- •Оглавление
- •Введение
- •Unit 1 Operating Systems
- •1. Translate the following words and word combinations without a dictionary:
- •Remember the following words and word combinations:
- •3. Read and translate the text
- •Volume Label
- •Translate the following words from English into Russian:
- •Translate from Russian into English
- •3. Answer the following questions:
- •4. Say if these sentences are true or false. If they are false give the correct statement.
- •5. Fill in the gaps with proper words:
- •Windows
- •1. Translate the following words and word combinations without a dictionary:
- •Remember the following words and word combinations:
- •3. Read and translate the text
- •Give the Russian equivalents.
- •Give the English equivalents
- •3. Match the synonyms:
- •Answer the following questions
- •Fill in the gaps with proper words
- •7. Insert the correct preposition.
- •8. Translate the sentences using the Infinitive:
- •Here are the answers. Ask the questions.
- •10. Speak about Windows. Unit 2 Software Engineering
- •Remember the following words and word combinations:
- •Read the international words and guess their meaning:
- •3. Read and translate the text:
- •4. Give the Russian equivalents to the following words and phrases:
- •5. Give the English equivalents to the following words and phrases:
- •6. Answer these questions about the text:
- •7. Say if these sentences are true or false. If they are false give the correct statement.
- •8. Fill in the gaps with proper words:
- •9. Match the synonyms
- •11. Look back in the text and find words that have a similar meaning to:
- •12. Here are the answers. Ask the questions
- •13. Choose the correct answer:
- •13. Use the appropriate form of Gerund instead of verbs given in brackets and insert prepositions where necessary:
- •4. Translate into English:
- •2. Read and translate the text about the Internet
- •3. Make the sentences of your own using the following words and word combinations.
- •4. Answer the questions according to the text content.
- •5. Complete the following definitions:
- •6. Speak on the following services and resources provided by the Internet:
- •Unit 4 Database management systems
- •Remember the following words and word combinations:
- •2. Translate the following words and word combinations using a dictionary:
- •3. Read and translate the text:
- •8. Match the antonyms
- •9. Look back in the text and find words that have a similar meaning to:
- •10. Here are the answers. Ask the questions
- •11. Translate into English:
- •Unit 5 Data Security
- •2. Read the international words and guess their meaning:
- •3. Read and translate the text:
- •4. Give the Russian equivalents to the following words and phrases:
- •5. Give the English equivalents to the following words and phrases:
- •6. Answer these questions about the text:
- •7. Say if these sentences are true or false. If they are false give the correct statement.
- •8. Choose the correct answers:
- •9. Describe some crime in the field of computing.
2. Read the international words and guess their meaning:
variety [və΄rаiəti], crime, hacking [΄hæki ŋ], manipulate [mə΄nipjuləit], accumulate [ə΄kju:mjuleit], attack [ə΄tæk], individual [indi΄vidjuəl], technique [tek΄nik], destructive [dis΄trktiv], piracy [΄pаiərəsi], bomb [b m], address [ə΄dres], server [΄sə:və], credit card, copy [΄k pi], site, activate
3. Read and translate the text:
There are a variety of different crimes that can be committed in computing. Spreading viruses is distributing programs that can reproduce themselves and are written with the purpose of causing damage or causing a computer to behave in an unusual way.
Hacking means gaining unauthorised access to a network system.
Salami shaving is manipulating programs or data so that small amounts of money are deducted from a large number of transactions or accounts and accumulated elsewhere. The victims are often unaware of the crime because the amount taken from any individual is so small.
Denial of service attack is swamping a server with large numbers of requests.
Trojan horse is a technique that involves adding concealed instructions to a computer program so that it will still work but will also perform prohibited duties. In other words, it appears to do something useful but actually does something destructive in the background.
Trapdoors is a technique that involves leaving, within a completed program, an illicit program that allows unauthorised -and unknown – entry.
Mail bombing is inundating an email address with thousands of messages, slowing or even crashing the server.
Software piracy means unauthorised copying of a program for sale or distributing to other users.
Piggybacking means using another person's identification code or using that person's files before he or she has logged off (disconnected from a network account).
Spoofing is tricking a user into revealing confidential information such as an access code or a credit-card number.
Defacing is changing the information shown on another person's website.
Hijacking is redirecting anyone trying to visit a certain site elsewhere.
4. Give the Russian equivalents to the following words and phrases:
to cause damage, to behave in an unusual way, salami shaving, transaction, to be unaware, denial of service attack, swamping, large numbers of requests, concealed instruction, mail bombing, illicit program, piggybacking, defacing, hijacking, prohibited
5. Give the English equivalents to the following words and phrases:
совершать преступление, несанкционированный доступ, счет, выходить из сети, имитация соединения, код доступа, среда для хранения (информации), распространять вирусы, другими словами, лазейка, нарушение авторских прав на программное обеспечение
6. Answer these questions about the text:
Are there many crimes that can be committed in computing? Enumerate them.
What does spreading viruses mean?
What is hacking?
Why are victims of salami shaving often unaware of this crime?.
What does denial of service attack mean?
Is Trojan horse a harmful program? Why?
What kind of technique are trapdoors?
Why is mail bombing destructive?
9) What does software piracy mean?
10) What is piggybacking?
11) What kind of information is revealed during the process of spoofing?
12) What kind of information is changed when defacing?
13) What is hijacking?