Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатика
ИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханика
ОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторика
СоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансы
ХимияЧерчениеЭкологияЭкономикаЭлектроника

Transport and insurance costs

Читайте также:
  1. Amount of unemployment insurance benefit
  2. Baggage carts are used for the transportation of luggage, mail, cargo and other materials between the aircraft and the terminal.
  3. Budget of unemployment insurance fund
  4. Calculations of exhausts of harmful substances by motor transport
  5. Cargo transportation.
  6. Chapter Two : Transport
  7. Costs, Money And Banks in Spain

Ex-works: the buyer pays all costs once the goods leave the factory/ warehouse.

F.O.R. (free on rail): includes cost of delivery to the nearest railway station.

F.A.S. (free alongside ship): includes cost of taking goods to the side of the ship, but not loading.

F.O.B. (free on board): as for F.A.S., but includes cost of loading goods.

C.& F. (cost and freight): includes cost of shipping goods to the named destination, but not insurance.

C.I.F. (cost, insurance, and freight): includes all costs to the named destination.

Notes:

C.& F. (cost and freight) – цена «стоимость и фрахт»

C.I.F. – цена сиф

Ex-works – цена франко-завод

F.O.R. (free on rail) – цена франко-вагон

F.A.S. (free alongside ship) – цена фас

F.O.B. (free on board) – цена фоб.

freight (N) – фрахт (стоимость перевозки)

Task 14. Read the contract and find English equivalents to the following.

1) вступать в силу

2) в дальнейшем именуемый

3) затраты на страхование

4) без уплаты таможенных пошлин на импорт

5) страна происхождения

6) уведомить в письменной форме

7) утеря или повреждение товара

8) уплата налогов и таможенных сборов

9) транспортировка

10) юридический адрес

11) стороны (контракта)

CONTRACT

This Contract is signed and is entering into force between the Frith Components Company and hereinafter referred to as "Seller" and ABC Corporation hereinafter referred to as "Buyer", have entered into agreement under the following Conditions:

Terms and Conditions

1. Subject of the contract: The "Seller" is undertaking to deliver to the "Buyer" 10,000 iPods hereinafter referred to as the "Goods", under the terms of C.I.F., port UK.

2. Price and total value of the contract: The total value of the Contract is determined in U.S. Dollars as 400$ per item. Quantity: 10,000. The total amount of the Contract is 4,000,000$

The total value of the Contract is determined on C.I.F. Port UK terms (import dues uncleared), including the "Seller's" expenditures for insurance against risks of loss or damage to the "Goods" during shipment, in accordance with conditions of the present contract, as well as on payments covering taxes, and custom duties in the country of origin if necessary, and resulting from the execution of the current Contract.

The prices are fixed for duration of the current Contract and will not be subjected to any changes, with exception of wartime, when transportation costs are rising, at which point the "Seller" has to notify in written form, immediately, the "Buyer".

3. Legal Addresses and Signatures of the Parties

The Seller: Frith Components

139, Giles Kemp Road, New York, USA

The Buyer: ABC Company

16, Green Street, Liverpool, UK

 

Task 15. True or false?

1) The Seller is to pay for insurance against risks of loss or damage to the "Goods" during shipment.

2) The Seller is to pay for import dues.

3) The payment has to be done in euros.

4) In case of war the "Seller" has to notify the "Buyer" by telephone.

5) The Seller will deliver 10,000 iPods to one of the ports of the United Kingdom.

 

Task 16. Match the extracts with the types of documents.

A) Application Letter

B) Contract

C) Memo

D) Letter of Enquiry

E) CV

1) Dear Ms. Payton,

Further to our telephone conversation yesterday, could you please send me a copy of your company's Annual Report for the last two operating years.

2) TO: Kelly Anderson, Marketing Executive

FROM: Jonathon Fitzgerald, Market Research Assistant

DATE: June 14, 2007

RE: Fall Clothes Line Promotion

Through market research and analysis, it has been discovered that the proposed advertising media for the new fall lines need to be reprioritized and changed.

