- •Additional texts
- •Computer architecture
- •Read the following article in 10 minutes without dictionary and speak about types of computer infections. (Use the phrases from Appendix 4). Types of Computer Infections
- •Viruses
- •A word processor
- •Read the following article in 10 minutes without dictionary and render it. (Use the phrases from Appendix 4).
- •Storing files
- •Computer security
- •Protecting files
- •Remote access
- •The World Wide Web
- •The Mobile Phone in 2010
- •Spamming and computer viruses
- •Voice telephony (VoIp)
- •Information technology (it)
Spamming and computer viruses
The usefulness of e-mail is being threatened by four phenomena: e-mail bombardment, spamming, and e-mail worms.
Spamming is unsolicited commercial e-mail. Because of the very low cost of sending e-mail, spammers can send hundreds of millions of e-mail messages each day over an inexpensive Internet connection. Hundreds of active spammers sending this volume of mail results in information overload for many computer users who receive voluminous unsolicited email each day.
E-mail worms use e-mail as a way of replicating themselves into vulnerable computers. Although the first e-mail worm affected UNIX computers, the problem is most common today on the more popular Microsoft Windows operating system.
The combination of spam and worm programs results in users receiving a constant drizzle of junk e-mail, which reduces the usefulness of e-mail as a practical tool.
A number of anti-spam techniques mitigate the impact of spam. In the United States, U.S. Congress has also passed a law, the Can Spam Act of 2003, attempting to regulate such e-mail. Australia also has very strict spam laws restricting the sending of spam from an Australian ISP, but its impact has been minimal since most spam comes from regimes that seem reluctant to regulate the sending of spam.
(1103)
Unit 13
Translate the following text in writing in 45 minutes using the dictionary.
Voice telephony (VoIp)
VoIP stands for Voice over IP, where IP refers to the Internet Protocol that underlies all Internet communication. This phenomenon began as an optional two-way voice extension to some of the instant messaging systems that took off around the year 2000. In recent years many VoIP systems have become as easy to use and as convenient as a normal telephone. The benefit is that, as the Internet carries the actual voice traffic, VoIP can be free or cost much less than a normal telephone call, especially over long distances and especially for those with always-on Internet connections such as cable or ADSL.
Thus, VoIP is maturing into a viable alternative to traditional telephones. Interoperability between different providers has improved and the ability to call or receive a call from a traditional telephone is available. Simple, inexpensive VoIP modems are now available that eliminate the need for a PC. Voice quality can still vary from call to call but is often equal to and can even exceed that of traditional calls.
Remaining problems for VoIP include emergency telephone number dialing and reliability. Currently, a few VoIP providers provide an emergency service, but it is not universally available. Traditional phones are line-powered and operate during a power failure; VoIP does not do so without a backup power source for the electronics.
Most VoIP providers offer unlimited national calling, but the direction in VoIP is clearly toward global coverage with unlimited minutes for a low monthly fee.
(1271)
Unit 14
Read the following article in 8-10 minutes without dictionary and speak about computer security. (Use the phrases from Appendix 4).