Uploaded by kpu73133

Учебное пособие для ПИ 2022

advertisement
Министерство сельского хозяйства
Российской Федерации
ФГБОУ ВО «Кубанский государственный аграрный
университет имени И. Т. Трубилина»
Н. В. Погребняк, C. Г. Карамышева
ИНОСТРАННЫЙ ЯЗЫК
(АНГЛИЙСКИЙ)
В СФЕРЕ ИНТЕРНЕТ-ТЕХНОЛОГИЙ
Учебное пособие
Краснодар
КубГАУ
2022
УДК 811.111:004 (075.8)
ББК 81.432.1
П43
Рецензенты:
А. В. Зиньковская – профессор кафедры английской филологии
Кубанского государственного университета,
д-р филол. наук, доцент;
Т. А. Хитарова – доцент кафедры иностранных языков
Кубанского государственного аграрного университета,
канд. филол. наук
Погребняк Н. В.
П43
Иностранный язык (английский) в сфере интернеттехнологий : учеб. пособие / Н. В. Погребняк, C. Г.
Карамышева. – Краснодар : КубГАУ, 2022. – 137 с.
ISBN 978-5-907550-89-6
В учебном пособии, разработанном в соответствии с
программой по иностранным языкам для неязыковых вузов,
грамматический материал представлен в виде правил, таблиц и
упражнений. Включены аутентичные тексты по специальности,
научно-популярные статьи из зарубежных периодических изданий,
а также упражнения, направленные на развитие навыков говорения,
чтения и перевода оригинальной литературы в профессиональной
сфере.
Предназначено для обучающихся по направлениям подготовки
09.03.02 Информационные системы и технологии, 09.03.03
Прикладная информатика.
УДК 811.111:004 (075.8)
ББК 81.432.1
© Погребняк Н. В.,
Карамышева С. Г., 2022
© ФГБОУ ВО «Кубанский
государственный аграрный
университет имени
2
И. Т. Трубилина», 2022
ISBN 978-5-907550-89-6
ВВЕДЕНИЕ
Учебное пособие разработано на основании программы по
иностранным языкам для неязыковых вузов и предназначено
для контактной и самостоятельной работы обучающихся и
совершенствования их грамматических навыков. Освоение
материала направлено на расширение активного словарного
запаса,
приобретение
навыков
профессионально
ориентированного чтения, перевода и коммуникации на
английском языке.
В основу структуры учебного пособия положен
тематический принцип, т. е. включает такие темы, как: кража
личных данных, предупредительные меры, антивирусное
программное обеспечение, облачные вычисления, системное
администрирование.
При отборе материала в качестве основного критерия
руководствовались
аутентичностью
текстов
и
их
информативной ценностью.
Каждая тема содержит грамматический материал,
упражнения для его закрепления, словарь, учебные тексты, а
также упражнения, направленные на развитие навыков
перевода оригинальной литературы в профессиональной
сфере.
Теоретический материал изложен на русском языке.
Комплекс упражнений рассчитан на дальнейшее развитие и
закрепление навыка чтения, различных видов устной речи
(диалогической, монологической), а также письменной
(реферирование, перевод).
3
UNIT 1. IDENTITY THEFT
Grammar:
I. There …. and it …
II. Subject and object pronouns, reflexive pronouns
III. ‘One’ и ‘ones’
Reading and Speaking:
Text A: Protect Yourself, Secure Your Future
Text B: Identity Theft
Text C: How does Pharming work?
Text D: How to Protect Yourself against Pharming
GRAMMAR
I There ... and it …
Предложение в английском языке обязательно должно
содержать подлежащее (кроме повелительного наклонения).
Если объект, который совершает действие, отсутствует, то в
английском
предложении
используется
формальное
подлежащее
there или it.
There используется
– в
предложениях, которые представляют новую
информацию,
что-то
упоминается
впервые.
Такие
предложения сообщают, что объект существует (стоит, сидит,
находится ...), часто со словами a, some, any.
There isn’t a Post Office but there are three shops.
– В разных временах и в модальных конструкциях таких,
как there will be / there must be / there might be / there used
4
to be / there must have been, there should have been / there is
sure / bound (= sure) / likely to be:
‘Is there a flight to Rome tonight?’ ‘There might be.
There’s sure to be a flight to Rome tonight. (=There’s bound
to be)
– Наличие чего-то и его количество, часто со словами a
lot of, many, much, more, enough и с числительными:
There is not much time left. There are thirty days in April.
– There are употребляется с существительными во
множественном
числе,
there
is
употребляется
с
существительными в единственном числе, неисчисляемыми
существительными
и
при
перечислении
ряда
существительных в единственном числе и неисчисляемых
существительных
There is milk in your coffee.
There’s an apple, some bread and a bottle of milk.
– There в значении ‘to/at/in that place’:
When we got to the party, there were already a lot of people
there (= at the party).
It используется
– для обозначения определенного неодушевленного
предмета, места, факта, ситуации, чтобы избежать
повторения:
We went to the new restaurant. It’s very good. (It = the restaurant)
– чтобы сообщить о времени, датах, погоде или
расстоянии:
It’s nine a.m. It’s 50 miles from here to Brighton.
– для обозначения неизвестного лица:
Did someone ring? – It was Vicky.
– в конструкциях с to-infinitive или that-clause:
It was nice to meet your friends.
It’s a pity (that) you can’t come with us.
1. Rewrite the sentences in brackets using it.
5
We sometimes go surfing. (Surfing is really good fun.)
It’s really good fun.
1. I bought a shirt in the market. (The shirt was very cheap.) ...
2. Someone rang. (The caller was Mike.) ..........
3. Our heating is out of order. (The situation is a nuisance.) ....
4. I’ve left my coat at home. (The weather is very warm.) .......
5. Don’t lose your credit card. (To keep it somewhere safe is
important.) ………….
2. Choose the correct option.
1 I’m happy. There’s /It’s Friday and I love Fridays.
2 There isn’t/It isn’t a lesson today.
3 There is/It is white bread if you don’t like brown bread.
4 Is there/it five o’clock already?
5 I like Norwich. There’s/It’s a great city.
6 There/It is next to the bank.
7 Listen, there is/it is something I need to tell you.
8 Here’s a letter. There’s/It’s for you.
9 There isn’t/It isn’t my book.
10 Oh no! Is there/it closed?
11 Is there/it any more news?
3. Put in there or it.
1. Is............. the fifteenth today? – No, the sixteenth.
2. The road is closed. .................’s been an accident.
3. Take a taxi. ..................’s a long way to the station.
4. ..........was a motor bike outside. …. looked very expensive.
5. Will ............... be any delays because of the strike? – Well,
........... would be a good idea to ring the airline and check.
6. ..............was wet, and ...................was a cold east wind after midnight, and ............... were few people on the streets.
6
4. Put in there is/was or it is/was. Some sentences are questions (is there? / is it?) and some are negative (isn’t/wasn’t).
1 The journey took a long time. ………… a lot of traffic.
2 What’s this restaurant like? ……….. good?
3 …….. something wrong with the computer. Can you check
it for me?
4 I wanted to visit the museum, but ..……... enough time.
5 ‘What’s that building? ….. a hotel?’ ‘No, ...... a theatre.’
6 How do we get across the river? …….. a bridge?
7 A few days ago…a big storm, which caused a lot of damage.
8 I can’t find my phone. ……. in my bag – I just looked.
9 It’s often cold here, but ………. much snow.
10 ‘How was your trip?’ ‘ ............. a disaster. Everything went
wrong.’
11 ………..anything on television, so I turned it off.
12 ‘.... a bookshop near here?’ ‘Yes, ... one in Hudson Street.’
13 When we got to the cinema, … a queue outside. ... a very
long queue, so we decided not to wait.
14 I couldn’t see anything. ……. completely dark.
15 ... difficult to get a job right now.... a lot of unemployment.
5. Put in there and a form of be, e.g. is, are, was, have
been, will, would or may / must / wouldn’t / should / used to /
(be) going to.
1 Victor: ............. any restaurants here that open on a Sunday?
Rachel: ..... a café in the High Street which is open for lunch.
2 Alan: ........... a train at twelve thirty, isn’t there? Let’s catch
that one.
7
Mark: OK. ............. time to finish our discussion on the train.
3 Vicky: What’s happened? Why .... so many police cars here?
Daniel: ................... a hold-up at the bank.
4 Tom: Last night .... a party next door. I couldn’t get to sleep.
Melanie: .............. must ............. a lot of people there.
5 If people drove more carefully, .... fewer accidents.
6 ‘Do we have any eggs?’ ‘I’m not sure. …………… some in
the fridge.’
7 I think everything will be OK. I don’t think ... any problems.
8 Look at the sky ……… a storm.
9 ‘Is there a school in the village?’ ‘Not now…. one, but it
closed.’
10 People drive too fast on this road. I think … a speed limit.
11 If people weren’t aggressive, ……….. any wars.
12 They live on a busy road. ……… a lot of noise.
II Subject and object pronouns (субъектные / объектные
местоимения),
reflexive
pronouns
(возвратные
местоимения)
Субъектные местоимения (subject pronouns) отвечают
на вопрос «кто?» / «что?»; являются в предложении
подлежащим.
Объектные (object pronouns) – на разные вопросы
косвенных падежей: «кого / что?», «кому / чему?», «о ком / о
чем?» и т. д., являются дополнением.
She cooks everyday for him (Она готовит для него каждый
день), здесь she – это subject pronoun, а him – object pronoun.
8
Возвратные
местоимения
в
английском
языке
используются, когда действие глагола направлено на само
действующее лицо, то есть субъект и объект совпадают, это
одно и то же лицо.
I advertise myself. She speaks about herself.
Для того, чтобы образовать возвратное местоимение,
частица self присоединяется к объектным местоимениям:
Обратите внимание на различие форм возвратных
местоимений в единственном и во множественном числе:
Number
FIRST
PERSON (1-е лицо)
SECOND PERSON
(2-е лицо)
THIRD PERSON
(3-е лицо)
Singular
myself
yourself
Plural
ourselves
yourselves
himself/herself/itself
themselves
Существует
неопределенно-личное
местоимение
oneself, его употребляют, когда говорят о ком-то в общем, не
указывая на определенного человека:
It is a great ability – to put oneself in the others’ position.
Глаголы, которые всегда употребляются с возвратными
местоимениями: absent oneself, avail oneself (of) and pride
oneself (on):
9
Monica absented herself from work. Jim prides himself on his
cooking.
Глаголы, которые часто употребляются с возвратными
местоимениями, но могут использоваться и без них: amuse,
blame, cut, dry, enjoy, hurt, and introduce:
I’ve cut myself with the bread knife. I’ve cut my thumb.
Можно применять объектные местоимения после этих
глаголов (me, him, her, etc.) только когда они относятся к
кому-то другому, не к субъекту, т. е. субъект и объект
различны:
He amused me (НЕЛЬЗЯ I amused me// cut me)
Идиомы с возвратными местоимениями:
We really enjoyed ourselves. (= had a good time)
I hope the children behave themselves. (= behave well)
Just help yourself to sandwiches, won’t you? (= take as many
as you want)
Please make yourself at home. (= behave as if this was your
home)
I don’t want to be left here by myself. (= on my own, alone)
Глаголы, которые не употребляются с возвратными
местоимениями: afford, approach, complain, concentrate, decide, feel + adjective, get up, hurry (up), lie down, meet, remember, rest, relax, sit down, stand up, wake up, wonder,
worry
Shall we meet at the cinema? I feel uncomfortable.
С предлогами места и после with (= accompanied by)
возвратные местоимения не используются, в этом случае –
объектные местоимения (me, you, him, etc.):
There was an empty chair beside her.
I brought the children with me.
10
Есть глаголы, которые обычно не употребляются с
возвратными местоимениями, но могут использоваться вместе
с ними для того, чтобы акцентировать что-то или
подчеркнуть, что действие выполняется с трудом: dress,
hide, shave, wash, get up, sit down, stand up, wake up and get
wet, get tired, get dressed, get married
I sat myself down with difficulty. Old Bill has got himself married at last! My friend is disabled, but she can dress herself.
Сравните значение и употребление -selves и each other:
Kate and Joe stood in front of the mirror and looked at themselves. (= Kate and Joe looked at Kate and Joe)
Kate looked at Joe; Joe looked at Kate. They looked at each
other.
Можно использовать one another вместо each other:
How long have you and Ben known each other? (= known one
another?)
6. Supply the correct reflexive pronouns in the following.
1 I enjoyed ............. very much at the party.
2 I see you’ve cut ………. again. Won’t you ever learn how to
shave?
