Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

Cambridge Professional English 10 страница



mm

MM

 

Severe

 

windows Defender detected orograms that may corepronee rour privacy or damage your о


Review harmful or potentially unwanted software


 

 

О


 

Internet


Authentication Required

Enter username and password for *E*syNew** at http: //members.euvnews.com user Mm*

 

 

Cances

G

 

О

*5 https://www.bankinter.com/ ^



2 Security and privacy on the Internet

A [P| Read the text quickly and see how many of your ideas from 1A Question 3 are mentioned.

 

В Read the text more carefully and answer these questions.

1 Why is security so important on the Internet?

2 What security features are offered by Mozilla Firefox?

3 What security protocol is used by banks to make online transactions secure?

4 How can we protect our email and keep it private?

5 What methods are used by companies to make internal networks secure?

6 In what ways can a virus enter a computer system?

7 How does a worm spread itself?


•net security

Security and privacy on the Internet



 


There are many benefits from an open system like the Internet, but one of the risks is that we are often exposed to hackers, who break into computer systems just for fun, to steal information, or to spread viruses (see note below). So how do we go about making our online transactions secure?

Security on the Web

Security is crucial when you send confidential information online. Consider, for example, the process of buying a book on the Web. You have to type your credit card number into an order form which passes from computer to computer on its way to the online bookstore. If one of the intermediary computers is infiltrated by hackers, your data can be copied.

To avoid risks, you should set all security alerts to high on your web browser. Mozilla Firefox displays a lock when the website is secure and allows you to disable or delete cookies - small files placed on your hard drive by web servers so that they can recognize your PC when you return to their site.

If you use online banking services, make sure they use digital certificates - files that are like digital identification cards and that identify users and web servers. Also be sure to use a browser that is compliant with SSL (Secure Sockets Layer), a protocol which provides secure transactions.

Email privacy

Similarly, as your email travels across the Net, it is copied temporarily onto many computers in between. This means that it can be read by people who illegally enter computer systems.

The only way to protect a message is to put it in a sort of virtual envelope - that is, to encode it with some form of encryption. A system designed to send email privately is Pretty Good Privacy, a freeware program written by Phil Zimmerman.

Network security

Private networks can be attacked by intruders who attempt to obtain information such as Social Security numbers, bank accounts or research and business reports.To protect crucial data, companies hire security consultants who analyse the risks and provide solutions.The most common methods of protection are passwords for access control, firewalls, and encryption and decryption systems. Encryption changes data into a secret code so that only someone with a key can read it. Decryption converts encrypted data back into its original form.

Malware protection

Malware (malicious software) are programs designed to infiltrate or damage your computer, for example viruses, worms, Trojans and spyware. A virus can enter a PC via a disc drive - if you insert an infected disc - or via the Internet. A worm is a self-copying program that spreads through email attachments; it replicates itself and sends a copy to everyone in an address book. A Trojan horse is disguised as a useful program; it may affect data security. Spyware collects information from your PC without your consent. Most spyware and adware (software that allows pop-ups - that is, advertisements that suddenly appear on your screen) is included with free'downloads.

If you want to protect your PC, don't open email attachments from strangers and take care when downloading files from the Web. Remember to update your anti-virus software as often as possible, since new viruses are being created all the time.



Note: Originally, all computer enthusiasts and skilled programmers were known as hackers, but during the 1990s, the term hacker became synonymous with cracker - a person who uses technology for criminal aims. Nowadays, people often use the word hacker to mean both things. In the computer industry, hackers are known as white hats and crackers are called black hats or darkside hackers.


 

 

С Solve the clues and complete the puzzle.

1 Users have to enter a................................ to gain

access to a network.

2 A............................. protects a company intranet

from outside attacks.

3 A............................. is a person who uses their


 

6 7 8


computer skills to enter computers and networks illegally.

............................ can infect your files and corrupt

your hard drive.

You can download................................ from the Net; this type of software is available free of charge

but protected by copyright.

Encoding data so that unauthorized users can't read it is known as............................................

