Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатика
ИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханика
ОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторика
СоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансы
ХимияЧерчениеЭкологияЭкономикаЭлектроника

I Reading skills. Read and remember the following words and word combinations used in their specialized meanings. a set - набір virus - вірус

Читайте также:
  1. ACQUIRING COMMUNICAITON SKILLS
  2. Additional reading
  3. AFTER READING
  4. After Reading Activities
  5. After reading tasks
  6. After reading tasks.
  7. After-reading activities.

Read and remember the following words and word combinations used in their specialized meanings.

a set - набір
virus - вірус
vaccine - вакцина
contagious - інфекційний, заразний
occurrence - випадок, подія, пригода
file infector - файловий вірус
to replicate - тиражувати, імітувати
to trigger - приводити у дію, запускати
covert - прихований, завуальований; таємний
destructive - руйнівний, знищувальний, згубний, шкідливий
illicit - заборонений, нелегітимний
legitimate program - легітимна програма
to come in contact with - стикатися з
to be aware of - усвідомлювати

 

Read and translate the following text into Ukrainian

How computer viruses work

On March 6, 1991, personal computer users all over the world turned on their machines in fear and trepidation. In most cases, nothing unusual happened; the computers started up just fine. But in some cases, a message flashed on the screen and the computer began to erase all files and data stored on the hard disk. What had happened? A virus called Michelangelo had somehow spread throughout the personal computer community around the world.

The terms viruses and vaccines have entered the jargon of the computer industry to describe some of the bad things that can happen to computer systems and programs.

A virus, as its name suggests, is contagious. It is a set of illicit instructions that passes itself on the other programs with which it comes in contact. It has two parts, which could be called the infector and the detonator. They have two very different jobs. One of the features of the computer virus that separates it from other kinds of computer program is that it replicates itself, so that it can be spread (via flash cards transported from computer to computer, or networks) to other computes. After the infector has copied the virus elsewhere, the detonator performs the virus’s main work.

In this case, the Michelangelo virus was spread on IBM and IBM-compatible personal computer by unsuspected users who shared diskettes that carried the virus instructions. Michelangelo was first spotted in Europe in Mach 1990. It was named after the famous artist born on March 6, 1475.Within a year it had spread to the United States and the rest of the world.

Whoever created this virus was never caught. But one thing became evident: a virus can strike at any time because few computer systems are totally secure.

Unpleasant occurrences like the March 6, 1991, attack of the Michelangelo virus will be with us for years to come. In fact, from now, you need to check your IBM or IBM-compatible personal computer for the presence of Michelangelo before March 6 every year – or risk losing all the data on your hard disk when you turn on you machine that day. And Macintosh uses need to do the same for another intruder, the Jerusalem virus, before each Friday the 13th, or the risk a similar fate for their data.

Some types of viruses include the worm, a program that spreads by replicating itself. The bomb, a program intended to sabotage a computer by trigging damage based on certain conditions – usually at a later date. And the Trojan horse, a program that covertly places illegal, destructive instructions in the middle of the otherwise legitimate program.

Don’t worry too much about viruses. You may never see one. There are just a few ways to become infected that you should be aware of. The sources seem to be service people, pirated games, putting disks in publicly available PCs with put write-protect tabs, commercial software (rarely) and software distributed over computer bulletin board systems. Many viruses have spread through pirates – illegally copied or broken – games. This is easy to avoid.

If you use a shared PC or a PC that has public access, such as one in a college lab or a library, be very careful about putting disks into PC’s drives without a write-protect tab. Carry a virus-checking program and scan the PC before letting it write data onto disks.

There are actually two kinds of antivirus programs: virus shield, which defect viruses as they are infecting your PC, and virus scanners, which detect viruses once they’re infected you.

 

Find the answers to the questions.

1. What happened on March 6, 1990?

2. What is the origin of the term virus?

3. What is a computer virus?

4. How does a virus work? What parts does typical virus consist of?

5. What information have you got about the Michelangelo virus?

6. What virus does Macintosh suffer from?

7. What are the main types of computer viruses and how do they differ?

8. Is there any way to protect your IBM or IBM-compatible personal computer from viruses?

9. Give some practical advice for novice.

10. What programs can be used for protection of computers? Name them and explain their manner of work.

11. Why do some people consider computer viruses important?

12. Can you keep your computer free of viruses?

 

Complete the sentences.