3 How did Tom dry ....................? - He used your towel!
4 She has no reason to blame .............. for what has happened.
5 I think that poor dog has hurt ............................... .
6 ‘One prides ................. on one’s patience,’ the boss said, in
his usual pompous manner.
7 We amused ............................ playing football on the beach.
8 Our new neighbours knocked at our door and introduced...................... .
9 Sheila prides ...... on her ability to judge people’s characters.
10 Bill had to absent ....... from work when his baby was born.
11
7. Use reflexive pronouns (myself/yourself/ourselves etc.)
or object pronouns (me/you/us etc.) in the following.
1 John knows how to take care of ………………
2 Have you got any money on............................ ?
3 Come and sit beside...........................................
4 Strictly between ............................ she’s wrong.
5 She’s very certain of...........................................
6 There’s a big truck in front of.............................
7 Granddad doesn’t like living by..........................
8 Jimmy tied his shoelaces all by...........................
9 Amy had a great holiday. She enjoyed …………
10. It’s not my fault. You can’t blame …………….
11. What I did was really bad. I’m ashamed of……
12. We’ve got a problem. I hope you can help ………
13. ‘Can I take another biscuit?’ ‘Of course. Help. …….’
14. You must meet Sarah. I’ll introduce ……….. to her.
15. Don’t worry about us. We can take care of …………
16. Don’t worry about the children. I’ll take care of ……
17. I gave them a key to our house so that they could let … in.
8. Complete these sentences. Use myself/yourself etc. only
where necessary. Use these verbs (in the correct form):
concentrate defend dry feel meet relax shave
blame burn enjoy express hurt introduce put
1. Martin decided to grow a beard because he was fed up with
………..
2. I wasn’t very well yesterday, but I ……. much better today.
3. I climbed out of the swimming pool and …… with a towel.
12
4. I tried to study, but I couldn’t …………………………….
5. If somebody attacks you, you need to be able to ………….
6. I’m going out with Chris this evening. We’re …….. at 7.30.
7. You’re always rushing around. Why don’t you sit down and
………………...?
8. Steve …………….. to the other guests at the party.
9. Ben fell down some steps, but fortunately he didn’t ………
10. It isn’t Sue’s fault. She really shouldn’t ………………….
11. Please try and understand how I feel. …….in my position.
12. The children had a great time at the beach. They really ….
13. Be careful! That pan is very hot. Don’t …………………..
14. Sometimes I can’t say exactly what I mean. I wish I could
………………better.
9. Complete the sentences with ourselves/themselves or
each other.
1. How long have you and Ben known ………………. ?
2. If people work too hard, they can make ………….. ill.
3. I need you and you need me. We need ……………....
4. In Britain friends often give ……… presents at Christmas.
5. Some people are very selfish. They only think of ………..
6. Tracy and I don’t see …………….. very often these days.
7. We couldn’t get back into the house. We had locked …out.
8. They’ve had an argument. They’re not speaking …… at the
moment.
9. We’d never met before, so we introduced.... to ………….
10. Put in reflexive pronouns (ourselves, etc.) or object
pronouns (us, etc.).
KEEP SMILING!
Psychiatrists have proved that happiness is the secret of good
health. Mood really can affect the body 1............ This means we
13
all have to look after 2............... We have to enjoy 3............. and
take pride in 4.................. and we’ll rarely have to visit the doctor.
Praise helps 5............ to learn and is good for us, too. We all know
how pleased young children feel when they learn to dress 6...........
and do things by 7........... We should praise 8.................. for their
achievements. Bosses rarely have a good word for 9........................
Yet if we want to be happy and healthy, we need people around
10…..... who keep telling 11............ how marvellous we are. Then
we l2............ will believe that we are marvellous, too!
III ‘One’ и ‘ones’ с исчисляемыми существительными
Используют one для существительных в единственном
числе и ones для существительных во множественном числе,
чтобы избежать повторения того же существительного.
I don’t want to wear my old shoes. I want to wear my new
ones.
С неисчисляемыми существительными one или ones не
используется, например:
There was no hot water. I had to wash in cold.
Мы можем использовать one или ones или опустить
после this, that, these, those; each / another; which; или
после превосходной степени прилагательного, н-р:
I don’t like these sweaters. I prefer those (ones) over there.
The last question is the most difficult (one).
Нельзя опускать one или ones
прилагательных, например:
после the, every,
The film wasn’t as good as the one we saw last week.
I rang all the numbers, and every one was engaged.
14
11. Supply one or ones where necessary.
1 Have you met our new secretary? – Is she the....................
who joined us last week?
2 You know the man I mean, the ................ who lent you $50.
3 Which actresses did you meet? – The .......... who appeared
in Act 1.
4 Here are your stamps. These are the................. you paid for.
5 Which computer did you use? – The.... that is in your office.
6 The children I like to teach are the ............ who like to learn.
7 Pour away that dirty water and get some clean.....................
8 If I were you, I’d sell that old car and buy a new..................
12. Supply one or ones. Put a tick beside the sentences
where one/ones could be omitted
1 Which gloves would you like to see? – The …….. in the
window.
2 Which shoes fit you best? – The large........................
3 Which pullover do you prefer? – The red........................
4 Which jeans are you going to buy? – The most expensive
........................
5 Please pass me that plate. – Which........................?
6 Two of those coats suit you very well. – Which...................?
7 I’d like to test-drive one of these two cars. – This........ or
that ………
8 I’d like to see some rings, please. – These............. in silver
or those ............. in gold?
9 I’d like to try one of these shirts. Please pass me that white...
10 I think, on the whole, I prefer these yellow........................
15
READING AND SPEAKING
In our fast-paced digital world, it’s never been more important
to protect your personal information. If your Social Security number, health records, bank accounts, financial information, PINS
and passwords, or other data falls into the wrong hands, the damage can be swift, severe, and long-lasting.
1.
What does this quotation mean to you?
‘If we don’t act now to safeguard our privacy, we could all
become
victims
of
identity
theft.’
Bill
Nelson
2. Vocabulary. Listen, read and memorize.
№
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Vocabulary
identity theft
occur
consent
impersonate
fraud
fraudulent
tax returns
damage
gains access
to spot existing account
fraud
utility
easy to prevent
insurance rates
a tax refund
an alias
submit phony tax infor-
Translation
кража личных данных
иметь место
согласие
олицетворять
мошенничество
поддельный
налоговые декларации
урон
получать доступ
выявить мошенничество с
существующим аккаунтом
коммунальные услуги
легко предотвратить
страховые ставки
возврат налога
псевдоним
предоставить фальшивую
16
17
18
mation
miscellaneous forms
scammers
налоговую информацию
разные формы
мошенники
3. Read Text A.
TEXT А. Protect Yourself, Secure Your Future
Identity theft occurs when someone uses your personal information to:
– Purchase goods, property, or services without your consent;
– Create fake financial accounts in your name;
– Impersonate you for financial gain or to receive medical
care;
– File fraudulent tax returns under your name to obtain your
refund; and/or
– Commit other crimes that can damage your personal credit
and reputation.
Victims often spend hundreds of hours and thousands of dollars to fix the damage caused by identity thieves.
What Does Identity Theft Look Like?
Identity theft can take many forms. Often, identity thieves like
to simply steal money. This is called financial identity theft.
Financial identity theft generally takes one of two forms: existing account fraud or new account fraud. Existing account fraud
is extremely common, and there is a good chance you have already
experienced it at some point in your life. This type of fraud happens when an identity thief gains access to an account that you
created. For example, if an identity thief makes a purchase using
your stolen credit card number, you are a victim of existing account fraud. Existing account fraud can be relatively easy to spot,
but difficult to prevent. Diligently monitoring your account statements for unauthorized activity is one of the best ways to spot existing account fraud. Be sure to check your account statements at
least once a month, but more frequently if possible.
17
New account fraud occurs when identity thieves use stolen information to create a new account in your name. By using your
stolen information (name, date of birth, or Social Security number,
for example), someone may be able to open a credit card or utility
account in your name. This type of fraud can be very dangerous
because it may go undiscovered for many years. Victims often discover the new accounts when they are contacted by a debt collection agency or applying for credit. New account fraud can be hard
to spot, but it’s easy to prevent. A free tool, called a credit freeze is
extremely effective at preventing new account fraud. Checking
your credit report annually from each of the three major credit reporting agencies is a good way to see if an identity thief has fraudulently opened an account in your name. The three major credit
reporting agencies are Equifax, Experian, and TransUnion. Check
your credit report from all three major credit reporting agencies at
least once per year. Also consider placing a credit freeze with all
three credit reporting agencies before identity theft happens. This
is one of the only preventative tools in the world of identity theft.
Other common forms of identity theft include medical, criminal,
and income tax fraud.
– Medical identity theft occurs when an unauthorized person
uses your personal information to receive medical care. This is
dangerous because it could negatively affect your insurance rates,
or potentially lead to an inaccurate diagnosis or dangerous drug
interaction.
– “Criminal” identity theft occurs when a person uses your
personal information in the commission of a crime, often as an alias or during a traffic stop.
– Income tax identity theft occurs when a person uses your
personal information to file a fraudulent tax return to obtain a tax
refund. The identity thief will submit phony tax information to receive a large tax refund in your name.
Identity thieves seem to be endlessly inventive. As a result,
the list of miscellaneous forms of identity theft is ever-growing. If
identity thieves can find a way to benefit from using your stolen
18
information, they will. Common examples include government
benefits, Social Security payments, jobs, apartment rentals, student
loans, utility accounts, and much more.
4. Find in the text the equivalents to the following word
combinations:
1) Приобретать товары, имущество или услуги без вашего
согласия; 2) подавать поддельные налоговые декларации на
свое имя, чтобы получить возмещение; 3) кража финансовых
данных; 4) мошенничество с существующей учетной записью;
5) мошенничество с новой учетной записью; 6)
злоумышленник совершает покупку; 7) мониторинг состояния
учетной записи на предмет несанкционированных действий;
8) мошенничество с новой учетной записью; 9) возможность
замораживания кредита; 10) медицинское, уголовное и
налоговое мошенничество.
5. Find words and phrases in Text A with the following
meanings:
1. Someone who has suffered as a result of someone else’s actions or beliefs, or as a result of unpleasant circumstances.
2. Detrimental effects.
3. A person who steals another person’s property, especially by
stealth and without using force or threat of violence.
4. A small plastic card issued by a bank, building society, etc.,
allowing the holder to purchase goods or services on credit.
5. An arrangement by which a company or the state undertakes
to provide a guarantee of compensation for specified loss, damage,
illness, or death in return for payment of a specified premium.
6. Answer the questions:
1. When does identity theft occur?
19
2. What are the most common forms of identity theft?
3. What kind of fraud can be relatively easy to spot, but difficult to prevent?
4. Which type of fraud can be hard to spot, but easy to prevent?
5. When do victims usually discover new accounts?
6. Why is medical identity theft dangerous?
7. What is Income tax identity theft?
7. What are the common examples of using your stolen information?
7. Vocabulary. Listen, read and memorize.
№
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Vocabulary
affect
customer
instance
to avoid
сard scanning
unsolicited emails
malware
spyware
legitimate business
pretexting
phishing
CEO
pharming
malicious
Translation
затронуть
клиент
случай
избежать
считывание с карточки
нежелательные электронные письма
вредоносное ПО
шпионское ПО
законный бизнес
претекстинг
фишинг
исполнительный директор
фарминг
злонамеренный
8. Read Text B.
TEXT B. Identity Theft
Recently, a series of identity thefts has affected our customers.
Unfortunately, this led to several instances of fraud occurring at
20
our bank. The best way to avoid these events is to be informed.
Please take a moment to familiarize yourself with some common
ways that criminals steal personal information.
Card scanning is one simple form of identity theft. This is
when someone uses a card scanner to record the information
stored on credit or debit cards. Card scanning can be used to collect passport information as well.
Email also presents opportunities for cyber thieves. Spam, or
unsolicited emails, can contain malware. This malicious software
includes spyware, Trojan horses, and worms that can infect one’s
computer and steal information. Phishing is also conducted over
email. This occurs when thieves trick people into giving them information by pretending to represent a legitimate business.
Pretexting is similar to phishing but is often done over the
phone. One of the most popular examples of pretexting attack is
when an unknown caller contacts a staff member and imitates the
CEO or someone in power to obtain sensitive information.
Pharming occurs when a hacker redirects someone to a site
operated by them. Pharming sets up a website that contains copies
of pages from a legitimate website in order to capture confidential
information from users, such as credit card, bank account, social
security numbers and other sensitive personal information. Users
are automatically redirected to malicious URLs when hackers hack
into DNS servers and change IP addresses.