3) Please regard this as an application for the position of District Sales Manager that was recently advertised on Monster.com. Based on the requirements stated in the ad, I believe that I possess a unique mix of experience, knowledge, and skills that can definitely help your company in the critical customer service area.

4) Name: David William MANNING

Age: 21

Date of Birth: 29 May 1991

Marital Status: Single
Tel: 071 263 6925

5) Seller shall issue monthly invoices to Buyer, stating Seller's charges for natural gas supplied to Buyer. Buyer agrees to pay the invoices within ten (10) days. Interest of (1.5%) per month shall accrue on any overdue balance. If Buyer defaults on any of its obligations under this contract, Seller may, in addition to other legal remedies, suspend deliveries or terminate this contract.

Speaking

Task 17. These are answers from an interview with Elissa, who works for SysTech. Ask the questions.

1. I’m a computer systems software engineer.

2. I coordinate the constructions and maintenance of a company’s computer systems.

3. A bit of both. I’m here some of the time but I also spend a lot of time on site configuring and installing computer systems at a company.

4. Well, companies have various needs. They have to organize things like ordering, inventory, billing, payroll, etc. I help companies to coordinate their computer systems in their departments.

5. No, not really. As a software engineer, I need to have good programming skills, but I’m more concerned with developing algorithms and analyzing and solving programming problems than with actually writing code programs.

6. I also help companies to set up their Intranet systems and, in general, I make suggestions about the technical direction of the company and I help them to plan for future growth.

 

Task 18.

A. Choose a profession from the list and make your interviews with a partner. Use the prompts in brackets.

Web designer (to use JavaScript, to make a website more interactive, freedom, flexibility and long holidays)

Computer programmer (to write software, to prefer working with computers to people)

Database administrator (to help companies to store, manage and retrieve data, to work for a good company, to have a better job security)

E-commerce manager (high risks and high rewards of E-commerce, to manage one’s own online shop, to like to work both with computers and people)

B. Tell about your future profession.


Revision

Task 19. There are 33 words connected with the Internet in this grid. Can you find them all? (Look down and across).

b q q t s y z b x d o m a i n y k n l p
r v i r u s u l i i z x s e c u r e o h
o a r s r p o o c s a t x e r t y w i y
w t e d f h w g l c s o c m c j y s u p
s d f b g f j g k o s o v a h k t g f e
e n c r y p t i o n e l j i a h u r i r
r s a o v b v g b n h b b l t i r o r l
z c x a n h a c k e r a u p r o l u e i
m u p d a t e x c c b r n n o m e p w n
u f d b s a z h i t s n n b o w q q a k
l g p a s s w o r d v w e b m a i l l d
t h j n e w q f b v c c x z a s h g l f
i c l d r u i f n s p y w a r e j k l p
m o p o t y q l m l o i o p a d l o c k
e o i n b o x i b n r m w i e w e r u y
d k q r w x c n v a t t a c h m e n t q
i i y t e z r e l o a d b i o r p h k l
a e i u a g f d s n l u w e b s i t e j
p s o k e y w o r d x y c v t f e w g q
j l s p a m h h m z a s s d l a u n c h

 

Task 20. Enjoy the poem.

If a packet hits a pocket on a socket on a port,

and the bus is interrupted as a very last resort,

and the address of the memory makes your floppy disk abort,

then the socket packet pocket has an error to report.

If your cursor finds a menu item followed by a dash,

and the double-clicking icon puts your window in the trash,

and your data is corrupted 'cause the index doesn't hash,

then your situation's hopeless and your system's gonna crash!

If the label on the cable on the table at your house,

says the network is connected to the button on your mouse,

but your packets want to tunnel on another protocol,

that's repeatedly rejected by the printer down the hall,

and your screen is all distorted by the side effects of gauss,

so your icons in the window are as wavy as a souse,

then you may as well reboot and go out with a bang,

'cause as sure as I'm a poet, the sucker's gonna hang!

