- •Language work: Articles
- •Listening
- •What can computers do?
- •Language work: The Present Simple Passive
- •Living with computers
- •Other applications
- •In pairs, discuss the elements of a simple computer system.
- •Read the text, translate it and get ready to do the exercises after the text.
- •Unit 3 Types of computer system reading material
- •Study in the table the details of different types of computer.
- •Find the answers to these questions. Which type of computer is:
- •From mainframes to wearable computers
- •Language work: Comparison
- •Aids to communication
- •Problem-solving
- •Writing
- •Language work: Compound Adjectives
- •Wearable computers, aren’t they chic?
- •Inside the system reading material
- •What's inside a pc system?
- •Language work: Relative Clauses
- •Vocabulary quiz
- •Processors and memory.
- •Your ideal computer system
- •Unit 5 units of memory reading material
- •Bits - basic units of memory
- •Bytes and characters
- •The ascii code
- •Kilobytes, megabytes and gigabytes
- •Word building
- •Bits for pictures
- •Buying a computer.
- •Input devices-1 reading material
- •Work in pairs.
- •About the keyboard
- •The mouse
- •Voice input
- •Input devices-2 reading material
- •Word building
- •Language work: Instructions and Advice
- •Unit 10 magnetic drives
- •Technical details
- •World building
- •What are the advantages and disadvantages of optical disks?
- •Read the text to check your answer.
- •Connectors and modifiers
- •Products available
- •Iomega's removable drives
- •Unit 12 operatung systems and database sytems reading material
- •What is the function of os?
- •How many parts does it consist of?
- •Operating Systems
- •Language work: Countable and Uncountable Nouns
- •Systems Programs and Databases
- •Writing
- •Unit 13 The Graphical User Interface reading material
- •Language work: The Passive Voice (Present, Past)
- •Writing
- •Graphics and design
- •Writing
- •Unit 14 Word-processing facilities reading material
- •Word-processing facilities
- •Language Work: -ing forms
- •Unit 15 Databases reading material
- •Basic features of database programs
- •Unit 16 faces of the internet
- •Internet software
- •Irc, audio and video chatting
- •Unit 17 Programming languages reading material
- •Algorithm
- •Flowchat
- •Programming languages
- •Language work: Infinitive constructions.
- •Make a list of as many computer languages as you can think of.
- •Language work: The passive
- •A short description of Visual Basic
- •What is Java?
- •Language work: The Past Simple
- •Read the text and do the following exercises.
- •Support
- •Charles Graham
- •Language work: Past Activities.
- •Animator
- •Video game creator
- •Network security administrator
- •Webmaster
- •Unit 20 Electronic communications reading material
- •How can a pc be connected to another computer?
- •What data communication systems can you think of? Make a list.
- •Channels of communication
- •Word building: Prefixes
- •If you are not sure, look them up in a dictionary.
- •Unit 21
- •Internet issues reading material
- •Security and privacy on the Internet
- •Security on the Web
- •Network security
- •Virus protection
- •Preventative tips
- •Internet security
- •Internet crime
- •Hackers!
- •Language work: The Past Simple (revision)
- •Unit 22 laNs and waNs reading material
- •Network configurations
- •Language work: Predicting Consequences
- •WaNs and worldwide communications
- •Read the following text.
- •Mobile phones: definition and technology
- •A brief history
- •Features and functions
Unit 21
Internet issues reading material
T E X T A
Task
a) Try to answer these questions.
1. Is it technically possible for computer criminals to infiltrate into the Internet and steal sensitive information?
2. What is a hacker?
3. Can viruses enter your PC from the Internet?
b) Translate the sentences (1-4) into your language.
-
Web browsers warn you if the connection is not secure; they display a message when you try to send personal information to a server.
-
Private networks use a software and hardware mechanism, called a 'firewall', to block unauthorized traffic from the Internet.
-
You have to type your user name and password to access a locked computer system or network.
-
An open padlock in Netscape Communicator indicates the page is not secure; a closed padlock indicates the page is encrypted (secure).
c) Read the text and do the exercises below.
Security and privacy on the Internet
There are a lot of benefits from an open system like the Internet, but we are also exposed to hackers who break into computer systems just for fun, as well as to steal information or propagate viruses. So how do you go about making online transactions secure?
Security on the Web
The question of security is crucial when sending confidential information such as credit card numbers. For example, consider the process of buying a book on the Web. You have to type your credit card number into an order form which passes from computer to computer on its way to the online bookstore. If one of the intermediary computers is infiltrated by hackers, your data can be copied. It is difficult to say how often this happens, but it's technically possible.
To avoid risks, you should set ail security alerts to high on your Web browser. Netscape Communicator and Internet Explorer display a lock when the Web page is secure and allow you to disable or delete “cookies”.
If you use online bank services, make sure your bank uses digital certificates. A popular security standard is SET (secure electronic transactions).
E-mail privacy
Similarly, as your e-mail message travels across the net, it is copied temporarily on many computers in between. This means it can be read, by unscrupulous people who illegally enter computer systems.
The only way to protect a message is to put it in a sort of 'envelope', that is, to encode it with some form of encryption. A system designed to send e-mail privately is Pretty Good Privacy, a freeware program written by Phil Zimmerman.
Network security
Private networks connected to the Internet can be attacked by intruders who attempt to take valuable information such as Social Security numbers, bank accounts or research and business reports.
To protect crucial data, companies hire security consultants who analyse the risks and provide security solutions. The most common methods of protection are passwords for access control, encryption and decryption systems, and firewalls.
Virus protection
Viruses can enter a PC through files from disks, the Internet or bulletin board systems. If you want to protect your system, don't open e-mail attachments from strangers and take care when downloading files from the Web. (Plain text e-mail alone can't pass a virus.)
Remember also to update your anti-virus software as often as possible, since new viruses are being created all the time.