Главная страница
Навигация по странице:

  • Task 6. Say whether the statements given below are true or false: Задание 6. Определите истинность или ложность следующих предложений

  • Task 7. Make up the sentences: Задание7 . Составьте предложения

  • Task 8. Make the sentences negative and interrogative: Задание 8. Преобразуйте следующие предложения в вопросительную и отрицательную формы

  • Task 9. Translate the sentences from Russian into English: Задание 9. Переведите предложения с русского языка на английский

  • Ресурсы информационно-телекоммуникационной сети «Интернет»

  • ESSON 11 WHAT IS A COMPUTER VIRUS Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст

  • Types of Computer Viruses

  • Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы

  • Task 3. Match the English words given below with their Russian equivalents: Задание 3. Соотнесите следующие слова с соответствующим переводом

  • Task 4. Find the sentences with the words and word -combinations given below in the text

  • Task 5. Complete the following sentences corresponding to the contents of the text: Задание5 . Закончитепредложения

  • 110302_мет._проф_2018.docx1. Методические указания к практическим занятиям по дисциплине Иностранный язык в профессиональной сфере для студентов направления подготовки


    Скачать 381.32 Kb.
    НазваниеМетодические указания к практическим занятиям по дисциплине Иностранный язык в профессиональной сфере для студентов направления подготовки
    Анкорbyukbi
    Дата30.10.2022
    Размер381.32 Kb.
    Формат файлаdocx
    Имя файла110302_мет._проф_2018.docx1.docx
    ТипМетодические указания
    #762910
    страница8 из 14
    1   ...   4   5   6   7   8   9   10   11   ...   14

    Задание 5. Закончите предложения:

    1. .... infected a great amount of computers, connected to Internet network.

    2. According ... were also registered events of blocking the computers.

    3. It is necessary to differentiate between ... .

    4. ... they are a part of "tech-organism", but they have completely different functions.

    5. ... tricks with system halts means a dangerous one, and finally with a devastating destruction means a very dangerous virus.

    6. This virus is spreading very quickly ... .

    7. Apparently what the attacker did was this ... .

    8. If denunciatory verdict had been approved without modification ... .

    9. It may have done more ... .
    Task 6. Say whether the statements given below are true or false:

    Задание 6. Определите истинность или ложность следующих предложений:

    1. 2 November 1888 Robert Morris older, graduate student of information faculty of Cornwall University infected a small amount of computers, connected to Internet work.

    2. Network worm had struck 3200 machine that formed 7,9 % computers to network, and has show, that UNIX okay too.

    3. Symptom: hundreds or thousands of jobs start running on a UNIX system bring response to two.

    4. This virus is not spreading very quickly over the Milnet.

    5. Within the past 10 hours, it have hit > 10 sites across the country, both Arpaned and Milnet sites.

    6. Apparently what the attacker do this: he or she connected to send mail, issue the appropriate debug command, and had a big C program compiled.

    7. 22 January the author of the virus came to FBI headquarters in Washington on his own.

    8. 22 January 1989 a court of jurors has acknowledged Morris guilty.

    9. It was necessary to differentiate between reproduce program and Trojan horses.
    Task 7. Make up the sentences:

    Задание7. Составьте предложения:

    • This network UNITes
    • Viruses are an area of
    • Viruses seem to be the only alive organisms
    • Reproducing programs will not harm your own system

    • Network worm has struck

    • because they are aimed at producing as many copies of their own as possible.

    • 6200 machines that formed 7.3% computers to network.

    • pure programming, and carry intellectual functions on protection from being found.

    • machines of university centers, private companies and governmental agents.

    • in the computer environment.