9. Find in the text the equivalents to the following word
combinations:
1) Серия краж личных данных; 2) распространенные
способы кражи личной информации; 3) осуществляется по
электронной почте; 4) притворяясь представителями
законного бизнеса; 5) неизвестный абонент связывается с
сотрудником; 6) имитирует генерального директора; 7) вебсайт, содержащий копии страниц с законного веб-сайта;8)
собирать конфиденциальную информацию от пользователей;
21
9) автоматически перенаправляются на вредоносные URLадреса; 10) взламывать DNS-серверы и менять IP-адреса.
10. Answer the questions.
1. What is the best way to avoid identity thefts?
2. What is card scamming?
3. When does phishing occur?
4. What is the difference between phishing and pretexting?
5. What is pharming?
11. Finish the sentences.
1. A series of identity thefts …
2. Card scanning can be used to …
3. Spam can contain …
4. Phishing occurs when …
5. Pretexting is often done over …
6. Pharming sets up a website that contains …
12. Fill in the gaps choosing the words from the box
scammers, call, safe, fraud, specialist, questions, codes
1. A call out of the blue usually, but not always, to your mobile, alerts you to possible … on your account.
2. The caller typically claims to be a … from your bank’s
fraud prevention department, a police officer, or an employee at a
major service provider.
3. You are told that … are trying to access your account.
4. The caller asks you some standard bank security … – maiden names, birthday dates or other personal numbers.
5. You may be told that it is vital to move your cash urgently
to a … account.
22
6. The caller may also tell you to read out a series of … they
send to your phone by text.
7. The … then ends, often with a final request not to log into
your account for a matter of hours.
13. Vocabulary. Listen, read and memorize.
№
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
Vocabulary
portmanteau
similar
target
ultimate objective.
exploit
to direct traffic away
intended target
regardless of
the corrupted hosts file
multiple users
a significant number
taking precautions
Translation
сложно-сокращенное слово
похожий
цель, предназначать
конечная цель
использовать
перенаправить трафик
намеченная цель
независимо от того
поврежденный файл
несколько пользователей
значительное количество
принимая
меры
предосторожности
manually entering the ввод
адреса
веб-сайта
website address
вручную
trusted bookmarks
надежные закладки
being cached on the кешируются на серверах
ISP’s servers
провайдера
the affected user
затрагиваемые пользователи
obtain
получать
spread
распространяться
connection request
запрос на подключение
23
14. Read Text С.
TEXT C. How Does Pharming Work?
Pharming, a portmanteau of the words ‘phishing’ and ‘farming’, is an online scam similar to phishing, where a website’s traffic is manipulated, and confidential information is stolen. In essence, it is the criminal act of producing a fake website and then
redirecting users to it.
These fake sites aim to capture a victim’s personally identifiable information (PII) and log-in credentials, such as passwords,
social security numbers, account numbers, and so on, or else they
attempt to install pharming malware on their computer. Pharmers
often target websites in the financial sector, including banks,
online payment platforms, or e-commerce sites, usually
with identity theft as their ultimate objective.
How does pharming work?
Pharming exploits the foundation of how internet browsing
works – namely, that the sequence of letters that form an internet
address, such as www.google.com, have to be converted into an IP
address by a DNS server for the connection to proceed.
Pharming attacks this process in one of two ways:
1. First, a hacker may send malicious code in an email which
installs a virus or Trojan on a user’s computer. This malicious
code changes the computer’s hosts file to direct traffic away from
its intended target and toward a fake website instead. In this form
of pharming – known as malware-based pharming – regardless of
whether you type the correct internet address, the corrupted hosts
file will take you to the fraudulent site instead.
2. Second, the hacker may use a technique called DNS poisoning. DNS stands for “Domain Name System” – pharmers can modify the DNS table in a server, causing multiple users to visit fake
websites instead of legitimate ones inadvertently. Pharmers can
24
use the fake websites to install viruses or Trojans on the user’s
computer or attempt to collect personal and financial information
for use in identity theft.
While DNS servers are harder to attack because they sit on an
organization’s network and behind its defenses, DNS poisoning
can affect a significant number of victims and therefore offer great
rewards for cybercriminals. Poisoning can also spread to other
DNS servers. Any internet service provider (ISP) receiving information from a poisoned server can lead to the corrupted DNS entry
being cached on the ISP’s servers – spreading it to more routers
and devices.
What makes pharming attacks such a dangerous form of online
fraud is that they require minimal action from the victim. In cases
of DNS server poisoning, the affected user can have a completely
malware-free computer and yet still become a victim. Even taking
precautions such as manually entering the website address or always using trusted bookmarks is not sufficient, because the misdirection happens after the computer sends a connection request.
Once pharmers have obtained your personal information, they
either use it themselves for fraudulent purposes or sell it to other
criminals on the dark web.
15. Find in the text the equivalents to the following word
combinations:
1) Преступное деяние; 2) создание поддельного веб-сайта;
3) последовательность букв, образующих интернет-адрес;
4) отправить вредоносный код по электронной почте; 5)
фарминг на основе вредоносных программ; 6) повреждение
целостности данных DNS; 7) установка вирусов или троянов
на компьютер пользователя; 8) минимальные действия со
стороны жертвы; 9) компьютер, на котором нет вредоносных
программ.
25
16. Make up a written abstract of the above text. Learn the
summary of the text.
17. Find words and phrases in Text C with the following
meanings:
1. Take into one’s possession or control by force.
2. A string of characters that allows access to a computer system or service.
3. Software that is specifically designed to disrupt, damage, or
gain unauthorized access to a computer system.
4. A person who uses computers to gain unauthorized access to
data.
5. A measure taken in advance to prevent something dangerous, unpleasant, or inconvenient from happening.
18. Read and translate Text D in writing using a dictionary.
TEXT D. How to Protect Yourself Against Pharming
– Choose a reputable internet service provider (ISP). A
good ISP will filter out suspicious redirects by default – ensuring
you never reach a pharming website in the first place.
– Use a reliable DNS server. For most of us, our DNS server
will be our ISP. However, it is possible to switch to a specialized
DNS service, which could offer more security against DNS poisoning.
– Only follow links that begin with HTTPS – as opposed to
just HTTP. The “s” stands for “secure” and indicates that the site
has a valid security certificate. Once on the site, check for the padlock icon in the address bar – another indicator that the site is secure.
26
– Don’t click on links or open attachments from unknown
senders. While you can’t protect yourself from DNS poisoning,
you can take care to avoid the malicious software that enables
pharming. Avoid clicking on links or opening attachments in any
email or message you are unsure of.
– Check URLs for typos. Pharmers sometimes use spelling
tricks to deceive visitors, by replacing or adding letters to domain
names. Look at the URL closely and if you spot a typo – avoid it.
– Avoid suspicious-looking websites generally. Aside from
the URL, signs to look out for include spelling or grammatical errors, unfamiliar fonts or colors, and missing content – for example,
some pharmers don’t bother to populate the privacy policy or
terms and conditions. Check that everything is as you would expect before submitting any information.
– Avoid deals that appear too good to be true. Online
scammers sometimes lure victims with eye-catching deals – for
example, discounts much lower than the legitimate competition. If
offers seem implausible, then exercise caution.
– Enable two-factor authentication where possible. Many
platforms offer two-factor authentication, and when this is available, it’s a good idea to turn it on. This makes your accounts harder
to hack into – even if fraudsters have obtained your log-in details
through pharming, they won’t be able to access your account.
– Change the default settings of your Wi-Fi router. Changing the standard password and using a strong password instead for
your private network will help to protect you from DNS poisoning.
It is also essential to keep your router up to date. If your router
doesn’t have automatic updates, consider replacing it with one that
does.
– Use a robust anti-malware and antivirus solution and
keep it up to date. For example, Kaspersky Total Security protects you against hackers, viruses, and malware and works 24/7 to
secure your devices and data.
27
The best way to protect yourself from cybercrimes such as
pharming and phishing is through a combination of antivirus protection and following the latest cybersecurity best practices.
19. Find in the text international words and give their Russian equivalents.
20. Find words and phrases in Text C with the following
meanings:
1. Consistently good in quality or performance; able to be
trusted.
2. A code or instruction which connects one part of a program
or an element in a list to another.
3. A computer file appended to an email.
4. A typographical error.
5. A security system that requires two distinct forms of identification in order to access something.
21. Fill in the gaps choosing the words from the box
fraud, pretexting, cyber, worm, scanner
1. The man on the phone was part of a _______ scam.
2. I got a _________ in my email and now my computer won’t
work.
3. The criminal used a _______ to steal the information on her
card.
4. The man was arrested and went to jail for committing
_______.
5. Avoid ________ crime by being safe on your computer.
28
22. Fill in the gaps choosing the words from the box
duped, outgoing, fraudsters, card, details, genuine, PIN
1. Never disclose your_____ or hand over your bank card to
anyone.
2. We will never visit your home address and ask you to give
us your cards, PINs and personal ______. The police won’t either.
3. If you accidentally share your details and later realise that
you have been ______, call your bank immediately.
4. You should use a different phone to the one the _______
called on you.
5. This is because they can intercept your _______calls, even
after you’ve ended the fraudulent call – so they could pretend to be
your bank when you try to report them.
6. The number to call should be listed on the back of your
payment _______.
7. If you bank with us, you can always use our telephone
number checker to make sure the number is _______ and for advise on how to proceed.
23. Role play the dialogue between a customer and the
bank employee:
Employee: Lincolnshire Bank. This is Walter. How can I help
you?
Customer: Hi! I think I received a phishing scam.
Employee: Why don’t you tell me a little more about what
happened?
Customer: Well, I got an email that said it was from Lincolnshire Bank, but I don’t think it was.
E: Oh, did it ask you to give away any personal information?
29
C: Yes. It said that the bank needed to confirm my account
details.
E: Did you email them that information?
C: No, I thought I should call the bank first. It seemed suspicious.
E: Yes, Lincolnshire Bank would never ask for your account
details via email.
C: That’s what I thought, but the email looked legitimate because it had the bank logo. It even linked to a site that looked official.
E: Well, some of these criminals are pretty sophisticated.
C: Ok, what should I do now?
E: You should call the police. Phishing typically leads to identity theft or fraud.
C: Ok, I’ll do that.
30
UNIT 2. PREVENTATIVE MEASURES
Grammar:
I No/none/any Nothing/nobody
II All / all of most / most of no / none of
III Both / both of neither / neither of either / either of
Reading and Speaking:
Text A: How Malware Spreads
Text B: How to Prevent Malware
Text C: Keystroke Logging
Text D: How Do Keyloggers Get on the User’s Computer?
GRAMMAR
I No/none/any Nothing/nobody
No и none
Мы используем no + существительное.
No = not a или not any:
We had to walk home because there was no bus. (= there wasn’t a
bus)
No+ существительное особенно часто используется
после have (got) и there is/are.
Отрицат. форма глаг. + any = утвердит. форма глаг + no
They haven’t got any children. = They’ve got no children.
None используется без существительного:
‘How much money do you have?’ ‘None.’ (= no money)
Можно использовать none of :
This money is all yours. None of it is mine.
После none of +мн.ч. (none of the students, none of them
etc.) глагол может быть в ед.ч. или во мн.ч, чаще встречается
во мн.ч.:
None of the shops were (или was) open.
31
None и no-one
none = 0 (zero) no -one = nobody
None – ответ на вопрос How much? / How many?:
‘How much money have you got?’ ‘None’ (= no money)
‘How many people did you meet?’ ‘None’ (= no people)
No-one – ответ на вопрос Who?:
‘Who did you meet?’ ‘No-one.’ = ‘Nobody.’
No + thing/body/where = not + anything / anybody / anywhere:
I said nothing. = I didn’t say anything.
1. Complete these sentences with no, none or any.
1. It was a public holiday, so there were …… shops open.
2. I haven’t got ….. money. Can you lend me some?
3. We had to walk home because there were ………. taxis.
4. We had to walk home because there weren’t ……. taxis.
5. ‘How many eggs have we got?’ …….. Do you want me to
get some?’
6. We took a few pictures, but ….. of them were very good.
7. ‘Did you take lots of pictures?’ ‘No, I didn’t take .....…’
8. What a stupid thing to do! …… intelligent person would
do such a thing.
9. There’s nowhere to cross the river. There’s ……. bridge.
10. I haven’t read ……. of the books you lent me.
11. We cancelled the party because........ of the people we invited were able to come.
12. ‘Do you know when Chris will be back?’ ‘I’m sorry. I
have …… idea.’
32
2. Complete these sentences with no- or any- + -body/thing/-where.
1 I don’t want ……… to drink. I’m not thirsty.
2 The bus was completely empty. There was …... on it.
3 ‘Where did you go for your holidays?’….I stayed at home.’
