Learn the following words and expressions. — КиберПедия 

Своеобразие русской архитектуры: Основной материал – дерево – быстрота постройки, но недолговечность и необходимость деления...

Особенности сооружения опор в сложных условиях: Сооружение ВЛ в районах с суровыми климатическими и тяжелыми геологическими условиями...

Learn the following words and expressions.

2017-10-07 351
Learn the following words and expressions. 0.00 из 5.00 0 оценок
Заказать работу

 

Malware (malicioussoftware) – поражающиевирусомпрограммы

malicious – злонамеренный, злокозненный

malevolent - недоброжелательный

crucial – значительный, ключевой

tobootup – загружаться, выполнять начальную загрузку

spreadlikewildfire - распространяться со сверхъестественной быстротой

toreside – обитать, пребывать

intheirheyday – в зените славы, расцвета

topropagate – распространяться

notorious - пользующийся дурной славой; печально известный; пресловутый;

vulnerable – уязвимый

dormant – дремлющий, потенциальный, скрытый

topinpoint – указать точно, засечь

breed – племя

a generic term – общееназвание

in common parlance - впросторечии

benign - добрый, милостивый

perse - сам по себе, по существу

 

EXERCISE 3

Answer the questions after reading the text.

· What viruses do you know?

· Where is the word ‘virus’ derived from? Do you know its plural form?

· Have you ever experienced destroying activity of any virus?

· Make a list of damages caused by viruses.

· What anti-virus programme do you have in your computer? Do you find it safe enough?EXERCISE

EXERCISE 4

Words can combine to make new compound words. Look at the examples. Then make as many compounds as you can combining a word from A with a word from B. Check the meaning.

Example: a computer program; an E-mail address

 

A B
computer   program  
E-mail   address  
companion file bomb spreadsheets
time Logic sector databases
boot data loss reformatting
system new-age crash application
Excel Access browser memory
web hard disk virus software
Macro      

 

EXERCISE EXERCISE 5

Look through the text about viruses again. Write questions to the answers.

____________________________________?

a. To replicate itself and execute itself.

____________________________________?

b. Like a real biological virus.

____________________________________?

c. In January, 2004.

____________________________________?

d. Trojan horses and worms.

____________________________________?

e. It doesn’t affect files.

____________________________________?

f. A combination of boot sector viruses and file viruses.

____________________________________?

g. It lies inert until specific conditions are met.

____________________________________?

h. ‘Friday the 13th’ virus.

____________________________________?

i. They are known to be platform-independent.

_ ___________________________________?

j. To destroy and delete files.

____________________________________?

k. It is the method in which they reproduce and spread.

 

EXERCISE EXERCISE 6

Open brackets. Use the correct form of an adverb (Present Participle or Past Participle).

1. A computer virus is a computer program (written/writing) to alter the way a computer operates.

2. Multipartite viruses come in through (infected/infecting) media and reside in memory.

3. With the (increased/increasing) capabilities of macro languages in applications, macro viruses are major threats.

4. The user often finds the banners (annoying/annoyed).

5. Trojans can also open back doors so that computer hackers can gain access to passwords and other personal information (storing/stored) on a computer.

6. The first PC virus was a boot sector virus (calling/called) (c)Brain, created in 1986 by two brothers, Basit and Amjad Farooq Alvi from Pakistan.

7. Traditional computer viruses emerged in the 1980s, (driven/driving) by the spread of personal computers.

8. If a user tries to start an (infecting/infected) program, the virus code may be executed first.

9. Some viruses try to avoid detection by killing the tasks (associated/associating) with antivirus software before it can detect them.

10. As computers and operating systems grow larger and more complex, old hiding techniques need to be (updated/updating) or (replaced/replacing).

 

EXERCISE EXERCISE 7

All these sentences are false. Make them negative to obtain the right answer.

1. Boot sector viruses were prevalent in the 1980s. (Not nowadays)

2. A companion virus has host files per se.

3. However, the slow infector approach does not seem very successful.

4. Windows XP uses the MS-DOS command prompt.

5. Trojan horses are viruses in the strict sense because they can replicate automatically.

6. Computer viruses come into existence spontaneously, they are likely to be created by bugs in regular programs.

7. Resident viruses search for hosts when they are started.

8. This approach fools anti-virus software, however.

9. Anti-virus software changes the underlying capability of host software to transmit viruses.

 

EXERCISE EXERCISE8

Find in the text sentences containing a word or a group of words from the following. Read them out and translate.

In the same sense, all kinds of malware, in a single day, along with, used to spread like wildfire, in their heyday, infamous, eventually, on a specific day or at specific hour, to a great extent

 

EXERCISE EXERCISE 9


Поделиться с друзьями:

Индивидуальные очистные сооружения: К классу индивидуальных очистных сооружений относят сооружения, пропускная способность которых...

История создания датчика движения: Первый прибор для обнаружения движения был изобретен немецким физиком Генрихом Герцем...

Семя – орган полового размножения и расселения растений: наружи у семян имеется плотный покров – кожура...

Археология об основании Рима: Новые раскопки проясняют и такой острый дискуссионный вопрос, как дата самого возникновения Рима...



© cyberpedia.su 2017-2024 - Не является автором материалов. Исключительное право сохранено за автором текста.
Если вы не хотите, чтобы данный материал был у нас на сайте, перейдите по ссылке: Нарушение авторских прав. Мы поможем в написании вашей работы!

0.007 с.