- •Virtual world of Computers методические указания
- •Севастополь
- •Содержание
- •Введение
- •Lesson I
- •Personal Computers. What are they?
- •Vocabulary exercises
- •Grammar exercises
- •Speaking-discussion
- •Computers
- •Lesson II
- •Jobs in it
- •Vocabulary exercises
- •It professionals
- •Becoming Certified
- •Grammar exercises
- •How to become an it Manager
- •How to become a Computer Consultant
- •How to become a programming expert
- •Speaking-discussion
- •Lesson III
- •Bloggers and the company
- •Exercises
- •Free wi-fi
- •File sharing on the Internet
- •Lesson IV
- •Cyber crime
- •Vocabulary exercises
- •Grammar exercises
- •Speaking-discussion
- •Lesson V
- •Battle of the software giants
- •Vocabulary exercises
- •Grammar exercises
- •Blackberry way?
- •Библиографический список
Speaking-discussion
Exercise 1. Study the figures for software piracy in different regions of the world. Piracy rate is percentage of total software installed.
Region |
Piracy rate |
Loss |
Western Europe |
34% |
$ 362 million |
Eastern Europe |
70% |
$ 505 million |
North America |
26% |
$ 358 million |
Asia/Pacific |
47% |
$ 279 million |
Middle East |
63% |
$ 284 million |
Africa |
56% |
$ 193 million |
Exercise 2. Answer the questions.
In Western Europe and North America, the piracy rates are lower, but the losses are higher. Why do you think this is so?
How do you think piracy affects the growth of the legitimate software market?
How easy do you think it is to prosecute for piracy?
Exercise 3. Discuss your ideas, try to use the following phrases:
I (really don't) think that we should ... In my opinion ...
I’m not so sure about I (don't) agree with your point
That's an interesting idea, ... I suppose we should ...
The advantage of ... The problem with ... You have to remember that ...
Exercise 4. Look through this abstract and express your view point.
Cryptography has become so powerful that messages scrambled with so-called strong cryptography are virtually indecipherable. Like many powerful technologies, this is a double-edged sword. Encryption can keep email and financial transactions over the Internet secure and private, but law enforcement officials worry that criminals and terrorists could use the same tools to conceal incriminating evidence and violent plots. This Point/Counterpoint Sidebar provides an excerpt from a statement by Louis J. Freeh, director of the United States Federal Bureau of Investigation (FBI), arguing before a congressional committee for government regulation, and a contrasting viewpoint from cryptographer Ronald L. Rivest.
Exercise 5. Choose the topic you want to speak about.
Freeware anti-virus software and shareware one.
Anti-virus software can protect your computer from any viruses or threats.
Threats and benefits of Internet.
Lesson V
Exercise 1. These words you should know.
HQ - headquarters - штаб-квартира diverse - разнообразный
CEO - chief executive officer - главный исполнительный директор
advertising campaign – рекламная кампания to hail - называть
retailer – розничный торговец to converge - сходиться, встречаться
Exercise 2. These terms you should learn.
vendor – поставщик, производитель suite - набор, комплект
turnkey vendor - поставщик комплектных систем
imaging – создание изображений; обработка изображений; запись изображений на носители
embedded – встроенный, встраиваемый
bundled software - ПО, поставляемое в комплекте (с компьютером)
Exercise 3. Don’t mix such words.
find (found, found) - находить found (founded, founded) - основывать
Exercise 4. Check your memory: freeware, shareware, open source software, consumer electronics, flash memory cards.
READ AND TRANSLATE THE TEXT