4 I went to the shops, but I didn’t buy ……...
5 ‘What did you buy?’ ‘ …... I couldn’t find …… I wanted.’
6 The town is still the same as it was years ago ….. has
changed.
7 Have you seen my watch? I can’t find it ………
8 There was complete silence in the room…… said ..............
3. Choose the right word.
1. She didn’t tell nobody / anybody about her plans.
2. The accident looked bad, but fortunately nobody / anybody
was badly injured.
3. I looked out of the window, but I couldn’t see no-one / anyone.
4. My job is very easy. Nobody / Anybody could do it.
5. ‘What’s in that box?’ ‘Nothing / Anything. It’s empty.’
6. The situation is uncertain. Nothing / Anything could happen.
7. I don’t know nothing / anything about economics.
8. I’ll try and answer no / any questions you ask me.
9. ‘Who were you talking to just now?’ ‘No-one / Anyone. I
wasn’t talking to no-one / anyone.
4. Complete the sentences. Use:
nobody / no-one / nothing or anybody / anyone / anything
1 That house is empty. …… lives there.
2 Jack has a bad memory. He can’t remember…..........
3 Be quiet! Don’t say......................................
33
4 I didn’t know about the meeting. ..................... told me.
5 ‘What did you have to eat?’ ‘.............. I wasn’t hungry.’
6 I didn’t eat...................................... I wasn’t hungry.
7 Helen was sitting alone. She wasn’t with............................
8 I’m afraid I can’t help you. There’s................ I can do.
9 I don’t know ..................................... about car engines.
10 The museum is free. It doesn’t cost ............... to go in.
11 I heard a knock on the door, but when I opened it, there
was............................ there.
12 The hotel receptionist spoke very fast. I didn’t understand....................
13 What are you doing tonight?’ ‘............................ Why?’
14 Helen has gone away. ……..knows where she is. She
didn’t tell ..........................where she was going.
II All / all of most / most of no / none of
Запомните!
all some any most much/many little/few no
+ существительное
All cars have wheels. Some cars can go faster than others.
Мы используем
all some any most much/many little/few half none
+ of следующим образом
Some of the people I work with are not very friendly.
34
None of this money is mine.
Обратите внимание на различие в значении этих
конструкций:
All flowers are beautiful. (= all flowers in general)
All (of) the flowers in this garden are beautiful. (= a specific
group of flowers)
Мы используем all of / some of/ none of/ half of etc. +
it/us/you/them:
All of us were late.
5. Put in of where necessary. Leave the space empty if the
sentence is already complete.
1 All ……. cars have wheels.
2 None ….. this money is mine.
3 Some …….. films are very violent.
4 Some ... the films I’ve seen recently have been very violent.
S Joe never goes to museums. He says that all …. museums
are boring.
6 I think some …… people watch too much TV.
7 ‘Do you want any……these magazines?’ ‘No, I’ve finished
with them.’
8 Kate has lived in London most ……… her life.
9 Joe has lived in Chicago all ……..his life.
10 Most ….days I get up before 7 o’clock.
6. Choose from the list and complete the sentences. Use of
(some of / most of etc.) where necessary.
accidents European countries my dinner
birds
her friends
my spare time
cars
her opinions
the buildings
35
the players
the population
these books
1 I haven’t read many ……..
2 All ……. have wheels.
3 I spend much ………. gardening.
4 Many ….... are caused by bad driving.
5 It’s a historic town. Many ….... are over 400 years old.
6 When she got married, she kept it a secret. She didn’t tell
any …........
7 Not many people live in the north of the country. Most
.…… live in the south.
8 Not all …….. . can fly. For example, the penguin can’t fly.
9 Our team played badly and lost the game. None …... played
well.
10 Emma and I have very different ideas. I don’t agree with
many ….
11 Sarah travels a lot in Europe. She has been to most ………
12 I had no appetite. I could only eat half ……….
7. Use your own ideas to complete these sentences.
1 The building was damaged in the explosion. All ………
were broken.
2 We argue sometimes, but get on well most of ……...
3 I went to the cinema by myself. None of…. wanted to come.
4 The test was difficult. I could only answer half ………
5 Some of….. you took at the wedding were very good.
6 ‘Did you spend all .... I gave you?’ ‘No, there’s still some
left.’
8. Complete the sentences. Use:
all of / some of / none of + it/them/us (all of it / some of them ...)
1 These books are all Jane’s. …….. belong to me.
2 ‘How many of these books have you read?’ ‘… Every one.’
3 We all got wet in the rain because …… had an umbrella.
4 Some of this money is yours and ...... is mine.
36
5 I asked some people for directions, but ……. was able to
help me.
6 She invented the whole story from beginning to end. …..
was true.
7 Not all the tourists in the group were Spanish. .......... were
French.
8 I watched most of the film, but not .........
9 There are very talkative people. .............. never stop talking.
10 A lot of students failed the exam. ……… did nothing.
III Both / both of neither / neither of
either / either of
Both/neither/either используются только по отношению к
двум объектам (2 предмета или 2 человека).
both» и «neither» имеют прямо противоположное
значение: «оба» и «ни один», а «either» используется, когда
нужно сделать выбор в пользу одного или другого.
Both/neither/either используются с существительным или
без него:
Both restaurants are very good. Neither restaurant is expensive.
‘Is your friend British or American?’ ‘Neither. She’s Australian.’
‘Do you want tea or coffee?’ ‘Either. I don’t mind.’
Можно использовать both of / neither of / either of
перед определителями (my, his, these, the и us, you, them)
37
Both of these restaurants are very good.
Neither of the restaurants we went to was (or were) expensive.
(talking to two people) Can either of you speak Russian?
Обратите внимание на обороты:
both …. and…. (и…, и….)
neither …. nor …. (ни….,
ни ….)
either …. or …. (или…..,
или ….)
Both Chris and Paul were late.
Neither Chris nor Paul came
to the party.
Either you apologise, or I’ll
never speak to you again.
Сравните:
either/neither/both – о двух
объектах
There are two good hotels
here.
You could stay at either of
them.
We tried two hotels.
Neither of them had any
rooms.
Both of them were full.
any/none/all – более двух
There are many good hotels
here.
You could stay at any of them.
We tried a lot of hotels.
None of them had any rooms.
All of them were full.
38
9. Complete the sentences with both/neither/either. Use of
where necessary.
1 Do you want tea or coffee?’ ……. I really don’t mind.
2 ‘What day is it today – the 18th or the 19th?’ ‘…... It’s the
20th.’
3 A: Where did you go on your trip — Korea or Japan?
B: We went to.... . A week in Korea and a week in Japan.
4 ‘Shall we sit in the corner or by the window?’ ‘…... I don’t
mind.’
5 ‘Where’s Lisa? Is she at work or at home?’ ‘ …….. She’s
away on holiday.’
6 ……. my parents are from London.
7 To get to the town centre, you can go along the footpath by
the river or you can go along the road. You can go ……. way.
8 I tried twice to phone Carl, but ……. times he was out.
9 ....... Tom’s parents is English. His father is Polish and his
mother is Italian.
10 I saw an accident this morning. One car drove into the back
of another. Fortunately ……. driver was injured, but .……. cars
were badly damaged.
11 I’ve got two sisters and a brother. My brother is working,
but ............... my sisters are still at school.
12 Helen has got two sisters and a brother. I’ve met her brother,
but I haven’t met ............... her sisters.
10. Complete the sentences with both/neither/either + of
us / of them.
1 I asked two people the way to the station, but ............ could
help me.
2 I was invited to two parties last week, but I couldn’t go to
............
3 There were two windows in the room. It was very warm, so
I opened ............
39
4 Sarah and I play tennis together regularly, but we’re not very
good. ............ can play very well.
5 I tried two bookshops for the book I wanted, but ........ had it.
6 I invited Donna and Mike to the party, but ……... came.
7 Paula and I didn’t know the time because.............. had
a watch.
8 ‘Which jacket do you prefer, this one or that one?’ ‘I don’t
like ........... ‘
9 There were two pictures on the wall. I didn’t like ...........
10 Last year I went to Paris and Rome. I liked …….
11. Write sentences with both and /neither nor /either or.
1 Chris was late. So was Pat. .............................
2 He didn’t say hello, and he didn’t smile. ………….
3 Joe is on holiday and so is Sam. ………….
4 Joe doesn’t have a car. Sam doesn’t have one either. ………
5 Brian doesn’t watch TV and he doesn’t read newspapers. …
6 It was a boring movie. It was long too. The movie ..............
7 Is that man’s name Richard? Or is it Robert? It’s one of the
two. That man’s name …………………………..
8 I haven’t got time to go on holiday. And I don’t have the
money. I have.................................
9 We can leave today or we can leave tomorrow – whichever
you prefer. We.................................
12. Complete the sentences with neither/either/none/any.
1 We tried a lot of hotels, but ......... of them had any rooms.
2 I took two books with me on holiday, but I didn’t read
………... of them.
3 There are a few shops at the end of the street, but ……… of
them sells newspapers.
4 You can phone me at ...................... time during the evening.
I’m always at home.
40
5 I can meet you next Monday or Friday. Would ……… of
those days suit you?
6 John and I couldn’t get into the house because ………. of us
had a key.
READING AND SPEAKING
1. What does this quotation mean to you?
"Keeping your computer, personal information and your children safe should be taken seriously. Not using common sense precautions like firewalls, virus protections and parental controls is
like leaving the door of your house wide open all night." – Orson
Swindle
2. Vocabulary. Listen, read and memorize.
№
1
2
3
4
5
6
7
8
9
10
11
Vocabulary
spread
malware
sensitive information
via
to pretend
to carry out
to contain
legitimate
bundled with
powerless
to prevent
Translation
распространяться
вредоносное ПО
конфиденциальная информация
через
притворяться
выполнять
содержать
законный
в комплекте с
бессильный
предотвращать
41
3. Read Text A and do the assignment below.
TEXT A. How Malware Spreads
Malware is any kind of software that is designed to harm a
computer. Malware can steal sensitive information from your
computer, gradually slow down your computer, or even send fake
emails from your email account without your knowledge. Here are
some common types of malware you might have heard about:
– Virus: A harmful computer program that can copy itself and
infect a computer.
– Worm: A malicious computer program that sends copies of
itself to other computers via a network.
– Spyware: Malware that collects information from people
without their knowledge.
– Adware: Software that automatically plays, displays, or
downloads advertisements on a computer.
– Trojan horse: A destructive program that pretends to be a
useful application, but harms your computer or steals your information after it is installed.
– A bot is a device that has been infected with malicious software to do something harmful without the user’s knowledge. Botnets are networks of these infected devices that work together under the control of an attacker. Botnets can be used to conduct
phishing campaigns, send out spam or used to carry out Distributed Denial of Service (DDoS) attacks.
Malware can get onto your computer in a number of different
ways. Here are some common examples:
– Downloading free software from the Internet that secretly
contains malware
– Downloading legitimate software that’s secretly bundled
with malware
– Visiting a website that’s infected with malware
– Clicking a fake error message or pop-up window that starts a
malware download
42
– Opening an email attachment that contains malware
There are a lot of different ways that malware can spread, but
that doesn’t mean you are powerless to stop it. To prevent your
devices from being infected with malware, there are a number of
steps you can take.
4. Find in the text the equivalents to the following word
combinations:
1) Вредоносное ПО; 2) украсть конфиденциальную
информацию; 3) постепенно замедлить работу вашего
компьютера; 4) отправить поддельные электронные письма из
вашей учетной записи; 5) может копировать себя и заражать
компьютер; 6) рассылать свои копии на другие компьютеры
по сети; 7) автоматически воспроизводит, отображает или
загружает рекламные объявления на компьютер; 8) выдает
себя за полезное приложение; 9) проведение фишинговых
кампаний; 10) рассылка спама; 11) загрузка бесплатного
программного обеспечения из Интернета, которое тайно
содержит вредоносное ПО.
5. Write ten questions about the facts mentioned in Text A.
6. Fill in a suitable word: attacks, sensitive, spread, disguised, malware
1. Viruses and worms are defined by their behaviour – malicious software designed to ______ without the user’s knowledge.
2. Trojans and rootkits are grouped together as they both seek
to conceal ________ on computers.
3. Spyware and keyloggers are _______ used in malicious attacks like identity theft, phishing and social engineering – threats
designed to steal money from unknowing computer users, businesses and banks.
43
4. Phishing attacks are another common type of malware delivery where emails __________ as legitimate messages contain
malicious links or attachments that can deliver the malware executable file to unsuspecting users.