When the copy of your floppy's getting sloppy on the disk,

and the microcode instructions cause unnecessary risk,

then you have to flash your memory and you'll want to RAM your ROM.

Quickly turn off the computer and be sure to tell your mom!

 


Unit 5. Information Security

Reading and Vocabulary

1) alert (N) – сигнал тревоги

2) denial of service, DOS – отказ в обслуживании

3) destroy (V) – разрушать

4) destruct (V) – разрушать, destructive (A) – разрушительный

5) encrypt (V) – шифровать

6) firewall (N) – брандмауэр, файервол

7) forge (V) – фабриковать, подделывать, forgery (N) – подделка

8) gap (N) – брешь, пробел (в защите)

9) hacker (N) – хакер (программист высокого класса; программист или пользователь, стремящийся незаконно преодолеть системы защиты данных)

10) identity (N) – личность, тождество, identity card – удостоверение личности, identical (A) – идентичный, identify (V) – идентифицировать

11) intend (V) – намереваться, intended (A) – предназначенный, намеренный

12) intrude (V) – вторгаться; intrusion (N) – вторжение

13) legitimate (A) – законный

14) malicious (A) – злонамеренный

15) malware (N) – вредоносное программное обеспечение

16) notify (N) – уведомить

17) padlock (N) – «висячий замок» (знак защиты веб-страницы)

18) patch (N) – «заплата» (в программном обеспечении)

19) pirate (N) – пират, pirated (A) – пиратский, piracy (N) - пиратство

20) pollute (V) – загрязнять

21) prank (N) – выходка, шутка

22) replicate (V) – самовоспроизводиться

23) restrict (V) – ограничивать (доступ и т.п.)

24) sniff (V) – вынюхивать, подслушивать

25) spyware (N) – шпионское программное обеспечение

26) tap (V) – подслушивать, перехватывать

27) victim (N) – жертва

28) vulnerable (A) – уязвимый

 

Task 1. Answer the questions.

1) Who is a hacker?

2) How to make computer data secure?

3) What computer crimes do you know?

4) What is a firewall?

5) What is a computer virus?

 

Task 2. Read the text and match each highlighted word with its

correct definition.

A) an attempt to make a computer resource unavailable to its intended users, network flood

B) pretending to be an authorized person and aiming to get some confidential information

C) entireness, wholeness

D) the act of taking information secretly, without the permission from the owner

E) trying account names and password combinations until one works

F) hardware (a router or access server) or software ensuring the security of the private network.

G) to overhear (a telephone conversation, etc.) secretly

H) software which sees the network traffic usually intending to find password information

Why Internet Firewalls?

If you are building a firewall, the first thing you need to worry about is what you're trying to protect. When you connect to the Internet, you're putting three things at risk: your data (the information you keep on the computers); your resources (the computers themselves); and your reputation.

The Internet is a marvelous technological advance that provides access to information, and the ability to publish information, in revolutionary ways. But it's also a major danger that provides the ability to pollute and destroy information in revolutionary ways.

Computer security incidents are different from many other types of crimes because detection is unusually difficult. Sometimes, it may take a long time to find out that someone has broken into your site. Sometimes, you'll never know. Even if somebody breaks in but doesn't actually do anything to your system or data, you'll probably lose time (hours or days) while you verify that the intruder didn't do anything.

Your data has three separate characteristics that need to be protected: secrecy (you might not want other people to know it); (1) integrity (you probably don't want other people to change it); and availability: (you almost certainly want to be able to use it yourself). A (2) firewall is a form of protection that allows a network to connect to the Internet while maintaining a degree of security.

The most common attacks on your systems are intrusions; with intrusions, people are actually able to use your computers. Most attackers want to use your computers as if they were legitimate users. Attackers have dozens of ways to get access. They range from (3) social engineering attacks (you figure out the name of somebody high up in the company; you call a system administrator, claiming to be that person and claiming to need your password changed right now, so that you can get important work done), to simple (4) guesswork (you try account names and password combinations until one works).

