Learn the following words and expressions. — КиберПедия 

Своеобразие русской архитектуры: Основной материал – дерево – быстрота постройки, но недолговечность и необходимость деления...

Адаптации растений и животных к жизни в горах: Большое значение для жизни организмов в горах имеют степень расчленения, крутизна и экспозиционные различия склонов...

Learn the following words and expressions.

2017-10-07 352
Learn the following words and expressions. 0.00 из 5.00 0 оценок
Заказать работу

 

Malware (malicioussoftware) – поражающиевирусомпрограммы

malicious – злонамеренный, злокозненный

malevolent - недоброжелательный

crucial – значительный, ключевой

tobootup – загружаться, выполнять начальную загрузку

spreadlikewildfire - распространяться со сверхъестественной быстротой

toreside – обитать, пребывать

intheirheyday – в зените славы, расцвета

topropagate – распространяться

notorious - пользующийся дурной славой; печально известный; пресловутый;

vulnerable – уязвимый

dormant – дремлющий, потенциальный, скрытый

topinpoint – указать точно, засечь

breed – племя

a generic term – общееназвание

in common parlance - впросторечии

benign - добрый, милостивый

perse - сам по себе, по существу

 

EXERCISE 3

Answer the questions after reading the text.

· What viruses do you know?

· Where is the word ‘virus’ derived from? Do you know its plural form?

· Have you ever experienced destroying activity of any virus?

· Make a list of damages caused by viruses.

· What anti-virus programme do you have in your computer? Do you find it safe enough?EXERCISE

EXERCISE 4

Words can combine to make new compound words. Look at the examples. Then make as many compounds as you can combining a word from A with a word from B. Check the meaning.

Example: a computer program; an E-mail address

 

A B
computer   program  
E-mail   address  
companion file bomb spreadsheets
time Logic sector databases
boot data loss reformatting
system new-age crash application
Excel Access browser memory
web hard disk virus software
Macro      

 

EXERCISE EXERCISE 5

Look through the text about viruses again. Write questions to the answers.

____________________________________?

a. To replicate itself and execute itself.

____________________________________?

b. Like a real biological virus.

____________________________________?

c. In January, 2004.

____________________________________?

d. Trojan horses and worms.

____________________________________?

e. It doesn’t affect files.

____________________________________?

f. A combination of boot sector viruses and file viruses.

____________________________________?

g. It lies inert until specific conditions are met.

____________________________________?

h. ‘Friday the 13th’ virus.

____________________________________?

i. They are known to be platform-independent.

_ ___________________________________?

j. To destroy and delete files.

____________________________________?

k. It is the method in which they reproduce and spread.

 

EXERCISE EXERCISE 6

Open brackets. Use the correct form of an adverb (Present Participle or Past Participle).

1. A computer virus is a computer program (written/writing) to alter the way a computer operates.

2. Multipartite viruses come in through (infected/infecting) media and reside in memory.

3. With the (increased/increasing) capabilities of macro languages in applications, macro viruses are major threats.

4. The user often finds the banners (annoying/annoyed).

5. Trojans can also open back doors so that computer hackers can gain access to passwords and other personal information (storing/stored) on a computer.

6. The first PC virus was a boot sector virus (calling/called) (c)Brain, created in 1986 by two brothers, Basit and Amjad Farooq Alvi from Pakistan.

7. Traditional computer viruses emerged in the 1980s, (driven/driving) by the spread of personal computers.

8. If a user tries to start an (infecting/infected) program, the virus code may be executed first.

9. Some viruses try to avoid detection by killing the tasks (associated/associating) with antivirus software before it can detect them.

10. As computers and operating systems grow larger and more complex, old hiding techniques need to be (updated/updating) or (replaced/replacing).

 

EXERCISE EXERCISE 7

All these sentences are false. Make them negative to obtain the right answer.

1. Boot sector viruses were prevalent in the 1980s. (Not nowadays)

2. A companion virus has host files per se.

3. However, the slow infector approach does not seem very successful.

4. Windows XP uses the MS-DOS command prompt.

5. Trojan horses are viruses in the strict sense because they can replicate automatically.

6. Computer viruses come into existence spontaneously, they are likely to be created by bugs in regular programs.

7. Resident viruses search for hosts when they are started.

8. This approach fools anti-virus software, however.

9. Anti-virus software changes the underlying capability of host software to transmit viruses.

 

EXERCISE EXERCISE8

Find in the text sentences containing a word or a group of words from the following. Read them out and translate.

In the same sense, all kinds of malware, in a single day, along with, used to spread like wildfire, in their heyday, infamous, eventually, on a specific day or at specific hour, to a great extent

 

EXERCISE EXERCISE 9


Поделиться с друзьями:

Биохимия спиртового брожения: Основу технологии получения пива составляет спиртовое брожение, - при котором сахар превращается...

Опора деревянной одностоечной и способы укрепление угловых опор: Опоры ВЛ - конструкции, предназначен­ные для поддерживания проводов на необходимой высоте над землей, водой...

История развития хранилищ для нефти: Первые склады нефти появились в XVII веке. Они представляли собой землянные ямы-амбара глубиной 4…5 м...

Автоматическое растормаживание колес: Тормозные устройства колес предназначены для уменьше­ния длины пробега и улучшения маневрирования ВС при...



© cyberpedia.su 2017-2024 - Не является автором материалов. Исключительное право сохранено за автором текста.
Если вы не хотите, чтобы данный материал был у нас на сайте, перейдите по ссылке: Нарушение авторских прав. Мы поможем в написании вашей работы!

0.009 с.