Заглавная страница Избранные статьи Случайная статья Познавательные статьи Новые добавления Обратная связь FAQ Написать работу КАТЕГОРИИ: АрхеологияБиология Генетика География Информатика История Логика Маркетинг Математика Менеджмент Механика Педагогика Религия Социология Технологии Физика Философия Финансы Химия Экология ТОП 10 на сайте Приготовление дезинфицирующих растворов различной концентрацииТехника нижней прямой подачи мяча. Франко-прусская война (причины и последствия) Организация работы процедурного кабинета Смысловое и механическое запоминание, их место и роль в усвоении знаний Коммуникативные барьеры и пути их преодоления Обработка изделий медицинского назначения многократного применения Образцы текста публицистического стиля Четыре типа изменения баланса Задачи с ответами для Всероссийской олимпиады по праву Мы поможем в написании ваших работ! ЗНАЕТЕ ЛИ ВЫ?
Влияние общества на человека
Приготовление дезинфицирующих растворов различной концентрации Практические работы по географии для 6 класса Организация работы процедурного кабинета Изменения в неживой природе осенью Уборка процедурного кабинета Сольфеджио. Все правила по сольфеджио Балочные системы. Определение реакций опор и моментов защемления |
Match these words-processing terms with their definitions.↑ Стр 1 из 8Следующая ⇒ Содержание книги
Поиск на нашем сайте
Англійська мова Методичні вказівки до практичних занять для студентів IV курсу спеціальності «Інформаційні технології проектування»
КИЇВ КНУТД 2010
Англійська мова: методичні вказівкидо практичних занять для студентів ІV курсу спеціальності «Інформаційні технології проектування» / Укладачі: Л.Г.Захарова – К. КНУТД, 2010 – 64 с. – Англійська мова
Упорядник: Захарова Л.Г.
Відповідальний за випуск: Т.В. Барамикова, к.ф.н., доцент, зав.кафедрою іноземних мов ф-ту ТЛП
CONTENTS Introduction Warm up activities....................................................................................4 Quiz..........................................................................................................5 Unit 1 Job opportunities........................................................................................6-13 Text A Information technology.................................................................7 Text B What does a system administrator do?.........................................9 Text C Programmers..............................................................................11 Communicative skills.........................................................................11-12 Unit 2 Operating system......................................................................................14-19 Text A What is an operating system?.....................................................14 Text B Warm boot...................................................................................17 Text C Understanding Filenames...........................................................18 Communicative skills..............................................................................18 Unit 3 Electronic communications......................................................................19-25 Text A Channels of communication........................................................19 Text B Data transmission........................................................................22 Text C Modems.......................................................................................23 Communicative skills..............................................................................23 Unit 4 World Wide Web......................................................................................25-32 Text A The World Wide Web.................................................................25 Text B Internet software..........................................................................29 Text C Yahoo! A guide to everything.....................................................30 Communicative skills..............................................................................31 Unit 5 Security......................................................................................................32-37 Text A Computer security.....................................................................32 Text B The first hackers.........................................................................35 Text C Biometrical and high-tech crime.................................................36 Communicative skills..............................................................................36 Unit 6 Viruses.......................................................................................................37-46 Text A How computer viruses work.......................................................38 Text B Spyware.......................................................................................42 Text C Cookies........................................................................................43 Communicative skills..............................................................................44 Unit 7 Copyright law............................................................................................46-52 Text A Software security.........................................................................47 Text B Copyright law.............................................................................50 Text C Copyleft.......................................................................................51 Communicative skills..............................................................................51 Unit 8 Artificial intelligence and Robotics.........................................................52-57 Text A Artificial Intelligence..................................................................53 Text B The Robotic arm..........................................................................56 Text Robots.............................................................................................57 Communicative skills..............................................................................57 Tapescripts Keys Introduction Warm up activity 1a. Do you have a compute at home? b. What kind of compute do you have?
2a. Do you want a new computer? b. What kind of computer do you want?
3a. Do you like to play computer games? b. What computer games do you like to play?
4a. Do you use e-mail? b. How often do you use e-mail?
5a. Do you think computers are important for students? b. Why do you think computers are important for students?
6a. Do you want a job that uses computer? b. What kind of job do you want?
7a. Can you use at least three types of software? b. What types of soft ware can you use?
8a. Do you ever surf the Web? b. What websites do you visit?
Match these words-processing terms with their definitions.
Click file(document) cursor window highlight menu icon word processor
New Cut and Paste Copy Close print Open Save Save as
Quiz CPU What does CPU stand for? Core processing unit Computer processing unit Central processing unit
When was the first CPU introduced?