Firewalls help prevent intrusions in a number of ways. Ideally, they block all ways to get into a system without knowing an account name and password. Properly configured, they reduce the number of accounts accessible from the outside that are therefore vulnerable to guesswork or social engineering. Most people configure their firewalls to use one-time passwords that prevent guessing attacks.

A (5) denial of service attack is one that's aimed entirely at preventing you from using your own computers. While flooding is the simplest and most common way to carry out a denial of service attack, a cleverer attacker can also disable services, reroute them, or replace them.

Most often, the risk of denial of service attacks is unavoidable. If you accept things from the external universe – electronic mail, telephone calls, or packages – it's possible to get flooded. The notorious college prank of ordering a pizza or two from every pizzeria in town to be delivered to your least favorite person is a form of denial of service; it's hard to do much else while arguing with 42 pizza deliverers. In the electronic world, denial of service is as likely to happen by accident as on purpose. The most important thing is to set up services so that if one of them is flooded, the rest of your site keeps functioning while you find and fix the problem. The good news is that most of these attacks are avoidable; a well-designed firewall will usually not be susceptible to them itself, and will usually prevent them from reaching internal machines that are vulnerable to them.

Some types of attacks allow an attacker to get data without ever having to directly use your computers. Usually these attacks exploit Internet services that are intended to give out information, inducing the services to give out more information than was intended, or to give it out to the wrong people. Many Internet services are designed for use on local area networks, and don't have the type or degree of security that would allow them to be used safely across the Internet.

Most people who steal information try to get access to your computers; they're looking for usernames and passwords. Fortunately for them, and unfortunately for everybody else, that's the easiest kind of information to get when (6) tapping a network. Username and password information occurs quite predictably at the beginning of many network interactions, and such information can often be reused in the same form.

Network taps, which are usually called (7) sniffers, are very effective at finding password information but are rarely used by attackers to gather other kinds of information. Getting more specific information about a site requires either extreme dedication and patience, or the knowledge that the information you want will reliably pass through a given place at a given time.

There are several types of protection against (8) information theft. A properly configured firewall will protect you against people who are trying to get more information than you intended to give. Once you've decided to give information out across the Internet, however, it's very difficult to protect against that information's reaching an unintended audience, either through misauthentication (somebody claiming to be authorized, when he or she isn't) or through sniffing (somebody simply reading information as it crosses a correctly authorized channel). For that matter, once you have given the information to somebody, you have no way to prevent that person from distributing it to other people.

(From Building Internet Firewalls,

by E. Zwicky, S. Cooper & D. Chapman)

 

Task 3. Decide if the statement is true, false or there is no information

in the text.

1. The Internet is a major danger that provides the ability to pollute and destroy information in revolutionary ways.

2. When you connect to the Internet, you're putting only one thing at risk: the information you keep on the computers.

3. Computing resources are natural resources that belong by right to the world at large.

4. A denial of service attack is aimed entirely at preventing you from using your own computers.

5. Network sniffing is often used for destroying computer data.

6. If you share the information with somebody, it is impossible to prevent that person from distributing it to other people.

 

Task 4. Answer the questions.

1. What are you trying to protect on your systems?

2. Which antivirus software or service do you use? Does it help to increase your computer security?

3. What types of attacks do you know?

4. Can simple accidents or stupidity be the threat for computer security?

 

Task 5. Choose the correct words.

1. A person who illegally accesses somebody else's computer over the Internet is called a __________.

A. pirate B. guest C. hacker

2. A website which (in theory) cannot be accessed by a hacker is _________.

A. strong B. secure C. clean

3. A website which can only be viewed by authorised people has ________ access.

A. reduced B. small C. restricted

4. Unwanted advertising e-mails are popularly known as _______.

A. garbage B. spam C. ham

5. Software which blocks attempts by others to access your computer over the internet is called a __________.

A. firewall B. fire blanket C. fire engine

6. It's essential to ________ your anti-virus protection regularly.

A. up-to-date B. date back C. update

7. Anti-virus software can _______ your computer for viruses.

A. flood B. review C. scan

8. Anti-virus software can also _______ viruses on removable media, such as floppy disks.

A. detect B. control C. see

9. When your anti-virus software subscription ______ it's a good idea to renew it immediately.

A. ends B. stops C. expires

10. Sites that ask for your credit card number or other personal information should use a secure server, so the data you send is ______.

