Файл: Методические указания Новосибирск 2009.doc

ВУЗ: Не указан

Категория: Не указан

Дисциплина: Не указана

Добавлен: 04.12.2023

Просмотров: 242

Скачиваний: 3

ВНИМАНИЕ! Если данный файл нарушает Ваши авторские права, то обязательно сообщите нам.

СОДЕРЖАНИЕ

Module I

Computers and Information Technology

Unit 1

Introduction to Computers

Unit 2

Computer Hardware

Unit 3

Computer Software

Unit 4 The Internet Vocabulary 1. create [krı'eıt] творить, создавать2. network ['netwɜ:k] (инфор.) сеть3. spread [spred] распространять(ся), простирать(ся) 4. share [ʃeə] делиться; поделиться5. transfer ['trænsfɜ:] перемещать, передавать6. backbone ['bækbəυn] главная опора; основа; суть7. maintain [meın'teın] (тех.) обслуживать; содержать в исправности8. provide [prə'vaıd] предоставлять (услуги), давать9. provider (информ.) провайдер, поставщик информационных и коммуникационных услуг10. browse [braυz] просмотреть11. browse facility [fə'sılətı] (компьют.) средство просмотра12. feature ['fi:tʃə] (компьют.) функция, функциональность, опция, (сленг) фича (у программного продукта, системы)13. surf the Internet [sɜ:f] «путешествовать» по Интернету (тж. surf the net)14. etiquette ['etıket] этикетпрофессиональная этика15. netiquette ['netıket] (информ.) сетевой этикет16. flood (with spam) [flʌd] засыпать; заваливать(спамом)17. evaluate [ɪ'væljυeɪt] оценивать4.1. How would you describe what the Internet is? Discuss it with your partner.4.2. Match the terms and their definitions.a) Internet b) World Wide Web c) e-mail1. A global network connecting millions of computers. 2. The transmission of messages over communications networks. 3. A system of Internet servers that support specially formatted documents. 4.3. Now read the text and try to describe the Internet again using the key vocabulary in bold type.Believe it or not, the Internet was created way back in 1969, during the Cold War, by the United States military. It was meant to be a "nuke-proof"(1) communications network. Today, the Internet spreads across the globe and consists of countless networks and computers, allowing millions of people to share information. Data that travels long distances on the Internet is transferred on huge lines known collectively as the Internet backbone. The Internet is now maintained by the Internet service pro-viders.Many people think the Internet and the World Wide Web are the same thing. They're not! The World Wide Web is what you are browse. It is one of the many features of the Internet. E-mail, FTP(2), and Instant Messaging (3) are also features of the Internet.(http://www.sharpened.net)(1) "nuke-proof" устойчивый к воздействию ядерного оружия(2) FTP File Transfer Protocol протокол передачи файлов (используемый в Internet протокол передачи файлов между хост-компьютерами)(3) Instant Messaging система мгновенной передачи текстовых сооб-щений4.4. Interview your partners if they surf the Internet. Use the questions given below. Do you often surf the Internet? Which websites do you usually visit? Do you download any programs from the Internet? If so, what are they? Do you belong to any chat forum? Why? / Why not? What feature of the Internet do you consider the most attractive? Why? What is netiquette? 4.5. Read the passage below and think if you always follow the netiquette. Why? / Why not? Discuss it with your partner.Netiquette, or net etiquette, refers to etiquette on the Internet. Good netiquette involves respecting others' privacy and not doing anything online that will annoy or frustrate other people. Three areas where good netiquette is highly stressed are e-mail, online chat, and newsgroups. For example, people that spam other users with unwanted e-mails or flood them with messages have very bad netiquette. You don't want to be one of those people. If you're new to a newsgroup or online chat room, it may help to observe how people communicate with each other before jumping in.4.6.Think of good and bad points of the Internet and fill in the table. You can work either individually or in pairs. Advantages of the Internet Disadvantages of the Internet 4.7. Read Text A, compare your ideas with information given, and extend the table. How many advantages/disadvantages are there in your table? First, study the vocabulary you may need to understand the text.mankind [mæn'kaɪnd] (n) 1) человечество; человеческий род ['mænkaɪnd] 2) мужчины, мужской полmagnitude ['mæɡnɪtju:d] (n) 1) величина, paзмеры, 2) важность; значимостьoutweigh [̗aυt'weɪ] (v) быть тяжелее, превосходить в весеwealth [welθ] (n) изобилие, избытокtarget ['tɑ:ɡɪt] (n) цельadvent ['ædvent] (n) наступление (какой-л. эпохи, какого-л. события), available [ə'veɪləbl] (adj) доступный; имеющийся в распоряжении, entertainment [̗entə'teɪnmənt] (n) развлечение; зрелищное мероприятиеnumerous ['nju:mǝrəs] (adj) многочисленныйavailable [ə'veɪləbl] (adj) доступный; имеющийся в распоряженииtheft [θeft] (n) воровство, кражаobstruct [əb'strʌkt] (v) препятствовать, затруднять, мешатьprone (adj) подверженный (чему-л.)TEXT AAdvantages and Disadvantages of the InternetThe Internet has been perhaps the most outstanding innovation in the field of communication in the history of mankind. As with every single innovation, the Internet has its own advantages and disadvantages. But usually, greater magnitude of advantages outweighs its disadvantages. Today the Internet has brought a globe in a single room. Right from news across the corner of the world, wealth of information to shopping, purchasing the tickets of your favourite movie.Advantages CommunicationThe main target of the Internet has always been the communication. By the advent of the Internet, our earth has become a global village. Now we can communicate with a person who is sitting in the other part of the world.Information Information is probably the biggest advantage the Internet offers. Students and children are among the top users who surf the Internet for research. Today, it is almost required that students should use the Internet for research purpose of gathering resources. Entertainment Downloading games, visiting chat rooms or just surfing the Web are some of the entertainments. In fact, the Internet has been successfully used by people to find life long partners. When people surf the Web, there are numerous things that can be found. Music, hobbies, news and more can be found and shared on the Internet. Services Many services are now provided on the Internet such as online banking, job seeking, purchasing tickets. Often these services are not available off-line or can cost you more. E-Commerce It has got a really amazing and wide range of products from technology to household needs. Disadvantages Theft of personal information If you use the Internet, you may be facing danger as your personal information such as name, address, credit card number, etc. can be accessed and used by a criminal.SpammingSpamming refers to sending unwanted e-mails, which provide no purpose and obstruct the entire system. Virus threat Computers attached to the Internet are more prone to virus attacks and they can end up into crashing your whole hard disk. PornographyThis is perhaps the biggest threat related to your children’s healthy mental life. (http://www.buzzle.com)4.8. Match the words below to make word partners.1. global a. chat rooms2. surf b. privacy3. visit c. danger4. download d. village5. household e. needs6. face f. disk7. hard g. the Internet8. respect h. games4.9. Now use the word partners to complete these sentences. McLuhan believes that the world is rapidly becoming a ________, in which mankind is interconnected by contemporary technology, especially television and the world wide web. This method will allow you to _________ without leaving any information about what browser you're using, which computer system you have. Many people who ________ use them as a place to discuss their problems and get a kind of a support. People of all ages visit special free sites to safely ___________ of high quality. You are not computer addict, so low-powered computer is suitable for all your _________. How does computer software usually react when it ________ of virus attack? _____ can store anywhere from 20MB to more than 200GB. Sites like Facebook must ___________. They should not tell my friends what I buy on other sites. 4.10. Analyse the “-ing” form words in bold type in Text A. Are they gerunds? Why/Why not?Do you know that…? Because a gerund (base form of VERB+ -ing) acts as a noun, it can be used after prepositions, too. (e.g. That computer programmer is famous for spilling coffee into his keyboard. Complete the sentences, using gerund.1. He never thought of ____.2. This student is very clever at _____.3. I don’t insist on ____.4. We were tired of _____.5. Did you succeed in ____?6. Who is responsible for ____?7. They were grateful for ____.8. He had some difficulty in ____.Now give your own examples.4.11. Work in pairs or in small groups. Discuss if you always trust the information from the Internet? Why/Why not?Now skim Text B and say what the main idea of the text is.4.12. Read Text B and give your ideas on what could help Zack to understand that Professor Butz's Web page wasn't a reliable source of information?