Out of what material are computer chips made? Plastic Silicon Metal
The width of the smallest wire on a computer chip is typically measured in: Millimeters Microns Nanometers
Which of the following is not part of a computer chip's job? Performing mathematical operations Moving data from one memory location to another Starting up the computer
To what do buses and lines connect in a computer chip? ROM RAM ROM and RAM
What does ROM stand for? Read-only memory Random-only memory Read-on memory
On a PC, what do the BIOS (Basic Input/Output System) instructions do? Load the operating system Open latches Test hardware in the machine
Computer chip designers create language instructions that the microprocessor reads. What part of the computer can translate the words from the instructions into bit patterns the chip can understand? The assembler The program counter The ALU
About how much address space can a 64-bit microprocessor access? 4 GB 1,000 GB One billion GB Unit 1 Topic: Job opportunities
I Reading skills Read and translate the following text into Ukrainian Information technology Information technology (IT), as defined by the Information Technology Association, is "the study, design, development, implementation, support or management of computer-based, information systems particularly software applications and computer hardware." IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information. Today, the term information technology has ballooned to encompass many aspects of computing and technology, and the term has become very recognizable. IT professionals perform a variety of duties that range from installing applications to designing complex computer networks and information data bases. A few of the duties that IT professionals perform may be included: data management, networking, engineering, computer hardware, database and software design, as well as the management and administration of entire systems. When computer and communications technologies are combined, the result is information technology, or "infotech". Information technology is a general term that describes any technology that helps to produce, manipulate, store, communicate, and/or disseminate information. Presumably, when speaking of Information Technology (IT) as a whole, it is noted that the use of computers and information are associated. Computing is usually defined as the activity of using and developing computer technology, computer hardware and software. It is the computer-specific part of information technology. Computer science (or computing science) is the study and the science of the theoretical foundations of information and computation and their implementation and application in computer systems. Computer programming in general is the process of writing, testing, debugging, and maintaining the source code and documentation of computer programs. This source code is written in a programming language, which is an artificial language, restrictive, demanding, and unforgiving to humans but easily translated by the computer. The purpose of programming is to invoke the desired behavior (customization) from the machine. The process of writing high quality source code requires knowledge of both the application's domain and the computer science domain. The highest quality software is thus developed by a team of various domain experts, each person a specialist in some area of development. But the term programmer may apply to a range of program quality, from hacker to open source contributor to professional. And a single programmer could do most or all of the computer programming needed to generate the proof of concept to launch a new “killer” application.
Complete the sentences. 1. IT deals with the use of electronic computers and.... 2...., and the term has become very recognizable. 3. … are combined, the result is information technology, or “infotech” 4. Computing is usually defined as the activity of.... 5. The purpose of programming is.... 6.... requires knowledge of both the application's domain and the computer science domain.
True or false statements. 1. IT deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information. 2. When computer and communications technologies are combined, the result is computer science. 3. Computer science (or computing science) only is the study and the science of the theoretical foundations of information and computation. 4. This source code is an artificial language. 5. The term programmer may apply to a range of program quality, from hacker to open source contributor to professional, who could do most or all of the computer programming.
III Rendering IV Comprehensive skills
Read and remember
True or false statements. 1. The programmer prepares the instructions of a computer program and runs, tests, and corrects the programs. 2. A programmer typically does not interact with a variety of people. 3. Programmers help the users weed out errors in existing programs. 4. If you were a programmer, you might have coordination meetings to evaluate your work.
V Communicative skills
VI Additional task. 1. If you decide to apply for a job in the western countries, you will probably need to form two documents: a letter of interest and a resume. This is a way to do it. In your resume, you should:
Include you contact information (address, e-mail address, if any) Provide your educational background List your professional and search experience Indicate significant honours and accomplishments Describe your skill and language knowledge
Sample
Unit 2 Topic: Operating system
I Reading skills Complete the sentences. 1. A (an)... is a program that controls the flow of information within a computer system. 2. Many computers can use.... 3...., whereas PC-DOS is predominantly available for only IBM brand computers. 4. New and revised versions of DOS have developed as computer.... 5. The operating system controls... on a disk and the... that information.
True or false statements. 1. The operating system controls the saving of information on a disk and the retrieval of that information. 2. Because the operating system plays such an important role in a computer, leaning the basics of the operating system is important. 3. Only operating system MS-DOS remains the most common and most widely used. 4. Each new version of DOS may be described as upwardly compatible. 5. New and revised versions of DOS have developed as computer software technology has advanced.