This company uses................................ techniques to decode (or decipher) secret data.

Most.............................. is designed to obtain personal information without the user's permission.




Safety online for children

A i&u Listen to an interview with Diana Wilson, a member of the Internet Safety Foundation. Which answers (a or b) best describe what she says?

1 Parents should make children aware of a the benefits and risks of the Internet. b the risks of the Internet.

2 A web filter program can be used to a prevent access to sites with inappropriate content, b rate web content with labels (similar to the way movies are rated).

3 If kids spend too much time online or suffer from internet addiction, parents should a stop them using the Internet. b look for help from specialists.

 

в E Listen again and complete the interviewer's notes.

 

Risks Sokdions^

/Manipulation of children There are websites (4)..................................

Invasions of (I).............................................. ai children.

Distribution of indecent or Internet (5)................................ programs let

(2) material parents block objectionable websites.

Violence and racist (3).................................. Websites should (Q............................................ their

content with a label, from child-friendly to over 18 only.

 

 

4 The history of hacking

A Read Part 1 of the text and answer these questions.

1 Which hacking case inspired the film War Games?

2 When did Captain Zap hack into the Pentagon?

3 Why was Nicholas Whitely arrested in 1988?

4 How old was the hacker that broke into the US defence computer in 1989?

 

The history of hacking - Part 1

John Draper discovered that a whistle offered in boxes of Cap'n Crunch breakfast cereal perfectly generated the 2,600Hz signal used by the AT&T phone company. He started to make free calls. He was arrested in 1972 but wasn't sent to prison.

1974 - Kevin Mitnick, a legend among hackers, began hacking into banking networks and altering the credit reports of his enemies. He didn't expect that his most famous exploit - hacking into the North American Defense Command in Colorado Springs - would inspire the film War Games in 1983.

1981 - Ian Murphy, a 23-year-old known as Captain Zap on the networks, hacked into the White House and the Pentagon.

1987-The IBM international network was paralysed by a hacker's Christmas message.

1988-The Union Bank of Switzerland almost lost £32 million to hackers. Nicholas Whitely was arrested in connection

with virus spreading.

1989 - A fifteen-year-old hacker cracked the US defence computer.

1991 - Kevin Poulsen, known as Dark Dante on the networks, was accused of stealing military files.


Internet security

 

I In pairs, discuss which of the cases in Part 1 you had heard of. Which do you think is the most important?

 

S Language work: the past simple

A Look at the HELP box and then complete Part 2 of the text with the past simple form of the verbs in the box.

show spread steal launch attempt overwrite be infect affect

 

 

The history of hacking - Part 2

1992 - David L Smith (I)............. prosecuted for writing the Melissa virus, which was passed in

Word files sent via email.

1997 - The German Chaos Computer Club (2)..... on TV how to obtain money from

bank accounts.

2000 - A Russian hacker (3)..... to extort $100,000 from online music retailer CD Universe.

A Canadian hacker (4)......... - a massive denial of service attack against websites like

Yahoo! and Amazon.

The ILoveYou virus, cleverly disguised as a love letter, (5) so quickly that email

had to be shut down in many companies.The worm (6) image and sound files

with a copy of itself.

2001 - The Code Red worm (7)........... tens of thousands of machines.

2006 - Hackers (8).............. the credit card details of almost 20,000 AT&T online customers.

However, subscribers to its service (9) (not)...


I'I'J Past simple

 

Past

• We use the past simple to talk about a complete action or event which happened at a specific time in the past.

Now

He began hacking in 1974.

 

We form the past simple of regular verbs by adding -(e)d to the infinitive.

John Draper discovered that a whistle...

We form questions and negatives using did/didn't.

 

When did Captain Zap hack into the Pentagon? He didn't expect that his most famous exploit...

 

 

There are many verbs which are irregular in the past simple.

Kevin Mitnick began hacking into...

For a list of irregular verbs, see page 166.

We form questions and negatives for irregular verbs in the same way as for regular verbs. The exception is be (see below).

When did Kevin Mitnick begin hacking into...? He didn't begin hacking until 1974.