(To understand the text better use the vocabulary given below.)TEXT BThe Web – Teaching Zack to ThinkAs more and more students access the Internet for research, it's important that they learn how to validate online information. The Internet is a place where you can find "proof" of almost any belief system that you can imagine. And, for too many students, "If it's on the Internet, it must be true."The following story is also true.Fourteen-year-old Zack was asked to research a unique topic for his history class. Zack knew a bit about using reliable sources on the Internet, so when he found some information on a Web page on the US Northwestern University site he felt sure that he had found a reliable source of information for his project. The topic was unique too–Holocaust Revisionism–Zack had never heard of that before, so he decided to write his history paper on "How the Holocaust Never Happened."Zack found his "information" from a Web page at http://pubweb. northwestern.edu/abutz/ (no longer at this URL), titled "Home Web Page of Arthur R. Butz." On his low-key home page, Butz explained that he wrote "A short introduction to the study of Holocaust revisionism" and that his material was intended for "advanced students of Holocaust revisionism." At the top of the page Butz identified himself as "Associate Professor of Electrical and Computer Engineering, Northwestern University». His article began with the following: “I see principal reasons for the widespread but erroneous belief in the legend of millions of Jews killed by the Germans during World War II: During both world wars Germany was forced to fight typhus… That was one of the main reasons for a high death rate in the camps, and the crematoria... Look at the above situation from the perspective of a 14-year-old, untrained to think critically about information. He's researching the Holocaust, and suddenly finds this Web page. His teacher told him to find a unique topic, and this certainly fit the bill. The page is simple and clear. It's written in a calm, logical tone. The page is clearly intended for experts in its field. Best of all is the source: Northwestern University! And a professor to boot! Perfect. validate ['vælɪdeɪt] v проверять достоверностьproof [pru:f] (n) доказательствоbelief [bɪ'li:f] (n) убеждение, мнение; вераreliable [rɪ'laɪ əbl] (adj) заслуживающий доверия, достоверныйreliable information – достоверные сведенияreliable source – достоверный, надежный источникlow-key (adj) 1) неброский; сдержанный2) гамма тёмных тоновin a lowkey – в тёмных тонах Associate Professor доцент университетаwidespread ['waɪdspred] (adj) широко распространённыйerroneous [ɪ'rəυnɪəs] (adj) ложный; ошибочный;typhus ['taɪfəs] (n) сыпной тифfit the bill отвечать всем требованиямto boot к общей пользе; вдобавок; к тому же4.13. Now read Text C and check your ideas. (To understand the text better use the vocabulary given below.)TEXT CThinking about What We've FoundThe fact is that students increasingly depend on the Internet for information, so it's important that they develop ways to evaluate their findings. Zack could have used some, or all, of the following techniques to decide whether the site was a reliable source for information.PurposeTry to determine a Web site's purpose. What is it trying to do? Why was it created? Most Web sites are designed to sell services and products, present information, put ideas forward, or entertain. Many sites do several of these at once.A Web site's purpose will not always be clear. Look at Butz's site. His purpose is surely advocacy, although he comes across as an objective information provider, especially in the closing sentence of his article: "Surely any thoughtful person must be skeptical." Would a 14-year-old know how to distinguish between objective information and propaganda?Understand the purpose(s) of a Web site, and that those purpose(s) may not be entirely obvious. Author The next step in validation involves the site's author. We all know that it's easy to fool people. Many people will believe someone if he or she sounds authoritative. Butz is a professor, sure, but he's an Engineering professor. How