A. coded B. encrypted C. translated.

11. The _______ symbol means that a web-page is secure.

A. smile B. SOS C. padlock

12. I couldn't book my flight online because the airline's system was _____.

A. down B. up C. over

 

Task 6. Match the malware with the damage.

1. virus

2. spyware

3. trojan horse

4. keystrokelogger or keylogger

5. worm

A. collects and sends private information from the infected computer to a third party

B. an undesirable program which can replicate itself across a network

C. allows a hacker to access private information when he/she wishes

D. a program which adds itself to an executable file, and can cause considerable damage to the data on the infected computer

E. records characters that are typed into a computer

Task 7. Read the text and fill in the gaps with the words below.

How can banks protect themselves?

They need technology to prevent intrusions: ___(1)___, anti-virus software and patches. The other thing they need is a process to assess threat changes. Several years ago, it was all about server-side ___(2)___. Then a year ago, ___(3)___ reported they were going after ___(4)___ in Internet Explorer. Now we are seeing a shift back to server-side attacks and the use of Microsoft Word or Excel attachments to break in.

What can bank customers do to protect themselves?

Turn your computer off when you aren't using it. If you can ___(5)___ two computers – one for online banking, the other for Internet-surfing – do that. If you are a ___(6)___ of identity theft, ___(7)___ the credit reporting agencies, place a fraud ___(8)___ on your report and get a police report.

notify firewalls alert

attacks victim afford

clients gaps

 

 

Task 8. Use the word given in brackets to form a word that fits in the space.

1. Confidential information about a company’s products or operation can be stolen or sold to unfair ________. (compete)

2. Phone freakers send over their phones control signals that are ________ to those used by telephone company. (identity)

3. Signatures are widely used to identify credit-card holders, but only an expert can detect a good _________. (forge)

4. Trojan horse is a program that places illegal, _______ instructions in the middle of an otherwise legitimate program. (destruct)

5. A programmer secretly inserts a few ______ instructions in an operating system. (author)

6. Stay away from _______ software. (pirate)

7. A virus is a self-replicating program that spreads by inserting copies of itself into other __________ code or documents. (execute)

Task 9. Choose the correct word. Consult the Appendix for confusable words.

1. The manager received / perceived an urgent E-mail from France.

2. Copernicus was the first to deceive / conceive the idea that the Earth is round.

3. Congratulations! You have conceived / received very good recommendations.

4. The authorities refused to extend / attend his visa.

5. He is planning to attend / pretend the conference on computer security.

6. Don't attend / pretend you didn't know about this!

7. This book is attended / intended for computer science students.

8. The access / accessible to the computer room is restricted to authorised personnel.

9. The students are making good progress / congress with their French.

10. Although he had revise / advise all his notes, he could not answer most of the questions.

11. A control program schedules and devises / supervises the performance of data processing.

12. His application for the university grant was injected / rejected.

13. After the disk is rejected / ejected, the project is over.

14. We design and produce learning materials in all subjects / rejects to support education and training.

15. We impress / express our gratitude for his kind donation.

 


Writing and Translation

Task 10. Make the written translation into Russian (2,100 characters).

Types of Web-Attackers

All attackers share certain characteristics. They don't want to be caught, so they try to conceal themselves, their identity and real geographic location. If they gain access to your system, they will certainly attempt to preserve that access, if possible, by building in extra ways to get access. Most of them have some contact with other people who have the same kinds of interests, and most will share the information they get from attacking your system.

Joyriders are bored people looking for amusement. They break in because they think you might have interesting data, or because it would be amusing to use your computers, or because they have nothing better to do. They're curious but not actively malicious; however, they often damage the system through ignorance or in trying to cover their tracks. Joyriders are particularly attracted to well-known sites and uncommon computers.