1. A virus called Michelangelo had somehow spread ….

2. … the jargon of the computer industry to describe some of the bad things that can happen to computer systems and programs.

3. Some types of viruses include the worm, ….

4. If you use a shared PC or a PC that has public access, ….

5. …: virus shield, which defect viruses as they are infecting your PC, and virus scanners, which detect viruses once they’re infected you.

 

Match the following English words with their definitions.

  a computer virus a to discover or recognize that something is present
  antivirus program b something which transmits a disease or virus
  a detonator c an unwanted program that has entered your system without you knowing about it
  to erase d a device used to set off an explosion or other destructive process
  to detect e a computer program that stops the spread of and often eradicates the virus
  pirated f to remove all traces of something
  an infector g stolen, obtained without the owner’s consent
  a shield h a protective device

 

 

True or false statements.

1. A virus is always lethal to your hard disk.

2. Virus shield are more effective than virus scanners.

3. Virus is the name generally given to software that causes malicious alteration of computer files.

4. The virus will spread as soon as you put the infected disk in your PC.

5. Most viruses spread through pirated games.

Translate the following sentences into Ukrainian.

1. The first recognized virus was created by Fred Cohen while a student at the University of Southern California. His doctoral theses proved that computer code could replicate itself, attach itself to other files, and change the behaviour of the computer.

2. The computer virus, of course, gets its name from the biological virus. The word itself comes from a Latin word meaning slimy liquid or poison.

3. A virus that replicates itself by resending itself as an e-mail attachment or as part of a network message is known as a worm.

4. Macro viruses are among the most common viruses, and they tend to do the least damage. Macro viruses infect your Microsoft Word application and typically insert unwanted words or phrases.

5. The best protection against a virus is to know the origin of each program or file you load into your computer or open from your e-mail program.

 

Choose the most appropriate answer.

1. What is a virus?

a) A program that e-mails from your computer.

b) A program that replicates.

c) A program that hides on your computer.

 

2. What is a Trojan horse?

a) A program that replicates.

b) A program that automatically spreads.

c) A program with hidden functions.

 

3. Data diddling is when...

a) data is overwritten.

b) data is altered.

c) data is e-mailed.

 

4. A multipartite virus...

a) Infects only hard disks.

b) Infects only files.

c) Infects multiple vectors.

 

5. Most viruses...

a) make themselves visible.

b) hide themselves.

c) reveal themselves after one infection.

 

6. More viruses are spread by...

a) e-mail.

b) Web pages.

c) floppy diskettes.

 

7. When you detect a virus, first...

a) shut down your computer immediately.

b) make some tea.

c) format your hard disk.

 

8. A blended threat would not...

a) copy confidential information.

b) erase your credit cards.

c) open a backdoor.

 

9. The biggest potential damage caused by a virus is...

a) formatting the hard drive.

b) erasing files.

c) e-mailing confidential information.

 

10. Viruses exploit...

a) none of the known vulnerabilities.

b) some of the known vulnerabilities.

c) all of the known vulnerabilities.

 

II Retell the text “Viruses”.

III Rendering

Read the text and translate it into Ukrainian using a dictionary.

Spyware

Spyware is any program which secretly gathers user information through the user's internet connection without the user's knowledge. This program may be hidden as a component of freeware or shareware programs that can be downloaded from the Internet. The spyware then transmits the information to someone else. This information is used for many reasons. Some spyware is used strictly for marketing data collection, gathering and transmitting that information on to someone else. Spyware software may be installed legitimately to monitor security or workplace monitoring, and may be installed to maliciously violate the integrity of your computer.

Personal information is secretly recorded through many techniques, including logging keystrokes, recording internet web browsing activity, and scanning documents on the computer's hard drive. Purposes range from criminal (theft of passwords and financial information) to the collection of marketing research for targeted advertising.

