- •Содержание
- •Text 1 Computers and How They Work
- •Processing
- •1. Match a verb from a with a word or phrase from b to make phrases from the article.
- •2. What input device would you use for these tasks?
- •3. Complete each sentence by choosing from the following devices: memory stick, hard disk, cDs, dvDs, touch screen, trackball, touchpad, webcam.
- •4. Use the words in the box to complete these sentences.
- •Input processing storage output rom ram cpu software
- •5. Create a crossword puzzle for 20 of the computer terms found in this article.
- •The Internet: What’s all fuss?
- •Who uses it?
- •Its Benefits
- •How did the Internet begin?
- •1. Read the article and answer the questions.
- •2. What do isp, html, url and http stand for? Match these terms with their meanings.
- •3. Match a word from a with a word or phrase from b to make phrases from the article.
- •4. Use the words in the box to complete these sentences.
- •5. Make a list of the ways you use the Internet for study, at work and in your free time. Text 3 Computer Viruses? What really is it?
- •1. Read the article and mark the statements true (t) or false (f).
- •2. Read the article again and answer the questions.
- •3. Match a verb from a with a word or phrase from b to make phrases from the article.
- •4. Find words in the article which fit these meanings.
- •5. Use the words from Exercise 4 to complete these sentences.
- •Text 4 Microsoft aims Windows 8 storage at enterprise data centers
- •1. Read the article and answer the questions.
- •3. Use the words in the box to complete these sentences.
- •4. Match a word from a with a word or phrase from b to make phrases from the article.
- •1. Read the article and choose the best headline.
- •2. Read the article again and answer the questions.
- •3. Match a verb from a with a word or phrase from b to make phrases from the article.
- •4. Find words in the article which fit these meaning.
- •5. Use the words in the box to complete these sentences.
- •Text 6 using computers
- •Input devices
- •Text 7 can a computer respond to the human voice?
- •Information, people, one, processing, accurately, programmer, computers, instructions, components
- •Inevitably
- •Text 8 Cloud and Security
- •1. Match the words with their definitions:
- •2. Answer the questions:
- •3. Find the words in the text which have similar meanings:
- •4. Match the words to make word expressions:
- •5. Translate the chains of nouns:
- •Text 9 Compiling or interpreting
- •1. Answer the questions:
- •2. True or false:
- •3. Choose the right preposition:
- •4. Choose the following words:
- •Text 10 Term information technology
- •1. Answer the questions:
- •2. Choose true or false:
- •3. Put the following sentences logically in the right order according to the text:
- •4. Match the sentence halves:
- •Text 11 Taking computer for granted
- •VIII. What's missing? You can help yourself referring to the text.
- •IX. Put the letters in order to make words, then use the words to complete the sentences.
- •X. Give the opposites of the following words.
- •XI. Give the synonyms of the following words:
- •XII. What verbs frequently precede these words?
- •Match the expressions with their definitions:
- •Are you up to giving a right explanation?
- •Text 12 strap on some eyephones and you are virtually there
- •VII. True or false?
- •Read the words as they are used in the following sentences and try to come up with your own definition:
- •Put the proper words into sentences:
- •Guess the meaning of the italicized words:
- •Answer the questions:
- •Give the opposites of the following words:
- •Are you up to giving a right explanation?
- •Text 13 computer systems
- •VI. Answer the following questions:
- •VII. Match each component in column a with its function in column b:
- •IX. Give the opposites of the following words:
- •X. True or false?
- •XI. What's missing? You can help yourself referring to the text.
- •XII. Look through the text and find the English equivalents of the following words:
- •XIII. Are you baffled by computer language? Choose a, b, c or d. (Only one choice is correct)
- •XIV. Are you up to giving a right explanation?
- •Text 14 the first hackers
- •VII. Put the proper words into sentences:
- •XII. What's missing? You can help yourself referring to the text.
- •XIII. Match the words given in the left column with their definitions in the right column.
- •XIV. Are you up to giving a right explanation?
- •Text 15 the development of computers: prehistory
- •XI. Match the words given in the left column with their definitions in the right column.
- •XII. What's missing? You can help yourself referring to the text.
- •XIII. Match the sentence halves:
- •XIV. Are you up to giving a right explanation?
- •Text 16 Security and privacy issues in the pdf document format
- •Match the words with their definitions.
- •Choose the most suitable word (a-f from task 1) to complete the sentences.
- •What is described in the text as:
- •Look through the text and say whether these statements are true, false or not mentioned.
- •Answer the questions.
- •Text 17 Making the web more accessible to people with disabilities and special needs
- •Match the words with their definitions.
- •Fill in the gaps with the words from task 1.
- •Match the words and phrases that go together in a and b and translate them.
- •Which verbs form the following adjectives? Translate both verbs and adjectives into Russian.
- •Answer the questions to the text.
- •Text 18 Programmable nanowire circuits for nanoprocessors
- •Match the terms with their definitions.
- •Fill in the gaps with the following words: architecture, transistor, sensor, nano, circuit, volatile, approach.
- •Match the words and phrases that go together in a and b and translate them.
- •Find the Russian equivalents of the terms:
- •Answer the questions.
- •Text 19 New wireless technology developed for faster, more efficient networks
- •Match the words with their definitions.
- •Fill in the gaps with the following words: feasible; setup; transmitter; headphones; wireless network; receiver; channel; whisper; filter out.
- •Match the sentence halves.
- •Correct the statements according to the text.
- •Answer the questions.