III Rendering Warm boot To start a computer, you must load the operating system into memory. To boot means to turn the computer on and load DOS into memory. Therefore, booting a computer is loading the operating system into computer. With DOS there are two methods for booting a computer. The first is known as a cold boot. A cold boot is the process of inserting a DOS disk into a disk drive, or making sure that DOS resides on the hard disk, and then turning on the computer. It is called a cold boot because the process begins when power to the computer is turned on. The second type of boot is known as a warm boot. In a warm boot, DOS is loaded while power to the computer is on. In other words, the computer is already on and warned up when DOS is reloaded. Warm boots are faster than cold boot. Sometimes operating a computer requires you to reload DOS. If the computer locks up and cannot process information, it is necessary to reboot the computer. One method is to turn the computer off and back on – cold boot. However, a cold boot may take quite some time, because DOS begins a serial of system checks. To speed up the booting progress, a warm boot only clear all memory and then reloads DOS. A warm boot does not start the series of system checks. As a general rule, use warm boots whenever there is already power to the computer. This reduces wear and tear on the hardware and is faster and more efficient. After the computer is successfully booted, a DOS prompt is displayed on the monitor. The DOS prompt has two components: a letter and a symbol. The letter indicates which drive is active. To change active drive, type the letter of the desired drive followed by a colon. The colon tells that the letter refers to a disk drive. Two types of commands are available in DOS: external commands and internal commands. Internal commands are loaded into memory each time the computer is booted. External commands must be activated from the DOS directory or the DOS disk. So they are external because they are not loaded into memory with COMMAND.COM; rather, each desired external commands must be loaded into memory separately. When you boot the computer, DOS asks for the current date and time. Both the date and the time can be set from any DOS prompt. Date and Time are internal DOS commands. To change the date or the time, enter the time or date in the prescribed format after entering the DATE or TIME command. You can also learn what DOS prompt, type VER to display the active version of DOS and the specific type of DOS (that is PC-DOS or MS-DOS).
IV. Comprehensive skills Read and remember.
True or false statements. 1. For information to be organized on a disk, every file must have a name. 2. DOS names for file consist of two parts. 3. Filenames may contain from one to eighteen characters. 4. Data files contain executable instructions. Program files contain information used by program files.
V Communicative skills Operating systems Macintosh Most of the Mac OS code is the ROM chips. These contain hundred routines (sequences of instructions) which perform such tasks as starting up the computer, transferring data from disks to peripheries and controlling the RAM space. Large parts of the Mac OS are also inside the System file and the Finder kept in the System folder. The content of the System file is loaded automatically at start-up and contains information which modifies the routines of the OS in the ROM chips. The Finder displays the Macintosh desktop and enables the users to work with disk programs and files. It allows multitasking. It has an Internet set up assistant, an e-mail program and a Web browser. UNIX The operating system designed by Bell Laboratories in the USA for minicomputers, has been widely adopted by many corporate installations. From the very first, it was designed to be a multitasking system. It is written by C language. It has become an operating environment for software development, available for any type of machine from IBM PS/2s to Macs to Cray supercomputers. UNIX is the most commonly used system for advanced CAD programs. Java Java refers to a number of computer software products and specifications from Sun Microsystems. Together they provide a system for developing application software and deploying it in a cross-platform environment. It is used in a wide variety of computing platforms from embedded devices and mobile phones on the low end, to enterprise servers and supercomputers on the high end. Its applets are often used to provide improved and secure functionalities while browsing the World Wide Web. Writing in the allied name of programming language is the primary way to produce code that will be deployed as Java bytecode. On November 13, 2006, Sun Microsystems made the bulk of its implementation of Java available under the GNU General Public License.
Write your own one description for Vista, Windows, or Linux. Mention its main tasks and characteristics, what for it was worked out, by whom and where and express your own attitude about its benefits. Unit 3 I Reading skills Channels of communication Telecommunication refers to the transmission of information over long distances using the telephone system, radio, TV satellite or computer links. But in modern world telecommunications mainly means transferring information from one PC to another via modem and phone lines or fibre-optic cables. Modern telecommunications use fibre-optic cable because data can be transmitted at a very high speed through the extremely wide bandwidths of glass fibres. The fibre system operates by transmitting light pulses at high frequencies along the glass fibre. This offers considerable advantages: the cables require little physical space, they are safe because they don’t carry electricity and they avoid electromagnetic interface. Network on different continents can also be connected via satellite. Computers are connected by a modem either to ordinary telephone wires of fibre-optic cables, which are linked to a dish aerial. This aerial has a large concave reflector for a reception and sending of signals. Then, when signals are received by the satellite, they are amplified and sent on workstation in another part of the world. A modem is your computer’s link to the external world. With a modem, you can exchange e-mail and files with friends and colleagues; access the Web and search for information about the current affairs, entertainment, participate in newsgroups and live conversations, make bank transactions and buy things from the comfort of your home. You can also access your office from your computer at home or your laptop in a hotel room. Today a lot of companies find it more efficient to have some employees doing their work at home. Using a modem, they transfer their work into the office where it is printed and distributed. The list of applications is endless. To implement such work you need PC or a terminal, a modem connected to the computer and the telephone line, and communication software. Once you have installed and configured your modem, you can communicate with people through bulletin boards and online services. Bulletin board systems (BBS) are frequently free because they are run by enthusiasts and sponsored by user groups or small businesses. The first time you make a BBS connection you are required to register your name, address, phone number and other information such as the kind of computer and modem you are using. The person who administers the BBS is called sysop (system operator). We can use a BBS to download artwork, games and programs, or participate in ongoing discussions. You can also upload (send) programs, but make sure they are shareware or public domain programs. To gain access to the Internet one must first open an account with an Internet service provider (ISP) or a commercial online service provider. Internet service providers usually offer access to the Web and newsgroups, an e-mail address, a program to download files from FTP sites, and IRC software so that one can have live charts with other users. Most ISPs charge a flat monthly or annual fee that gives you unlimited access to the Internet. Commercial online services differ from dedicated ISPs in two ways: they use a smooth, easy-to-use interface, and they have extra services for members only.