The spread of spyware has led to the development of anti-spyware programs. Its products remove or disable the existing spyware on the computer and prevent installation of any new program. However, a number of companies have added a form of spyware into their products. These are not considered malware (or malicious software) but still monitor for advertising purposes. They are still spyware and it is debatable whether this is a legitimate use of adware/spyware and malware since the user often has no knowledge that these programs have been installed. The user then is unaware of the infringement on their privacy. These programs still use the resources of your computer without your permission.

The first recorded use of spyware was on October 16, 1995 in a Usenet post that poked fun at Microsoft's business model. It first was considered hardware for theft purposes. In 2000 it was the term used in a press release for a personal firewall. Since then spyware has taken on its present definition. In 2001 Steve Gibson of Gibson Research realized that advertising software had been installed in his system stealing personal information. He determined the source was adware and he developed the first anti-spyware program, OptOut.

Many anti-spyware programs have been written since then. According to a 2005 study by AOL and others, 61% of surveyed users' computers had some form of spyware on them. 92% of surveyed users with spyware reported that they did not know of its presence and 91% reported that they had not given permission for the installation of the program. In 2006 it was found that spyware had become one of the worse security threats to computer systems running Microsoft Windows operating systems. In an estimate based on customer information, 9 out of 10 computers connected to the internet are infected. Windows Internet Explorer is the primary browser attacked because it is the most widely used program and allows spyware access to important parts of the operating system.

Some spyware programmers infect a system through security holes in the Web browser or in other software. When you navigate on a web page controlled by the spyware author, the page may contain a code which attacks the browser, forcing the download and installation of the software. The spyware creator knows the security systems, spyware blockers and firewall programs available to us. They continually pursue new methods of attacking your computer. The software programs are written as a means of income for the author.

Continually check for spyware and adware on your computer. A spyware free computer operates faster and connects you to the Internet faster than an infected computer. Some computers may become so overrun by these software programs that they fail to operate properly and people resort to taking their computer to be repaired. Sometimes it appears that the computer has a virus, when in fact it is bogged down by spyware. The worse case scenario is having your system totally restored to reverse the problem. The best way to stay free of spyware is to stay up to date on your virus, spyware, adware and malware definitions, have an anti-virus, anti-spyware, firewall program on your computer. Run the security programs daily and stay alert to symptoms. The Internet is meant to be used and enjoyed in spite of the possible problems.

 

Make up a plan in the form of questions.

Give the summary of the text according to your plan in a written form.

IV Comprehensive skills

Read and remember

expiration date термін закінчення дії
to regard відносити
customized information замовлена інформація
invasion порушення прав
harmless нешкідливий

 

2. Listen to the text “Cookies” and try to understand it.

True or false statements.

1. Cookies cannot read information stored in your computer.

2. Cookies can remember different kinds of personal information, but not such as your password.

3. Someone thinks that cookies are invasion of privacy and harmful for websites privacy.

4. Internet Explorer separate cookies and store them in Temporary Internet Files.

 

Listen to the text once again and answer the following questions.

1. What is a cookie?

2. Where are cookie files located?

 

V. Communicative skills

Job interview

Ex. 1 You need to be prepared for the full spectrum of questions that may be presented during interview. If you have not completed it yet, do it now. Sit down with a friend, a significant other, or your roommate and go through all of the questions.