5. Spyware targets __________ information and can grant remote access to predators.
7. Vocabulary. Listen, read and memorize.
№
Vocabulary
Translation
1
2
3
release updates
fixes
multiple user accounts
4
5
6
7
8
9
10
11
12
suspicious links
reputable source
to prompt
pop-up windows
fall for
disguised
an extra barrier
mitigate damage
a ransomware attack
выпускать обновления
исправления
несколько учетных записей
пользователей
подозрительные ссылки
авторитетный источник
предлагать
всплывающие окна
попасться на
замаскированный
дополнительный барьер
уменьшить ущерб
атака
программывымогателя
8. Read Text B and do the assignment below.
TEXT B. How to Prevent Malware
1. Keep your computer and software updated.
Microsoft and Apple often release updates for their operating
systems, and it is a good idea to install these updates when they
become available for your Windows and Mac computers. These
updates often include fixes that can improve the security of your
44
system. Some operating systems also offer automatic updates, so
that you can automatically get updates soon after they are available.ma
Windows users can install updates using a feature called "Windows Update," while Mac users can install updates using a feature
called "Software Update."
In addition to your computer’s operating system, your computer’s software should also be kept up to date with the latest versions. Newer versions often contain more security fixes to prevent
malware attacks.
2. Use a non-administrator account whenever possible.
Most operating systems allow you to create multiple user accounts on your computer, so that different users can have different
settings. These user accounts can also be set up to have different
security settings.
For example, an ‘admin’ (or ‘administrator’) account usually
has the ability to install new software, while ‘limited’ or ‘standard’
accounts usually don’t have the ability to do so. When doing dayto-day web browsing, you probably don’t need to install new software, so we suggest that you use a ‘limited’ or ‘standard’ user account whenever possible. Doing this can help prevent malware
from getting installed on your computer and making system-wide
changes.
3. Don’t click on suspicious links.
Phishing remains the easiest way for hackers to install malware
on your device. Phishing scams trick people into opening emails or
clicking on a link that may appear to come from a legitimate business or reputable source. The link may direct you to a fake website
where you are prompted to enter your personal details or take you
to a website that directly infects your computer with malware. If in
doubt, don’t click the link.
4. Don’t download attachments from unknown sources.
You should be wary if a random person sends you a suspicious
email containing attachments or images. Sometimes, those emails
45
might just be spam, but other times, those emails might secretly
contain harmful malware.
5. Don’t trust pop-up windows that ask you to download software. When surfing the web, you might come across sites that
show pop-up windows, making you believe your computer has
been infected and asking you to download some software in order
to protect yourself. Don’t fall for this trick. Just close the pop-up
window and make sure you don’t click inside the pop-up window.
6. Limit your file-sharing. Some sites and applications allow
you to easily share files with other users. Many of these sites and
applications offer little protection against malware. If you exchange or download files using these file-sharing methods, be on
the lookout for malware. Malware can often be disguised as a popular movie, album, game, or program.
7. Use antivirus software. If you need to download something,
you should use an antivirus program to scan that download for
malware before opening it. Antivirus software also allows you to
scan your entire computer for malware. It is a good idea to run
regular scans of your computer to catch malware early and prevent
it from spreading.
8. Install Firewall. A firewall prevents malicious attacks by
blocking all unauthorized access to or from a private computer
network. In addition to anti-virus software, a firewall provides an
extra barrier against malware, reducing the chance of attack.
9. Back up data regularly. It is important to back up on a regular basis to ensure that you can still retrieve all your valuable data
and files if your computer is infected with malware. This will help
mitigate any damage and ensure that you are not held victim to a
ransomware attack.
9. Find in the text the equivalents to the following word
combinations:
1) Выпускать обновления для операционных систем;
2) установить обновления; 3) исправления безопасности для
46
предотвращения атак вредоносных программ; 4) настроить
разные параметры безопасности; 5) «ограниченная» или
«стандартная»
учетная
запись
пользователя;
6)
подозрительные ссылки; 7) поддельный веб-сайт; 8)
подозрительное электронное письмо, содержащее вложения
или изображения;
9) поддаваться на уловку; 10) закрыть
всплывающее окно;
11) может быть замаскировано под
популярный фильм, альбом, игру или программу; 12)
сканировать компьютер на наличие вредоносных программ;
13) предотвратить злонамеренные атаки; 14) дополнительный
барьер от вредоносных программ; 15) регулярно выполнять
резервное копирование; 16) восстановить все свои ценные
данные и файлы.
10. Find in the text the sentence in which it is said that…
Пользователи Windows могут устанавливать обновления с
помощью функции под названием «Обновление Windows», а
пользователи Mac с помощью функции «Обновление
программного обеспечения».
Фишинг остается для хакеров самым простым способом
установить вредоносное ПО на ваше устройство.
Иногда электронные письма могут быть просто спамом,
но в других случаях эти электронные письма могут тайно
содержать вредоносные программы.
Некоторые сайты и приложения позволяют легко
обмениваться файлами с другими пользователями.
Рекомендуется проводить регулярное сканирование
компьютера, чтобы на раннем этапе обнаружить вредоносное
ПО и предотвратить его распространение.
11. Study Text A and Text B. Answer the suggested questions.
1. What is meant by malware?
47
2. What are the uses of malware?
3. What are the types of malware?
4. What is a virus?
5. What is Trojan horse?
6. How does malware spread?
7. How can you protect your computer?
12. Fill in the gaps choosing the words from the box.
Translate the sentences.
reputable, prevent, malware, malicious, infected, reputable
1. Anti-Malware program is used to ________, detect, and
remove computer viruses, worms, trojan horses and any other type
of malware.
2. ‘Antivirus’ is protective software designed to defend your
computer against __________ software.
3. Your computer can become _________ through
shared disks or even from another computer on the network.
4. Download files only from _________ Internet sites.
5. Adware is a type of ________ that automatically delivers advertisements.
13. Get ready to speak about ways to prevent malware.
14. Vocabulary. Listen, read and memorize.
№
1
2
Vocabulary
keystroke logger
keystroke logging
3
4
5
6
7
8
covertly
unaware
to retrieve
employers
to oversee
under some circumstances
Translation
кейлоггер, клавиатурный шпион
отслеживание
нажатия
каждой
клавиши на клавиатуре компьютера
скрыто, тайно
не подозревая
забирать
работодатели
наблюдать
при некоторых обстоятельствах
48
9
10
11
12
13
14
15
to neglect
legitimate
executable code
heuristics
particular technique
hook-based
antispyware application
to defeat
пренебрегать
законный
исполняемый код
эвристика
особая техника
приложение
для
защиты
от
шпионского ПО на основе ловушек
победить
15. Read Text C.
TEXT C. Keystroke Logging
Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys
struck on a keyboard, typically covertly, so that a person using the
keyboard is unaware that their actions are being monitored. Data
can then be retrieved by the person operating the logging program.
A keystroke recorder or keylogger can be either software or
hardware.
While the programs themselves are legal, with many designed
to allow employers to oversee the use of their computers, keyloggers are most often used for stealing passwords and other confidential information.
Keylogging can also be used to study keystroke dynamics or
human-computer interaction. Numerous keylogging methods exist,
ranging from hardware and software-based approaches to acoustic
cryptanalysis.
Many anti-spyware applications can detect some software
based keyloggers and quarantine, disable, or remove them. However, because many keylogging programs are legitimate pieces of
software under some circumstances, anti-spyware often neglects to
label keylogging programs as spyware or a virus. These applications can detect software-based keyloggers based on patterns
49
in executable code, heuristics and keylogger behaviors (such as the
use of hooks and certain APIs).
No software-based anti-spyware application can be 100% effective against all keyloggers. Software-based anti-spyware cannot
defeat non-software keyloggers (for example, hardware keyloggers
attached to keyboards will always receive keystrokes before any
software-based anti-spyware application).
The particular technique that the anti-spyware application uses
will influence its potential effectiveness against software keyloggers. As a general rule, anti-spyware applications with higher privileges will defeat keyloggers with lower privileges. For example, a
hook-based anti-spyware application cannot defeat a kernel-based
keylogger (as the keylogger will receive the keystroke messages
before the anti-spyware application), but it could potentially defeat
hook- and API-based keyloggers.
16. Find in the text the equivalents to the following word
combinations:
1) Отслеживание нажатия каждой клавиши на клавиатуре
компьютера, 2) его действия отслеживаются, 3) кейлоггер
может быть программным или аппаратным; 4) контролировать
использование компьютеров; 5) клавиатурные шпионы;
6) кража паролей; 6) антишпионское ПО; 7) обнаруживать
программные кейлоггеры и помещать их в карантин,
отключать или удалять; 8) пренебрегать маркировкой
программ как шпионских программ или вирусов; 9) на основе
шаблонов в исполняемом коде, эвристики и поведения
кейлоггеров;
10) приложения для защиты от шпионского
ПО с более высокими привилегиями; 11) приложение для
защиты от шпионского ПО на основе ловушек; 12) кейлоггер
на основе ядра.
17. Answer the following questions:
50
1. What is keystroke logging?
2. What are legal and illegal usages of keylogging?
3. How do you remove keyloggers?
4. What can anti-spyware applications do to protect your computer from keyloggers?
5. Can a hook-based anti-spyware application defeat a kernelbased keylogger?
6. Can a hook-based anti-spyware application defeat hook- and
API-based keyloggers?
18. Study Text C and translate these sentences into English:
1. Запись информации о нажатии клавиш (перехват) – это
отслеживание нажатия каждой клавиши на клавиатуре
компьютера пользователя без его ведома.
2. Кейлоггер может быть аппаратным или программным и
использоваться как легитимный индивидуальный или
профессиональный инструмент для IT-мониторинга.
3. Чаще всего, кейлоггер – это вредоносное шпионское
ПО, которое используется для сбора конфиденциальной
информации, например, паролей или финансовых данных,
которые затем
отправляются
третьим
лицам
для
использования в преступных целях.
4. Кейлоггер может находиться в операционной системе
компьютера, на уровне программного интерфейса клавиатуры,
в памяти или входить в состав ядра операционной системы.
5. Клавиатурного шпиона трудно обнаружить, поскольку
он не всегда вызывает ощутимые проблемы с компьютером,
такие как замедление процессов или сбои в работе.
6. К счастью, от кейлоггеров можно защититься.
Постоянное обновление вашей операционной системы,
программных продуктов и веб-браузеров с использованием
новейших патчей безопасности должно быть частью вашего
защитного решения.
51
7. Эффективной защитой является установка хорошего
антишпионского
продукта,
который
защищает
от
клавиатурных шпионов, или полноценного защитного
решения с функциями предотвращения использования
кейлоггеров на компьютере.
19. Read Text D.
TEXT D. How Do Keyloggers Get on the User’s Computer?
When the user has an outdated antivirus, or when the antivirus
is turned off or if the user has not got it installed, keylogger finds
its way to reach the computer. Virus protection tools are to be kept
up-to-date and if not done, they cannot defend or deny such
keylogging activities.
Another possible way is that the keyloggers find a way
through .exe files. However, it is not possible to restrict or limit to
deny .exe files just to avoid keyloggers as most of the important
programs run through .exe files.
Programs That Can Remove a Keylogger Virus
There is a wide variety of protection software available both
free and paid to fit your specific requirements. Ensure there is an
updated Antivirus to drive away the keylogger.
A centralized approach to protecting all the endpoints – servers, laptops, desktops, smartphones and other IoT devices like
Comodo Endpoint Protection would help the users to fend against
such keylogging activities. It delivers total protection for corporate
networks when it is accessed through remote devices. It offers 7layer protection with containment technology, Web URL Filtering,
Firewall, Antivirus, Host Intrusion Prevention and Viruscope.
The best part of Comodo Endpoint Protection is the containment technology that works on Artificial Intelligence, it moves the
suspicious files to a virtual environment so it doesn’t interfere with
the normal operations of the computer. This is also combined with
a future-proof concept called viruscope that helps to analyze the
52
suspicious files while it generates a report for the user to understand about the actions and processes of the suspicious files. By
this way, users can certainly stay ahead of threats like keylogger
malware.
20. Find in the text the equivalents to the following word
combinations:
1) Устаревший антивирус; 2) инструменты защиты от
вирусов; 3) ограничить использование файлов .exe; 4)
большинство важных программ запускаются через файлы
.exe.; 5) удалить вирус Keylogger; 6) установлен обновленный
антивирус, чтобы избавиться от кейлоггера; 7) полная защита
корпоративных сетей при доступе к ним через удаленные
устройства; 8) 7-уровневая защита с технологией
сдерживания,
фильтрацией
веб-URL,
брандмауэром,
антивирусом, предотвращением вторжений хоста и Viruscope;
9)
технология
сдерживания,
которая
работает
с
искусственным интеллектом; 10) перспективная концепция
Viruscope;
11)
понять
действия
и
процессы
с
подозрительными файлами; 12) предупреждать такие угрозы,
как вредоносное ПО для клавиатурных шпионов.