Complete the sentences. 1. But in modern world telecommunications mainly means.... 2.... by transmitting light pulses at high frequencies along the glass fibre 3. …, you can communicate with people through bulletin boards and online services. 4. We can use a BBS to.... 5. Internet service provide usually offer access to....
True or false statements. 1. Modern telecommunications use only TV cable because data can be transmitted at a very high speed through the extremely wide bandwidths of glass fibres. 2. A telephone is your computer’s link to the external work. 3. To gain access to the Internet one must first open a bank account. 4. Bulletin board systems (BBS) are frequently free because they are run by enthusiasts and sponsored by user groups or small businesses. III Rendering IV. Comprehensive skills Read and remember
True or false statements. 1. A modem can demodulate the analogue signal. 2. A modem is a device that allows remote computers to communicate, to transmit and receive data using telephone lines. 3. An internal modem boards can not be installed in a personal computer as standard equipment. 4. The advantage of an external direct-connected modem is that can be connected to any phone, but the transmission quality may suffer since they are not connected directly to the telephone line.
V. Communicative skills VI Additional task. Ex 1. Imagine that you are proposed to write an article ‘‘Are computers and new technologies a blessing or a curse?’’. Before to start discuss a group of questions with your groupmates. 1. What kind of article would you write? 2. Who is going to read your article? 3. What paragraph plan would you follow? 4. Would you use formal or informal style? Why? 5. Would it be necessary to state your opinion in both the first and final paragraphs? 6. What phrases would you use to state your opinion? 7. What linking words/phrases would you use to: list points; add more points; introduce conflicting viewpoints? 8. Would you use examples and/ or reasons to support your view? 9. Would you use topic sentences? If yes, in which paragraphs? 10. Which techniques would you use in the first and last paragraphs to attract the readers’ attention and make them want to continue reading? 11. Which of the following arguments could you use in your article? Tick (√) a. Computers have proved to be an efficient tool in the learning process b. Having a mobile phone can be vey expensive. c. Computers and new technologies are extremely valuable in one’s workplace. d. Studying to become a doctor requires a great deal of time and money. e. Many problems have been caused because of wide use of electronic communications in the workplace.
Unit 4 Topic: The World Wide Web I Reading skills The World Wide Web The land around Geneva in the Swiss Alps is beautiful mountain countryside. But among the farms and lakes and the hotels, there are also some of the largest, most powerful and most expensive scientific tools on Earth. This is the home of CERN, Europe’s centre for research into high-energy physics. It is not of the type of scientific lab that produces practical inventions. But there, in 1989, Tim Berners-Lee invented the World Wide Web. Tim is an English engineer with computers in his blood: both of his parents worked on the first commercial computer made in Britain. In 1980 Tim got a job at CERN for six month, and during this time he wrote a program called ‘’Enquire Within’’. Enquire Within was new because it could organize information according to the content of documents, not where they could be found. It was ‘’’hypertext’’. A hypertext is a special kind of text that is intended to give more freedom to the reader (and the writer). It contains links that lead to other places, but also to pictures or programs or musical recordings. There is no single path through a hypertext. Readers can choose the path that suits them best. It was possible to get something from distant computers at this time. But you had to be a computer expert to do it. In 1989, when Tim was again working at CERN, he decided to try to make communication between scientists easier. In October 1989, Tim started writing that he called “ World Wide Web’’. When you were reading something interesting on the computer screen, you could just choose a phrase and link it to another document. Then you just needed to hit a “hot key’’ and other document appeared on screen. Today the World Wide Web – or simply the “Web’’ – is all the billions of documents on millions of computers that can be read by the ‘’browsers’’ that have followed Tim’s original program. The program used a new invention, a system of addresses. The system means that anything, anywhere on the Internet can have its own special address. The addresses are called “URLs’’. The Web browser understands what to do with anything that has a URL. He also invented a set of rules for sending text and pictures over the Internet. For Web authors, was also created a new computer language called HTML. This is the language in which all Web documents are written. It controls how text and pictures are shown on a computer screen. Together, these inventions changed the world of the Internet. The Internet of the 1980s was a place for computer experts. Since the 1990s anyone with a computer has been able to use it. In 1991, CERN put the browser software on the Internet, so that it was free to anyone who wanted it. Within four years, the World Wide Web was the most popular use of the Net. The browser gave an idea to a group of young programmers in the USA. In just a few years, the business they started would take off and become the fasters-growing company that world has ever seen – Netscape Communications.