We form the past passive with the past simple of be + the past participle.

IBM international was paralysed by hackers. He wasn't sent to prison. Why was Nicholas Whitely arrested in 1998?


В Read these landmarks in the history of the Internet and prepare at least five questions in the past simple.

Example: What happened in 1969? What did RayTomlinsondoin 1971?

1969 - The US Defense Department establishes ARPANET, a network connecting research centres.

1971 - Ray Tomlinson of BBN invents an email program to send messages across a network. The @ sign is chosen for its of meaning.

1981- IBM sells the first IBM PC. BITNET provides email and file transfers to universities.

1982- TCP/IP is adopted as the standard language of the Internet.

1988 - Jarkko Oikarinen develops the system known as Internet Relay Chat (IRC).

1991 - CERN (Conseil Еигорёеп pour la Recherche Nucleaire) creates the World Wide Web.

1998- The Internet 2 network is born. It can handle data and video at high speed but is not a public network.

1999- Online banking, e-commerce and MP3 music become popular.

2001 - Napster, whose software allows users to share downloaded music, maintains that it does not perpetrate or encourage music piracy. However, a judge rules that Napster's technology is an infringement of music copyright.

2004 - Network Solutions begins offering 100-year domain registration. 2006 - Americans spend over SI00 billion shopping online.


In pairs, ask and answer your questions


6 Internet issues


A |C^JIn small groups, look at the list of cybercrimes and discuss these questions.

1 Which crimes are the most dangerous?

2 Is it fair or unfair to pay for the songs, videos, books or articles that you download? Should copyright infringement be allowed online?

3 What measures can be taken by governments to stop cybercrime?

4 Do you think governments have the right to censor material on the Internet?

5 Personal information such as our address, salary, and civil and criminal records is held in databases by marketing companies. Is our. privacy in danger?

 

Cybercrimes

• Piracy - the illegal copy and distribution of copyrighted software, games or music files

• Plagiarism and theft of intellectual property - pretending that someone else's work is your own

• Spreading of malicious software

• Phishing (password harvesting fishing) - getting passwords for online bank accounts or credit card numbers by using emails that look like they are from real organizations, but are in fact fake; people believe the message is from their bank and send their security details

• IP spoofing - making one computer look like another in order to gain unauthorized access

• Cyberstalking - online harassment or abuse, mainly in chat rooms or newsgroups

• Distribution of indecent or offensive material

 

 

__ Write a summary of your discussion on PowerPoint and present it to the rest of the class.

www.

Now visit www.cambridge.org/elt/ict for an online task.


Unit

20 Graphics and design

21 Desktop publishing

22 Multimedia

23 Web design

Creative software

page


Learning objectives

In this module, you will:

learn and use vocabulary related to graphics software, learn how to describe graphics.

study the basic features and vocabulary related to desktop publishing discuss the pros and cons of e-publishing versus paper publishing, write a letter to a newspaper, learn about the main components and applications of multimedia systems, learn how to use conditional sentences, study the basic principles of web page design, learn how to use common modal verbs, design a mock home page for a college or company.


unit гоGraphics and design

 

Computer graphics

In pairs, look at the computer graphics (a-d) and discuss these questions.

1 Which of these computer graphics are three-dimensional (3-D)?

2 What are the advantages of creating 3-D images?

3 Which types of professional might use the computer graphics (a-d)?

4 Who else uses computer graphics in their job? How do they use them?

В Read the text on page 101 and check your answers to 3 and 4 in A.

 

С Read the text again and answer these questions.

1 What are the differences between raster graphics and vector graphics?

2 Which graphics file formats are mentioned?

3 What is compositing?

4 What does CAD stand for?

5 What are the benefits of using graphics in the car industry?

6 What type of graphics software is used to make maps or 3-D models of the Earth?

7 Who uses computer animation? How?


lies and design

Computer graphics



Computer graphics are pictures and drawings produced by computer. There are two main categories:

Raster graphics, or bitmaps, are stored as a collection of pixels. The sharpness of an image depends on the density of pixels, or resolution. For example, text or pictures that are scaled up - that is, made bigger - may show jagged edges. Paint and photo-editing programs like Adobe Photoshop focus on the manipulation of bitmaps. Popular raster formats are JPEG, GIF and TIFF.

