Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
CompuText II.doc
Скачиваний:
25
Добавлен:
06.09.2019
Размер:
1.01 Mб
Скачать

8.11 Join the split sentences.

1. First and foremost the Internet is…

2. Originally developed for the military,…

3. The Internet has also become…

4. DELPHI was the first online service…

5. All the others…

6. Internet computers use…

7. FTP stands for…

8. Archie is a utility…

9. Telnet is a terminal emulation program…

10. Gopher is a utility…

11. Veronica lets you…

12. The IAB, or Internet Activities Board is…

13. Is it…

14. Using the World Wide Web, …

  • that provides listings of these files.

  • that lets you search hierarchical menus describing Internet files (not just file names).

  • going commercial?

  • the governing body for the Internet.

  • make more sophisticated searches on Gopher sites.

  • that lets you log onto a computer in the Internet and run a program.

  • File Transfer Protocol.

  • the TCP/IP communications protocol.

  • thousands of companies are contemplating how to make the Internet a worldwide shopping mall.

  • to provide full Internet access, not just e-mail.

  • have followed suit.

  • the worldwide system for electronic mail.

  • much of the Internet today is used for academic and commercial research.

  • a large network made up of a number of smaller networks.

8.12 Put the proper prepositions, conjunctions & adverbs in each sentence.

  • up of /for /of /of /in over

  1. … another thing "the" Internet is made … … thousands … interconnected networks … … 70 countries, comprised … academic, commercial, government and military networks.

  • for /to / to

  1. Users have access … unpublished data, journals and BBSs every subject known … humankind.

  • on /as of

  1. …the end of 1994, an estimated 30,000 networks are … the Internet.

  • around /because of /both … and /that

4) The Internet is growing rapidly … … the World Wide Web, an Internet facility … links documents … the world, which contain … text … graphics.

  • to /such as / thus /through / as /of

5) E-mail connection … the Internet is available … all major online services … … CompuServe, BIX and America Online, … all … these services can exchange mail using the Internet the … common denominator.

  • throughout /within /between /of /of

6) The backbone … the Internet is a series … high-speed communications links … major supercomputer sites and educational and research institutions … the U.S. and … the world.

  • on /over / or

7) There are … two million hosts … the Internet, a host being a mainframe, … mini workstation that directly supports the Internet Protocol (the IP in TCP/IP).

  • that /via /of /into /to

8) The Internet is connected … all types computer networks worldwide … gateways … convert TCP/IP … other protocols.

  • of /throughout

9) There are countless files … the Internet that can be downloaded free … charge using FTP.

  • about / than /more

10) There is … activity, excitement and hype … the Internet … ever.

Dramatize Dialogue 8.13.

Computer Crimes & Criminals

  • I’ve heard about computer crimes and criminals. What is it all about?

  • Criminals in the past used to have guns, masks and escape cars. Now they have a computer, a telephone and a piece of computer equipment called a 'modem'.

  • How can they commit a crime with all those things?

  • They simply dial a telephone number to link their own computer with others, and then, using a password (a secret word or phrase), enter a company's computer system (in a bank or a government office for example). Many companies used to have the word 'password' as their password.

  • That’s stupid!

  • It is strange and yet true. In 1990 two American teenagers broke into a computer system and added rude messages to some information and made other important data disappear. The damage cost over two million dollars to correct.

  • I can’t believe that!

  • A 12-year old boy in Detroit used his own computer to enter the computer system of a large company and caused financial chaos.

  • That can’t be multiplicity of such cases.

  • In Britain, computer crime costs companies about 400 million pounds a year.

  • Don’t those hackers make that by mischance? Or just for the sake of making money?

  • Often, the computer criminals do not want to make money; they just want to show the world how clever they are.

  • How can they?

  • They like to create computer viruses.

  • I still don’t understand what it means.

  • I’m gonna explain you. They program a computer disc with a special fault in it. When a computer copies the disc, the fault enters the computer's memory. That means it gets onto any other disc each time you put a new disc into your computer.

  • Now I get the principle, but what do viruses look like?

  • Some viruses are just silly messages. For example, one puts the message 'peace and love' on your computer screen while you are working. Other viruses use all the 'memory' on the computer, and the computer is 'sick' and unable to work.

  • What kind of inconvenience could they put to?

  • One hospital in Britain recently lost all of its records about sick patients because of a computer virus.

  • Wow! It is no joke.

  • Yes, the crimes like those often have high consequences.

Text 8D1

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]