    Task 8. Make the sentences negative and interrogative:

    Задание 8. Преобразуйте следующие предложения в вопросительную и отрицательную формы:

    1. Network worm has struck 6.200 machines that formed 7.3% computers to network.

    2. This virus is spreading very quickly over the Milnet.

    3. Well over 50 sites have been hit.

    4. Most of these are "major" sites and gateways.

    5. This utility can send a message into another program.

    6. FBI has imposed a prohibition on all materials relating to the Morris virus.

    7. Morris would have been sentences to 5 years of prison and 250.000 $ of fine.

    8. The author had to take part in the liquidation of its own creation.

    9. They have to fight for survival in complex conditions of conflicting computer systems.

    10. Destructive actions are not an integral part of the virus by default.
    Task 9. Translate the sentences from Russian into English:

    Задание 9. Переведите предложения с русского языка на английский:

    1.2 ноября 1988 Роберт Моррис младший, выпускник факультета информатики, разработал огромное число компьютеров, подключенных к сети Интернет.

    2.Эта сеть объединяет машины учебных центров, частных компаний, государственных служащих.

    3.Сетевой червь поразил 6200 машин, что составляет 7,3 % всех компьютеров сети.

    4.4 ноября автор вируса Моррис приехал в Вашингтон лично.

    5.22 Января 1989 года суд присяжных признал вину Морриса.

    6.Компьютерный вирус это исполнительный код, способный самовоспроизводиться.

    7.Вирусы кажутся очень живучими организмами в компьютерной среде.

    8.Существуют различные виды вирусов, которые делятся на классы и категории.

    Методическая литература

    1. Методические указания к практическим занятиям по дисциплине «Английский язык»: аннотирование и реферирование, для студентов вторых курсов технических специальностей. Ставрополь2015 г.

    2.Учебное пособие. Английский язык в сфере профессиональной коммуникации для студентов института информационных технологий и телекоммуникаций. Ставрополь 2018 г.

    3.Иностранный язык в сфере профессиональной коммуникации: методические рекомендации по организации самостоятельной работы студентов направления 11.03.02.Инфокоммуникационные технологии и системы связи. Профиль подготовки - Сети связи и системы коммутации (английский) / сост. ; ФГАОУ ВО Сев.-Кав. федер. ун-т. - Ставрополь: СКФУ, 2017. - с., экземпляров неограниченно. http://catalog.ncfu.ru/catalog/ncfu

    Ресурсы информационно-телекоммуникационной сети «Интернет»

          1. http://www.sil.org/linguistics/GlossaryOfLinguisticTerms/   глоссарий.содержащий более 950 лингвистических терминов с перекрестными ссылками и списком источников (SIL International). Ред. Е. Е. Loos, S.Anderson. D.H.Day Jr., P.C.Jourdan, J.D.Wingate.

          2. http:// biblioclub.ru – Университетская библиотека онлайн/

          3. http://www.ldc.upenn.edu/   LinguisticDataConsortium: лингвистический сайт университета Пенсильвании;

          4. http://orlapubs.org/ORLAPTJBS-L/L81.html  электронные учебные материалы по отдельным вопросам лингвистики и грамматики.

          5. http://www.cal.org/ericcll/faqs/RGOs/linguistics.html   сайт Центра прикладной лингвистики (the ERIC Clearinghouse on Languages and Lingu-stics, the Center for Applied Linguistics). Предоставляет материалы для изучающих иностранные языки и теорию языка.

          6. http://www.rsl.ru – Российская государственная библиотека.


    ESSON 11

    WHAT IS A COMPUTER VIRUS?
    Task 1. Read and translate the text:

    Задание 1. Прочитайте и переведите текст:

    A virus is a piece of software designed and written to adversely affect your computer by altering the way. It works without your knowledge or permission. In more technical terms, a virus is a segment of program code that implants itself to one of your executable files and spreads systematically from one file to another. Computer viruses do not spontaneously generate. They must be written and have aspecific purpose. Usually a virus has two distinct functions:

    • Spreads itself from one file to another without your input or knowledge. Technically, this is known as self-replication and propagation.

    • Implements the symptom or damage planned by the perpetrator. This could include erasing a disk, corrupting your programs or just creating havoc on your computer. Technically, this is known as the virus payload, which can be benign or malignant at the whim of the virus creator.

