Find English equivalents for the following words and phrases in the text:
- •5. Answer the questions using the information in the text:
- •6. Decide if the following sentences are true or false. Correct the false ones:
- •7. Write a summary of the text on the basis of your plan from task 3.
- •Text 22. Lord palmerston on programming
- •1. Make sure that you know the meaning of the keywords and translate them into Russian:
- •2. Answer the questions:
- •3. Read the text and organize the main ideas in the form of a plan:
- •Lord Palmerston on Programming
- •But learn you must
- •4. Answer the questions using the information in the text:
- •3. Read the text and give the main idea of each paragraph:
- •4. Find English equivalents for the following phrases in the text:
- •5. Answer the questions using the information in the text:
- •6. Decide if the following statements are true or false. Correct the false ones:
- •7. A) Find additional information about any of the languages mentioned in the text and complete the table below:
- •Text 24. Wearable computers become the ‘sixth sense’
- •1. Discuss the following questions in pairs:
- •2. A) Match the following words and word combinations with their Russian equivalents:
- •3. Read the text:
- •4. Find synonyms of these words in the text:
- •5. Answer the questions to the text:
- •6. Decide if the following sentences are true or false. Correct the false ones:
- •7. Fill in the gaps using the information from the text:
- •Text 25. Wireless laNs
- •1. Discuss the following questions in pairs:
- •2. Match the following words and word combinations with their definitions and translate them into Russian:
- •3. Read the text:
- •4. Find sentences with the following phrases in the text. Arrange them as they appear in the text:
- •5. Answer the questions to the text:
- •6. Decide if the following sentences are true or false. Correct the false ones:
- •7. If you use a network prepare a short description of it, with details of its architecture and protocols. Say what you use the network for. Text 26. Second life
- •1. Discuss the following questions in pairs:
- •2. Match the following words and word combinations with their definitions and translate them into Russian:
- •3. Fill in the gaps in the sentences using the words above. Each word can be used only once:
- •4. Read the text and give the main idea of each paragraph:
- •5. Find English equivalents for the following phrases in the text:
- •6. Answer the questions to the text:
- •7. Decide if the following statesments are true or false. Correct the false ones:
- •8. A) Answer the questions to complete the table. Use the information in the text:
- •Text 27. Robots on the job
- •1. Discuss the following questions in pairs:
- •2. Match the following words and word combinations with their definitions and translate them into Russian:
- •3. Read the text and check if your ideas were right:
- •4. Find sentences with the following expressions in the text. Arrange them as they appear in the text:
- •5. Answer the questions using the information in the text:
- •6. Decide if the following statements are true or false. Correct the false ones:
- •7. A) Complete the table using the information in the text:
- •2 Basic System Model
- •2.1 General Process Summary
- •3 Detailed System Model: Step-by-Step
- •3.1 Matricize
- •3.2 Harmonic Detection
- •3.3 Frequency Shift
- •3.4 Reconstruction
- •3. Answer the questions:
- •4. Read the text:
- •The Main Steps of Software Development
- •Domain Analysis
- •Software Elements Analysis
- •Maintenance
- •Waterfall processes
- •Iterative processes
- •Among other interesting improvements reported were:
- •4. Answer the questions to the text:
- •5. Work in two teams: a/b. Group a are the customers, group b the developers:
- •Preparation
- •Visual aids
- •Presentation - dress rehearsal
- •2. Match the presentation phrases with the parts where they are used:
- •3. Prepare your own presentation, using the previous information. References
3. Read the text and arrange the paragraphs (a-f) in the logical order:
A) Sometimes hackers even got prizes for their skills from computer companies that needed to develop sophisticated software. However, as the computer industry grew, such companies became more concerned with protecting, and exploiting intellectual property. To hackers intellectual property was a barrier to the free exploration and exploitation of the computer, so they sometimes copied and distributed not only their own work but also commercial systems software and utilities.
B) In response to public fears about hackers’ capabilities, federal and local law enforcement agencies have united their efforts to find and prosecute criminals who crack or vandalize systems or Web sites. Antiterrorism experts now worry that hacker attacks could be used by terrorist groups to paralyze the economies of different countries and even destruct vital infrastructure such as air traffic control. In this atmosphere the older, more positive image of the hacker is fading, although the creativity of hacking continues to be manifested in cooperative software development.
C) During the late 1970s and 1980s, the microcomputer created a mass consumer software market, and a new generation of hackers tried to get the most out of machines that had a tiny amount of memory and only rudimentary graphics and sound capabilities. At that time a new term - software piracy - appeared. Pirate hackers cracked the copy protection on games and other commercial software so the disks could be copied freely and exchanged at computer fairs, club meetings, and on illicit bulletin boards.
D) In the late 1950s, researches form various universities began to encounter people with unusual programming skills and an obsession with the inner workings of the machines. While ordinary users viewed the computer simply as a tool for solving particular problems, these programmers liked to extend the capabilities of the system and create tools that would make it easier to create even more powerful programs. The movement from mainframes that could run only one program at a time to machines that could simultaneously serve many users created a specific field in which these hackers could flourish. Indeed, while administrators sometimes complained that hackers took up too much of the available computer time, they often needed their help to fix the bugs that infested the first versions of time-sharing operating systems. Hackers also worked at night while normal users slept.
E) The growing use of on-line services and networks in the 1980s and 1990s brought new opportunities to exploit computer skills for stealing valuable information such as credit card numbers. The mass media always used the term hacker to refer to clever programmers, software pirates, and people who stole information or spread viruses across the Internet. Meanwhile, sensational stories about the notorious real world hackers (e.g. Kevin Mitnick, Jonathan James, Kevin Poulsen, Robert Tappan Morris) showed the dark side of hacking to people. Criminal hackers started to cooperate with more-traditional criminal organizations, creating rings that can efficiently turn stolen information into cash.
F) Early hackers had their own philosophy and supported the following ideas:
• computers should be freely accessible, without any limits on their use;
• information should be free so that it can reach its full potential. So, people should struggle against governments that want to restrict information access;
• the most important thing is the quality of the “hack”—the cleverness and utility of the code;
• the reputation of a hacker depends on his work— not on age, experience, academic attainment, or anything else.