Vector graphics represent images through the use of geometric objects, such as lines, curves and polygons, based on mathematical equations. They can be changed or scaled without losing quality. Vector data can be handled by drawing programs like Adobe Illustrator, Corel Draw or Macromedia Freehand. EPS is the most popular file format for exchanging vector drawings.

 

Bitmap graphics are composed of pixels, each of which contains specific colour information

 

Vector graphics [> consist of points, lines and curves which, when combined, can form complex objects

Almost all computer users use some form of graphics. Home users and professional artists use image-editing programs to manipulate images. For example, you can add filters (special effects) to your favourite photos, or you can composite images. Compositing is combining parts of different images to create a single image. Graphic artists and designers use drawing programs to create freehand drawings and illustrations for books or for the Web. Businesspeople use presentation graphics to make information more interesting visually - graphs and diagrams can be more effective ways of communicating with clients than lists of figures. Electrical engineers use graphics to design circuits in order to present data in a more understandable form. Mechanical engineers use CAD (Computer Aided Design) software to develop, model and test car designs before the actual parts are made. This can save a lot of time and money.

<3 A wireframe model of a teapot



CAD is also used in the aerospace, architecture and industrial sectors to design everything from aeroplanes and buildings to consumer products. Designers start a project by making a wireframe, a representation showing the outlines of all edges in a transparent drawing. They then specify and fill the surfaces to give the appearance of a 3-D solid object with volume. This is known as solid modelling. Next, they add paint, colour and filters to achieve the desired look and feel': this is called texturing the object. Finally, they render the object to make it look real. Rendering includes lighting and shading as well as effects that simulate shadows and reflections.

Smooth p> shading - part of the rendering process

 

 

Computer art, or digital art, is used in adverts and TV programmes. Artists and scientists use special graphic applets to create amazing fractals. Fractals are geometrical patterns that are repeated at small scales to generate irregular shapes, some of which describe objects from nature. Government agencies use GIS (Geographic Information Systems) to understand geographic data and then plan the use of land or predict natural disasters. Cartographers use GIS to make detailed maps. Animators use computer animation software to create animated cartoons or add effects in movies and video games.

A fractal


D Match the words (1-6) with the definitions (a-f).

1 resolution a special effects that can be applied to pictures

2 jagged b a technique that generates realistic reflections, shadows and highlights

3 filters с geometrical figures with special properties

4 wireframe d irregular or uneven

5 rendering e the number of pixels in an image

6 fractals f the drawing of a model by using features like edges or contour lines

 

E In pairs, discuss which application of computer graphics you think is the most important or useful. Give reasons for your answers.

 

 

Language work: the -ing form


A Look at the HELP box and decide if the -ing forms in these sentences are gerunds, present participles or adjectives. Write g, pp or a.

1 PCs generate graphics by performing mathematical calculations on data.

 

2 Businesspeople use graphics to make information more interesting visually.

3 Graphs and diagrams can be more effective ways of communicating with clients than lists of figures

4 She is designing a logo for the company.

 

5 If you need to make a presentation, I suggest using PowerPoint

6 The Internet is a network linking other networks

 

В Correct the mistakes in these sentences. There are seven mistakes in total.

1 Computer animation is the process of create objects which move across the screen.

2 Texturing involves add paint, colour and filters to drawings and designs.

3 You can open the colour palette by click on the corresponding icon.

4 CAD programs are very fast at to perform drawing functions.

5 A lot of time and money is saved by test a car design before to make the product.

6 To render refers to the techniques used to make realistic images.

 

 

The -ing form

We use the -ing form in three ways:

1 Rendering includes lighting and shading

2 We are designing a new car on computer.

3 They use special applets to create amazing fractals.

• In 1, rendering is a gerund (see below), acting as the subject. Lighting and shading are also gerunds, acting as the objects. A gerund refers to an activity or process.

