Читайте также:
|
|
ITS HISTORY AND FUTURE
Task 1. Study the following words and word-combinations. Memorize them!!!!!!!
1. to release control over smth
2. to buy and sell goods over the Internet
3. identity theft
4. spyware
5. “phishing”
6. fob technology
7. to provide targeted sales messages
8. to send through a person’s e-mail
9. pop-up blockers
10. search engines
11. small hand-held computer devices
12. to search and read the literature on the Internet for free
13. to start one’s own project
Task 2. Complete the sentences with the new words and word-combinations.
1. The EU, China, Brazil, India want the USA … the World Wide Web.
2. … is growing around the world. 2.7,000,000,000,000 dollars were earned through the Internet commerce last year.
3. … often use computer viruses to collect a victim’s personal information.
4. Banks and individuals can also use … to protect themselves from identity thieves.
5. Adware can use personal information … to the computer user.
6. People are able to … for free to learn about other cultures without travelling abroad.
7. Google … to create a World Wide Digital Library on the Web.
Task 3. Listen to the tape and explain the followings.
1. ICANN
2. www
3. blog
4. the UNO
5. EU
Task 4. Listen to the tape and complete the sentences.
1. A domain name is a series of …
2. Spyware are that are loaded onto … without …
3. “Phishings” are e-mail messages that …
4. Firewalls are programs or devices that …
5. A pop-up blocker is a computer program that prevents …
6. A blog may contain …, … to other Web sites, and …
7. A blogger is a person who …
Task 5. Listen to the tape and answer the questions.
1. When and what did the Internet grow out of?
2. What is a major service on the Internet?
3. What does a domain name is identify?
4. What functions does the ICANN perform?
5. Do countries argue against the US government control over the Internet? What do they propose?
6. Are most Internet communications personal e-mails?
7. Why are there risks involved with the e-commerce?
8. What methods do identity thieves use to get profit?
9. How can people protect themselves from identity thieves?
10. What do pop-up blockers need for?
11. What is the most popular kind of communication on the Internet?
12. Who usually create blogs?
13. What is one of the most popular “search engines” for the Internet?
14. What is the largest online bookstore?
15. What project has Google started recently? How much does it cost?
Task 6. Speak about advantages and disadvantages of using computers.
POSITIVE EFFECTS:
1. a big amount of information without travelling father than the nearest computer
2.
3.
4.
5.
NEGATIVE EFFECTS:
1. identity theft
2.
3.
4.
5.
Дата добавления: 2015-07-10; просмотров: 146 | Нарушение авторских прав
<== предыдущая страница | | | следующая страница ==> |
Глава 16 | | | Дневники вампира: Голод |