- •Prereading Discussion…………………………………………………..5
- •Prereading Discussion…………………………………………………74
- •Computer Literacy for Everyone? Topics for Essays, Oral or Written Reports
- •Text 5a Read the article & ask each other questions. Worry About Computers? Me?
- •5.1 Find the English equivalents to the following in Text 5a.
- •Feed in English, Print out in French
- •5.7 Choose the best idea for the text above.
- •Read the text & make a back translation.
- •5.12 Choose the best idea for the text above.
- •5.13 A) Give synonyms to:
- •5.15 Ask your groupmates:
- •Read the text below & make a back translation.
- •5.16 Choose the best idea for the text above.
- •5.17 A) Give synonyms to:
- •5.18 Put in the missing prepositions/conjunctions from the box.
- •5.19 A) The information of the reading passage helps you to see the structure of the main computer part.
- •A) Read the text, make a back translation.
- •5.22 Choose the best idea for the text above.
- •5.24 True or false? Add some more statements for your interlocutor.
- •5.27 Find the equivalents to the following in the dialogues above.
- •5.29 A) Translate the sentences. B) Give the Past, Future & Passive or Active forms of the modal verbs. Mind the equivalents:
- •5.30 Complete the sentences (if-, when- clauses).
- •Find the Modal Verbs & the sentences containing Conditional Mood in the dialogue above & translate them.
- •5.34 List ten modern inventions into the table given underneath, choose from the following.
- •A) Read & translate the text.
- •5.37 A) Translate the following.
- •5.39 Match the following to know more meanings of point.
- •5.40 Render the text below in English. Speak about your own experience, if any, of using computers.
- •5.42 A) Add to every Job Title the corresponding character qualities from the list & give some opposite meaning words using prefixes /suffixes, etc.
- •5.43 Imagine this box is the central part of a computer. Draw and label all the things that you can imagine might be plugged into the computer.
- •Personal Computers
- •Word power
- •Text 6a Read the article below & ask questions to each other.
- •A) Work in pairs: say if the given statements are true or false finding the necessary details in Text 6a above.
- •6.4 Give a synonym for each word/phrase (in the parentheses).
- •Supply the given answers with the proper questions.
- •6.7 Mind the meanings of the words in the boxes. Match the following with the hints underneath or translate it.
- •6.8 A) Read the following to know better mathematical expressions.
- •In Terms of Figures
- •A) Read the article and decide why the author chose the title
- •Can you suggest a better title? b) Render the article.
- •6.10 Find the English equivalents to the following Russian phrases.
- •6.14 Choose the correct word to complete each sentence. You may have to change some words slightly.
- •6.15 Choose the correct word to complete each sentence.
- •6.16 Cross out the one word that does not have the same meaning as the other three words.
- •6.17 Translate the sentences paying attention to Participle I and Participial Constructions.
- •6.18 Translate the sentences, mind the Gerund.
- •Read the text and make up a dialogue.
- •Read the text and make up a dialogue. The Storage Unit
- •6.20 А) Give Russian equivalents to the following.
- •6.21 Translate the following attributive groups.
- •Read the story & retell it in brief.
- •It is never too late to learn
- •6.32 Read & add your items. Advantages of Computers
- •Aaaa framework
- •What are the disadvantages of slow modems?
- •6.36 A) Complete the sentences to revise the Reported Speech.
- •6.37 Translate the sentences.
- •6.39 Answer the questions & ask some more on the topic.
- •Totally electronically
- •Interdependent?
- •Read the text below & make up a dialogue.
- •7.2 Find the equivalents to the following.
- •Read the next part of the text & ask each other questions on it.
- •7.6 Let’s revise comparatives.
- •7.7 A) Study the phrases containing good – better – the best.
- •7.8 Match the following sentences with the hints underneath.
- •Read the following text & make a list of the key words.
- •7.9 Find the following words and phrases in the texts above.
- •Read & make up a dialogue.
- •7.13 Ask your groupmates
- •7.14 Translate into English.
- •7.15 Find equivalents to the following
- •Get ready to speak on the topic. Choose the part according to your specialty.
- •Role-play the dialogue checking the meaning of any unfamiliar term.
- •7.20 A) Study the direction below & make up your instruction.
- •7.21 Self-checking questions.
- •7.22 Read the piece of information given below & supply your opinion.
- •8.2 Match the following.
- •Read & get ready to give advice.
- •8.4 Find the equivalents to the following in the text above.
- •Is Computing Healthy?
- •Read & get ready to give advice.
- •8.9 Render the following into English in brief.
- •A) Read & get ready to answer all the questions from the text.
- •8.11 Join the split sentences.
- •8.12 Put the proper prepositions, conjunctions & adverbs in each sentence.