• In 2, designing is a present participle.This is used in continuous tenses (in the above example, the present continuous) and reduced relative clauses.

...a representation showing the outlines of all edges. (= which shows the outlines...)

• In 3, amazing is an adjective.

We use gerunds in the following ways:

• As the subject of a verb

Compositing is combining parts of different images to create a single image.

• As the complement of the subject Compositing is combining parts of different images...

• As the object of a verb I enjoy editing pictures.

• After a preposition

Designers start a project by making a wireframe.

• As the complement of a verb

This course involves painting and drawing in various media.

• Some verbs are followed by the gerund, not by the infinitive (e.g. avoid, fancy, finish, give up, hate, imagine, involve, keep, look forward to, mind, suggest, enjoy)


The toolbox

 

Listen to an extract from an online tutorial about graphics programs and answer these questions.

1 What is a toolbox in graphics software?

2 What are graphics primitives?

3 What sort of attributes, or characteristics, can be used in graphical objects?

4 What does translation mean?


bE


Listen again and complete this extract from the web version of the tutorial.


 


Graphics programs usually have a toolbox - a activate it by (4)................................... on it. For example,

collection of drawing and (1).................................... tools if you want to (5) a rectangle, you

that enable you to type, (2), draw, activate the rectangle tool, and the pop-up options

paint, edit, move, and view images on the computer. give you the possibility of (6)

T,. • „. „.....,_x rectangles with square or rounded corners.

The basic shapes which are used to (3) -..... 3 ^

graphical objects are called primitives. These are You can transform an object by translating,

usually geometric, such as lines between two points, (7) or scaling it. Translation means

arcs, circles, polygons, ellipses and even text. moving an object to a different location. Rotation

Furthermore, you can specify the attributes of each is (8) the object around an axis. For

primitive, such as its colour, line type, fill area, example, you may need to rotate an object 90 or

interior style and so on. 180 degrees to fit the drawing. (9) is

T, „, ■„„. i •, и и. 4.. making the object larger or smaller.

The various tools in a toolbox usually appear together з j a

as pop-up icons in a menu or palette. To use one, you

4 ►

С Match the tools from the Photoshop toolbox (1-10) with the functions (a-j).



2 3 4 5 6 7

 

r —1 ■ I

Marquee select tools Move tool

Crop tool

Jl' Paintbrush, pencil

1 &\ Eraser </L Paint bucket I T 1 Type tool

8 J fi\ Colour picker (Eyedropper)

9 I Qj Zoom

 

a cut down the dimensions of a picture

b select a particular part of an image (you can choose different shapes for selection)

с fill in an area with a colour

d control the foreground and background colour

e select a specific colour in a photo

f magnify areas of an image when you are doing close, detailed work

g delete the part of the picture you drag it over

h insert text into your document

i draw and paint in different shapes and patterns

j move a selection or entire layer by dragging it with your mouse



10 ft] Colour tools and palette


4 Choosing graphics software

':I

U Work in pairs. Student A chooses a task from the list (1-6) and describes it. Student В chooses the most appropriate graphics software for the task (a-f) and gives reasons for his or her choice. Swap roles. Look at the text on page 101 and the Useful language box to help you.


2 3 4 5 6


to edit and retouch photos

to create illustrations and drawings for a magazine

to prepare slideshows for training sessions or conferences

to make mechanical designs and architectural plans

to create dynamic simulations and special effects for films, TV, advertisements and games to analyse geographic data and make maps


Describing graphics

Look at the images (1-4), which show the stages involved in drawing a plane using computer software. Write a short description of stages 2,3 and 4. Look at the text on page 101 and the Useful language box to help you.


Wireframe

Computer animation software, for example 3-D Studio Max


Дата добавления: 2015-09-29; просмотров: 67 | Нарушение авторских прав







mybiblioteka.su - 2015-2024 год. (0.061 сек.)







<== предыдущая лекция | следующая лекция ==>