    A benign virus is one that is designed to do no real damage to your computer. For example, a virus that conceals itself until some predetermined date or time and then does nothing more than display some sort of message is considered benign.

    A malignant virus is one that attempts to inflict malicious damage to your computer, although the damage may not be intentional. There is a significant number of viruses that cause damage due to poor programming and outright bugs in the he viral code a high percentage of them are very malignant. Some of the more malignant viruses will erase your entire hard disk, or delete files.

    A malicious virus might alter one or more of your programs so that it does not work, as it should. The infected program might terminate abnormally, write incorrect information into your documents. Or, the virus might after the directory information on one of your system areas. This might prevent the partition from mounting, or you might not be able to launch one or more programs, or programs might not be able to locate the documents you want to open.

    What Viruses Do?

    Some viruses are programmed specifically to damage the data on your computer by corrupting programs, deleting files, or erasing your entire hard disk. Many of the currently known Macintosh viruses are not designed to do any damage. However, because of bugs (programming errors) within the virus, an infected system may behave erratically.

    What Viruses Don't Do?

    Computer viruses don't infect files on write-protected disks and don't infect documents, except in the case of Word macro viruses, which infect only documents and templates written in Word 6.0 or higher. They don't infect compressed files either. However, applications within a compressed file could have been infected before they were compressed. Viruses also don't infect computer hardware, such as monitors or computer chips. They only infect software.

    In addition, Macintosh viruses don't infect DOS-based computer software and vice versa. For example, the infamous Michelangelo virus does not infect Macintosh applications. Exceptions to this rule are the Word and Excel macro viruses, which infect spreadsheets, documents and templates, which can be opened by either Windows or Macintosh computers. Finally, viruses don't necessarily let you know that they are there - even after they do something destructive.

    Types of Computer Viruses

    Nowadays number of viruses is about 55.000. It increases constantly. New unknown types of viruses appear. To classify them becomes more and more difficult. In common they can be divided by three basic signs: a place of situating, used operation system and work algorithms. For example, according to these three classifications virus Chernobyl can be classified as a file infector and resident Windows virus. Further it will be explained what it means.

    File Infectors

    These are viruses that attach themselves to (or replace) COM and EXE files, although in some cases they can infect files with extensions SYS, DRV, BIN, OVL and OVY With this type of a virus, uninfected programs usually become infected when they are executed with the virus in memory. In other cases they are infected when they are opened (such as using the DOS DIR command) or the virus simply infects all of the files in the directory is run from (a direct infector). There are three groups of file infectors.

    Viruses of the first group are called overwriting viruses because they overwrite their code into an infected file erasing contents. But these viruses are primitive and they can be found very quickly.

    Oilier group is called parasitic or cavity viruses. The infected file is capable of work fully or partly. Viruses can copy itself into begin, middle or end of a file. They record their code in data known not to be used.

    The third group is called companion viruses. They don't change files. They make double of infected file so when an infected file is being started a double file becomes managing, it means a virus. For example, companion viruses working with DOS use that DOS firstly runs COM. file. Viruses make double file with the same name and with extension COM and copies itself in this file. During start of an infected file DOS run a COM. file with a virus firstly and then a virus starts an EXE file.

    Sometimes companion viruses rename file will be infected and record their code in a double file with old name. For example, the file XCOPY.EX is renamed into XCOPY.EXD and a virus record itself in file XCOPY.EXE. When this file is started computer runs a virus code firstly and after the virus starts original XCOPY, saved as XCOPY.EXD. Viruses like these ones were found not only in DOS. They were found in Windows and OS / 2.

