
- •Vocabulary list
- •I. The statements below were other results of the survey. Write g if you think the statement might refer to girls and в if you think it could refer to boys.
- •II. How modern are you? (pop quiz)
- •I. Answer the following questions:
- •II. Match each component in column a with its function in column b:
- •IV. Label the diagram of a computer system using these terms:
- •I. Find in the text equivalents to:
- •II. Fill in the table:
- •Masters of invention
- •In 1972 Bushnell founded Atari Inc. In Sunnyvale, Calif., to build Pong games. By 1975 there were 150,000 Pong games in American homes.
- •In 1977 Jobs and Wozniak sold their first Apple II, which launched the personal computer industry. By 1985 they had sold more than two million Apple I I's.
- •Vocabulary ratings
- •Vocabulary list
- •I. Find in the text the English equivalents to:
- •II. True or false?
- •IV. Construct other sentences in these patterns (models):
- •V. Complete the sentences (if, when-clauses):
- •Exercises
- •I. Answer the following questions:
- •II. Complete the following and discuss it:
- •Topics for Essays, Oral or Written Reports
- •Essay Selection for Reading as a Stimulus for Writing
- •Keep clicking!
- •Vocabulary list
- •Text I. Prehistory
- •Exercises
- •Descendants, automated machine, exception, virtue, intelligence, to transmit, reliable, sufficient, in the early 19th century, in modern times.
- •Exercises
- •VIII. Translate into English
- •Vocabulary list
- •Text I. The early years
- •(6) Jobs and Wozniak brought different abilities to their venture: Wozniak
- •Exercises
- •Text II. Deep blue
- •Vocabulary list
- •Text I. The first hackers
- •Exercises
- •I. True or false?
- •Text II. Computer crimes
- •Exercises
- •Topics for Essays, Oral or Written Reports
- •Essay Selection for Reading as a Stimulus for Writing
- •Hackers of today
- •Unit VI. Computer Security
- •Prereading Discussion
- •Reading Analysis
- •Vocabulary list
- •IV. Put the proper words into sentences:
- •Exercises
- •Viruses and vaccines
- •Essay Selection for Reading as a Stimulus for Writing
- •Unit VII. Virtual Reality
- •Prereading Discussion
- •Reading Analysis
- •Vocabulary list
- •Topics for Essays, Oral or Written Reports
- •Essay Selection for Reading as a Stimulus for Writing
- •Unit VIII. It Revolution
- •Vocabulary list
- •Text I. Surfing the net
- •Exercises
- •*:0) Clown face; I'm feeling like a buffoon.
- •:A9 Licking the lips; very tasty or delicious.
- •I. Словарик юного интернетчика.
- •Точка, точка, запятая -
- •Вот и рожица кривая
- •III. Биокомпьютеры
- •IV. Оптические компьютеры
- •B. Electrical engineering vs. Computer science
- •Exercises
- •D. Mother should have warned you!
- •Bill gates in heaven
- •E. Can you do a better translation?
- •A) oa programmers
- •0A программистов
- •F. Render into English
- •Literature
-
(5) What's a flame? The vast majority of e-mail correspondence is civil
-
and courteous, but with millions of participants all over the world, it's inevitable that some folks will rub each other the wrong way. When this happens, the combatants may exchange emotionally charged, caustic, often obscene messages called flames. When enough of these messages exchange hands, an out-and-out flame war develops. These usually burn themselves out after a while, and then the participants can get back to more interesting things.
-
(6) Is e-mail secure? In a word, no. The Net's open architecture allows
-
programmers to write interesting and useful new Internet services, but it also allows unscrupulous snoops to lurk where they don't belong. In particular, the e-mail system has two problems: it's not that hard for someone else to read your e-mail, and it's fairly easy to forge an e-mail address. If security is a must for you, then you'll want to create an industrial strength password for your home directory, use encryption for your most sensitive messages, and use an anonymous remailer when you want to send something incognito.
-
Exercises
-
I. Answer the questions:
-
What major problems are there with the e-mail? Are they opinions or facts? Would it be a problem for you?
-
What do you think is the reason for the various bits of netiquette which are mentioned?
-
Find at least 5 examples of a very colloquial and chatty style used in the text. Why are they used?
-
For which of the following types of writing is it necessary to be brief?
-
Instructions, love letters, news reports, business proposals, faxes, adverts, insurance claims, curriculum vitae, short stories, scientific reports, e-mail, poems.
-
5. Write a summary of the text. Include only the information, ignore any extra remarks. Write in a neutral rather than an informal style.
-
II. E-mailers also keep their message brief by abbreviating frequently used phrases. Complete these common phrases:
-
-
AAMOF
-
as am... off...
-
AFAIK
-
as f... as I k...
-
FYI
-
for your i...
-
FYA
-
f... y... am...
-
IMO
-
in my o...
-
IOW
-
in o... words
-
NRN
-
not r... necessary
-
TTYL
-
talk to y... 1...
-
FAQ
-
f... a... question(s)
-
BTW
-
by t... w...
-
LOL
-
la... o... loud
-
KHYF
-
k... ho... y... fe...
-
IMHO
-
in my h... o...
-
WYSIWYG
-
what y... see is w... >
-
'... g...
-
RTFM
-
read the f... m...
-
-
III. E-mail messages usually have the following format:
-
To: (Name and e-mail address of recipient) From: (Name and e-mail address of sender) Subject: (Identification of main point of message) Here is an example of an e-mail address: smith@cup.ac.uk
-
Note that the symbol @ in e-mail address is read at and that the full stops are read as dot. Thus the example address would be read as Smith at С - U - P dot A - С dot U - K.
-
102
-
103