does that qualify him to speak as an expert on the Holocaust? It doesn't. But people see "Professor" and take what he says seriously.Zack didn't know anything about Butz, but could have researched his background. If Zack ran a search for "Arthur Butz," on the search engine Google, he would find Butz's name on a page titled "Holocaust Deniers" at the Web site for the anti-hate organization HateWatch (http://www.spl-center.org/intel/hatewatch/). Similarly, Zack would find Butz's article at a second hate directory site listed under "A Guide to Hate Groups on the Internet: Hate Books, Newsletters and Articles". Zack would find Butz mentioned negatively in a March 1998 USA Today article titled, "College anti-Semitism on the rise, according to new report." Zack would also find Butz's book described as popular among "anti-Semites" in a review of Deborah Lipstadt's book Denying the Holocaust.If Zack had run this multi-search on Butz, he would have seen how other people categorize Butz' work.Establish the credibility of the author. Meta-Web Information Meta-Web information validates Web pages solely within the context of other Web pages.Let's start with the URL, or address, of a Web page. You need to know when they're accessing a personal home page. Most Internet Service Providers give their subscribers a few megabytes of free space on a Web server to use as they want.Here are two sample URLs: and stefan/>. An experienced Web user knows that both URLs point to personal home pages.In the first example, the word "users" is the user name of someone who accesses the Internet through cdsinet.net. In the second example, focus on the . A tilde () indicates a Web site that has been created by someone given space on a Web server. "stefan" is the user name of someone who accesses the Internet through icon-stl.net.Knowing the above, if Zack had looked at Butz's URL - abutz/index.html> – he'd have seen the , an indicator that this is a personal Web site. Just as Zack can know something about individuals by their clothing, he can learn about a Web site by looking at its URL. Clothing tells us a lot, but the company a person keeps tells us more. Learning how a Web page interacts within the network of all other Web sites is valuable information.Meta-information sources.It is always a good idea to look beyond the Internet for sources of authentic information.evaluate [ɪ'væljυeɪt] (v) оценивать; определять количество, качество и т. п.technique [tek'ni:k] (n) метод; способdetermine [dɪ'tɜ:mɪn] (v) определять; устанавливатьentertain [̗entə'teɪn] (v) развлекать, заниматьadvocacy ['ædvəkəsɪ] (n) 1) защита2) пропаганда (взглядов и т. п.)distinguish [dɪ'stɪŋɡwɪʃ] (v) различать, распознаватьauthoritative [ɔ:'θɒrɪtətɪv] (adj) авторитетный; надёжныйdeny [dɪ'naɪ] (v) отрицать, отвергатьdenier тот, кто что-либо отвергаетcredibility [̗krədə'bɪlətɪ] (n) вероятность, правдоподобиеexperienced [ɪk'spɪərɪənst] опытный, знающийtilde ['tɪldə] (n) (полигр.) тильда (tilde)beyond [bɪ'jɒnd] (prep) за; по ту сторону, внеauthentic [ɔ:'θentɪk] (a) 1) подлинный, аутентичный2) достоверный, верный4.14. Translate the text into English and then finish it. Use the vocabulary from the Texts B,C.Все большее количество студентов используют Интернет как источник информации для своих исследований. Сегодня в Интернете можно найти доказательства любых идей, которые могут прийти вам в голову. А ведь многие считают ту информацию, которая представлена в Интернете вполне достоверной. Но это не так. Поэтому очень важно научиться оценивать достоверность такой информации. Для того чтобы определить является ли сайт надежным источником информации, можно использовать несколько методов: ___________4.15. Write a list of recommendations to help students critically evaluate the reliability of a Web site.4.16. Do the crossword.1. Electronic messages sent to someone over the Internet. 2. Copy information from a web site to your own computer.3. The place on the Internet where a company/organization/etc stores its documents. 4. A system linking millions of documents stored on Internet computers around the world.5. Move form one document or web site to another, to find information.6. Text, image or button that connects to other destination on the web.7. A device that makes connecting to the Internet possible.8. A group of computers joined together. 9. Now provide your own definition. 9 1 o o o o o o o o 2 3 4 5 6 7 8 1   2   3   4   5   6   7   8   9   ...   15

