- •Содержание
- •Text 1 Computers and How They Work
- •Processing
- •1. Match a verb from a with a word or phrase from b to make phrases from the article.
- •2. What input device would you use for these tasks?
- •3. Complete each sentence by choosing from the following devices: memory stick, hard disk, cDs, dvDs, touch screen, trackball, touchpad, webcam.
- •4. Use the words in the box to complete these sentences.
- •Input processing storage output rom ram cpu software
- •5. Create a crossword puzzle for 20 of the computer terms found in this article.
- •The Internet: What’s all fuss?
- •Who uses it?
- •Its Benefits
- •How did the Internet begin?
- •1. Read the article and answer the questions.
- •2. What do isp, html, url and http stand for? Match these terms with their meanings.
- •3. Match a word from a with a word or phrase from b to make phrases from the article.
- •4. Use the words in the box to complete these sentences.
- •5. Make a list of the ways you use the Internet for study, at work and in your free time. Text 3 Computer Viruses? What really is it?
- •1. Read the article and mark the statements true (t) or false (f).
- •2. Read the article again and answer the questions.
- •3. Match a verb from a with a word or phrase from b to make phrases from the article.
- •4. Find words in the article which fit these meanings.
- •5. Use the words from Exercise 4 to complete these sentences.
- •Text 4 Microsoft aims Windows 8 storage at enterprise data centers
- •1. Read the article and answer the questions.
- •3. Use the words in the box to complete these sentences.
- •4. Match a word from a with a word or phrase from b to make phrases from the article.
- •1. Read the article and choose the best headline.
- •2. Read the article again and answer the questions.
- •3. Match a verb from a with a word or phrase from b to make phrases from the article.
- •4. Find words in the article which fit these meaning.
- •5. Use the words in the box to complete these sentences.
- •Text 6 using computers
- •Input devices
- •Text 7 can a computer respond to the human voice?
- •Information, people, one, processing, accurately, programmer, computers, instructions, components
- •Inevitably
- •Text 8 Cloud and Security
- •1. Match the words with their definitions:
- •2. Answer the questions:
- •3. Find the words in the text which have similar meanings:
- •4. Match the words to make word expressions:
- •5. Translate the chains of nouns:
- •Text 9 Compiling or interpreting
- •1. Answer the questions:
- •2. True or false:
- •3. Choose the right preposition:
- •4. Choose the following words:
- •Text 10 Term information technology
- •1. Answer the questions:
- •2. Choose true or false:
- •3. Put the following sentences logically in the right order according to the text:
- •4. Match the sentence halves:
- •Text 11 Taking computer for granted
- •VIII. What's missing? You can help yourself referring to the text.
- •IX. Put the letters in order to make words, then use the words to complete the sentences.
- •X. Give the opposites of the following words.
- •XI. Give the synonyms of the following words:
- •XII. What verbs frequently precede these words?
- •Match the expressions with their definitions:
- •Are you up to giving a right explanation?
- •Text 12 strap on some eyephones and you are virtually there
- •VII. True or false?
- •Read the words as they are used in the following sentences and try to come up with your own definition:
- •Put the proper words into sentences:
- •Guess the meaning of the italicized words:
- •Answer the questions:
- •Give the opposites of the following words:
- •Are you up to giving a right explanation?
- •Text 13 computer systems
- •VI. Answer the following questions:
- •VII. Match each component in column a with its function in column b:
- •IX. Give the opposites of the following words:
- •X. True or false?
- •XI. What's missing? You can help yourself referring to the text.
- •XII. Look through the text and find the English equivalents of the following words:
- •XIII. Are you baffled by computer language? Choose a, b, c or d. (Only one choice is correct)
- •XIV. Are you up to giving a right explanation?
- •Text 14 the first hackers
- •VII. Put the proper words into sentences:
- •XII. What's missing? You can help yourself referring to the text.
- •XIII. Match the words given in the left column with their definitions in the right column.
- •XIV. Are you up to giving a right explanation?
- •Text 15 the development of computers: prehistory
- •XI. Match the words given in the left column with their definitions in the right column.
- •XII. What's missing? You can help yourself referring to the text.
- •XIII. Match the sentence halves:
- •XIV. Are you up to giving a right explanation?
- •Text 16 Security and privacy issues in the pdf document format
- •Match the words with their definitions.
- •Choose the most suitable word (a-f from task 1) to complete the sentences.
- •What is described in the text as:
- •Look through the text and say whether these statements are true, false or not mentioned.
- •Answer the questions.
- •Text 17 Making the web more accessible to people with disabilities and special needs
- •Match the words with their definitions.
- •Fill in the gaps with the words from task 1.
- •Match the words and phrases that go together in a and b and translate them.
- •Which verbs form the following adjectives? Translate both verbs and adjectives into Russian.
- •Answer the questions to the text.
- •Text 18 Programmable nanowire circuits for nanoprocessors
- •Match the terms with their definitions.
- •Fill in the gaps with the following words: architecture, transistor, sensor, nano, circuit, volatile, approach.
- •Match the words and phrases that go together in a and b and translate them.
- •Find the Russian equivalents of the terms:
- •Answer the questions.
- •Text 19 New wireless technology developed for faster, more efficient networks
- •Match the words with their definitions.
- •Fill in the gaps with the following words: feasible; setup; transmitter; headphones; wireless network; receiver; channel; whisper; filter out.
- •Match the sentence halves.
- •Correct the statements according to the text.
