Task 3. Choose the ending for each sentence from the two versions given.



1. One way to store data for a web page is

a) a file called an HTML document.

b) a unique address called a URL.

2. Some of these tags specify how the document is

a) to be displayed when viewed in a browser.

b) to be identified by a unique address.

3. Business sites may include

a) price list, information about products and comparisons of product features with those of competing products.

b) related document, graphics, sound and video files.

4. HTTP is

a) a protocol that works with TCP/IP to get Web resources to your desktop.

b) a set of specifications for creating HTML documents that a browser can display as a Web page.

5. Your browser creates a request for the data by

a) using the HTTP “GET” command.

b) using Web pages.

6. The Get method can be used to

a) pass a search query to a file server.

b) listen for HTTP requests.

Task 4. Vocabulary practice. Which word does not belong to the group?

a) documents, specifications, protocols, commands;

b) file, database, data, directory;

c) screen, display, desktop, browser;

d) connections, links, addresses, sites;

e) query, request, response, port.

 

 

Task 5. Complete the sentences using one of the given endings.

1. The WWW began as 2. HTTP is a protocol that works with 3. HTML is called a markup language  because 4. A typical Web page is based on 5. A browser is a software program that runs 6. As an alternative to HTML documents, Web server can store a) Web page data in other types of files, such as databases. b) on your computer and helps you access Web pages. c) a document stored in a file and identified by a unique address called URL. d) authors mark up their documents by inserting special instructions, called HTML tags. e) TCP/IP to get Web resources to your desktop. f) a project by high-energy physics researches in Switzerland.

Task 6. Transform the given sentences using the word in brackets without any change in the meaning.

1) When you type a … into the browser’s address box, you are requesting HTML data from a specific Web page.

a) HTML               b) URL                  c) HTTP                            d) TCP

2) A … is a software program that runs on your computer and helps you access Web pages.

a) Web server        b) e-mail server      c) FTP server         d) browser

3) Your browser creates a … for the data by using the HTTP “GET” command.

a) response             b) request               c) message                         d) instruction

4) Technically, a browser is the client half of the client/server software that facilitates communication between a personal computer and a… .

a) Web server        b) e-mail server      c) FTP server         d) web site

5) HTML is a set of specifications for creating … that a browser can display as a Web page.

a) HTML documents b) graphics             c) sound                 d) video files

 

 

Task 7. Fill in the gaps with appropriate words.

Many software tools are available today that make it easy to create Web pages. A Web page author can use a ___ editor, such as Notepad, to create Web pages “from scratch” by manually embedding HTML tags within the text of a document. It is also possible to use the HTML conversion routines included with many standard software applications. Another route is to use specialized Web ___ software, such as Microsoft FrontPage.

An HTML document is divided into two sections. The ___ section contains information used to define global properties for the document. The ___ section contains the text you want the browser to display, the HTML tags that format the text, and a variety of links. In addition to embedding HTML tags within the text, a Web page can be formatted with a ___ style sheet, which allows Web page designers to change formats throughout an HTML document without modifying individual HTML tags. To control the position of text and graphics on a Web page, many authors place these elements in the cells of a Web page ___.

Task 8. Read the text and find the answers to the questions.

What is a computer virus?

How does a virus work?

 

 Text 12 B. COMPUTER VIRUSES.HOW COMPUTER VIRUSES WORK

 

A computer virus - an unwanted program that has entered your system without you knowing about it - has two parts, which I’ll call the infector and the detonator. They have two very different jobs. One of the features of a computer virus that separates it from other kinds of computer program is that it replicates itself, so that it can spread (via flash cards transported from computer to computer, or networks) to other computers.

After the infector has copied the virus elsewhere, the detonator performs the virus’s main work. Generally, that work is either damaging data on your disks, altering what you see on your computer display, or doing something else that interferes with the normal use of your computer.

The sources seem to be service people, pirated games, putting flash cards in publicly available PCs without write-protect tabs, commercial software (rarely), and software distributed over computer bulletin board systems (also quite rarely).

Many viruses have spread through pirated – illegally copied or broken – games. This is easy to avoid. Pay for your games, fair and square.

If you see a shared PC or a PC that has public access, such as one in a college PC lab or library, be very careful about putting flash cards into that PC’s drives without a write-protect tab. Carry a virus-checking program and scan the PC before letting it write data onto floppies.

Despite the low incidence of actual viruses, it can’t hurt to run a virus-checking program now and then. There are actually two kinds of antivirus programs: virus shields, which detect viruses as they are infecting your PC, and virus scanners which detect viruses once they’ve infected you.

Viruses are something to worry about, but not a lot. A little common sense and the occasional virus-scan will keep you virus-free.

 

 

Task 9. Match the words and definitions listed below

 

1) a detonator a) a protective device
2) an infector b) to remove all traces of something
3) to boot destructive c) a device used to set off an explosion or other process
4) to trigger d) to discover or recognize that something is present
5) to erase e) to set a process in motion
6) pirated f) something which transmits a disease or virus
7) a shield g) stolen, obtained without the owner’s consent
8) to detect h) to load the operating system into memory

 

Task 10. Decide whether the following statements are true [T] or false [F] in relation to the information in the text. If you feel a statement is false, change it to make it true

 

1. Viruses cannot be spread through a computer network, only via flash cards transported from computer to computer. [ ]

2. The virus will spread as soon as you put the infected flashcard in your PC. [ ]

3. The infector works by interfering in some way with the normal use of your computer. [ ]

4. Most viruses spread through pirated games. [ ]

5. You should run an antivirus program every time you use your computer. [ ]

6. There are not very many viruses in circulation. [ ]

7. Virus shields are more effective than virus scanners. [ ]

Task 11. Transla te the following sentences from Ukrainian into English. Mind grammar

 

1. Комп'ютерні віруси, як і справжні біологічні віруси, є переносниками елементарної інформації, яка при вбудовуванні (to embed) в логічну структуру програми змушує її виконувати шкідливі дії, або просто уповільнює її роботу.

2. Лікування комп'ютерних вірусів - досить непросте завдання, адже далеко не у всіх випадках програму можна вилікувати, не пошкодивши її.

3. Кожен рік збільшення числа комп'ютерних вірусів змушує виробників антивірусних програм випускати доповнення для вірусних баз, а також оновлення програм-ревізорів.

4. Для профілактики (preventive measures) зараження вірусом рекомендується не запускати на комп'ютері програми, джерело яких ненадійний або невідомий, а також проводити регулярне сканування жорсткого диска і пам'яті.

5. Активізація багатьох вірусів відбувається в будь-які певні дні - в п'ятницю 13-го, в свята, в інші пам'ятні дати або навіть в день народження автора вірусу.

 

 

SPEAKING


Дата добавления: 2018-10-26; просмотров: 775; Мы поможем в написании вашей работы!

Поделиться с друзьями:






Мы поможем в написании ваших работ!