1. How would you describe your ideal job?

2. Why did you choose this career?

3. When did you decide on this career?

4. What goals do you have in your career?

5. How do you plan to achieve these goals?

6. How do you personally define success?

7. What do you think it takes to be successful in this career?

8. If you had to live your life over again, what one thing would you change?

9. Would you rather work with information or with people?

10. Are you a team player?

11. What motivates you?

12. Why should I hire you?

13. Are you a goal-oriented person?

14. What are your short-term goals?

15. What is your long-range objective?

16. What do you see yourself doing five years from now?

17. Where do you want to become ten years from now?

18. Do you handle conflict well?

19. Have you ever had a conflict with a boss or professor? How did you resolve it?

20. What major problem have you had to deal with recently?

21. Do you handle pressure well?

22. Why did you choose to attend your college?

23. Who were your favourite professors? Why?

24. Why is your GPA not higher?(GPS - Grade point average)

25. How has your education prepared you for your career?

26. What were your favourite classes? Why?

27. Do you enjoy doing independent research?

28. Do you have any plans for further education?

29. How much training do you think you’ll need to become a productive employee?

30. What qualities do you feel a successful _____ should have?

31. Why do you want to work in the _____ industry?

32. Is money important to you?

33. How much money do you need to make to be happy?

34. What kind of salary are you looking for?

N.B. Don’t just read these questions practice and rehearse the answers. Don’t let the employer interview be the first time you actually formulate an answer in spoken words. It is not enough to think about them in your head practice!

 

Ex. 2 Review some successful examples:

Why should I hire you?

For example: You should hire me because I am the best person for the job. I realize that there are likely other candidates who also have the ability to do this job. Yet I bring an additional quality that makes me the best person for the job − my passion for excellence. I am passionately committed to producing truly world class results. For example...

 

What is your long-range objective?

For example: Within five years, I would like to become the very best accountant your company has on staff. I want to work toward becoming the expert that others rely upon. And in doing so, I feel I’ll be fully prepared to take on any greater responsibilities which might be presented in the long term. For example, here is what I am presently doing to prepare myself...

Then go on to show by your examples what you are doing to reach your goals and objectives.

 

How has your education prepared you for your career?

An example: My education has focused on not only the learning the fundamentals, but also on the practical application of the information learned within those classes. For example, I played a lead role in a class project where we gathered and analyzed best practice data from this industry. Let me tell you more about the results...

Focus on behavioral examples supporting the key competencies for the career.

 

Are you a team player?

A sample answer: Yes, I am very much a team player. In fact, I’ve had opportunities in my work, school and athletics to develop my skills as a team player. For example, on a recent project...

 

 

Have you ever had a conflict with a boss or professor? How was it resolved?

For example: Yes, I have had conflicts in the past. Never major ones, but there have been disagreements that needed to be resolved. I've found that when conflict occurs, it helps to fully understand the other persons perspective, so I take time to listen to their point of view, then I seek to work out a collaborative solution. For example...

 

What is your greatest weakness?

For example: I have had trouble in the past with planning and prioritization. However, I’m now taking steps to correct this. I’ve just started using a pocket planner.... Talk about a true weakness and show what you are doing to overcome it.

 

If I were to ask your professors to describe you, what would they say?

I believe she would say I'm a very energetic person, that I’m results oriented and one of the best people she has ever worked with. Actually, I know she would say that, because those are her very words. May I show you her letter of recommendation?

 

What qualities do you feel a successful manager should have?

The key quality in a successful manager should be leadership--the ability to be the visionary for the people who are working under them. The person who can set the course and direction for subordinates. The highest calling of a true leader is inspiring others to reach the highest of their abilities. I'd like to tell you about a person whom I consider to be a true leader...

 

If you had to live your life over again, what one thing would you change?

For example: Although I’m overall very happy with where I’m at in my life, the one aspect I likely would have changed would be focusing earlier on my chosen career. I had a great internship this past year and look forward to more experience in the field. I simply wish I would have focused here earlier. For example, I learned on my recent internship… …then provide examples.

 

Ex.3 Role play. Job interview.

Student A is an employer of one of the international firm (company). Use a list of questions and ask at least 8 (the most important) to demonstrate a short part of the interview.

Student B is a job applicant. Give rich in content answers. You really need and want to obtain this vacant position. Do all your best to be hired.

Then students A and B change their roles and present a new variant of their job interview.

 

 

Unit 7

Topic: Copyright law

 


Дата добавления: 2015-10-28; просмотров: 124 | Нарушение авторских прав


Читайте в этой же книге: Match these words-processing terms with their definitions. | I Reading skills | I Reading skills | Read and remember |
<== предыдущая страница | следующая страница ==>
Computer security| I Reading skills

mybiblioteka.su - 2015-2024 год. (0.034 сек.)