О. В. Фёдорова е. В. Мезина е. В. Хамис английский язык в сфере информационных технологий и коммуникаций учебное пособие


Example: a computer program; an E-mail address



бет35/128
Дата02.01.2022
өлшемі0.79 Mb.
#454247
түріУчебное пособие
1   ...   31   32   33   34   35   36   37   38   ...   128
ПОСОБИЕ ИИТиК Федорова,Мезина, Хамис 2014

Example: a computer program; an E-mail address


A

B

computer




program




E-mail




address




companion

file

bomb

spreadsheets

time

Logic

sector

databases

boot

data

loss

reformatting

system

new-age

crash

application

Excel

Access

browser

memory

web

hard disk

virus

software

Macro











EXERCISE EXERCISE 5

Look through the text about viruses again. Write questions to the answers.

____________________________________ ?

a. To replicate itself and execute itself.

____________________________________ ?

b. Like a real biological virus.

____________________________________ ?

c. In January, 2004.

____________________________________ ?

d. Trojan horses and worms.

____________________________________ ?

e. It doesn’t affect files.

____________________________________ ?

f. A combination of boot sector viruses and file viruses.

____________________________________ ?

g. It lies inert until specific conditions are met.

____________________________________ ?

h. ‘Friday the 13th’ virus.

____________________________________ ?

i. They are known to be platform-independent.

_ ___________________________________ ?

j. To destroy and delete files.

____________________________________ ?

k. It is the method in which they reproduce and spread.
EXERCISEEXERCISE 6

Open brackets. Use the correct form of an adverb (Present Participle or Past Participle).


  1. A computer virus is a computer program (written/writing) to alter the way a computer operates.

  2. Multipartite viruses come in through (infected/infecting) media and reside in memory.

  3. With the (increased/increasing) capabilities of macro languages in applications, macro viruses are major threats.

  4. The user often finds the banners (annoying/annoyed).

  5. Trojans can also open back doors so that computer hackers can gain access to passwords and other personal information (storing/stored) on a computer.

  6. The first PC virus was a boot sector virus (calling/called) (c)Brain, created in 1986 by two brothers, Basit and Amjad Farooq Alvi from Pakistan.

  7. Traditional computer viruses emerged in the 1980s, (driven/driving) by the spread of personal computers.

  8. If a user tries to start an (infecting/infected) program, the virus code may be executed first.

  9. Some viruses try to avoid detection by killing the tasks (associated/associating) with antivirus software before it can detect them.

  10. As computers and operating systems grow larger and more complex, old hiding techniques need to be (updated/updating) or (replaced/replacing).


EXERCISEEXERCISE 7



Достарыңызбен бөлісу:
1   ...   31   32   33   34   35   36   37   38   ...   128




©dereksiz.org 2024
әкімшілігінің қараңыз

    Басты бет