Module II

Fundamentals of Engineering

Unit 5

Engineering

Unit 6

Engineering Materials

Unit 7

Nanotechnology

Unit 8

Robotics

Unit 9

My Faculty

Module III

Job-hunting

Unit 10

Finding a Job

Unit 11

Making a Choice

Unit 12

Working Life

Unit 13

Employment

Unit 14

A Job Interview. CV. A Letter of Application

References

a disc, which is a physical means of storing the software.

(http://www.sharpened.net)
3.3. Fill in the gaps with the terms from the box


data applications programs package (suite) software (2)
office program office suites



______ is the word used to refer to ______ (sets of computer instructions written in a computer language) and _____ that is input, processed and output by a computer system.

_______ are programs that allow the user to do various types of work on a computer e.g. word processors, databases. A set of related applications programs is referred to as a_____. Some applications programs, such as word processors, spreadsheets and databases, are commonly referred to
as _______ because they are commonly used in a typical office.

_______such as Microsoft office are sets of interrelated office programs.
3.4. Match each applications program with its function.


word processors

storing data so that it can be easily searched and sorted

spreadsheets

drawing

databases

creating multimedia slide shows

graphics

creating and editing texts

games

sending electronic mail messages

accounts

performing various business tasks

payroll

creating and editing web pages

presentation program

editing graphic images

e-mail

writing programs to add features to existing applications and creating integrated program systems

P I M (personal information program)

creating publications to be printed by a professional printer

D T P (desktop publishing program)

keeping track of appointments, address book

small business tools

playing fast action game

website editor

performing calculations using formulas

image editor

calculating salaries

developer tools

keeping business accounts

3.5. Study the vocabulary you may need to understand Text A.

scattered ['skætəd] (p. p. от scatter) разбросанный (о домах,

предметах), разрозненный

scatter ['skætə] (v) разбрасывать (on, over), рассеивать

distinct [dɪ'stɪŋkt] (adj) особый, индивидуальный;

отличный (от других)

maintain [meɪn'teɪn] (v) обслуживать; содержать

в исправности

acronym ['ækrənɪm] (n) акроним

formulae ['fɔ:mjυli:] (pl от formula) формулы

introduce [̗ɪntrə'dju:s] (v) вводить в употребление;


применять

portable ['pɔ:təbl] (adj) машинонезависимый; мобильный;

переносной

payroll ['peɪrəυl] (n) платёжная ведомость

purchase ['pɜ:tʃəs] (v) покупать, закупать; приобретать

executable выполнимый, осуществимый

vendor ['vendɔ:] (n) (юр.) продавец

conform [kən'fɔ:m] (v) соответствовать (to или with – чему-л.)
3.6. Before reading Text A, try to fill in the gaps in the sentences. Use vocabulary given at the beginning of Unit 3.

1. A ______ is a program written in one of the high-level languages.

2. A program written in a high-level language must be interpreted into ______ before the computer reads and processes it.

3. A program designed to perform a specific task is called an _______.

4. The ______ is the program produced when the original program has been converted into machine code.

5. A _____ is a program that converts a high-level language into machine code.

6. The systems program which fetches required systems routines and links them to the object is known as the _______.

7. The _______ is the program directly executable by the computer.
3.7. Now read Text A and check your answers.

TEXT A

Programs and Programming Languages

Computers are known to provide capability to make rapid calculations, compare and make decisions, and send messages through communication links to geographically scattered places, etc.

The organization of these capabilities into a system which is capable of solving problems and realizing aims depends on computer programs. The process of telling a computer what to do and how to do is called programming. The set of instructions is known as the program.

Programs are considered to be an integral part of computer systems: they have been given the name “software” to indicate that they are distinct from but parallel to the “hardware”.

More exactly, software includes not only the computer programs but also their documentation and the training required for people to use total system and operate and maintain the programs.

Computers can deal with different kinds of problems if they are given the right instructions for what to do. Instructions are first written in one of the high-level language, e.g. FORTRAN, COBOL, ALGOL, PL/I, PASCAL, or C, depending on the type of program, and it cannot be processed by the computer until it has been compiled, which means interpreted into machine code .Usually a single instruction written in a high-level language, when transformed into a machine code, results in several instructions. Here is a brief description of some of the many high–level languages:

FORTRAN – acronym for FORmula TRANslation. This language is used for solving scientific and mathematical problems. It consists of algebraic formulae and English phrases. It was introduced in the United States in 1954.

COBOL – acronym for Common Business-Oriented Language. This language is used for commercial purposes. COBOL, which is written using English statements, deals with problems that do not involve a lot of mathematical calculations. It was first introduced in 1959.

ALGOL – acronym for ALGOrithmic Language .Originally called IAL, which means International Algebraic Language. It is used for mathematical and scientific purposes. ALGOL was first introduced in Europe in 1960.