- •Text 20 New device may revolutionize computer memory
- •Match the words with their definitions.
- •Complete the sentences with the words from task 1 and translate them.
- •Find the Russian equivalents of the following terms.
- •Put the following sentences logically in the right order according to the text.
- •Answer the questions.
- •Text 21 a textbook manoeuvre
- •II) Match these words to make word expressions:
- •Text 22 beyond the pc
- •I) Choose the most suitable word to complete the sentence:
- •Text 23 Measuring the black web
- •I) Define the main idea of the text:
- •II) Look through the text and say whether these statements are true, false or not mentioned (t/f/nm). Correct the false ones:
- •Vocabulary
- •I) Find the words in the text that mean the same as following:
- •II) Match the English words with Russian equivalents:
- •Text 24 Facebook's Timeline irks some users
- •Text 25 How shoppers with smartphones are changing the retail landscape
- •I) Match the headings to the correct paragraph:
- •II) Match the sentence halves:
- •Vocabulary
- •I) Find words and phrases in the text which have similar meanings:
- •II) Match the English words with their Russian equivalents:
- •Text 26 Computer software
- •1. Answer the questions:
- •2. Complete the sentences, using the text. Translate into Russian. Retell briefly.
- •3. Translate the following sentences into English. Use the information from the text.
- •4. Match the words and word-combinations from the columns.
- •5. Look through the text and find the English equivalents of the following words:
- •6. Define the main idea of each paragraph. Text 27 Operating systems
- •1. Define the main idea of each paragraph.
- •2. Find the sentence expressing the main idea in each paragraph.
- •3. Complete the sentences. Retell the text, using the answers.
- •4. Match the words and word-combinations from the columns.
- •5. Look through the text and say whether these statements are true, false or not mentioned:
- •6. Answer the questions.
- •Text 28 a modem
XIV. Are you up to giving a right explanation?
It's a sort of a game, the game that develops student's abilities to express themselves. In some ways it helps students to plunge into English.
One of the students, a volunteer, is invited to take place at the teacher's table. He is facing the class and mustn't turn back and look at the blackboard. The other student with the rest of the company picks secretly out one of the statements given in this book and writes it on the blackboard.
Now the volunteer after getting some information from his colleagues tries to restore the statement.
The information concerns:
the number of words;
the main idea of the statement, if possible;
the meaning of each word of the statement. It is strictly prohibited to use the words written on the blackboard, but it is quite well to use synonyms and antonyms.
It's extremely desirable that everybody takes part in this game.
Text 14 the first hackers
(1) The first “hackers” were students at the Massachusetts Institute of Technology (MIT) who belonged to the TMRC (Tech ModelRailroad Club). Some of the members really built model trains. But many were more interested in the wires and circuits underneath the track platform. Spending hours at TMRC creating better circuitry was called “a mere hack.” Those members who were interested in creating innovative, stylistic, and technically clever circuits called themselves (with pride) hackers.
(2) During the spring of 1959, a new course was offered at MIT, a freshman programming class. Soon the hackers of the railroad club were spending days, hours, and nights hacking away at their computer, an IBM 704. Instead of creating a better circuit, their hack became creating faster, more efficient program — with the least number of lines of code. Eventually they formed a group and created the first set of hacker’s rules, called the Hacker’s Ethic.
(3) Steven Levy, in his book Hackers, presented the rules:
Rule 1: Access to computers — and anything, which might teach you, something about the way the world works — should be unlimited and total.
Rule 2: All information should be free.
Rule 3: Mistrust authority — promote decentralization.
Rule 4: Hackers should be judged by their hacking, not bogus criteria such as degrees, race, or position.
Rule 5: You can create art and beauty on a computer.
Rule 6: Computers can change your life for the better.
(4) These rules made programming at MIT’s Artificial Intelligence Laboratory a challenging, all encompassing endeavor. Just for theexhilaration of programming, students in the AI Lab would write anew program to perform even the smallest tasks. The program would be made available to others who would try to perform the same task with fewer instructions. The act of making the computer work more elegantly was, to a bonafide hacker, awe-inspiring.
(5) Hackers were given free reign on the computer by two AI Labprofessors, “Uncle” John McCarthy and Marvin Minsky, who realized that hacking created new insights. Over the years, the AILab created many innovations: LIFE, a game about survival; LISP, a new kind of programming language; the first computer chess game; The CAVE, the first computer adventure; and SPACEWAR, the first video game.
EXERCISES
I Define the main idea of the text:
The rules to be referred to.
The Tech Model Railroad Club.
The Hacker’s Ethic.
Hackers: the beginning.
II. Define the main idea of each paragraph.
III. Give a title to each passage.
IV. Find the sentence expressing the main idea in each paragraph.
V. Match the headings to the correct paragraph:
The hacker’s rules.
The AI Lab innovations.
The formation of the group.
MIT students.
Writing a new program.
VI. True or false?
Those who can, do. Those who cannot, teach. Those who cannot teach, HACK!
The first hackers were interested in railroad circuitry.
The first hackers studied at MIT.
The point of a hacker’s work was to create a faster and smaller code.
Hackers had their own Ethic Code.
TMRC stands for Toy Machinery Railroad Car.
Hackers sabotaged the work of the AI Lab.
An elegant computer was, to a real hacker, awe-inspiring.
At AI Lab hackers wrote a computer program for every other task.
Hackers were quite prolific in innovations.
Hackers were given free reign on the two AI Lab professors.