Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
COMPUTING.docx
Скачиваний:
5
Добавлен:
11.09.2019
Размер:
45.41 Кб
Скачать

4. Put the question to the bold-typed expression:

Many microcomputers function under the control of a disk operating system known as DOS.

5. Rewrite the sentence into the Past Indefinite Tense:

The operating system allocates control to each terminal in turn.

6. Make up the sentence using the following words:

be, plugged, also, into, can, a station, Laptops, docking

7. Find 2- sentences in the Passive Voice and write them down.

8. Find 3 - irregular verbs write them down and give the 3 forms.

9. Find two adjectives, put them in the Comparative Degree and the Superlative Degree, and write them down.

10. Rewrite the sentence using the Passive Voice:

The operating system allocates control to each terminal in turn.

  1. Read and translate the text into your own language.

(Look carefully at the tenses before you start)

Is your home computer a target?

Is your home computer a popular target for computer robbers? Why? It is so, because intruders want what you have stored there. The look for the numbers of your credit cards, bank account information, and anything else they can find. By stealing that information, all thefts can use your money buying themselves goods and services.

But they need not only the money- related information. These thefts also want your computer; it means your hard disk space, your fast processor, and your internet connection. They use resources to attack other computers on the Internet. In fact the more computers an intruder uses, the harder it is for law enforcement to find out where the attack is really coming from. If they can’t be found, they can’t be stopped, and they can’t be prosecuted and imprisoned.

Why do criminals pay attention to home computers? Home computers are typically not very secure and are easy to break into. When combined with high speed Internet connections that are always turned on, they can quickly find and then attack home computers. While thefts also attack home computers connected to the Internet through dial-in connections, high-speed connections (cable modems and DSL modems) are a favorite target.

No matter how a home computer is connected to the Internet, attacks of such people are often successful. Many home computer owners don’t realize that they need to pay attention to computer security. In the same way that you are responsible for having insurance when you drive a car, you also need to be responsible for your home computer’s security. The purpose is to keep computer robbers and their programs off your computer.

How do they break into your computer? In some cases, they send you an e-mail with a virus. When you read such e-mail you activate the virus, creating an opening that use to enter or access your computer. In other cases, they take advantage of a defect or weakness

In one of your computer’s programs a –vulnerability – to gain access.

Once they are on your computer, they often install new programs that let them continue using your computer – even after you closed all the holes they used to get into your computer in the first place. These backdoors are usually cleverly disguised so that they blend in with the other programs running on your computer.

Grammar tasks to the text “Is your home computer a target?”

1.Translatethefollowingwords:

ввод,счетнаямашина, заразить файлы, выдавать данные

2.Make the following sentence negative:

The purpose is to keep computer robbers and their programs off your computer.

3.Make the following sentence positive:

Many home computer owners don’t realize that they need to pay attention to computer security.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]