Vandals are out to do damage, either because they get their pleasure from destroying things, or because they don't like you. Vandals are a big problem if you're somebody that the Internet underground might think of as The Enemy (for example, the phone company or the government) or if you tend to annoy people who have computers and time (for example, you're a computer company with annoyed customers).

Fortunately, vandals are fairly rare. People don't like them, even people in the underground who have nothing against breaking into computers in general. Unlike other intruders, vandals have short but splashy careers. In most circumstances, deleting your data, or even ruining your computer equipment, is not the worst thing somebody could do to you, but it is what vandals do. Unfortunately, it's close to impossible to stop a determined vandal; somebody with a true vendetta against your site is going to get you, sooner or later.

Certain attacks are attractive to vandals but not to other types of attackers. For example, denial of service attacks are not attractive to joyriders; while joyriders are around in your system, they are just as interested as you are in having your computers up, running, and available to the Internet.

 

Task 11. Match the extracts with the types of documents.

A) Letter of Offer

B) Contract

C) CV

D) Application Letter

 

1) We are pleased to learn that you have moved into the area served by our bank. We cordially invite you to do your banking business here. Checking and saving accounts, loans for all purposes, and complete banking services are available to you at our convenient location.

2) EDUCATION

Bachelor of Science in Computer Science, May 2008

Illinois State University, Normal, Illinois

Courses taken included:

Software Engineering Design Artificial Intelligence

Operating Systems Design Object-Oriented Development

Java Development Relational Database Theory

C/C++ Programming Network Programming

3) I am currently a Systems Programmer at GCG Merchant Bank where I have two years' experience of specialized programming for the financial sector. I am familiar with C/UNIX, LAN/WAN technology, and relational databases.

4) Any business communication between the Parties is considered confidential or a business secret

Speaking

Task 12. Comment on the behaviour of Simon Greens, a computer user. What can you recommend him to improve his home computer security?

1. Simon uses antivirus software and updates it every year.

2. When he is sent a file attachment or program he doesn't expect or want, he usually opens it and sees what it is.

3. He doesn’t know what a firewall means.

4. Simon thinks he has no secret data in his home computer, that’s why he shouldn’t care about computer security.

5. When Simon is not using his computer, he always disconnects from the Internet.

6. His password for E-mail is his girl friend’s name.

7. Simon copies important files from his hard disk only in case he needs to transfer them to his office computer.

8. When something strange starts to happen on his computer, Simon immediately reboots it.

9. The security setting on Simon’s Internet browser software was set to High, but he reset it to Medium.

Task 13. Read the ideas of Hacker’s Ethics from Hackers by Steven Levi. Do you think the word hacker is used it its negative or positive meaning? Agree or disagree with the rules.

· Access to computers and anything which might teach you something about the way the world works should be unlimited and total.

· All information should be free.

· Mistrust authority – promote decentralization.

· Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.

· You can create art and beauty on a computer.

· Computers can change your life for the better.

· Like Aladdin's lamp, you could get it to do your bidding.

Task 14. Enjoy the joke.

Virus Alert

There is a virus being passed around electronically, orally, and by hand. This virus is called Worm-Overload-Recreational-Killer (W.O.R.K.).

If you receive W.O.R.K. from your colleagues, your boss, or any one else, do not touch W.O.R.K. under any circumstances. This virus will wipe out your private life completely.

Work has been circulating around our building for months and those who have been tempted to open W.O.R.K. or even look at W.O.R.K. have found that their social life is deleted and their brain ceases to function properly.

If you do encounter W.O.R.K., to purge the virus, you must immediately go to the nearest bar. Purchase the antidote known as Work-Isolating-Neutralizer-Extract (W.I.N.E.) or Bothersome-Employer-Elimination-Rebooter (B.E.E.R.). Take the antidote repeatedly until W.O.R.K. has been completely eliminated from your system.