    It is not only one way to make double files. For example there is a subgroup of companion viruses called path-companion viruses. They use special feature of DOS-PATH: hierarchical record of file location. The virus copies itself in a file with the same name but situated one level higher. In this case DOS will find a file with a virus.
    Task 2. Answer the following questions:

    Задание 2. Ответьте на следующие вопросы:

    1. What is a computer virus?

    2. How many types of viruses are there? What are they?

    3. How many groups of file-Infector do you know?

    4. What do companion viruses do?

    5. What don't viruses do?

    6. What do special feature of POS path-companion viruses use?

    7. Computer viruses do spontaneously generate, don't they?

    8. What viruses will erase your entire hard disk?

    9. How are viruses divided?

    10. Viruses don't necessarily let you know that they are there-even after they

    do something destructive, do they?
    Task 3. Match the English words given below with their Russian equivalents:

    Задание 3. Соотнесите следующие слова с соответствующим переводом:

    • a symptom

    • a viral code

    • software

    • direct infector

    • a bug

    • an infected program

    • a self-replication

    • a hard disk

    • destructive

    • a file infector

    • a damage

    • executable files

    • a malignant virus

    • a monitor

    • a computer chip

    • a computer virus

    • compressed files

    • a benign virus

    • macro virus

    • erasing contents

    • a work algorithm

    • an application

    • a resident virus

    • a place of situating

    • файл-инфектор

    • повреждать

    • жесткий диск

    • злостный вирус

    • монитор

    • компьютерный вирус

    • программная ошибка

    • неопасный вирус

    • симптом

    • программное обеспечение

    • макровирус

    • вирусный код

    место расположения

    • главный вирус

    • сжатые файлы

    • зараженная программа

    • резидентный вирус

    • самоответ

    • исполнительные файлы

    • разрушение

    • стирающий содержание

    • алгоритм работы

    • компьютерные чипы

    • приложение


    Task 4. Find the sentences with the words and word-combinations given below in the text:

    Задание 4. Найдите в тексте предложения, содержащие нижеследующие слова и выражения:

    • a segment of program code;

    • executable files;

    • a virus payload;

    • a viral code;

    • a partition from mounting;

    • DOS-based computer software;

    • Word and Excel macro viruses;

    • to make double of infected file.
    Task 5. Complete the following sentences corresponding to the contents of the text:

    Задание5. Закончитепредложения:

    1. Other group is called ...

    2. The third group is called ... .

    3. Usually a virus has two distinct functions ... .

    4. Computer viruses do not ... .

    5. Sometime companion viruses rename file will be.

    6. Virus copies itself in ... .

    7. Chernobyl can be ... .

    8. Viruses also don't .... .

    9. They must be ….. .

    10. Viruses of the first group are called ... .

    11. A virus is a piece of ... .

    12. This could include erasing a disk ... on your computer.

    13. Some viruses programmed ... your entire hard disk.

    14. ... on write-protected disks and ... in the case of .... .

    15. These are viruses that ... .



    Task 6. Say whether the statements given below are true or false:

    Задание 6. Определите истинность или ложность следующих предложений:

    1. Some of the more malignant viruses will erase your entire hard disk, or delete files.

    2. Computer viruses do infect files on write-protected disks and do infect documents, except in the case of Word macro viruses, which infect only documents and templates written in Word 6.0 or higher.

    3. Usually a virus has six distinct functions.

    4. There are many groups of file infectors.

    5. Nowadays number of viruses is about 55.000.

    6. Other group is called parasitic or overwriting viruses.

    7. Viruses also don't infect computer hardware such as monitors or computer chips; they only infect software.

    8. Virus is a software designed and written to adversely affect your computer.

    9. Viruses didn't spontaneously generate.

    10. A malignant virus is one that is designed to do no real damage to your computer.

    11. A benign virus might alter one or two of your programs so that it doesn't work, as it should.

    12. The infected programs second of you system area.

    13. In addition, Macintosh virus doesn't infect DOS - based computer software and vice versa.

    14. Finally, viruses don't necessarily let you know that they are there - even after do something destructive.

    15. In this case DOS wasn't find file with virus.
    1   ...   4   5   6   7   8   9   10   11   ...   14


    написать администратору сайта