PL/I – Programming Language I. It was developed in 1964 to combine features of COBOL and ALGOL. Consequently, it is used for data processing as well as scientific applications.

BASIC – acronym for Beginner’s All–purpose Symbolic Instruction Code. It was developed in 1965 at Dartmouth College in the United States for use by students who require a simple language to begin programming.

C – developed in the 1970s to support the UNIX operating system. C is a highly portable general–purpose language.



Other such languages are APL (developed in 1962), PASCAL (named after Blaise Pascal and developed in 1971), LISP and PROLOG, both of which are used for work in artificial intelligence. LOGO is a development of LISP which has been used to develop computer–based training (CBT) packages.

When a program written in one of these high–level languages is designed to do a specific type of work such as to calculate a company’s payroll or calculate the stress factor on a roof, it is called an applications program. Institutions either purchase these programs as packages or commission their own programmers to write them to meet the specifications of the users.

The program produced after the source program has been converted into machine code is referred to as an object program or object module. This is done by a computer program called the compiler, which is unique for each computer.

The compiler is a systems program which may be written in any language, but the computer’s operating system is a true systems program which controls the central processing unit (C P U), the input, the output, and the secondary memory devices. Another systems program is the linkage editor, which fetches required systems routines and links them to the object module (the source program in machine code). The resulting program is then called the load module, which is the program directly executable by the computer. Although systems programs are part of the software, they are usually provided by the manufacturer of the machine.

Unlike systems programs, software packages are sold by various vendors and not necessarily by the computer manufacturer. They are a set of programs designed to perform certain applications which conform to the particular specifications of the user.

3.8. Summarize the information on different high-level computer languages by completing the table below.


Language

Date of development

Purpose

Characteristics




1959













Mathematical
and scientific













Combines features
of COBOL and ALGOL

BASIC
















To support Unix
operating system







1962








3.9. Choose the proper word to fill in the gap. Change its form if necessary.

instruction, instruct, instructed, instructor

a) Our math’s _____ explained to us the principles of binary arithmetic.

b) We were _____ to document our programs very carefully.

c) Both ____ and data have to be changed to machine code before the computer can operate on them.

compilation, compiler, compile, compiled

a) Our university computer does not have a PASCAL________.

b) Usually, a programmer _____ his program before he puts in the data.

c) A source program cannot be directly processed by the computer until it has been ____.


result, results, resulting

a) The linkage editor links systems routines to object module. The _______ program, referred to as the load module, is directly executed by the computer.

b) The _________ of these mathematical operations were obtained from the university mainframe and not from my micro.
3.10. Look at the words in bold type in Text A. Can you give your comments from the grammar perspective?

Do you know that…?

The –ing form (present participle) can be used to form adjective from verbs; it then describes the person or thing ‘who/that does the action of the verb’ (active): e.g. ‘This story excites people’ can become ‘This is an exciting story’.

The –ed form* (past participle) can also be used as an adjective; it then describes the person or thing ‘to whom/which the action of the verb is done’ (passive): e.g. we can say, ‘The play in this theatre is exciting the children’ and ‘there are a lot of excited children in this theatre’.

*Do not forget that irregular verbs have specific forms of Past Participle.
Write these sentences, changing the verbs in brackets into the present or past participle.

1. My sister is (interest) in exotic flowers, and she has some (interest) ones in her garden.

2. Her friend felt (relax) because he had a (relax) weekend.

3. Her computer skills were quite (astonish). (Astonish) students used to watch her easily writing complicated programs.

4. One very windy night Sarah heard the sound of (break)glass upstairs, and when she went to look , she found a (break) window.

5. John was very (tire) because it was (tire) having so many lessons yesterday.

6. The tourist agency made a (surprise) suggestion. Mary was quite (surprise) to hear it.

7. The movie was quite (depress) so she felt (depress).

8. He was (bore). He listened to very (bore) lecture.

Now give your own examples.
3.11. Read the text. Find sentences with Past Participle and translate them.

Your future life is strictly dependent on the profession you choose. There are various jobs to take up and many ways how to lead the future life.

In my opinion, the best choice is to take up the profession connected with computers. Today computers are considered to be the symbol of modern era. Everything connected with Internet, computers, multimedia and interactive television seems to be the techniques of the future. This advanced techniques is present in every part of our life. Everyone should be familiar with it, because it is essential.

