Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
пособие(2).doc
Скачиваний:
133
Добавлен:
14.03.2016
Размер:
3.31 Mб
Скачать

Vocabulary

1. Look at the words from Text 1. How many different words can you form with each one? Using a dictionary write down all possible words and translate them into Russian:

to manipulate, to refer, common, to engage, to relate, to intend, to pass, malicious

e.g. effort: effortless, effortlessness, effortlessly, effortful

What part of speech (noun, adjective, etc.) is each word you have formed?

2. Complete the following sentences with the original words from ex. 1 (including the word from the example):

1) Malware, short for __________ software, is software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. 2) __________ to produce more energy-efficient computing earns science foundation’s support. 3) Quantum computer chips __________ key milestones. 4) What are the most __________ types of computer platforms? 5) How do you __________ to use the computer skills you will gain from training? 6) Which book or material should I __________ to prepare for GATE exam? 7) How does hacking __________ to computer science? 8) How can people __________ other computers from their computer? 9) Many computer applications have been developed explicitly to __________ learners in critical thinking.

3. Match the words and word combinations from Texts 2 and 3 with their Russian equivalents:

1) to originate

a) ни при каких условиях

2) to install

b) сопротивляться, противостоять

3) depending on

c) происходить, брать начало

4) under no conditions

d) устанавливать

5) to avoid

e) уязвимое место

6) to resist

f) в зависимости от

7) vulnerability

g) избегать

4. Translate the sentences from Russian into English:

1) Возможно ли установить клавиатурный шпион (a keylogger) на компьютер вашей девушки, используя Метасплойт? 2) Как компания может избежать взлома? 3)Узнайте больше о том, какие бывают уязвимые места и как их устранить. 4) Американское правительство заявило, что ни при каких условиях не будет взламывать китайские телефонные компании для того, чтобы иметь доступ к текстовым сообщениям. 5) Сайт опубликовал топ десять стран, откуда берут начало кибер атаки. 6) В зависимости от контекста термин «хакер» можно отнести к людям из разных, но не совсем разрозненных(disjoint) сообществ и субкультур. 7) Приобретайте специальные программы, которые помогут вам противостоять хакерским атакам.

5. Using the words from ex. 3 say what can be done to protect a computer from hackers. Write the sentences down.

6. Study these phrasal verbs and give Russian equivalents:

Break into, hack into, go about, set about, keep ahead, grow up, phone up, throw away, log on, find out, track down, hand over, shut down, note down.

7. Now complete the gaps with the appropriate phrasal verbs in the correct form. In some cases, more than one answer is possible:

1) Hackers try to __________ passwords so they can penetrate a system. 2) Don’t __________ your password to anyone who asks for it. 3) The police __________ Ralph __________ by talking to his friends and acquaintances. 4) Some hackers __________ systems to get commercially valuable information. 5) When you __________ to a network, you have to provide your ID. 6) How do you __________ hacking into a system? 7) Hackers may __________, pretending to be from your company, and ask for your password. 8) Never __________ your credit card receipts where someone can find them. 9) Ralph was a hacker as a teenager but he’s __________ now and become more responsible. 10) __________ a system is strictly illegal now. 11) It’s a constant race to __________ of the hackers.