- •Answer the questions.
- •Text 20 New device may revolutionize computer memory
- •Match the words with their definitions.
- •Complete the sentences with the words from task 1 and translate them.
- •Find the Russian equivalents of the following terms.
- •Put the following sentences logically in the right order according to the text.
- •Answer the questions.
- •Text 21 a textbook manoeuvre
- •II) Match these words to make word expressions:
- •Text 22 beyond the pc
- •I) Choose the most suitable word to complete the sentence:
- •Text 23 Measuring the black web
- •I) Define the main idea of the text:
- •II) Look through the text and say whether these statements are true, false or not mentioned (t/f/nm). Correct the false ones:
- •Vocabulary
- •I) Find the words in the text that mean the same as following:
- •II) Match the English words with Russian equivalents:
- •Text 24 Facebook's Timeline irks some users
- •Text 25 How shoppers with smartphones are changing the retail landscape
- •I) Match the headings to the correct paragraph:
- •II) Match the sentence halves:
- •Vocabulary
- •I) Find words and phrases in the text which have similar meanings:
- •II) Match the English words with their Russian equivalents:
- •Text 26 Computer software
- •1. Answer the questions:
- •2. Complete the sentences, using the text. Translate into Russian. Retell briefly.
- •3. Translate the following sentences into English. Use the information from the text.
- •4. Match the words and word-combinations from the columns.
- •5. Look through the text and find the English equivalents of the following words:
- •6. Define the main idea of each paragraph. Text 27 Operating systems
- •1. Define the main idea of each paragraph.
- •2. Find the sentence expressing the main idea in each paragraph.
- •3. Complete the sentences. Retell the text, using the answers.
- •4. Match the words and word-combinations from the columns.
- •5. Look through the text and say whether these statements are true, false or not mentioned:
- •6. Answer the questions.
- •Text 28 a modem
Information, people, one, processing, accurately, programmer, computers, instructions, components
Exercise 4. Now read the text more carefully. In every column choose the word which is a synonym of the underlined word. (Only one answer is possible in each case).
joint forces
unfortunately
unite
break
collaborate
open
crack
perhaps
combine
melt
of course
merge
Inevitably
solve
eventually
add
cut
at first
myriad |
bit |
potential |
lot of |
chip |
power |
innumerable |
fragment |
activity |
large |
piece |
possibilities |
plenty |
share |
range |
great quantity |
part |
earnings |
Exercise 5. Discuss the extract and say what new facts you’ve found in it.
Qwerty is the name of the standard typewriter keyboard. Q, W, E, R, T and Y are the first six keys in the upper row of letters. Together they make up the traditional name for the keyboard
The first practical typewriter was put together in Milwaukee between 1867 and 1872. The letters were arranged alphabetically at first, but this proved useless. Because of the mechanics of the machine the letters jammed together when you typed fast. The inventors asked a school teacher which letters were used most in English, and then designed a keyboard where the most-used letters were as far apart as possible — qwerty. Since then typewriters changed completely, but, despite all the changes, the keyboard has-remained the same. Even though they operate in quite a different way, computer keyboards have followed the typewriter, so that we have qwerty computers, too.
Text 8 Cloud and Security
Today, innovations in information technology are creating a new paradigm for human communication and collaboration on a global scale. The Internet is evolving into the cloud: the means through which everything will be delivered as a service — from computing power to business processes and personal interaction. The cloud is fundamentally changing the way we connect with each other and with information.
At Hewlett-Packard Labs the research is focused on delivering the secure application and computing end-state of “Everything-as-a-Service.” This research envisions billions of users securely accessing millions of services through thousands of service providers, over millions of servers that process exabytes of data, delivered securely through terabytes of network traffic. They’re creating the foundational technologies to expand the use and relevance of cloud computing in the enterprise. They’re working on an enterprise cloud platform, from computing resources to human skills. And they’re working on the security analytics that will automate enterprise-grade security and address one of the biggest obstacles in the broad adoption of the cloud in the enterprise.
Cloud and Security Big Bets:
Curious: Enterprise Cloud Software Platform
The curious vision is to lead HP in becoming the foremost Service Providers’ Service Provider, delivering a set of cloud capabilities that enable service providers to take full advantage of the power of the cloud. HP’s work enables service providers of all types to tap into foundational cloud capabilities – general purpose horizontal capabilities, as well as those tailored for specific industry verticals – that make it easy for them to develop, host and manage their services to deliver value from the cloud, and to integrate with an ecosystem of services from other providers.
Automating Security
HP’s security research agenda focuses on developing analytical and architectural computing models to support assured governance of information security management. In the context of a worsening threat environment, increased consumerization of IT, and the highly sought-after cloud computing paradigm, they are creating technology and methodologies that will improve situational awareness and help assure customers that security of their information assets is appropriately managed. Their approach is to introduce innovative analytics in the lifecycle of security management, to help analyze and drive appropriate desired security outcomes at the governance level; and to design the next generation of trusted system architectures that will help ensure that IT operations can achieve those outcomes reliably and with strong assurances.
Notes:
end-state – конечное состояние
bet – пари, ставка
exabytes – эксабайт, квадриллион килобайт
terabytes – терабайт , 1000 Гбайт
cloud – глобальная сеть
governance – управление
envision – представлять себе; предвидеть
relevance – значимость; существенность; важность
to have relevance to smth. – иметь отношение к чему-л.
assets – средства; фонды; имущество