- •Computer science english
- •Unit 1. Computer millenium
- •2. Work in groups of three or four. What aspects have not been mentioned by anybody before reading? Why?
- •3. Match the passages on the left with the pictures on the right.
- •4. Read Text 2 and match the passages with the most suitable heading.
- •5. Answer the questions on the text.
- •6. Choose the best way to complete each sentence.
- •7. Read Text 3 and decide if the following statements are true (t) or false (f):
- •Text 3. Computers in the modern world
- •8. Complete the sentences on the text:
- •Vocabulary
- •2. Look Text 2 through again and match the words on the left with their definitions on the right.
- •3. Form with the given words as many different words as possible and translate them into Russian.
- •4. Complete the following sentences with the words from ex. 2.
- •5. Make up 5 sentences using the vocabulary from ex. 1. Ask your partner to translate them into Russian.
- •6. Translate the following sentences using the highlighted words and expressions from Text 3.
- •2. Role-play “An expert and a dummy”.
- •Unit 2. Computer architecture
- •3. Complete the sentences on the text:
- •4. Choose the best answer.
- •5. Read Part II of the text which tells you about the other useful components of the computer. Can you suppose what they are? Make the list and compare after reading. Part II
- •6. Read the text again and match the gaps (1-6) with the sentences (a-g) below. There is one sentence that you don’t need.
- •7. Are the statements true (t) or false (f) according to the text?
- •8. Retell the text about what a computer is using the expressions in italics from Part I and II:
- •Vocabulary
- •1. Complete the sentences using the words from the box.
- •2. Match the words and word expressions from Part I with their Russian equivalents.
- •3. Arrange the words from a to the words from b in pairs of synonyms.
- •4. Make up 5 sentences with the words from ex. 2 and 3. Ask your partner to translate into Russian.
- •5. Study these examples of prepositions of place, translate them into Russian.
- •6. Complete the sentences using the prepositions from Ex. 2.
- •8. Look at the words in ex.7 again. How many different words can you form with each one? Using a dictionary write them down and translate into Russan.
- •9. Translate into English using the active vocabulary from Part I.
- •1. Work in pairs. Find out as much as you can about your partner's computer by asking questions about the features in the table and complete it. Whose computer is more powerful?
- •2. Role-play “At an it shop”.
- •Unit 3. Programming languages
- •Text 1. Programming languages
- •3. Answer the questions on the text:
- •7. Decide if these sentences are true (t) or false (f) supporting your answers with information from the text:
- •3. Study the verbs from Text 2. Form nouns from them, translate into Russian:
- •4. Translate the sentences from Russian into English using the verbs and the nouns from ex. 3:
- •2. Role-play “First-time programmers”.
- •Unit 4. Software
- •2. Find the answers to these questions in the following text.
- •Text 2. Design patterns
- •Uses of Design Patterns
- •Vocabulary
- •Text 4.
- •4. Find in Text 4 the English equivalents of the following combinations:
- •1. Read the following quotes for software engineers:
- •2. Study these versions of Office Suite and decide which version provides the best value for the following users.
- •Unit 5. Graphics and multimedia
- •1. Look at the chart and give the definition of Multimedia.
- •1. Read Text 1 and answer the questions:
- •Text 1. Intelligent multimedia computer systems
- •2. Are the statements true (t) or false (f) according to the text?
- •7. Answer the questions on the text:
- •Vocabulary
- •1. Study the words and word combinations from Text 1 and give Russian equivalents:
- •2. Complete the following sentences with the words from ex 1.
- •3. Study the verbs from Text 1and with the help of a dictionary say which of them are international. Using a dictionary write down all possible words and translate them into Russian:
- •4. Using the verbs from ex. 3 say what multimedia computer systems can do. Write the sentences down.
- •5. Look at the components of a multimedia system and then say which category they belong to:
- •5. Match the words and word combinations with their Russian equivalents:
- •6. Translate the following sentences using the words and word combinations from ex. 5.
- •1. Work in pairs.
- •3. Project Work.
- •Unit 6. World wide web: internet, networks
- •1. Work in pairs and answer the questions. Do new developments in information technology affect your life? Which of these phrases describes you?
- •2. Now take the quiz. Ask your partner about the answers to the quiz and compare them.
- •Is your answer still the same afterwards? Who is more addicted to the Internet, you or your partner?
- •1. Put these events in the correct chronological order then read the text and check:
- •2. Read the text and answer the following questions:
- •Text. The rise of the world wide web
- •3. Give the heading to each passage of the text and use them to retell the text.