Complete the sentences. 1. A hypertext is a special kind of text that.... 2.... he called ‘World Wide Web’. 3. He also invented.... 4. Today the World Wide Web.... 5. The Internet of the 1980s was.... 6.... to a group of young programmers in the USA. 7. In just a few years,... – Netscape Communications.
True or false statements. 1. The born place of WWW is CERN, Geneva. 2. The system means that anything, anywhere on the Internet can have its own special address. 3. In 1989, when Tim was again working at CERN, he decided to try to make collaboration between scientists easier. 4. Today the World Wide Web – or simply the ‘’Web’’ – is all the millions of documents on millions of computers that can be read by the ‘’browsers’’ that have followed Tim’s original program. 5. The browser encouraged a group of young programmers in the USA.
II Retell the text “WWW”. III Rendering Internet software The language used for data transfers on the Internet is known as TCP/IP (transmission protocol/Internet protocol). This is like the Internet operating system. The first program you need is a PPP (point to point protocol) driver. This piece of software allows the TCP/IP system to work with your modem. It deals up your Internet service provider (ISP), transmits your password and log-in name and allows Internet programs to operate. E-mail is your favourite personal connection to the Internet. It allows you to exchange messages with people all over the world. It can include text, pictures, and even audio and animation. When you set up an account with an ISP, you are given a unique address and anyone can send you e-mail. The mail you receive is stored on the server of your ISP until you next connect and download it to your hard disk. Web browsers. The Web is hypertext-based system where you can find news, pictures, games, online shopping, virtual museums, and electronic magazines – any topic you can imagine. You navigate through the Web using a program a “browser”, which allows you to search and print Web pages. You can also click on keywords or buttons that take you to other destinations on the net. This is possible because browsers understand hypertext mark up language (HTML), a set of commands that indicate how a Web page is formatted and displayed. IRC-Internet relay chat – is a system for real time (usually typed) conversation. It’s easy to use. To start a chat session you run an IRC program, which connects you to IRC server – a computer dedicated to IRC. Then you join a channel, which connects you to a single chat area. Next you type a message and the other participants can see it. Internet telephone and video chatting are based on IRC protocols. Videoconferencing programs enable users to talk to and see each other and collaborate. They are used in intranet – company networks that use Internet software but make their Web site accessible only to employees and authorized users. With FTP software you can copy programs, games, images and sounds from the hard disks of a remote computer to your hard disks. Today this utility is built into Web browsers. A Telnet program is used to log directly into remote computer system. This enables you to run programs kept on them and edit files directly. Newsgroups are the public discussion areas which make up a system called “Usenet”. The contents of the newsgroups are contributed by people who send articles (messages) or respond to articles. They are classified into categories comp (computers), misc (miscellaneous), new (news), rec (recreation), soc (society), sci (science), talk and alt (alternative).
IV Comprehensive skills Read and remember
2. Listen to the text “Yahoo! A guide to everything” and try to understand it. True or false statements. 1. Yahoo is no more such a popular guide. 2. Information is no use unless you can find it 3. There were forty main categories in Yahoo! 4. Yahoo! is clever because it is so well organized. 5. Yahoo!’s professional surfers spend all day looking at Web sites to think the site is good, interesting or important, and to add it to Yahoo!’s guide.