21. Say if it is true or false.
1. Virus protection tools are to be kept up-to-date and if not
done, they cannot defend or deny such keylogging activities.
2. You need to buy antivirus software to drive away the
keylogger.
3. Comodo Endpoint Protection cannot defend against keylogging activities.
4. Comodo Endpoint Protection uses Artificial Intelligence to
supplement malware detection mechanisms.
53
5. Viruscope monitors the activities of processes running on
your computer and alerts you if they take actions that could potentially threaten your privacy.
22. Summarize Text D in 6 – 7 sentences.
UNIT 3. ANTI-VIRUS SOFTWARE
Grammar:
I Relative clauses: clauses with who/that/which
II Relative clauses: clauses with and without
who/that/which
III Relative clauses: whose/whom/where
IV Relative clauses: Defining and Non-Defining
Reading and Speaking:
Text A: What is Antivirus?
Text B: Security Products
Text C: How Does Antivirus Software Detect and Remove
Viruses and Malware?
Text D: Can Antivirus Software Stop Hackers?
GRAMMAR
I. Relative clauses: clauses with who/that/which
Relative clauses – придаточные определительные
предложения.
Неотъемлемыми
составляющими Relative
Clause являются слова which, who и that. Они соответствуют
русскому слову «который». Однако, помимо них Relative
Clause может вводиться словами whose (чей, у которого),
whom
(которому,
с
которым),
where
(где,
в
котором), when (когда, в котором), why (почему, по которым).
Обратите внимание на то, что неопределенный артикль
a перед существительными в предложении с Relative Clause
54
заменяется на the, поскольку придаточное предложение
дополняет существительные, делая их конкретными.
I saw a film yesterday. It was fantastic. = The film that I saw yesterday was fantastic.
Можно использовать who или that, но не which, когда
говорят о людях:
The woman that lives next door is a doctor. = who lives
Можно использовать which или that, но не who, когда
говорят о неодушевленных предметах:
В
придаточном
определительном
заменяют he/she/they/it:
who/that/which
‘Who’s that woman?’ ‘She lives next door to me.’
I’ve never spoken to the woman who lives next door.
1. In this exercise you have to explain what some words
mean. Choose the right meaning from the box and then write a
sentence with who. Use a dictionary if necessary.
1 (an architect) An architect is someone………………………
2 (a burglar) A burglar is someone ............................................
3 (a customer) ............................................................................
4 (a shoplifter) ...........................................................................
5 (a coward) ...............................................................................
55
6 (an atheist) ..............................................................................
7 (a pessimist) ............................................................................
8 (a tenant) .................................................................................
2. Make one sentence from two. Use who/that/which.
A girl was injured in the accident. She is now in hospital.
The girl who was injured in the accident is now in hospital.
1. A waitress served us. She was impolite and impatient.
The …………………………………………………………..
2. A building was destroyed in the fire. It has now been rebuilt. The ………………………………………………………….
3. Some people were arrested. They have now been released.
The ……………………………………………………………
4. A bus goes to the airport. It runs every half hour.
The ……………………………………………………………
5. A bomb caused a lot of damage. (It went off this morning.) The ………………………………………………………
6. A scientist has won the Nobel Prize. (He discovered a
new planet.) The …………………………………………………...
7. A footballer has been banned from playing again. (He
took drugs.) The ……………………………………………………
8. An old lady now wants to swim the English Channel.
(She did a parachute jump.) The …………………………………...
9. A company has laid off thousands of workers. (It owns
Greenway Supermarkets.) The ……………………………………
10. A little girl has been found safe and well. (She had been
missing since Tuesday.) The ………………………………………
3. Are these sentences right or wrong? Correct them
where necessary.
1. I don’t like stories who have unhappy endings.
2. What was the name of the person who phoned?
56
3. Where’s the nearest shop who sells bread?
4. The driver which caused the accident was fined £500.
5. Do you know the person that took these pictures?
6. We live in a world what is changing all the time.
7. Dan said some things about me that were not true.
8. What was the name of the horse it won the race?
II Relative clauses: clauses with and without
who/that/which
Относительные местоимения (who, which, that) могут
быть: подлежащим (subject) в придаточном предложении:
That’s the woman who bought my car.
The woman (subject) bought my car (object).
или дополнением (object):
That’s the car that I used to own.
I (subject) used to own the car (object).
Если who/that/which относится в предложении к
подлежащему, то мы не можем его опустить, употребление
who/that/which обязательно:
Если who/that/which относится в
дополнению, то мы можем его опустить:
предложении
к
The woman I wanted to see was away. = The woman who I
wanted to see….
57
Обратите внимание на место предлогов в предложении с
придаточным определительным:
Сравните значение what (что / то, что) и that (который):
What = ‘the thing(s) that’
What happened was my fault. (= the thing that happened)
Everything that happened was my fault. (НЕ Everything what
happened)
Everything (that) they said was true. (НЕ Everything what
they said)
Did you hear what they said? (= the things that they said)
4. What do you say in these situations? Complete each
sentence with a relative clause.
1 Your friend lost some keys. You want to know if he has
found them. You say: Have you found the keys you lost?
2 A friend is wearing a dress. You like it. You tell her:
I like the dress........................................
3 A friend is going to see a film. You want to know the name
of the film. You say: What’s the name of the film....................... ?
4 You wanted to visit a museum. It was shut when you got
there. You tell a friend: The museum ............... was shut when we
got there.
5 You invited some people to your party. Some of them
couldn’t come. You tell someone:
Some of the people ……………. couldn’t come.
6 Your friend had to do some work. You want to know if she
has finished. You say: Have you finished the work. ……………. ?
58
7 You rented a car. It broke down after a few miles. You tell a
friend: The car ................ broke down after a few miles.
5. In some of these sentences you need who or that. Correct the sentences where necessary.
1 The woman lives next door is a doctor.
2 Have you found the keys you lost?
3 The people we met last night were very nice.
4 The people work in the office are very nice.
5 The people I work with are very nice.
6 What have you done with the money I gave you?
7 What happened to the money was on the table?
8 What’s the worst film you’ve ever seen?
9 What’s the best thing it has ever happened to you?
6. These sentences all have a relative clause with a preposition. Put the words in the correct order.
1 Did you find (looking / for / you /the books / were)?
Did you find the books you were looking for?
2 We couldn’t go to (we / invited / to / were / the wedding).
We couldn’t go to ….............................................................
3 What’s the name of (the hotel / about / me / told /you)?
What’s the name of …………………………………....?
4 Unfortunately I didn’t get (applied / I /the job / for).
Unfortunately I didn’t get ………………………………..
5 Did you enjoy (you / the concert / to / went)?
Did you enjoy......................................................................?
6 Gary is a good person to know. He’s (on / rely / can / somebody /you). Gary is a good person to know. He’s ……………..
7 Who was (the man / were / with /you) in the restaurant last
night? Who was ………………….. in the restaurant last night?
59
7. Put in that, what or who, where necessary. If the sentence is already complete, leave the space empty.
1 I gave her all the money ……... I had.
2 Did you hear ……….... they said?
3 They give their children everything ………. they want.
4 Tell me..……....you want and I’ll try to get it for you.
5 Why do you blame me for everything ……… goes wrong?
6 I won’t be able to do much, but I’ll do ……… I can.
7 I won’t be able to do much, but I’ll do the best.............. I
can.
8 I don’t agree with ………….you’ve just said.
9 I don’t trust him. I don’t believe anything ……. he says.
10 Somewhere I’ve got a photo of the mountain ……….
we climbed.
11 The man ………. repaired my car is a real expert.
12 I’m afraid the numbers ……… I chose didn’t win a prize.
13 The man …….. paid for the meal was a friend of Tom’s.
14 The meeting ……. Mark had to attend went on for three
hours.
15 I thought I recognized the assistant…. served us.
III Relative clauses: whose/whom/where
Whose используют в придаточных определительных
вместо his/her/their:
Сравните:
I met a man who knows you. (he knows you)
I met a man whose sister knows you. (his sister knows you)
60
Whom используют вместо who, когда whom относится к
дополнению в придаточном предложении:
George is a person whom I admire very much. (I admire him)
Можно использовать whom с предлогом (to whom / from
whom / with whom etc.):
I like the people with whom I work. (I work with them)
Чаще используются придаточные с who или that, либо без
них:
a person who/that I admire a lot ИЛИ a person I admire a lot
Where используют в придаточных определительных,
когда говорят о месте:
I recently went back to the town where I grew up.
(= the town I grew up in = the town that I grew up in)
Обратите внимание на конструкции:
I can’t meet you on Friday. That’s the day (that) I’m going
away.
The last time (that) I saw Anna, she looked great.
The reason I’m phoning is to ask your advice.
(= The reason that I’m phoning /The reason why I’m phoning)
61
8. Read the situations and complete the sentences using
where.
1 You grew up in a small town. You went back there recently.
You tell someone this.
I recently went back to the small town where I grew up.
2 You’re thirsty and you want a drink. You ask a friend where
you can get some water.
Is there a shop near here ........................................................?
3 You work in a factory. The factory is going to close down
next month. You tell a friend.
The................................... is going to close down next month.
4 Sue is staying at a hotel. You want to know the name of the
hotel. You ask a friend.
Do you know the name of .......................................................?
5 You play football in a park on Sundays. You show a friend
the park. You say:
This is the ........................................................ on Sundays.
9. Complete each sentence using who/whom/whose/where.
1 What is the name of the man ……….. car you borrowed?
2 A cemetery is a place.............. people are buried.
3 A pacifist is a person ……. believes that all wars are wrong.
4 An orphan is a child ………….. parents are dead.
5 What was the name of the person to .......... you spoke on the
phone?
6 The place........... we spent our holidays was really beautiful.
7 This school is only for children ...... first language is not
English.
8 The woman with ......... he fell in love left him after a month.
10. Use your own ideas to complete these sentences.
62
1 I can’t meet you on Friday. That’s the day …………
2 The reason..............was that the salary was too low.
3 I’ll never forget the time …………………………...
4 Do you remember the day....................................?
5 The reason ..............is that they don’t need one.
6 ……………. was the year.......................................
Relative clauses: Defining and Non-Defining
Существует два вида придаточных определительных:
Type 1
Defining – ограничительное
придаточное, оно предлагает
важную
информацию,
которая точно расскажет
(идентифицирует), о чем
идет речь
That book which you lent me
is really good.
Без придаточного было
бы
сложно
определить,
какой конкретно предмет
(или человек) имеется в
виду.
Этот тип запятыми не
выделяется.
Type 2
Non-Defining
–
распространительное
придаточное
добавляет
дополнительную
информацию, которую можно
опустить, смысл предложения
все равно останется ясным.
Этот
тип
выделяется
запятыми с двух сторон.
The book, which I hadn’t
read, was still on the shelf.
Этот тип придаточного не
идентифицирует человека или
предмет,
о
котором
говорится, так как знают о
ком / чем идет речь.
The woman who lives next My brother Ben, who lives in
door is a doctor.
Hong Kong, is an architect.
В обоих типах придаточных используются who для
одушевленных и which – для неодушевленных
Можно использовать that:
That не используется
63
John, who (НЕ that) speaks
French and Italian, works as a
tour guide.
Anna told me about her new job,
which (НЕ that) she’s enjoying
a lot.
Можно
опустить
who/ Нельзя опускать who / which:
which/that,
если
они
относятся к дополнению:
We stayed at the Park Hotel,
We stayed at the hotel which a friend of ours recom(that/which) you recommend- mended.
ed.
Whom
практически
не Можно использовать whom,
используется.
если относятся к дополнению:
This morning I met Chris, whom
I hadn’t seen for ages.
В обоих типах придаточных можно использовать whose и
where:
We met some people whose Lisa, whose car had broken
car had broken down.
down, was in a very bad mood.
What’s the name of the place Kate has just been to Sweden,
where you went on holiday?
where her daughter lives.
Do you know anyone who/that
speaks French and Italian?
Grace works for a company
which/that makes furniture.
11. Make one sentence from two. Use the sentence in
brackets to make a relative clause (Type 2).
You will need to use who(m) / whose / which / where.
1 Catherine is very friendly. (She lives next door.)
Catherine, who lives next door, is very friendly.
2 We stayed at the Park Hotel. (A friend of ours recommended
it.) We stayed at the Park Hotel …………………………………...
3 We often go to visit our friends in Cambridge. (It is not far
from London.)
