- •2. Find the Ukrainian equivalents for the following English word and word combinations:
- •3. Analyze the following words and translate them, paying attention to the negative prefixes:
- •4. Read the text and translate it: Video camera
- •1. Put the words in the right order to make a sentence:
- •2. Fill in the blanks with the following words:
- •3. Complete the following sentences using active vocabulary:
- •4. Say if the following statements are true or false:
- •5. Answer the following questions:
- •6. Put the questions to the following sentences:
- •7. Match the first part (1-8) of the sentence with the second part (a-f):
- •8. Read the supplementary text, translate and entitle it:
- •1. Put the words in the right order to make a sentence:
- •2. Fill in the blanks with the following words:
- •3. Complete the following sentences using active vocabulary:
- •4. Say if the following statements are true or false:
- •5. Answer the following questions:
- •6. Match the first part (1-8) of the sentence with the second part (a-h):
- •1. Put the words in the right order to make a sentence:
- •2. Fill in the blanks with the following words:
- •3. Complete the following sentences using active vocabulary:
- •4. Say if the following statements are true or false:
- •5. Answer the following questions:
- •6. Put the questions to the following sentences:
- •7. Match the first part (1-8) of the sentence with the second part (a-h):
- •8. Read the supplementary text, translate and entitle it:
- •1. Put the words in the right order to make a sentence:
- •2. Fill in the blanks with the following words:
- •3. Say if the following statements are true or false:
- •4. Put the questions to the following sentences:
- •5. Complete the following sentences:
- •6. Match the first part (1-8) of the sentence with the second part (a-h):
- •7. Read the supplementary text, translate and entitle it:
- •8. Work in pairs. State the advantages and disadvantages of dtv and analog tv.
- •9. Render the text: tv goes digital.
- •Fill in the blanks confusing words and memorize them:
- •2. Find the Ukrainian equivalents for the following English and word combinations:
- •3. Match two parts of word combinations:
- •4. Read the text and translate it: Computer crime
- •1. Put the words in the right order to make a sentence:
- •2. Fill in the blanks with the following words:
- •3. Complete the following sentences using active vocabulary:
- •4. Say if the following statements are true or false:
- •5. Answer the following questions:
- •6. Match the first part (1-9) of the sentence with the second part (a-I):
- •7. Render the text: Computer crime
- •8. Work in pairs. How do you defend your computer?
- •9. Read the supplementary text, translate and entitle it:
- •1. Fill in the blanks confusing words and memorize them:
- •2. Find the Ukrainian equivalents for the following English words and word
- •3. Translate the following words and word combinations into English:
- •4. Read the text and translate it: An antenna
- •1. Put the words in the right order to make a sentence:
- •2. Fill in the blanks with the following words:
- •3. Complete the following sentences using active vocabulary:
- •4. Say if the following statements are true or false:
- •5. Answer the following questions:
- •6. Match the first part (1-7) of the sentence with the second part (a-g):
- •7. Read the supplementary text, translate and entitle it:
- •8. Render the text: An antenna
- •9. Work in pairs. Compare the two kinds of antennas.
5. Answer the following questions:
1. What is the most common outside threat to a business's computer network? 2. How many types of computer viruses are there? 3. Who is a "hacker"? 4. How do you defend your computer? 5. What viruses can reformat your hard drive? 6. How do viruses infect your machine? 7. What are macro viruses written to? 8. What can reformat your hard drive? 9. When did the National Computer Security Association estimate that two out of three U.S. companies were affected by computer viruses?
6. Match the first part (1-9) of the sentence with the second part (a-I):
1. Spam is …
2. A computer virus is …
3 Computer fraud is …
4. Cyberstalking is …
5. Malware is …
6. A hard disk drive (HDD) is …
7. A way of representing text or computer processor instructions by the use of …
8. The Internet is …
9. Cyberterrorism is …
a) … a non-volatile, random access device for digital data.
b) … unlawful to varying degrees.
c) …software designed to secretly access a computer system without the owner's informed consent.
d) … any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss.
e) … the binary number system's two-binary digits 0 and 1.
f)… the use of the Internet to stalk or harass an individual or an organization.
g) … a computer program that can copy itself and infect a computer.
h) … a global system of interconnected computer networks that use the standard
Internet Protocol Suite (TCP/IP) to serve billions of users worldwide.
i) … a phrase used to describe the use of Internet based attacks in terrorist activities.
7. Render the text: Computer crime
8. Work in pairs. How do you defend your computer?
9. Read the supplementary text, translate and entitle it:
A computer virus is a computer program that can copy itself and infect a computer. A true virus can spread from one computer to another when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.
As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.
UNIT 6
Pre-text exercises: