- •Содержание
- •Text 1 Computers and How They Work
- •Processing
- •1. Match a verb from a with a word or phrase from b to make phrases from the article.
- •2. What input device would you use for these tasks?
- •3. Complete each sentence by choosing from the following devices: memory stick, hard disk, cDs, dvDs, touch screen, trackball, touchpad, webcam.
- •4. Use the words in the box to complete these sentences.
- •Input processing storage output rom ram cpu software
- •5. Create a crossword puzzle for 20 of the computer terms found in this article.
- •The Internet: What’s all fuss?
- •Who uses it?
- •Its Benefits
- •How did the Internet begin?
- •1. Read the article and answer the questions.
- •2. What do isp, html, url and http stand for? Match these terms with their meanings.
- •3. Match a word from a with a word or phrase from b to make phrases from the article.
- •4. Use the words in the box to complete these sentences.
- •5. Make a list of the ways you use the Internet for study, at work and in your free time. Text 3 Computer Viruses? What really is it?
- •1. Read the article and mark the statements true (t) or false (f).
- •2. Read the article again and answer the questions.
- •3. Match a verb from a with a word or phrase from b to make phrases from the article.
- •4. Find words in the article which fit these meanings.
- •5. Use the words from Exercise 4 to complete these sentences.
- •Text 4 Microsoft aims Windows 8 storage at enterprise data centers
- •1. Read the article and answer the questions.
- •3. Use the words in the box to complete these sentences.
- •4. Match a word from a with a word or phrase from b to make phrases from the article.
- •1. Read the article and choose the best headline.
- •2. Read the article again and answer the questions.
- •3. Match a verb from a with a word or phrase from b to make phrases from the article.
- •4. Find words in the article which fit these meaning.
- •5. Use the words in the box to complete these sentences.
- •Text 6 using computers
- •Input devices
- •Text 7 can a computer respond to the human voice?
- •Information, people, one, processing, accurately, programmer, computers, instructions, components
- •Inevitably
- •Text 8 Cloud and Security
- •1. Match the words with their definitions:
- •2. Answer the questions:
- •3. Find the words in the text which have similar meanings:
- •4. Match the words to make word expressions:
- •5. Translate the chains of nouns:
- •Text 9 Compiling or interpreting
- •1. Answer the questions:
- •2. True or false:
- •3. Choose the right preposition:
- •4. Choose the following words:
- •Text 10 Term information technology
- •1. Answer the questions:
- •2. Choose true or false:
- •3. Put the following sentences logically in the right order according to the text:
- •4. Match the sentence halves:
- •Text 11 Taking computer for granted
- •VIII. What's missing? You can help yourself referring to the text.
- •IX. Put the letters in order to make words, then use the words to complete the sentences.
- •X. Give the opposites of the following words.
- •XI. Give the synonyms of the following words:
- •XII. What verbs frequently precede these words?
- •Match the expressions with their definitions:
- •Are you up to giving a right explanation?
- •Text 12 strap on some eyephones and you are virtually there
- •VII. True or false?
- •Read the words as they are used in the following sentences and try to come up with your own definition:
- •Put the proper words into sentences:
- •Guess the meaning of the italicized words:
- •Answer the questions:
- •Give the opposites of the following words:
- •Are you up to giving a right explanation?
- •Text 13 computer systems
- •VI. Answer the following questions:
- •VII. Match each component in column a with its function in column b:
- •IX. Give the opposites of the following words:
- •X. True or false?
- •XI. What's missing? You can help yourself referring to the text.
- •XII. Look through the text and find the English equivalents of the following words:
- •XIII. Are you baffled by computer language? Choose a, b, c or d. (Only one choice is correct)
- •XIV. Are you up to giving a right explanation?
- •Text 14 the first hackers
- •VII. Put the proper words into sentences:
- •XII. What's missing? You can help yourself referring to the text.
- •XIII. Match the words given in the left column with their definitions in the right column.
- •XIV. Are you up to giving a right explanation?
- •Text 15 the development of computers: prehistory
- •XI. Match the words given in the left column with their definitions in the right column.
- •XII. What's missing? You can help yourself referring to the text.
- •XIII. Match the sentence halves:
- •XIV. Are you up to giving a right explanation?
- •Text 16 Security and privacy issues in the pdf document format
- •Match the words with their definitions.
- •Choose the most suitable word (a-f from task 1) to complete the sentences.
- •What is described in the text as:
- •Look through the text and say whether these statements are true, false or not mentioned.
- •Answer the questions.
- •Text 17 Making the web more accessible to people with disabilities and special needs
- •Match the words with their definitions.
- •Fill in the gaps with the words from task 1.
- •Match the words and phrases that go together in a and b and translate them.
- •Which verbs form the following adjectives? Translate both verbs and adjectives into Russian.
- •Answer the questions to the text.
- •Text 18 Programmable nanowire circuits for nanoprocessors
- •Match the terms with their definitions.
- •Fill in the gaps with the following words: architecture, transistor, sensor, nano, circuit, volatile, approach.
- •Match the words and phrases that go together in a and b and translate them.
- •Find the Russian equivalents of the terms:
- •Answer the questions.
- •Text 19 New wireless technology developed for faster, more efficient networks
- •Match the words with their definitions.
- •Fill in the gaps with the following words: feasible; setup; transmitter; headphones; wireless network; receiver; channel; whisper; filter out.
- •Match the sentence halves.
- •Correct the statements according to the text.
- •Answer the questions.
- •Text 20 New device may revolutionize computer memory
- •Match the words with their definitions.
- •Complete the sentences with the words from task 1 and translate them.
- •Find the Russian equivalents of the following terms.
- •Put the following sentences logically in the right order according to the text.
- •Answer the questions.
- •Text 21 a textbook manoeuvre
- •II) Match these words to make word expressions:
- •Text 22 beyond the pc
- •I) Choose the most suitable word to complete the sentence:
- •Text 23 Measuring the black web
- •I) Define the main idea of the text:
- •II) Look through the text and say whether these statements are true, false or not mentioned (t/f/nm). Correct the false ones:
- •Vocabulary
- •I) Find the words in the text that mean the same as following:
- •II) Match the English words with Russian equivalents:
- •Text 24 Facebook's Timeline irks some users
- •Text 25 How shoppers with smartphones are changing the retail landscape
- •I) Match the headings to the correct paragraph:
- •II) Match the sentence halves:
- •Vocabulary
- •I) Find words and phrases in the text which have similar meanings:
- •II) Match the English words with their Russian equivalents:
- •Text 26 Computer software
- •1. Answer the questions:
- •2. Complete the sentences, using the text. Translate into Russian. Retell briefly.
- •3. Translate the following sentences into English. Use the information from the text.
- •4. Match the words and word-combinations from the columns.
- •5. Look through the text and find the English equivalents of the following words:
- •6. Define the main idea of each paragraph. Text 27 Operating systems
- •1. Define the main idea of each paragraph.
- •2. Find the sentence expressing the main idea in each paragraph.
- •3. Complete the sentences. Retell the text, using the answers.
- •4. Match the words and word-combinations from the columns.
- •5. Look through the text and say whether these statements are true, false or not mentioned:
- •6. Answer the questions.
- •Text 28 a modem
3. Match a word from a with a word or phrase from b to make phrases from the article.
A |
B |
|
|
4. Use the words in the box to complete these sentences.
ISP HTML URL HTTP hypertext convenience feature e-mail
This ………. enables the knowledge worker to manage data and reduces administrative overhead.
Your ………. can give you all the information you need.
There is a ………. command called root that switches your default name server to the server named here.
Make sure to use that ………. when starting the server.
If the open fails, we call a custom error function to return a nicely formatted ………. document and exit.
ABBYY PDF Transformer allows you to save output files to disk or send them as ………. attachments.
The 8597 entry in this example is the size of the document that Apache returned, not counting ………. overhead.
This system displays HLP files and supports ………. jumps that let the user display another related topic.
5. Make a list of the ways you use the Internet for study, at work and in your free time. Text 3 Computer Viruses? What really is it?
One might think of a computer virus as a tiny computer program designed to perform mischief. Most computer users have heard about computer viruses. A computer virus is the result of a destructive program that someone has written and placed inside a computer program, which unsuspecting people then place in their computer system.
Some viruses can erase all the information from the place where it's stored on the computer's hard disk. But each virus is different. Some display strange messages on your computer screen; others make small changes in your computer programs.
Where do these viruses come from? They certainly don't float around in the air like some human viruses. Instead, like any other computer program, a human must create them.
Why do people create them? It's hard to say. Some people create these programs out of meanness to get even. While others create them just as a challenge. Why do you thing people create these very destructive programs? How does your computer get a virus? Almost exactly the way humans do. The computer gets exposed to one. Well, it’s not quiet that easy.
Many people get contaminated computer programs by trading programs with other people. Others get contaminated computer programs through the use of modems, which allow computers to communicate over telephone lines (i.e. the Internet)
Most of the time, programs that arrive by modem or a trade are perfectly safe to use. However, you do stand a chance of getting a program that has been tampered with. Here a computer program virus is hiding inside the normal program. Many computer programs that are traded were copied illegally.
When this program enters your computer through your input device, it hides in your computer's memory and starts to duplicate itself like a disease. When you save your data, you also save the virus. Slowly but surely, the virus crowds out your data and causes major system problems.
The virus can't affect the computer's ROM (Read Only Memory), but it can affect RAM (Random Access Memory) and your computer disks. When your shut off your computer a virus that has been picked up will be lost, just like any other memory that is held in RAM.
If the virus is on your disk or hard drive, it will return to the computer when you use the program again. If you switch from one program to another without shutting down the machine, the virus will attach itself to the new program. In this way, it can slowly infect all your programs before you know that it exists. Today millions of dollars are being spent to rid and protect computer systems from these virus programs.
Commercial and shareware programs have been created with the sole purpose of detecting and fixing suspect programs that might be viruses infected. These detection programs should be ran when any disk is put into your disk drive or every time your computer is first started up each day to scan the computer's hard drive.