Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
ГОТОВОЕ ПОСОБИЕ.docx
Скачиваний:
35
Добавлен:
16.03.2016
Размер:
994.92 Кб
Скачать

III. Find the sentences with compound conjunctions. Give their Russian equivalents.

1. Telecommunications technologies include both wired and wireless services, among them the telegraph (now obsolete), telephone, radio, television, and the Internet. 2. These viruses replace either the programs that store information about the disk’s contents or the programs that start the computer. 3. Telenet and Tymnet were two packet networks, neither supported host-to-host communications. 4. In order for the concept to work, a new protocol had to be designed and developed; indeed, a system architecture was also required. 5. But ordinary voice communications taking place by way of a telephone are not in binary form; neither is much of the information gathered for transmission from a space probe, nor are the television or radio signals gathered for transmission through a satellite link. 6. The manager not only objects to the terms of payment, but he also objects to the time of delivery. 7. Firewalls can also help combat the spread of computer viruses and other malware, or malicious software.

IV. Compare the words by form and choose a) nouns; b) verbs; c) adjectives.

Introduction, influential, development, communicate, clarify, scientific, particular, commercial, communication, digitize, receiver, compute, storage, overwrite, wireless, location, design, typical, capacity, device, replace, require, transmission, fastest, comprehension, capability, improve, link, object, delivery, spread.

V. Match each word English or word combination with the correct Russian equivalent.

plug-in

программа шифрования

wireless

устанавливать

access point

перехватывать

install

посредством, с помощью (чего-л.)

encryption program

вместимость, ёмкость

intercept

приемник

via

съемный; сменный; встраиваемый

transceiver

приемопередатчик

receiver

беспроводной

capacity

точка доступа

VI. Arrange in pairs the words and word combinations with a) similar meaning, b) contrary meaning.

  1. Link, encryption, rate, expensive, demand, allow, connect, via, able to be added, by means of, require, speed, permit, costly, encoding, plug-in.

  2. Wireless, fixed, allow, connect, wired, cheap, mobile, prohibit, separate, disadvantage, expensive, further, benefit, nearer.

VII. In the text of task VIII find the word derived from the verb to encrypt. Give other derivatives of this verb and give their Russian equivalents.

VIII. Read the first and last passages of the text and say what the text might be about.

1. Wireless (Wi-Fi) networks are just like fixed LANs, but instead of using cables, devices are linked by radio waves.

2. Each computer in a wireless network requires a wireless network interface card (NIC). These can be built in or you can use plug-in adaptors. These allow each component in the network to communicate with a wireless access point (AP) to create a wireless local area network (WLAN). The AP operates like a router in a fixed LAN. It also provides a bridge which plugs into the hub of a fixed LAN allowing both fixed and wireless users to talk to each other. If your LAN is connected to the Internet, the WLAN can also use it. If not, you can connect the WLAN to the Internet via an ADSL or cable modem.

3. What are the advantages of a wireless network? You don’t need cabling. In older buildings, it can be expensive to install cables and access points. With Wi-Fi, one access point can cover an entire floor or even a building. You can work anywhere within range of the access point. On a sunny day, you could work outside. You can make any room in the house your study. There are now Wi-Fi hotspots in hotels, libraries and airports, so you can link to a network away from home or your office. 4. There are disadvantages. Fixed LANs can run 1000 Mbps. Wireless networks are much slower and the further you are from an access point, the slower the rate. Other users may be able to intercept your data. Encryption programs like Wired Equivalent Privacy (WEP) can help.