We often go to visit our friends in Cambridge ……………….
64
4 I went to see the doctor. (She told me I needed to change my
diet.) I went to see............................................................................
5 Steven is one of my closest friends. (I have known him for a
very long time.) Steven....................................................................
6 Lisa is away from home a lot. (Her job involves a lot of
travelling.) Lisa..................................................................................
7 The new stadium will be finished next month. (It can hold
90,000 people.) …………………………………………………….
8 Alaska is the largest state in the USA. (My brother lives
there.) ………………………………………………………………
9 Our teacher was very kind. (I have forgotten her name.)
…………………………………………………………………….
12. Read the information and complete each sentence. Use
a relative clause of Type 1 or Type 2. Use commas where necessary.
1 There’s a woman living next door to me. She’s a doctor.
The woman who lives next door to me is a doctor.
2 I’ve got a brother called Ben. He lives in Hong Kong. He’s
an architect. My brother ……………………………………………
3 There was a strike at the factory. It began ten days ago. It is
now over. The strike at the factory..................................................
4 I was looking for a book this morning. I’ve found it now.
I’ve found……………………………………………………..
5 I’ve had my car for 15 years. It has never broken down.
My car………………………………………………………..
6 A job was advertised. A lot of people applied for it. Few of
them had the necessary qualifications.
Few of.......................................................................................
7 Amy has a son. She showed me a picture of him. He’s a police officer. Amy showed me...........................................................
65
13. Some of these sentences are wrong. Correct them and
put in commas where necessary. If the sentence is correct,
write ‘OK’.
1 Anna told me about her new job that she’s enjoying very
much.
2 My office that is on the second floor is very small.
3 The office I’m using at the moment is very small.
4 Mark’s father that used to be in the army now works for a
TV company.
5 The doctor that examined me couldn’t find anything wrong.
6 The sun that is one of millions of stars in the universe provides us with heat and light.
14. Put a suitable relative pronoun in each space, or
leave the space blank where possible.
1.
2.
3.
4.
5.
6.
7.
8.
My bike…...... I had left at the gate, had disappeared.
The shoes …… I bought were the ones …… I tried on first.
The bag …… in the robbers put the money was found later.
The medicine ……. the doctor gave me had no effect at all.
Peter, ... couldn’t see the screen, decided to change his seat.
I really liked that tea…….. you made me this morning.
What was the name of your friend …… tent we borrowed?
The flight …….. Joe was leaving on was cancelled.
READING AND SPEAKING
1. What does this quotation mean to you?
“Buying antivirus software is like buying insurance: It’s important to make a good choice now just in case you need the assistance later.” – Peter H. Gregory
2. Listen, read and memorize.
66
№
1
2
3
4
5
6
7
8
9
Vocabulary
further
propagation
contemporary
multiple
to combat
cryptocurrency mining
ransomware
information extraction
specific detection
10
generic detection
11
12
13
14
common codebase
quarantine
deletion
inaccessible
Translation
дальнейший
распространение
современный
многочисленный
бороться
добыть, получить криптовалюту
программа-вымогатель
извлечение информации
узкоспециализированные
системы обнаружения
групповая (общая) функция
обнаружения
единая кодовая база
изолировать
удаление
недоступный
3. Guess the meaning of the words.
Infected, credential, unauthorized, dramatic, evolve, type,
identify, detection, cyber criminals.
4. Read Text A and answer the questions:
– What is an antivirus program?
– How does antivirus work?
TEXT A. What is Antivirus?
Originally, an antivirus program was a piece of software that
detected and sometimes removed computer viruses from infected
devices, whereby it also helped stop further propagation of the malicious content. That was mostly in the 1990s and in the beginning
67
of the 2000s. However, with the dramatic growth in numbers of
malware in other categories, antivirus programs have evolved into
complex security solutions.
To ensure their users’ security, most contemporary protective
products use multiple technologies. These allow them to combat a
wide range of malicious activities, such as spying, keylogging,
credential stealing, unauthorized cryptocurrency mining, unwanted
encryption of files (by ransomware), information extraction (by
banking Trojans), spam and scams as well as other forms of
cyberattacks.
Antivirus software begins operating by checking your computer programs and files against a database of known types of
malware. Since new viruses are constantly created and distributed
by hackers, it will also scan computers for the possibility of new or
unknown type of malware threats.
Typically, most programs will use three different detection
devices: specific detection, which identifies known malware; generic detection, which looks for known parts or types of malware
or patterns that are related by a common codebase; and heuristic
detection, which scans for unknown viruses by identifying known
suspicious file structures. When the program finds a file that contains a virus, it will usually quarantine it and/or mark it for deletion, making it inaccessible and removing the risk to your device.
5. Find in the text the equivalents to the following word
combinations:
1) Дальнейшее распространение вредоносного контента;
2) сложные решения безопасности; 3) несколько технологий;
4) шпионаж, кейлог, кража учетных данных, нежелательное
шифрование
файлов
программами-вымогателями;
5)
сканировать компьютеры на предмет наличия новых типов
вредоносных угроз; 6) узкоспециализированные системы
обнаружения; 7) универсальное обнаружение; 8) связанные
общей кодовой базой; 9) эвристическое обнаружение; 10)
68
идентифицировать
структуры.
известные
подозрительные
файловые
6. Identify the topic of each paragraph of Text A.
7. Listen, read and memorize.
№
1
2
3
4
5
Vocabulary
to block
web page analysis
sweep
false positives
false negatives
6
7
7
8
9
virus removal software
to get rid of
Rootkit
ultimate
security software
10
11
cyber criminals
backup service
Translation
блокировать
анализ веб-страницы
убрать, подчистить
ложные срабатывания
ложноотрицательные
результаты
антивирусная программа
избавиться
руткит
последний, высший
программное обеспечение
безопасности
киберпреступники
сервис восстановления
8. Read the antivirus software advertisement.
TEXT B. Security Products
Web Advisor
People who want to protect their children from the dangers of
the Internet use WebAdvisor. This software blocks the types of
websites that you decide are unsafe. It also provides instant web
page analysis, helping you avoid phishing and pharming scams.
Anti-Virus Plus with RapidClean.
Anti-Virus Plus is an update of our first product, Anti-Virus.
This anti-virus software sweeps your computer system to detect
69
viruses. All viruses are then quarantined so they cannot harm your
computer. It is he most reliable software on the market, providing
fewer false positives and false negatives than any other software.
RapidClean is a virus removal software that destroys the malicious software discovered by Anti-Virus Plus. This includes rootkit viruses. These viruses are designed to disguise themselves as a
part of your computer’s operating system. This makes them very
difficult to get rid of. Most security software won’t destroy rootkits
but with RapidClean you can.
Defender
Defender is the ultimate security software. A combination of
both of our software packages, Defender keeps your computer
completely safe from cyber criminals. Defender also comes with
our computer backup service. This means that the data on your
computer’s hard drive will be backed up on our company’s servers. With Defender you cannot lose your files.
9 Choose the right answers:
1. What is the advertisement mostly about?
A damage that rootkits can cause
B kinds of webpage analysis
C types of security software
2. Which of the following is intended to block unsafe Internet
pages?
A Anti-Virus
B RapidClean
C WebAdvisor
D Anti-Virus Plus
3. What can be inferred bout false negatives and false positives?
A They aid virus detection
B They disrupt webpage analysis
C They mark the presence of virus
D They occur in most anti-virus programs
70
10. Match the words in column A with the definitions in
column B.
A
1) malicious software
2) rootkit
3) backup
4) to quarantine
5) to sweep
6) cyber criminal
7) to block
8) web page analysis
9) false negative
10) false positive
B
a) to isolate a file
b) to search a system for viruses
c) any software that brings harm to a
computer system
d) a person who commits illegal acts
online
e) to stop a file from being downloaded
f) to save all information on a system
g) labeling a safe file as dangerous
h) labeling a dangerous file as safe
i) a virus that hides itself as part of an
OS
j) to search a system for viruses
11. Listen, read and memorize.
№
1
2
3
4
5
6
7
Vocabulary
signature analysis
fingerprinting
vendor
compile
heuristic analysis:
sophisticated
sandbox detection
8
9
10
trial-and-error method
to disguise
undo
Translation
сигнатурный анализ
снятие отпечатков пальцев
продавец
компилировать
эвристический анализ
сложный
среда тестирования
песочница
метод проб и ошибок
замаскировать
отменить
71
12. Read Text C and do the assignments below.
TEXT C. How Does Antivirus Software Detect and Remove
Viruses and Malware?
Different types of internet threats resulting from various
online activities – email, link clicking, web surfing, file or app
transfers or downloads, and webcam video recording and calling –
require different antivirus solutions. These include, but aren’t limited to:
Signature Analysis: Signature-based analysis is similar to
fingerprinting and is one of the most common types of antivirus
threat detection. All antivirus software vendors compile and constantly update a database of identified threats, known as "virus definitions," from files and suspicious websites. Antivirus programs
compare the fingerprint, or "signature," of a detected potential
threat against the analyzed threats in this database and respond accordingly when there is a match.
Heuristic Analysis: Many hackers understand signaturebased tools and know how to disguise their malicious code. In response, some antivirus software also uses a so-called heuristic approach. Often described as a sophisticated trial-and-error method,
heuristic-based analysis works to identify suspicious characteristics in an otherwise unrecognizable file that might match those of
known malware.
Sandbox Detection: Some potentially malicious code is so
well disguised or encrypted that it escapes signature and heuristic
detection. Thus, if an encrypted file seems even vaguely suspicious, some antivirus software will open and run it in a "sandbox."
This sandbox is a secure area inside the software that the antivirus
program uses to determine if the file is innocuous or malicious
without damaging your computer.
Machine Learning/Artificial Intelligence: As hackers have
learned to adapt, antivirus software vendors have developed more
sophisticated machine learning and artificial intelligence technologies to identify new techniques hackers use to disguise their work.
72
The software then adds information about these new threats to its
detection database. As it collects more information, the software
becomes better at detecting previously unknown malware.
Behavior Monitoring: "Generally speaking, behavior monitoring watches the traffic between your computer and various devices – external hard drives, USB thumb drives, networked computers, printers, etc. – to stop them when they do something suspicious," says John Hawes, CEO of the international nonprofit AntiMalware Testing Standards Organization (AMTSO). If necessary,
antivirus software can undo any changes these external devices
make.
13. Find in the text the equivalents to the following word
combinations:
1) Различные типы интернет-угроз; 2) сигнатурный анализ;
3) поставщики антивирусного программного обеспечения;
4) сравнивать отпечаток или «сигнатуру»; 5) при обнаружении
совпадения; 6) эвристический анализ; 7) замаскировать свой
вредоносный код; 8) сложный метод проб и ошибок; 9)
нераспознаваемый файл; 10) зашифрованный файл; 11)
открыть и запустить файл в «песочнице»; 12) машинное
обучение / искусственный интеллект; 13) новые угрозы; 14)
внешние жесткие диски и флэш-накопители USB; 15)
международная
некоммерческая
организация
по
стандартизации тестирования вредоносного ПО.
14. Answer the questions.
1. What is signature analysis?
2. What is heuristic analysis?
3. What is sandbox detection?
4. What do machine learning technologies do?
5. What is behavior monitoring?
73
15. Read Text D and do the assignments below.
TEXT D. Can Antivirus Software Stop Hackers?
Because antivirus software vendors are almost always playing
defense against hackers, behaving judiciously online and using antivirus software will never protect you 100 %. "There are plenty of
successful threats out there, and the industry isn’t winning," admits
Simon Edwards, CEO of security testing company SE Labs. He
continues, "I recently found myself tricked by one, so even the experts fall for them sometimes!"
Hackers’ primary point of attack – one that antivirus software
is powerless against – is prompting careless user behavior. Instead
of trying to stealthily plant a malicious file, more and more hackers try to get you to give up your information or provide a way into
your computer. To do this, they send emails with malware-laden
attachments or links to bogus websites to trick you into clicking
on, downloading, or navigating to something harmful. This process
is what Hawes describes as "obfuscation" – files or "hiding what
they’re doing, pretending to be something else" and "trying to look
harmless or even useful." As a result, never open attachments or
click on links in emails sent by people you don’t know.
There are other ways to stop hackers, as well. For instance,
most legitimate websites employ TLS (transport layer security)
encryption to prevent eavesdropping. "TLS is good for users’ privacy and bad for people wanting to snoop on web sessions," according to Simon. Secure website addresses (URLs) using TLS
begin with "HTTPS" rather than "HTTP." Avoid downloading
files from or sending private information through sites that begin
with "HTTP."
