- •Contents
- •Module 1
- •1. What is a Computer? Word List
- •III. Understanding words
- •IV. Content review
- •V. Translate the sentences from Ukrainian into English using new vocabulary.
- •VI. Discussion.
- •2. Types of Computer Word list
- •"Types of computer"
- •III. Match types of computer with their definitions.
- •IV. Understanding
- •V. Choose the correct adjective. Then fill in the gaps with the correct form of the adjective.
- •VI. Translate from Ukrainian into English.
- •VII. Make up dialogue between a shop assistant and a customer.
- •VIII. Prepare a report about ibm pc and Apple Macintosh (Mac).
- •3. Early Computing Machines and Inventors Word list
- •Exercises
- •I Match words with definitions
- •II Sequencing of events
- •IV. Understanding the text
- •V. Categorization
- •VI. Make the degrees of comparisons of adjectives and adverbs from the exercise V.
- •VIII. Make up questions to the text.
- •IX. Imagine! You are the guide at the Computer History Museum.
- •4. Five Generations of Modern Computers Word list
- •First Generation (1945-1956)
- •Fourth Generation (1971-Present)
- •III. Locating information
- •V. Replace the pronouns with the corresponding nouns.
- •VI. Give the main characters of the computers of each generation.
- •5. The Parts of Computer Word list
- •IV. Understanding the text
- •V. Replace the pronouns with the corresponding nouns.
- •VI. Make up questions to the text.
- •VII. Translate the following sentences from Ukrainian into English.
- •VIII. Retell the text using exercise VI as a plan.
- •6. The Central Processing Unit Word list
- •I. Main idea
- •II. Understanding the passage
- •III. Locating information
- •V. Understanding words
- •VI. Word forms
- •VII. Content review
- •7. Types of Hardware Word list
- •Hardware
- •III. Complete the passages using the words.
- •Module 1 Variant 2
- •III. Complete the passages using the words.
- •IV. Choose the appropriate form of the words to complete the sentences.
- •Module 1 Variant 3
- •III. Complete the passages using the words.
- •Module 2
- •1. Types of Software Word List
- •I. Main idea
- •Types of software
- •IV. Which of the listed below statements are true/false.
- •V. Find English equivalents in the text:
- •VI. Give definitions to the following using the vocabulary:
- •2. Operating Systems Word List
- •IV. Complete the following sentences using information given in the text
- •VI. Answer the questions
- •3. Linux Text a
- •Exercise
- •1. Find equivalents
- •Exercises
- •I. Answer the following questions:
- •II. Understanding words
- •III. Complete the sentences with the words given bellow:
- •Why use Linux? Word list
- •Advantages of Using Linux
- •Retell these texts using your plan.
- •II. Understanding the passage
- •IV. Contextual reference
- •V. Understanding words
- •VI. Word forms
- •5. Memory Word list
- •Exercises
- •I. Find in the text adjectives which are used with the following nouns. Translate the word combinations.
- •II. Fill in the gaps with the appropriative words.
- •Find the passive constructions in the 4th and 5"' paragraphs and put them into past and future forms.
- •Give the main idea of the text in one sentence.
- •V. Decide whether the following statements are true or false.
- •VI. Translate from Ukrainian into English.
- •6. Internet Word List
- •II. Read the text "Internet"
- •IV. Find in the text Passive Constructions and make them Present, Past or Future Simple Passive
- •V. Change the following sentences into Passive Voice
- •VI. Understanding the text
- •VII. Translate the sentences from Ukrainian into English
- •VIII. Give the definitions of the following words
- •IX. Retell the text using sentences of exercise VI as a plan.
- •7. Viruses Word List
- •I. Refer back to the text and find synonyms for the following words
- •II. Name the words using the definitions
- •VII. Make your plan to the text.
- •III. Complete the passages using the words.
- •VI. Choose the appropriate form of the words to complete the sentences.
- •III. Complete the passages using the words.
- •IV. Choose the appropriate form of the words to complete the sentences.
- •III. Complete the passages using the words.
- •3. Nanorobots
- •4. Types of Networks. Neural Networks.
- •5. Artificial Intelligence
- •6. Digit that Means Nothing
- •7. Types of Error
- •9. Mineral Industry Software
- •10. Advantages of Electronic Detonator Application
II. Read the text "Internet"
The Internet, a global computer network which embraces millions of users all over the world, began in the United States in 1969 as a military experiment, It was designed to survive a nuclear war. Information sent over the Internet takes the shortest path available from one computer to another. Because of this, any two computers on the Internet will be able to stay in touch with each other as long as there is a single route between them, This technology is called packet switching. Owing to this technology, if some computers on the network are knocked out (by a nuclear explosion, for example), information will just route around them. One such packet-switching network already survived a war. It was the Iraqi computer network which was not knocked out during the Gulf War.
Most of the Internet host computers (more than 50%) are in the United States, while the rest are located in more than 100 other countries. Although the number of host computers can be counted fairly accurately, nobody knows exactly how many people use the Internet, there are millions, and their number is growing by thousands each month worldwide.
The most popular Internet service is e-mail. Most of the people, who have access to the Internet, use the network only for sending and receiving e-mail messages. However, other popular services are available on Ihe Internet: reading USENET News, using the World- Wide Web, telnet, FTP, and Gopher.
In many developing countries the Internet may provide businessmen with a reliable alternative to the expensive and unreliable telecommunication systems of these countries. Commercial users can communicate over the Internet with the rest of the world and can do it very cheaply. When they send e-mail messages, they have only to pay for phone calls to their local service providers, not for calls acrossjheir countries or around the world. But who actually pays for sending e-mail messages over the Internet long distances, around the world? The answer is simple: a user pays his/her service provider a monthly or an hourly fee. Part of this fee goes towards its costs to connect to a larger service provider. And part of the fee got by the larger provider goes to cover its cost of running a worldwide network of wires and wireless stations.
But saving money is only the first step. If people see that they can make money from the Internet, commercial use of this network will drastically increase. For example, some western architecture companies and garment centers already transmit their basic designs and concepts over the Internet into China, where they are reworked and refined by skilled - but inexpensive -Chinese computer-aided-design specialists.
However, some problems remain. The most important is security. When you send an e-mail message to somebody, this message can travel through many different networks and computers. The data are constantly being directed towards its destination by special computers called routers. Because of this, it is possible to get into any of computers along the route, intercept and even change the data being sent over the Internet. In spite of the fact that there are many strong encoding programs available, nearly all the information being sent over the Internet is transmitted without any forms of encoding, i.e. "in the clear". But when it becomes necessary to send important information over the network, these encoding programs may by useful. Some American banks and companies even conduct transactions over the Internet. However, there are still both commercial and technical problems which will take time to be resolved. III. Find in the text "Internet" sentences, containing the following words and word-combinations, then translate the whole sentence. the network is knocked out - мережа виведена з ладу computers are located - комп'ютери розташовані the people have access - люди мають доступ hourly fee - погодинна оплата
drastically increase -значно зросте
are reworked and refined - допрацювати і вдосконалити
intercept and change the data - перехоплювати і змінювати інформацію,