Forward this virus warning immediately to at least 5 friends. Should you realize that you do not have 5 friends, this means that you are already infected by this virus and W.O.R.K. already controls your whole life.

 


Appendix. Confusable Words

1) proscribe (V) – объявлять вне закона; изгонять, высылать, запрещать, осуждать

prescribe (V) – предписывать, прописывать

inscribe (V) – вырезать, начертать, посвящать

describe (V) – описывать, характеризовать

 

2) impress (V) – производить впечатление

express (V) – выражать

depress (V) – подавлять, угнетать

oppress (V) – угнетать, притеснять

repress (V) – подавлять, репрессировать, вытеснять

 

3) receive (V) – получать

conceive (V) – постигать, понимать, замышлять

perceive (V) – постигать, понимать, ощущать, различать

deceive (V) – обманывать

 

4) extend (V) – протягивать, простираться

attend (V) – посещать

pretend (V) – претендовать, притворяться

intend (V) – намереваться, предназначать

 

5) access (N) – доступ, (V) иметь доступ

excess (N) – избыток, излишек

recess (V) – отодвигать назад, делать перерыв

process (N) – процесс, (V) обрабатывать

 

6) expel (V) – выгонять, исключать, высылать

repel (V) – отгонять, отклонять, вызвать отвращение

impel (V) – побуждать, заставлять

dispel (V) – разгонять, рассеивать

7) inform (V) – информировать

conform (V) – соответствовать, подчиняться

reform (N) – реформа, (V) реформировать

deform (V) – деформировать

perform (V) – исполнять

 

8) aside (Adv) – в сторону

outside (Adv) – вне

inside (Adv) – внутри

beside (Adv) – рядом, вне

 

9) supervise (V) – наблюдать, надзирать, руководить

revise (V) – проверять, исправлять, просматривать

devise (V) – придумывать, разрабатывать, завещать (недвижимость)

advise (N) – совет, (V) – советовать

 

10) subject (N) – предмет, тема, (V) подчинять, подвергать

eject (V) – выбрасывать, выгонять, увольнять, выселять

deject (V) – удручать, угнетать; подавлять

reject (V) – отвергать, отклонять

inject (V) – вводить, впрыскивать

 

11) omit (V) – упускать, пропускать

emit (V) – испускать, излучать

permit (V) – разрешать

remit (V) – прощать, отпускать, смягчать

 

12) progress (N) – прогресс, (V) развиваться, совершенствоваться

congress (N) – конгресс

regress (N)– регресс, возвращение, (V) возвращаться, регрессировать

digress (V) – отступать, уклоняться


Bibliography

1. Брунова Е.Г. Англо-русский учебный словарь по технологиям сетей передачи данных. – М.: Флинта: Наука, 2009, 160 с.

2. Boeckner, K., Brown P. Oxford English for Computing. – Oxford: Oxford University Press, 1996.

3. Demetrias, D. Information Technology. – Oxford: Oxford University Press, 2008.

4. Marks J. Check your English Vocabulary for Computers and Information Technology. – London: A & C Black, 2007.

5. Williams, I. English for Science and Engineering. – Massachusetts: Thompson, 2007.

 

 

Recommended Web-Sources

1. Samples of business letters, memos and contracts – http: //owl.english.purdue.edu

2. Samples of CV and business letters, hints to job search in IT http: //jobsearchtech.about.com

3. Cisco Networking Academy http: //www.cisco.com/web/learning/netacad


Елена Георгиевна Брунова

 

IT World

Учебно-методическое пособие

по английскому языку

для студентов Института математики и компьютерных наук

 

 

Подписано в печать Тираж зкз.

Объём п.л. Формат Заказ №

Издательство Тюменского государственного университета

625003, Тюмень, Семакова, 10.

 


Дата добавления: 2015-10-23; просмотров: 75 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
The OSI Reference Model| Меры безопасности при эксплуатации мотоцикла

mybiblioteka.su - 2015-2024 год. (0.104 сек.)