V Communicative skills Unit 5 Topic: Security
I Reading skills Computer security What is computer security? We may define it as follows: Security is a system of safeguards designed to protect a computer system and data from deliberate or accidental damage or access by unauthorized persons. That means safeguarding the system against such threats as burglary, vandalism, fire, natural disasters, theft of data for ransom, industrial espionage, and various forms of white-collar crime. Computer installation of any kind can be struck by natural or man-made disasters that can lead to security violations. Your first thoughts might be of the hardware, the computer and its related equipment. But loss of hardware is not a major problem in itself, hardware can be replaced. Loss of software should not be a problem if the organization has heeded industry warning – and used common sense – to make backup copies. A more important problem is the loss of data. Some information industries, such as banking, could literally go out of business in a matter of days if their computer operations were suspended. Replacing lost data can be quite expensive. Now let us consider the security of data is one of an organization’s most important assets. There must be planning for security. Usually, this is done by security offices, who are part of top management. There are several data protection techniques, these will not individually (or even collectively) guarantee security, but at least they make a good start. Common means of protecting data are securing waste, separating employee functions and implementing password, internal control, auditors checks, cryptography, applicant screening, and copy protection (a software and hardware roadblock to piracy). Let us consider some of them. Applicant screening. The weakest link in any computer system is the people in it. At the very least, employers should verify the facts that job applicants list on their resumes to help weed out dishonest applicants before they are hired. Passwords are the secret words or numbers that must be typed on the keyboard to gain access to a computer system. In some installations, however, the passwords are changed so seldom that they become known to many people. And some users even tape paper with their password written on it right on the terminal. Good data protection systems change passwords often and also compartmentalize information by passwords, so that only authorized persons can have access to certain data. Cryptography. Data being sent over communications lines can be protected by scrambling the messages – that is, putting them code that can be broken only by the person receiving the message. The process of scrambling messages is encryption. Software protection can be built into operating system in ways that restrict access to the computer system. If a person does not get access, it is recorded that he or she tried to tap into some area to which they are not authorised. Another form of software protection is a user profile. Information is stored about each user, including the files to which the user has legitimate access.
Complete the sentences. 1. Computer installation of any kind can be struck by.... 2. Loss of software should not be a problem if.... 3.... can be replaced. 4. Common means of protecting data are.... 5. At the very least, employers should.... 6. Good data protection systems.... 7.... by scrambling the messages.... 8. Software protection can be built into....
True or false statements. 1. The process of scrambling a message is called encryption. 2. The lost of hardware is the most serious potential security problem. 3. The strongest link in any computer system is the staff in it. 4. The most reliable ways of protecting data are password and built-in software protection system. 5. One form of software protection system matches a user number against a number assigned to the data accessed.
III Rendering The first hackers Most of us have read about teenage hackers who created programs like viruses that cause havoc when run on computers. Society calls them hackers. The first hackers were students at the Massachusetts Institute of Technology (MIT) who belonged to the TMRC (Tech Model Railroad Club). Some of the members really built model train, but many were more interested in the wires and circuits underneath the track platform. Spending hours at TMRC creating better circuitry was called “a mere hack”, and technically clever circuits. Those members who were interested in creating innovative, stylistic technically clever circuits called themselves (with pride) hackers. During the spring of 1959, a new course was offered at MIT, a freshman programming class. Soon the hackers of the railroad club were spending days, hours, and nights hacking away at their computer, an IBM 704. Instead of creating a better circuit, their hack became creating a faster, more efficient program – with the least number of lines of code. Eventually they formed a group and created the first set of hacker’s rules, called the Hacker’s Ethic. Rule 1. Access to computers – and anything which might teach you something about the way the world works – should be unlimited and total. Rule 2. All information should be free. Rule 3. Mistrust authority – promote decentralization. Rule 4. Hackers should be judged by their hackers, not bogus criteria such as degrees, race, or position. Rule 5. You can create art and beauty on a computer. Rule 6. Computers can change your life for the better. These rules made programming at MIT’s Artificial Intelligent Laboratory a challenging, all-encompassing, endeavour. Just for the exhilaration of programming students in the AI Lab would write a new program to perform even the smallest tasks. The program would be made available to other who would try to perform the same task with fewer instructions. The act of making the computer work more elegantly was, to a bonafide hacker, awe-inspiring. Hackers were given free reign on the computer by two AI Lab professors, who realized that hacking created new insights. Over the years, the AI lab created many innovations: Life, a game about survival; LISP, a new kind of programming languages; the first computer chess game; The Cave, the first computer adventure; and Spacewar, the first video game. Originally, hacker was a term used to describe self-taught, enthusiastic computer user, but the word has become a term of derision. Now, it usually describes a person who gains access to computer systems illegally. Hackers are a real annoyance, but the most serious losses are caused by electronic pickpockets who are a good deal older and not half so harmless.
IV Comprehensive skills Read and remember
True or false statements. 1. US business and government agencies lose more than $1 million a year to hackers and high-tech criminals. 2. Even your kisser has unique lip patterns. 3. The computer doesn’t recognize your voice from a phone. 4. Each method of recognitions has advantages and disadvantages.