- •Vocabulary
- •1. Match the words with their definitions:
- •2. Complete the sentences with the words from ex. 1:
- •3. Rearrange the words to get the correct sentences using text 1:
- •4. Translate the sentences from Russian into English. Take the words in italics from the text:
- •1. Work in pairs. How much do you know about the history of networking? Can you match these events 1-4 to the dates a-d?
- •Is it Gottfrid Warg’s first charge? Do you suppose he will be punished?
- •3. Complete the sentences on the text:
- •4. Read Text 2 and find out what a ‘virus’ is: Text 2
- •5. Work in pairs and interview your partner asking these questions:
- •6. Read Text 3 and find out what is recommended to protect a computer: Text 3
- •Vocabulary
- •1. Look at the words from Text 1. How many different words can you form with each one? Using a dictionary write down all possible words and translate them into Russian:
- •2. Complete the following sentences with the original words from ex. 1 (including the word from the example):
- •3. Match the words and word combinations from Texts 2 and 3 with their Russian equivalents:
- •4. Translate the sentences from Russian into English:
- •5. Using the words from ex. 3 say what can be done to protect a computer from hackers. Write the sentences down.
- •6. Study these phrasal verbs and give Russian equivalents:
- •7. Now complete the gaps with the appropriate phrasal verbs in the correct form. In some cases, more than one answer is possible:
- •8. Replace the verbs in italics with a phrasal verb of a similar meaning. Use some of the verbs from ex. 6.
- •Unit 8. People in computing
- •1. Work in pairs. Take the computing quiz.
- •1. Answer the questions as a group:
- •2. Read the text following the instructions:
- •Text 1. Top 6 most important people in the history of computers
- •Vocabulary
- •1. Discuss the following questions:
- •2. Match the professions with their definitions:
- •3. Complete the sentences with an adjective from the box.
- •4. Study the list of technical qualifications and professional skills which are necessary for it-specialists:
- •1. Work in pairs. Which of the jobs in Exercise 2 would you most like to have? Which would you least like to have? Tell your partner why.
- •2. Study these job advertisements from the famous American job site www.Monsterjob.Com and match the requirements to the jobs which follow. A) Computer system engineer / network technician
- •3. Role-play «a Job Interview».
- •2. Read the statements and decide if they are true (t) or false (f).
- •5. Answer the questions.
- •6. Retell the text in a snowball form using some of the following expressions:
- •Vocabulary
- •2. Match the words and phrases from Text 1 about the leading it corporations with their Russian equivalents.
- •3. Translate into English using the vocabulary from ex. 1, 2.
- •4. Match the highlighted words from Text 2 with the definitions and synonyms below.
- •1. Do you know anything about the things in the photos? Read the descriptions and match them with the following new and noteworthy inventions:
- •3. Look at the pictures and name the following devices. What do you know about them?
- •4. Read Text 2 and answer the following questions:
- •Text 2. Licence to chill
- •5. Look through text 2 once again and say whether the following sentences are true (t) or false (f):
- •6. Read text 3 and name the function of electronic nose. Text 3. Electronic nose
- •7. Look at the text once again and answer the questions:
- •8. Read text 4 and say what robotically-assisted surgery was developed for. Text 4. Robotic surgery
- •9. Complete the sentences using the information from text 4:
- •10. Read text 5 and answer the following questions:
- •Text 5. Speech recognition
- •11. Match the following sentences with the inventions you have read:
- •Vocabulary
- •1. Match English phrases with their Russian equivalents:
- •2. Find adequate English translation of the following words and phrases:
- •3. Insert the prepositions (into, on, to, without, past, from, with, for, past, in):
- •4. Translate the following sentences from Russian into English using the words and expressions from ex. 1 and 2:
- •5. Work in pairs. Look at these predictions and say which of them are likely to come true and when. Add some of your own and compare them with other students.
- •2. Write an abstract of the text in 3-4 sentences. Text 2 can humans remain in control of computers?
- •1. Read the text and say what these numbers refer to:
- •3. Retell the text in 10 sentences.
- •1. Read the text and answer the following questions:
- •2. What are the most effective ways of prevention computer crimes in banking from your point of view?
- •2. Work in groups of three and find out if anybody has such a device. If yes, let him tell about (dis)advantages of it. If nobody has it, ask yourselves, what would you do, if you had it?
- •Text 6 best free antivirus: windows defender vs. Avast
- •1. Read the text and decide if the statements are true (t) or false (f).
