- •Оглавление
- •Введение
- •Unit 1 Operating Systems
- •1. Translate the following words and word combinations without a dictionary:
- •Remember the following words and word combinations:
- •3. Read and translate the text
- •Volume Label
- •Translate the following words from English into Russian:
- •Translate from Russian into English
- •3. Answer the following questions:
- •4. Say if these sentences are true or false. If they are false give the correct statement.
- •5. Fill in the gaps with proper words:
- •Windows
- •1. Translate the following words and word combinations without a dictionary:
- •Remember the following words and word combinations:
- •3. Read and translate the text
- •Give the Russian equivalents.
- •Give the English equivalents
- •3. Match the synonyms:
- •Answer the following questions
- •Fill in the gaps with proper words
- •7. Insert the correct preposition.
- •8. Translate the sentences using the Infinitive:
- •Here are the answers. Ask the questions.
- •10. Speak about Windows. Unit 2 Software Engineering
- •Remember the following words and word combinations:
- •Read the international words and guess their meaning:
- •3. Read and translate the text:
- •4. Give the Russian equivalents to the following words and phrases:
- •5. Give the English equivalents to the following words and phrases:
- •6. Answer these questions about the text:
- •7. Say if these sentences are true or false. If they are false give the correct statement.
- •8. Fill in the gaps with proper words:
- •9. Match the synonyms
- •11. Look back in the text and find words that have a similar meaning to:
- •12. Here are the answers. Ask the questions
- •13. Choose the correct answer:
- •13. Use the appropriate form of Gerund instead of verbs given in brackets and insert prepositions where necessary:
- •4. Translate into English:
- •2. Read and translate the text about the Internet
- •3. Make the sentences of your own using the following words and word combinations.
- •4. Answer the questions according to the text content.
- •5. Complete the following definitions:
- •6. Speak on the following services and resources provided by the Internet:
- •Unit 4 Database management systems
- •Remember the following words and word combinations:
- •2. Translate the following words and word combinations using a dictionary:
- •3. Read and translate the text:
- •8. Match the antonyms
- •9. Look back in the text and find words that have a similar meaning to:
- •10. Here are the answers. Ask the questions
- •11. Translate into English:
- •Unit 5 Data Security
- •2. Read the international words and guess their meaning:
- •3. Read and translate the text:
- •4. Give the Russian equivalents to the following words and phrases:
- •5. Give the English equivalents to the following words and phrases:
- •6. Answer these questions about the text:
- •7. Say if these sentences are true or false. If they are false give the correct statement.
- •8. Choose the correct answers:
- •9. Describe some crime in the field of computing.
7. Say if these sentences are true or false. If they are false give the correct statement.
1) There are a few different crimes that can be committed in computing.
2) Spreading viruses is distributing programs that can reproduce themselves and are written with the purpose of causing damage.
3) A computer virus is a program that can reproduce itself
4) A computer virus infects itself attaching to other programs.
5) A JUMP command is a command that changes the normal instruction sequence in a program.
6) Viruses normally attach themselves to application programs.
7) A virus is loaded into memory and then becomes memory resident.
8) When the virus is triggered, it operates all the programs on the computer.
9) A virus usually has two main parts.
10) A program that has a payload but does not have a reproduction routine is known as a Trojan.
8. Choose the correct answers:
The different crimes can be __________ in the field of computing.
made b) commited c) done
Spreading viruses is distributing programs that can _________ themselves.
a) reproduce b) repeat c) create
Viruses are written with the purpose of causing a computer to __________ in an unusual way.
a) compute b) look c)behave
4. Hacking means gaining __________ access to a network system.
a) unauthorized b) fast c) authorized
5. Salami shaving is manipulating programs or data so that small amounts of ________ are deducted from a large number of transactions or accounts and accumulated elsewhere.
a) money b) time c) memory
6. The victims of salami shaving are often unaware of the crime because the amount taken from any individual is so ________.
a) large b) small c) good
7. Denial of service ______ is swamping a server with large numbers of requests.
a) operation b) attack c) access
8. Trojan horse is a technique that involves adding concealed _________ to a computer program so that it will still work but will also perform prohibited duties.
a) programs b) routines c) instructions
9. In other words, it appears to do something useful but actually does something ____________ in the background.
a) destructive b) pleasant c) impressive
10. Trapdoors is a technique that involves leaving, within a completed program, an _________ program that allows unauthorised -and unknown – entry.
a) new b) illicit c) obvious
11. Mail bombing is inundating an email address with thousands of _____________, slowing or even crashing the server.
a) messages b) papers c) letters
12. Software piracy means unauthorised __________ of a program for sale or distributing to other users.
a) copying b) deleting c) installing
13. Piggybacking means using another person's identification code or using that person's files before he or she has ________.
a) switched off b) logged off c) turned on
14. Spoofing is tricking a user into revealing ______information such as an access code or a credit-card number.
a) proper b) illegal c) confidential
15. Defacing is changing the information shown on another person's ________.
a) computer b) screen c) website
16. Hijacking is anyone trying to visit a certain site elsewhere.
a) redirecting b) reproducing c) reporting
17. A computer virus is a very small routine that ______ a computer system and uses its resources to reproduce itself.
a) infects b) operates c) runs
18. A computer virus often infects a computer system by _________ the operating system.
a) detecting b) patching c) finding
19. A computer virus sometimes causes harm to the _____ computer system.
a) host b) original c) whole
20. When the user runs an infected program, it is loaded into memory carrying the virus.
a) memory b) cache c) buffer
21. The virus uses a common programming technique to stay ________ in memory.
a) dominant b) constant c) resident
22. A virus can then use a ________ routine to infect other programs.
a) trigger b) misdirection c) reproduction
23. The virus may also contain a payload that remains dormant until a ______ event activates it.
a) some b) trigger c) new
24. The payload can do something relatively harmless such as __________ a message on the monitor screen
a) displaying b) sending c) writing
25. The payload might also do something more destructive such as deleting files on _________ .
a) the hard disk b) the floppy disks c) folders
26. When it infects a file, the virus replaces the first instruction in the host program with a command that changes the normal _________ sequence.
a) running b) execution c) repair
27. This type of command is called a ______ command and causes the virus instructions to be executed before the host program.
a) EXE b) JUMP c) COM
28. The virus then returns ______to the host program which then continues with its normal sequence of instructions and is executed in the normal way.
a) control b) operation c) command
29. To be a virus, a program only needs to have a reproduction routine that _________ it to infect other programs.
a) does b) help c) enables
30. Viruses can, however, have ____ main parts.
a) four b) three c) five
31. A misdirection routine enables it to ________ itself.
a) lose b) hide c) provide
32. A reproduction routine allows it to ______ itself to other programs.
a) copy b) protect c) show
33. A trigger causes the ________ to be activated at a particular time or when a particular event takes place
a) program b) routine c) payload
34. A payload may be a fairly ______ joke or may be very destructive.
a) nice b) funny c) harmless
35. A program that has a payload but does not have a reproduction routine is known as a _______.
a) macro virus b) Trojan c) Love Bug