V Communicative skills Unit 6 Topic: Viruses I Reading skills How computer viruses work On March 6, 1991, personal computer users all over the world turned on their machines in fear and trepidation. In most cases, nothing unusual happened; the computers started up just fine. But in some cases, a message flashed on the screen and the computer began to erase all files and data stored on the hard disk. What had happened? A virus called Michelangelo had somehow spread throughout the personal computer community around the world. The terms viruses and vaccines have entered the jargon of the computer industry to describe some of the bad things that can happen to computer systems and programs. A virus, as its name suggests, is contagious. It is a set of illicit instructions that passes itself on the other programs with which it comes in contact. It has two parts, which could be called the infector and the detonator. They have two very different jobs. One of the features of the computer virus that separates it from other kinds of computer program is that it replicates itself, so that it can be spread (via flash cards transported from computer to computer, or networks) to other computes. After the infector has copied the virus elsewhere, the detonator performs the virus’s main work. In this case, the Michelangelo virus was spread on IBM and IBM-compatible personal computer by unsuspected users who shared diskettes that carried the virus instructions. Michelangelo was first spotted in Europe in Mach 1990. It was named after the famous artist born on March 6, 1475.Within a year it had spread to the United States and the rest of the world. Whoever created this virus was never caught. But one thing became evident: a virus can strike at any time because few computer systems are totally secure. Unpleasant occurrences like the March 6, 1991, attack of the Michelangelo virus will be with us for years to come. In fact, from now, you need to check your IBM or IBM-compatible personal computer for the presence of Michelangelo before March 6 every year – or risk losing all the data on your hard disk when you turn on you machine that day. And Macintosh uses need to do the same for another intruder, the Jerusalem virus, before each Friday the 13th, or the risk a similar fate for their data. Some types of viruses include the worm, a program that spreads by replicating itself. The bomb, a program intended to sabotage a computer by trigging damage based on certain conditions – usually at a later date. And the Trojan horse, a program that covertly places illegal, destructive instructions in the middle of the otherwise legitimate program. Don’t worry too much about viruses. You may never see one. There are just a few ways to become infected that you should be aware of. The sources seem to be service people, pirated games, putting disks in publicly available PCs with put write-protect tabs, commercial software (rarely) and software distributed over computer bulletin board systems. Many viruses have spread through pirates – illegally copied or broken – games. This is easy to avoid. If you use a shared PC or a PC that has public access, such as one in a college lab or a library, be very careful about putting disks into PC’s drives without a write-protect tab. Carry a virus-checking program and scan the PC before letting it write data onto disks. There are actually two kinds of antivirus programs: virus shield, which defect viruses as they are infecting your PC, and virus scanners, which detect viruses once they’re infected you.
Complete the sentences. 1. A virus called Michelangelo had somehow spread …. 2. … the jargon of the computer industry to describe some of the bad things that can happen to computer systems and programs. 3. Some types of viruses include the worm, …. 4. If you use a shared PC or a PC that has public access, …. 5. …: virus shield, which defect viruses as they are infecting your PC, and virus scanners, which detect viruses once they’re infected you.
True or false statements. 1. A virus is always lethal to your hard disk. 2. Virus shield are more effective than virus scanners. 3. Virus is the name generally given to software that causes malicious alteration of computer files. 4. The virus will spread as soon as you put the infected disk in your PC. 5. Most viruses spread through pirated games. III Rendering Spyware Spyware is any program which secretly gathers user information through the user's internet connection without the user's knowledge. This program may be hidden as a component of freeware or shareware programs that can be downloaded from the Internet. The spyware then transmits the information to someone else. This information is used for many reasons. Some spyware is used strictly for marketing data collection, gathering and transmitting that information on to someone else. Spyware software may be installed legitimately to monitor security or workplace monitoring, and may be installed to maliciously violate the integrity of your computer. Personal information is secretly recorded through many techniques, including logging keystrokes, recording internet web browsing activity, and scanning documents on the computer's hard drive. Purposes range from criminal (theft of passwords and financial information) to the collection of marketing research for targeted advertising. The spread of spyware has led to the development of anti-spyware programs. Its products remove or disable the existing spyware on the computer and prevent installation of any new program. However, a number of companies have added a form of spyware into their products. These are not considered malware (or malicious software) but still monitor for advertising purposes. They are still spyware and it is debatable whether this is a legitimate use of adware/spyware and malware since the user often has no knowledge that these programs have been installed. The user then is unaware of the infringement on their privacy. These programs still use the resources of your computer without your permission. The first recorded use of spyware was on October 16, 1995 in a Usenet post that poked fun at Microsoft's business model. It first was considered hardware for theft purposes. In 2000 it was the term used in a press release for a personal firewall. Since then spyware has taken on its present definition. In 2001 Steve Gibson of Gibson Research realized that advertising software had been installed in his system stealing personal information. He determined the source was adware and he developed the first anti-spyware program, OptOut. Many anti-spyware programs have been written since then. According to a 2005 study by AOL and others, 61% of surveyed users' computers had some form of spyware on them. 92% of surveyed users with spyware reported that they did not know of its presence and 91% reported that they had not given permission for the installation of the program. In 2006 it was found that spyware had become one of the worse security threats to computer systems running Microsoft Windows operating systems. In an estimate based on customer information, 9 out of 10 computers connected to the internet are infected. Windows Internet Explorer is the primary browser attacked because it is the most widely used program and allows spyware access to important parts of the operating system. Some spyware programmers infect a system through security holes in the Web browser or in other software. When you navigate on a web page controlled by the spyware author, the page may contain a code which attacks the browser, forcing the download and installation of the software. The spyware creator knows the security systems, spyware blockers and firewall programs available to us. They continually pursue new methods of attacking your computer. The software programs are written as a means of income for the author. Continually check for spyware and adware on your computer. A spyware free computer operates faster and connects you to the Internet faster than an infected computer. Some computers may become so overrun by these software programs that they fail to operate properly and people resort to taking their computer to be repaired. Sometimes it appears that the computer has a virus, when in fact it is bogged down by spyware. The worse case scenario is having your system totally restored to reverse the problem. The best way to stay free of spyware is to stay up to date on your virus, spyware, adware and malware definitions, have an anti-virus, anti-spyware, firewall program on your computer. Run the security programs daily and stay alert to symptoms. The Internet is meant to be used and enjoyed in spite of the possible problems.