- •A) Read & make a back translation.
- •Viruses
- •Read to know more on the topic.
- •8.14 Join the split sentences.
- •8.15 Answer the questions.
- •8.16 Identify the –ing & -ed (or equivalent) forms. Choose the right Russian word(s) in the brackets. Translate the sentences.
- •8.17 Identify the Infinitive functions. Choose the proper Russian word(s) in the brackets. Translate the sentences.
- •Read & discuss the problem.
- •It Is Vital for the Professionals
- •8.20 Give the main features of a) a Modern Computer Specialist;
- •Read it & make a back translation.
- •Appendix
- •The author of the article is ( автор статьи) …
- •The article is written by (статья написана) …
- •***Комментирование
- •****Выражение своего отношения к содержанию прочитанного
Read to know more on the topic.
Introduction to Computer Viruses & Security
What Is a Computer Virus?
A computer virus is a special kind of computer program which:
• Spreads across disks and networks by making copies of itself, usually surreptitiously.
• Can produce undesired side-effects in computers in which it is active.
How Infection Occurs
In order to infect a computer, a virus has to have the chance to execute its code.
Viruses usually ensure that this happens by behaving like a parasite, i.e. by modifying another item so that the virus code is executed when the legitimate item is run or opened. Good vehicles for viruses include the parts of a disk which contain code executed whenever that disk is booted, and documents which contain macros executed whenever that document is opened with the relevant application. As long as the virus is active on the computer, it can copy itself to other files or disks that are accessed.
How Viruses Escape Detection
The successful spread of a virus depends on how long it can replicate unnoticed, before its presence is made known by the activation of side-effects.
Viruses Use Two Main Methods of Disguise:
• Encrypting (scrambling) their code to avoid recognition.
• Preventing applications from seeing the virus in memory, by interrupt interception or (in the case of macro viruses) by disabling the options to view macros.
Virus Side-Effects
As well as self-replicating code, a virus normally contains a 'payload'. The former is like the propulsion unit of a missile; the latter is like the warhead it delivers. The payload can be programmed to have malicious side-effects. These effects can range from harmless messages to data corruption or destruction.
How Viruses Spread
Infections spread from machine to machine, and from organization to organization, in a number of ways.
Viruses Can Be Transmitted by:
• Booting a PC from an infected medium.
• Executing an infected program.
• Opening an infected file.
Common Routes for Virus Infiltration Include:
• Floppy disks or other media that users can exchange.
• E-mail attachments.
• Pirated software.
• Shareware.
Anti-Virus Measures
The fight against computer viruses involves five kinds of counter-measure:
• Preparation includes making backups of all software (including operating systems) and making a contingency plan.
• Prevention includes creating user awareness, implementing hygiene rules, using disk authorization software, or providing isolated 'quarantine' PCs.
• Detection involves the use of anti-virus software to detect, report and (sometimes) disinfect viruses.
• Containment involves identifying and isolating the infected items.
• Backup & Recovery The combination of manual and machine procedures that can restore lost data in the event of hardware or software failure. Routine backup of databases and logs of computer activity are part of a backup & recovery program.
• Checkpoint/Restart A method of recovering from a system failure. A checkpoint is a copy of the computer's memory that is periodically saved on disk along with the current register settings (last instruction executed, etc.). In the event of any failure, the last checkpoint serves as a recovery point. When the problem has been fixed, the restart program copies the last checkpoint into memory, resets all the hardware registers and starts the computer from that point. Any transactions in memory after the last checkpoint was taken until the failure occurred will be lost.
Computer Security
• Security The protection of data against unauthorized access. Programs and data can be secured by issuing identification numbers and passwords to authorized users of a computer. However, systems programmers, or other technically competent individuals, will ultimately have access to these codes.
• Passwords can be checked by the operating system to prevent users from logging onto the system in the first place, or they can be checked in software, such as DBMSs, where each user can be assigned an individual view (subschema) of the database. Any application program running in the computer can also be designed to check for passwords. Data transmitted over communications networks can be secured by encryption to prevent eavesdropping. Although precautions can be taken to detect an unauthorized user, it is extremely difficult to determine if a valid user is performing unauthorized tasks. Effective security measures are a balance of technology and personnel management.
NB Computer Security Act The first step in improving the security and privacy of information contained in federal computer systems. Signed January 8, 1988 by President Reagan, the Act: Establishes a central authority for developing guidelines for protecting unclassified, but sensitive information stored in government computers. Requires each agency to formulate a computer security plan, tailored to its own circumstances and based on the guidelines. Mandates that each agency provide training for its computer employees on the threats and vulnerabilities of its computer systems. Ensures that the National Security Agency and other defense-related government agencies not control computer security standards in civilian agencies of government.