- •3. Discuss in the group if anybody is ready to work as an it specialist for free but get some experience in this sphere. Give your reasons for pros and cons. Text 8 windows 8: a new look
- •1. Read the text and answer the following questions:
- •2. Share your views and opinions on Windows8 with your partner. What advantages does it give for the users? Text 9 safeguard your data
- •1. Read the text and answer the following questions:
- •2. Work in pairs. Find out how often and how your partner backups the data. Would he use the services of Carbonite? Report the results to the class. Text 10 steganography revealed
- •1. Read the text and match the paragraphs with their headings. Arrange the paragraphs in the correct order.
- •2. Work in pairs and discuss what spheres of life stenography is used in. Would you like to learn to use it? Why?
- •Computer science english
- •400005, Г. Волгоград, пр. Ленина, 28, корп. 1.
- •400005, Г. Волгоград, пр. Ленина, 28, корп. 7.
1. Read the text and decide if the statements are true (t) or false (f).
1) Avast takes a minimalist approach with an interface that’s extremely straightforward and dead simple to navigate.
2) The “AutoSandbox” automatically isolates suspicious programs from the OS.
3) Running a full system scan with 30GB of data on a solid-state drive took 10 minutes with Windows Defender.
4) Avast clocked seven minutes and nine seconds to scan the same data.
5) You’re unlikely to notice a performance impact with either Windows Defender or Avast installed.
6) Windows Defender is better at detecting zero-day threats and adds a second layer of protection through its automatic sandbox mode.
7) Windows Defender and Avast tied in this bout.
Windows 8 ships with a new version of Windows Defender that’s supposed to offer the same level of protection as Microsoft Security Essentials. Along with other security upgrades, we’re left wondering if there’s any reason to saddle up with a third-party antivirus program. To find out, we compared Windows Defender with Avast, which as we discovered in last month’s antivirus roundup is a formidable ally to have by your side as you romp around the web.
Round 1: Interface
There’s a lot going on in Avast, so much, in fact, that you might not even notice that it doesn’t scan for potentially unwanted programs (PUPs) by default, a setting we recommend enabling as an added ounce of protection (which, as you know, is worth a pound of cure). To get the most out of Avast, there’s an initial time investment required to poke around all the settings and tweak everything just the way you want it. In stark contrast to Avast, Windows Defender takes a minimalist approach with an interface that’s extremely straightforward and dead simple to navigate. There are just four headings to browse – Home, Update, History, and Settings – none of which tries to upsell you on security; Avast does. In this instance, simplicity gets the nod, and so does Windows Defender.
Round 2: Features
Whereas Windows Defender is super simple to navigate, it comes at the expense of an expansive feature-set. There’s very little in the way of fine-grain control, limiting most of what you can do to including/excluding certain file types and locations, and whether or not you want to scan removable drives. You can’t even schedule a scan, at least not through the traditional UI. To do that, you need to open up the Windows Task Scheduler and configure it through there. That’s lame. Avast, on the other hand, offers a much bigger toolbox. The “AutoSandbox” feature alone, which automatically isolates suspicious programs from the OS, wins this category for Avast. There’s also a remote assistance feature for troubleshooting family and friends who are running Avast, plus browser plugins, and more.
Round 3: Scan Speed
Windows Defender uses the same pokey scan engine as Microsoft Security Essentials, and since there’s no easy way to schedule scans, it’s even more problematic. Running a full system scan with 30GB of data on a solid-state drive took 20 minutes with Windows Defender, and subsequent scans took just as long. That’s an indication that Windows Defender doesn’t skip over files that haven’t changed since the last time they were processed. Avast clocked five minutes and nine seconds to scan the same data, and though it also didn’t get any quicker during subsequent scans, it’s still significantly faster than Windows Defender. Plus, you can easily schedule scans in Avast to run during times when you’re not sitting at your PC, such as after-work hours (assuming you leave your PC on 24/7).
Round 4: Performance Impact
Good news for both programs. If you’re rocking a solid-state drive with Windows 8 on a relatively modern machine, you’re unlikely to notice a performance impact with either Windows Defender or Avast installed. We slapped a 120GB Kingston SSDNow V300 drive onto an Asus P6X58D Premium motherboard with an Intel Core i7-930 processor, 4GB of DDR3/1333 RAM, and a Radeon HD 5850 graphics card. Boot times were virtually unaffected, with Avast introducing a startup penalty of just a few seconds. On the flip side, we recorded 4,035 in PCMark 7 with Avast installed versus 4,011 with Windows Defender. If this were a presidential race, it’d be too close to call. Subjectively, surfing the web and opening up programs felt equally snappy regardless of which AV program was running.
