- •Содержание
- •Text 1 Computers and How They Work
- •Processing
- •1. Match a verb from a with a word or phrase from b to make phrases from the article.
- •2. What input device would you use for these tasks?
- •3. Complete each sentence by choosing from the following devices: memory stick, hard disk, cDs, dvDs, touch screen, trackball, touchpad, webcam.
- •4. Use the words in the box to complete these sentences.
- •Input processing storage output rom ram cpu software
- •5. Create a crossword puzzle for 20 of the computer terms found in this article.
- •The Internet: What’s all fuss?
- •Who uses it?
- •Its Benefits
- •How did the Internet begin?
- •1. Read the article and answer the questions.
- •2. What do isp, html, url and http stand for? Match these terms with their meanings.
- •3. Match a word from a with a word or phrase from b to make phrases from the article.
- •4. Use the words in the box to complete these sentences.
- •5. Make a list of the ways you use the Internet for study, at work and in your free time. Text 3 Computer Viruses? What really is it?
- •1. Read the article and mark the statements true (t) or false (f).
- •2. Read the article again and answer the questions.
- •3. Match a verb from a with a word or phrase from b to make phrases from the article.
- •4. Find words in the article which fit these meanings.
- •5. Use the words from Exercise 4 to complete these sentences.
- •Text 4 Microsoft aims Windows 8 storage at enterprise data centers
- •1. Read the article and answer the questions.
- •3. Use the words in the box to complete these sentences.
- •4. Match a word from a with a word or phrase from b to make phrases from the article.
- •1. Read the article and choose the best headline.
- •2. Read the article again and answer the questions.
- •3. Match a verb from a with a word or phrase from b to make phrases from the article.
- •4. Find words in the article which fit these meaning.
- •5. Use the words in the box to complete these sentences.
- •Text 6 using computers
- •Input devices
- •Text 7 can a computer respond to the human voice?
- •Information, people, one, processing, accurately, programmer, computers, instructions, components
- •Inevitably
- •Text 8 Cloud and Security
- •1. Match the words with their definitions:
- •2. Answer the questions:
- •3. Find the words in the text which have similar meanings:
- •4. Match the words to make word expressions:
- •5. Translate the chains of nouns:
- •Text 9 Compiling or interpreting
- •1. Answer the questions:
- •2. True or false:
- •3. Choose the right preposition:
- •4. Choose the following words:
- •Text 10 Term information technology
- •1. Answer the questions:
- •2. Choose true or false:
- •3. Put the following sentences logically in the right order according to the text:
- •4. Match the sentence halves:
- •Text 11 Taking computer for granted
- •VIII. What's missing? You can help yourself referring to the text.
- •IX. Put the letters in order to make words, then use the words to complete the sentences.
- •X. Give the opposites of the following words.
- •XI. Give the synonyms of the following words:
- •XII. What verbs frequently precede these words?
- •Match the expressions with their definitions:
- •Are you up to giving a right explanation?
- •Text 12 strap on some eyephones and you are virtually there
- •VII. True or false?
- •Read the words as they are used in the following sentences and try to come up with your own definition:
- •Put the proper words into sentences:
- •Guess the meaning of the italicized words:
- •Answer the questions:
- •Give the opposites of the following words:
- •Are you up to giving a right explanation?
- •Text 13 computer systems
- •VI. Answer the following questions:
- •VII. Match each component in column a with its function in column b:
- •IX. Give the opposites of the following words:
- •X. True or false?
- •XI. What's missing? You can help yourself referring to the text.
- •XII. Look through the text and find the English equivalents of the following words:
- •XIII. Are you baffled by computer language? Choose a, b, c or d. (Only one choice is correct)
- •XIV. Are you up to giving a right explanation?
- •Text 14 the first hackers
- •VII. Put the proper words into sentences:
- •XII. What's missing? You can help yourself referring to the text.
- •XIII. Match the words given in the left column with their definitions in the right column.
- •XIV. Are you up to giving a right explanation?
- •Text 15 the development of computers: prehistory
- •XI. Match the words given in the left column with their definitions in the right column.
- •XII. What's missing? You can help yourself referring to the text.
- •XIII. Match the sentence halves:
- •XIV. Are you up to giving a right explanation?
- •Text 16 Security and privacy issues in the pdf document format
- •Match the words with their definitions.
- •Choose the most suitable word (a-f from task 1) to complete the sentences.
- •What is described in the text as:
- •Look through the text and say whether these statements are true, false or not mentioned.
- •Answer the questions.
- •Text 17 Making the web more accessible to people with disabilities and special needs
- •Match the words with their definitions.
- •Fill in the gaps with the words from task 1.
- •Match the words and phrases that go together in a and b and translate them.
- •Which verbs form the following adjectives? Translate both verbs and adjectives into Russian.