IV Comprehensive skills Read and remember
True or false statements. 1. Cookies cannot read information stored in your computer. 2. Cookies can remember different kinds of personal information, but not such as your password. 3. Someone thinks that cookies are invasion of privacy and harmful for websites privacy. 4. Internet Explorer separate cookies and store them in Temporary Internet Files.
V. Communicative skills Job interview Ex. 1 You need to be prepared for the full spectrum of questions that may be presented during interview. If you have not completed it yet, do it now. Sit down with a friend, a significant other, or your roommate and go through all of the questions. 1. How would you describe your ideal job? 2. Why did you choose this career? 3. When did you decide on this career? 4. What goals do you have in your career? 5. How do you plan to achieve these goals? 6. How do you personally define success? 7. What do you think it takes to be successful in this career? 8. If you had to live your life over again, what one thing would you change? 9. Would you rather work with information or with people? 10. Are you a team player? 11. What motivates you? 12. Why should I hire you? 13. Are you a goal-oriented person? 14. What are your short-term goals? 15. What is your long-range objective? 16. What do you see yourself doing five years from now? 17. Where do you want to become ten years from now? 18. Do you handle conflict well? 19. Have you ever had a conflict with a boss or professor? How did you resolve it? 20. What major problem have you had to deal with recently? 21. Do you handle pressure well? 22. Why did you choose to attend your college? 23. Who were your favourite professors? Why? 24. Why is your GPA not higher?(GPS - Grade point average) 25. How has your education prepared you for your career? 26. What were your favourite classes? Why? 27. Do you enjoy doing independent research? 28. Do you have any plans for further education? 29. How much training do you think you’ll need to become a productive employee? 30. What qualities do you feel a successful _____ should have? 31. Why do you want to work in the _____ industry? 32. Is money important to you? 33. How much money do you need to make to be happy? 34. What kind of salary are you looking for? N.B. Don’t just read these questions practice and rehearse the answers. Don’t let the employer interview be the first time you actually formulate an answer in spoken words. It is not enough to think about them in your head practice!
Ex. 2 Review some successful examples: Why should I hire you? For example: You should hire me because I am the best person for the job. I realize that there are likely other candidates who also have the ability to do this job. Yet I bring an additional quality that makes me the best person for the job − my passion for excellence. I am passionately committed to producing truly world class results. For example...
What is your long-range objective? For example: Within five years, I would like to become the very best accountant your company has on staff. I want to work toward becoming the expert that others rely upon. And in doing so, I feel I’ll be fully prepared to take on any greater responsibilities which might be presented in the long term. For example, here is what I am presently doing to prepare myself... Then go on to show by your examples what you are doing to reach your goals and objectives.
How has your education prepared you for your career? An example: My education has focused on not only the learning the fundamentals, but also on the practical application of the information learned within those classes. For example, I played a lead role in a class project where we gathered and analyzed best practice data from this industry. Let me tell you more about the results... Focus on behavioral examples supporting the key competencies for the career.
Are you a team player? A sample answer: Yes, I am very much a team player. In fact, I’ve had opportunities in my work, school and athletics to develop my skills as a team player. For example, on a recent project...
Have you ever had a conflict with a boss or professor? How was it resolved? For example: Yes, I have had conflicts in the past. Never major ones, but there have been disagreements that needed to be resolved. I've found that when conflict occurs, it helps to fully understand the other persons perspe
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Последнее изменение этой страницы: 2016-07-16; просмотров: 384; Нарушение авторского права страницы; Мы поможем в написании вашей работы! infopedia.su Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Обратная связь - 18.217.10.152 (0.012 с.) |