Round 5: Protection
Windows Defender needed to pull out a win in this round to keep the race interesting, but it doesn’t have the legs to compete with Avast. Using our own collection of malware, Avast detected twice as many dirty files as Windows Defender, though that might have to do with the way each program counts individual files within an infected archive. In both cases, Malwarebytes detected infections that both Windows Defender and Avast missed. However, Avast is better at detecting zero-day threats and adds a second layer of protection through its automatic sandbox mode, which Windows Defender lacks. Finally, we’re a little wary given that Microsoft’s antimalware engine is having trouble passing certification with AV-Test (www.av-test.org), a well-known independent testing laboratory. All things considered, this crucial round goes to Avast.
And the Winner Is…
Avast wins this bout by taking three of the five categories and tying in another, though it’s not quite as lopsided as it appears. Windows Defender, while not as fully featured as Avast, is capable of blocking common threats, and it doesn’t put a drain on system resources. Avast’s army of defenses is just bigger and better trained to spot danger from more places, like IM clients. It also has a bigger arsenal of weapons.
2. Work in pairs and find out what security program your groupmate’s computer has. Does it function well? If you have different programs, try to persuade your partner to change for yours. Give some reasons.
Text 7
IT ON A SHOESTRING
1. What does the title of the text mean? Choose the right variant:
a) Making bussiness with IT specialists;
b) Creating new IT;
c) Hiring IT staff for little money.
2. Read the text and match the paragraphs (A-F) with the headings. One heading is odd.
1) Networking; 2) Storage & Communications; 3) DIY Security; 4) Do IT Right; 5) Recent developments; 6) All IT Entails; 7) Mobile Devices.
No IT Staff? No Problem
Many small businesses, startups, and SOHO operations don't have the cash flow to hire a dedicated staff of IT (information technology) specialists, or even a single person tasked with handling the more technical aspects of running a business. In this article we'll describe some steps you can take to ensure that your business can compete effectively with organizations that do have dedicated staffs.
a) __________ IT is a catch-all phrase that encompasses email, phone systems, mobile devices, networking and the Internet, customer relationship management (CRM), desktop PCs, security, the software required to keep all of the above operational, and the business software required to perform any and all business-related functions. No 21st-century organization can function without most of what IT brings to the table. In order to keep up with your competitors, you need IT, and there are numerous third-party products and services out there designed to help you meet those needs without actually hiring a dedicated staff.
b) __________ The most valuable assets of most businesses are digital, which makes them vulnerable to cyber theft, disgruntled employees with a thumb drive and an axe to grind, or just unwitting employees who are unaware that their actions are putting the company at risk. Widely available business-centric security suites are characterized by proactive technologies that block Web threats, malicious links, spam, and viruses; thwart hackers and cybercriminals; and prevent data loss. You can find advanced security software that lets non-tech-inclined users tackle the securing of mail servers, PCs, and Macs; cloud-based security solutions that effectively outsource the secure management of the digital assets; and security clients that you can install on PCs, Macs, and mobile devices to easily manage security on a device-by-device basis.
c) __________ Have more employees, printers, and servers than can connect to a single consumer-centric router? Then you need something designed to handle the rigors of a small business. But that opens up even more vexingly complex questions, such as: Do you need a router, a switch, or a managed switch? Thankfully, many networking product manufacturers have tools aimed squarely at folks in your same situation—routers, switches, and managed switches that support as few as four wired Ethernet ports and up to as many as you need. Some small-business networking gear also features Wi-Fi with advanced security and encryption technologies and many even support the ability to tap into 3G/4G cellular networks. Best yet, many of these products are built with ease-of-use and minimal maintenance in mind.
d) __________ Enterprises have long known about the benefits of mobile devices in the workplace, but even small businesses can benefit from the increased productivity that comes with your employees using tablets and smartphones. It's important to develop policies around these devices and to take advantage of the multitude of tools that let you retain some control over the apps that are installed and sites that are accessed. Another important consideration is the increased network load you'll experience once your work force is fully unwired.
e) __________ Your organization's email, telephony, data sharing, video conferencing, and instant messaging platforms don't necessarily have to be separate systems. Unified communications providers that once catered exclusively to large enterprises now offer pay-as-you-go packages that are ideal for small businesses. Almost all cloud-based storage service providers now offer tiered plans that let you expand or contract your storage needs as needed, so on-site servers are no longer necessary. These outsourced products also benefit from enterprise-grade fail-safes and expert technical assistance, should the need arise.
f) __________ While it may have been unheard of just five years ago, running your business without a dedicated IT staff is not only possible, but sometimes even preferable for small organizations. Currently, almost any technology available to enterprises also has a pay-as-you-go option that's sure to meet your needs and keep your business going in the right direction.