- •Answer the questions to the text.
- •Text 18 Programmable nanowire circuits for nanoprocessors
- •Match the terms with their definitions.
- •Fill in the gaps with the following words: architecture, transistor, sensor, nano, circuit, volatile, approach.
- •Match the words and phrases that go together in a and b and translate them.
- •Find the Russian equivalents of the terms:
- •Answer the questions.
- •Text 19 New wireless technology developed for faster, more efficient networks
- •Match the words with their definitions.
- •Fill in the gaps with the following words: feasible; setup; transmitter; headphones; wireless network; receiver; channel; whisper; filter out.
- •Match the sentence halves.
- •Correct the statements according to the text.
- •Answer the questions.
- •Text 20 New device may revolutionize computer memory
- •Match the words with their definitions.
- •Complete the sentences with the words from task 1 and translate them.
- •Find the Russian equivalents of the following terms.
- •Put the following sentences logically in the right order according to the text.
- •Answer the questions.
- •Text 21 a textbook manoeuvre
- •II) Match these words to make word expressions:
- •Text 22 beyond the pc
- •I) Choose the most suitable word to complete the sentence:
- •Text 23 Measuring the black web
- •I) Define the main idea of the text:
- •II) Look through the text and say whether these statements are true, false or not mentioned (t/f/nm). Correct the false ones:
- •Vocabulary
- •I) Find the words in the text that mean the same as following:
- •II) Match the English words with Russian equivalents:
- •Text 24 Facebook's Timeline irks some users
- •Text 25 How shoppers with smartphones are changing the retail landscape
- •I) Match the headings to the correct paragraph:
- •II) Match the sentence halves:
- •Vocabulary
- •I) Find words and phrases in the text which have similar meanings:
- •II) Match the English words with their Russian equivalents:
- •Text 26 Computer software
- •1. Answer the questions:
- •2. Complete the sentences, using the text. Translate into Russian. Retell briefly.
- •3. Translate the following sentences into English. Use the information from the text.
- •4. Match the words and word-combinations from the columns.
- •5. Look through the text and find the English equivalents of the following words:
- •6. Define the main idea of each paragraph. Text 27 Operating systems
- •1. Define the main idea of each paragraph.
- •2. Find the sentence expressing the main idea in each paragraph.
- •3. Complete the sentences. Retell the text, using the answers.
- •4. Match the words and word-combinations from the columns.
- •5. Look through the text and say whether these statements are true, false or not mentioned:
- •6. Answer the questions.
- •Text 28 a modem
Text 16 Security and privacy issues in the pdf document format
UPM Facultad de Informática researchers compile information on security and privacy for authors or readers of PDF documents, the most popular format for publication of digital documents.
This work by researchers from the Universidad Politécnica de Madrid's Facultad de Informática surveys security and privacy threats related to digital document publishing. It addresses publisher-related information that is leaked once the document is sent over the Internet, as well as reader-related information that might be disclosed every time they open a downloaded document for examination. The work mainly focuses on the PDF document format that is the most popular document format for digital document publishing.
Publication of digital documents over the Internet poses serious security and privacy threats to both authors and readers. Previous research by the UPM Facultad de Informática's Distributed Systems Laboratory researchers addressed information leakage in popular Microsoft Office document formats. This research focuses on the PDF document format, which is the de facto standard for digital document exchange. Many institutions worldwide have adopted PDF as their document standard, and it has been estimated that billions of PDF documents are published or downloaded every day. The results of this research were published in the Journal of Systems and Software.
Published documents could include additional author-related data, such as user name, document location on the author's machine and even parts of the documents that were deleted before publication.
Some of this information, such as the user name or the last day the document was edited, are referred to as meta-data and are used by reader or editor applications to improve the user experience; however, they could lead to privacy breaches mainly because authors are not aware of their disclosure upon document publication. Other sensitive information is leaked because of the poor design of the document format. For example, whenever a paragraph of a document is deleted, PDF authoring applications do not remove the paragraph but rather mark it as "invisible." This way, the reader application does not visualize the deleted text when the document is opened for reading. Hence deleted data is kept along with the document and can be read by any malicious user that knows where to look for it. UPM researchers have developed several tools to extract information from PDF documents that are not accessible with standard document readers.
Facultad de Informática de la Universidad Politécnica de Madrid (2011, February 22). Security and privacy issues in the PDF document format. Science Daily.
from http://www.sciencedaily.com/releases/2011/02/110222083159.htm
Match the words with their definitions.
Security 1) an action that breaks a law, rule, or agreement
Privacy 2) the state of being free from public attention
Leakage 3) a piece of computer software which does a particular job
Application 4) serious study of a subject to discover new facts or test
new ideas
Breach 5) the deliberate spreading of secret information
Research 6) protection from danger