If I would have to choose my future profession right now, I would probably decide to work as a programmer, computer scientists or net administrator. I am fond of the new techniques and software and hardware novelties. Computers are my passion.

Now finish the idea: If I would have to choose my future profession right now, I would probably decide to work as …
3.12. Translate into English and reproduce the dialogue.

– Have you seen an interesting advertisement in the last issue of “The Economist”?

– Я ещё не читал его.

– The School of Engineering offers a new program in information system. Applicants are invited for jobs in this field.

– Профессор Смит говорил мне об этом. Эта программа очень интересна. Она создана, чтобы помочь людям со знанием компьютера найти работу.

– Don’t you think that our son can lecture on this new program?

– А почему бы и нет? Он ведь выпускник отделения информационных технологий и несколько лет принимал участие в исследо-вательском проекте, связанном с проблемами суперкомпьютеров и их производством.

– As far as I remember his research interests cover software and application.

– И что они говорят о контракте?


– It is a three years contract and it may be extended for further two years. I’ll write Mike a letter.

Это слишком долго. Я лучше позвоню ему.
3.13. Before reading Text B match the key software terms with their definitions.
software operating system malware virus search engine


  1. The most important program that runs on a computer. Every general-purpose computer must have an operating system to run other programs.

  2. Computer instructions or data. Anything that can be stored electronically.

  3. A computer program that retrieves documents or files or data from a database or from a computer network.

  4. Short for malicious software, software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse.

  5. Self-replicating computer program that spreads by inserting copies of itself into other executable code or documents.


3.14. Read Text B using a dictionary and then make a list of software terms which are new for you. Give the definitions to these terms.

TEXT B

All about Software
Categories of applications software explained

For years people understood the term software to refer to computer instructions, programs or data. Basically, anything that could be stored electronically on your computer is considered software. Traditionally, software has been divided into two different categories: systems software and applications software. However, in addition to those, an entire new batch of wares has entered the computer vernacular in recent years.
Systems Software

System software, as the diagram above illustrates, sits directly on top of your computer's hardware conponents (also referred to as its bare metal). It includes the range of software you would install to your system that enables it to function. This includes the operating system, drivers for your hardware devices, linkers and debuggers. Systems software can also be used for managing computer resources. Systems software is designed to be used by the computer system itself, not human users.
Applications Software

Unlike systems software, applications software is designed to be used by end-users. Applications software, in essence, sits on top of system software, as it is unable to run without the operating system and other utilities. Applications software includes things like database programs, word processors and spreadsheets, e-mail applications, computer games, graphics programs and such. Generally, people will refer to applications software as software.
All the Other 'Ware Terminology

Today we find new terms created frequently to classify types of applications software. You have classifications based on usage, for example games or accounting software, office applications,and other categories where the category is derived based on the main use of the software. Unfortunately, we also have a newer group of software related terms that have a negative association. Whileethe applications software itself may be useful, , it may also carry hidden programs or utilities that may cause undesirable effects.
Malware

We have a whole selection of software that may come bundled under the name of malware. Short for malicious software, malware is any software that has been designed (programmed) specifically to damage or disrupt a computer system. The most common forms of malware are computer viruses, worms, and Trojan horses.

Other common types of software is adware and spyware. Adware is considered a legitmate alternative offered to consumers who don't wish to pay for software. Today we have a growing number of software developers who offer their goods as "sponsored" freeware until you pay to register. Generally most or all features of the software are enabled but you will be viewing sponsored advertisements while the software is being used. If you're using legitimate adware, when you stop running the software, the ads should disappear, and you always have the option of disabling the ads by purchasing a registration key.

Unfortunately some applications that contain adware track your Internet surfing habits in order to serve ads related to you. When the adware becomes intrusive like this, then we move it into the spyware category and it then becomes something you should avoid for privacy and security reasons. Spyware works like adware, but is usually a separate program that is installed unknowingly when you install another application. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers. Unlike adware, spyware is considered a malicious program. For more information on spyware and adware, we recommend you check out Webopedia's "The Difference Between Adware & Spyware".