In addition, most antivirus software includes a "firewall" designed, like a real wall, to keep your computer safe from malicious
online intrusions. However, most operating systems and internet
routers include their own firewalls, which makes antivirus software firewalls largely redundant.
74
If you’re thinking about buying a particular brand of antivirus
software, first check the company’s privacy policies and terms of
service or end-user licensing agreement. Make sure you are comfortable with whatever data the software collects and access permissions it requires.
Second, viruses and other threats are designed to attack specific platforms and operating systems. Because you likely own multiple devices running different operating systems, such as a Windows computer and an Android phone or an iPhone, look for antivirus software that offers multiple platform protections for multiple devices.
Finally, choose antivirus software that provides comprehensive protection, regardless of a threat’s type, source, or purpose.
Choosing free antivirus software such as Windows Defender or
free stripped-down software from other vendors could come back
to bite you. "Some free products have fewer features like [cloud]
backup, a password manager, etc., and some free products even
have fewer security features," says AV-Comparatives’ Stelzhammer.
16. Find in the text the equivalents to the following word
combinations:
1) Генеральный директор компании SE Labs по
тестированию безопасности; 2) побудить пользователей к
неосторожному поведению; 3) предоставить доступ к вашему
компьютеру; 4) ссылки на поддельные веб-сайты; 5)
большинство законных веб-сайтов используют шифрование
TLS (безопасность транспортного уровня); 6)
для
предотвращения подслушивания; 7) сайты, которые
начинаются с HTTP; 8) в значительной степени избыточные;
9) ознакомиться с политикой конфиденциальности и
условиями обслуживания компании; 10) несколько платформ
защиты для нескольких устройств; 11) комплексная защита
независимо от типа, источника или цели угрозы.
75
17. Fill in the gaps choosing the words from the box. Translate the sentences.
security, eliminate, protect, software, generic, access
1. Antivirus software isn’t one thing, but rather a package of
evolving defense mechanisms designed to _______ your computer
against the constant barrage of known, unknown, and ever-shifting
malicious threats devised by hackers, trolls, and cybercriminals.
2. However, "antivirus" is a misnomer. Viruses are merely one
type of malware, and malware is only one type of an exploding
number of internet security threats. "It is like an elephant: Each
elephant is gray, but not everything that’s gray is an elephant,"
says Peter Stelzhammer, co-founder of independent _______ testing lab AV-Comparatives.
3. Malware is the ________ term for every malicious threat.
4. So, you have worms, viruses, ransomware, and much more,
and all of it is malware. ‘Virus is only used as a marketing term,
and usually a threat is a combination of several techniques." For
the sake of simplicity, all U.S. News guides use the term "antivirus
software" to refer to ________ that addresses all types of online
security threats.
5. Antivirus software constantly scans your computer for
threats from emails, web surfing, and app and software downloads,
to make sure everything you do and ________ online is free from
potentially harmful code.
6. Once a problem is detected, the software will warn you
about it, block you from accessing a suspicious file or website, or
________ the threat.
18. Summarize Text D.
76
UNIT 4. CLOUD COMPUTERS
Grammar:
I Linking words: But, although, in spite of, whereas
II Linking words: To, in order to, so that and for
III Linking words: If, when, unless and in case, as long as / so
long as / provided / providing
Reading and Speaking:
Text A: Cloud Computing
Text B: Service Models. Infrastructure as a Service
Text C: Platform as a Service
Text D: Software as a Service
GRAMMAR
I Linking words: But, although, in spite of, whereas
But, although, in spite of, while, whereas выражают
противопоставление одной части предложения другой.
Although, though, even though
Although (хотя) в разговоре часто заменяется на though.
Though можно использовать в конце предложения, although –
нет.
77
Although I asked her, she didn’t come. (speech and writing)
Though I asked her, she didn’t come. (speech)
/ asked her, (but) she didn’t come, though. (speech)
Even though дает более выразительное, эмоциональное
противопоставление, чем although.
Even though I asked her, she didn’t come. (which was really
surprising)
However, nevertheless
However (несмотря на, однако) – это способ выражения
противопоставления в официальной речи или письме. However может стоять в начале, середине или в конце предложения
и отделяться запятой (или паузой в речи).
Normally we don’t refund money without a receipt. However,
on this occasion I’ll do it.
Normally we don’t refund money without a receipt. On this
occasion, however, I’ll do it.
Nevertheless (несмотря на, однако, все же) – это очень
формальный способ выражения however.
I’m not happy with your work. Nevertheless, I’m going to give
you one last chance.
Despite and in spite of
Используем despite и in spite of + существительное /
местоимение (this/that/what etc.) или –ing (а не придаточное
предложение с подлежащим и сказуемым, как с although):
In spite of the rain, we went out. (Although it was raining, we
went out.)
Despite losing, we celebrated. (Although we lost, we celebrated.)
78
Обратите внимание на конструкцию in spite of the fact
(that) / despite the fact (that):
• While, whereas, on the other hand
While (хотя), whereas (несмотря на то), on the other
hand (с другой стороны) используются в официальной речи и
письме. Они сравнивают два факта и подчеркивают разницу
между ними.
While United were fast and accurate, City were slow and
careless. United are top of the league, whereas City are bottom.
The flat is conveniently located. On the other hand, there’s a
lot of noise from the traffic
1. Complete the sentences. Use although + a sentence from
the box.
I didn’t speak the language well he has a very important job
I had never seen her before
we don’t like them very much
it was quite cold
the heating was on
I’d met her twice before
we’ve known each other a long time
1. Although he has a very important job, he isn’t particularly
well-paid.
2. ……………………, I recognised her from a photograph.
3. She wasn’t wearing a coat ………………………………..
4. We thought we’d better invite them to the party …………
5. …………………, I managed to make myself understood.
6. …………………………………., the room wasn’t warm.
7. I didn’t recognise her …………………………………….
8. We’re not very good friends ……………………………..
79
2. Complete the sentences with although / in spite of / because / because of.
1 Although it rained a lot, we enjoyed our holiday.
2 a ………… all our careful plans, a lot of things went wrong.
b ………….. we’d planned everything carefully, a lot of
things went wrong.
3 a I went home early …………………. I was feeling unwell.
b I went to work the next day ….. I was still feeling unwell.
4 a She only accepted the job ………the salary, which was
very high.
b She accepted the job … the salary, which was rather low.
5 a I managed to get to sleep ……….. there was a lot of noise.
b I couldn’t get to sleep ……………… the noise.
3. Make one sentence from two. Use the word(s) in brackets in your sentences.
1 I couldn’t sleep. I was very tired. (despite) ………………
2 They have very little money. They are happy. (in spite of)
In spite ………………………………………………………
3 My foot was injured. I managed to walk home. (although)
……………………………………………………………………
4 I enjoyed the film. The story was silly. (in spite of) ……….
5 We live in the same street. We hardly ever see each other.
(despite) …………………………………………………………..
6 I got very wet in the rain. I was only out for five minutes.
(even though) ……………………………………………………..
7 Nick used to smoke. He seems to be in good health. (although) …………………………………………………………….
8 I couldn’t sleep. I was tired. (despite) ……………………...
9 Trevor didn’t notice the sign. It was right in front of him.
(even though) ……………………………………………………..
10 Matthew doesn’t know any French. It was one of his
school subjects. (although)…………………………………………
80
11 Henry’s friend is a millionaire. He hates spending money.
(despite) ……………………………………………………………
12 We couldn’t get tickets. We queued for an hour. (in spite
of) ………………………………………………………………….
4. Complete the sentences with but / although / however /
in spite of / despite / even though / whereas / on the other hand.
There is sometimes more than one possible answer.
(1) ............................ the ground was very wet, it was decided to go
ahead with United’s game against City.
(2) United were 1-0 winners ........................... not playing very well.
(3) .................................... the poor conditions, City played some attractive football, (4) ..................................... they just couldn’t score. (5)
.................................... they lost, their fans gave them a big cheer.
(6) ………it was rush-hour time, the roads weren’t at all busy.
(7) I always spend money when I have it. My brother,
........................, is very careful.
(8) I managed to do some studying ...................... all the noise.
(9) People are friendly in the North,....................... in London
no one speaks to you.
II Linking words: To, in order to, so that and for
Мы используем to, in order to, so that и for для того, чтобы
выразить цель, сказать, почему мы что-то делаем.
To и So (that)
Мы можем использовать to-infinitive, чтобы выразить
цель. Подлежащее главного и придаточного предложений
должно быть одним и тем же.
81
Melanie was hurrying to catch her bus. Most people work to
earn money.
Если в предложении два разных подлежащих, то нельзя
использовать to-infinitive. Нужно применять so that (так что,
для того чтобы).
Jack went to England so that his brother would have some
help working in the restaurant.
После so that мы часто используем can, could, will /
would.
I gave Nick a map so that he could find/would be able to find
the way all right.
In order to и so as to
In order to (для того, чтобы) и so as to (для того, чтобы,
таким образом, чтобы) используются для выражения цели в
более формальном (официальном) стиле, чем to.
The government took these measures in order to reduce crime.
The staff are working at weekends so as to complete the project in time.
Отрицательные формы: in order not to or so as not to.
Обратите внимание, что форма not to сама по себе не
используется.
Melanie was hurrying in order not to miss her bus.
She was hurrying to catch her bus. НЕ She was hurrying not
to catch her bus.
For или to
Мы используем for + существительное, чтобы сказать,
почему мы что-то делаем
The whole family have gone out for a bike ride.
Why don’t you come over for coffee?
Чтобы сказать, для чего нам нужен предмет, мы
используем либо to-infinitive, либо форму for + ing.
82
This heater is to keep/for keeping the plants warm in winter.
This machine is used to cut/for cutting plastic.
НО мы не используем for + ing, когда говорим о
конкретном действии. В этом случае применяется только toinfinitive:
I put the heater on to keep the plants warm. НЕ I put the heater on for keeping the plants warm.
5. Alan works for Zedco. He wants to succeed in business,
so he is listening to a talk on the subject. Here is what the
speaker is showing the audience.
Say what Alan is going to do. Use either in order to or so as
to. Both are correct.
He is going to study the market in order to be more successful.
1 ……………………………………………………………….
2 ……………………………………………………………….
3 ……………………………………………………………….
4 ……………………………………………………………….
6. Explain what each object is for, using one of the verbs
in the box.
lock paint stick clean keep open put wash
1. brush ... It’s for painting things.
2. glue
83
3.
4.
5.
6.
7.
8.
fridge
sink
dustbin
toothbrush
corkscrew
key
7. Rewrite these sentences using in order that or so that
making any necessary changes.
1 I took twenty driving lessons to pass my driving test first
time.
I took twenty driving lessons in order that I might pass my
driving test first time.
2 I arrived at the cinema early so as not to miss the beginning
of the film………………………………………………………….
3 We stood up in order to get a better view of what was happening. .............................................................................................
4 Mr. Jones bought a second car for his wife to learn to drive.
....................................................................................................
5 I spoke slowly and clearly because I wanted the audience to
understand me. …………………………………………………….
8. Comment on what each person says. Use the word in
brackets.
Ilona: I’m learning English. I want to get a better job. (to)
Ilona is learning English to get a better job.
1 Claude: I study encyclopedias. Then I can answer quiz questions. (so that)……………………………………………………..
2 Vicky: I’m saving up. I’m planning a holiday. (for)………..
3 Nick: I keep a dog. It guards the house. (to) ……………….
84
4 David: I’m going to be very careful. Then I won’t have an
accident. (so that) ………………………………………………….
5 Jessica: I’m going on a diet. I want to lose weight. (to) ……
6 Trevor: I often switch off the heating. It saves money. (to)
…………………………………………………………………
7 Sarah: I had to go to Birmingham. I had a business meeting.
(for) ………………………………………………………………..
8 Emma: I wore boots because I didn’t want my feet to get
wet. (so that) ……………………………………………………….
III Linking words: If, when, unless and in case, as long as /
so long as / provided / providing
Обратите внимание, что для выражения будущего – после
if, when, unless / as long as / so long as / provided / providing, in
case используется Present Simple, а не will:
You’ll be tired tomorrow if you stay up late.
Tell me when the water boils.
If или when
Мы используем if (если) для Мы
используем
when
чего-то, что, по нашему (когда) для того, что, как мы
мнению, могло бы произойти
знаем, произойдет
If you hear any news, can you When you hear some news,
ring me immediately?
can you ring me immediately?
(You might hear some news.)
(You will hear some news.)
Мы используем if (не when)
для чего-то невозможного,
воображаемого, нереального
If I were you, I’d refuse.
Мы можем использовать либо if, либо when в контексте, где
они означают «каждый раз».
If you run, you use up energy.
When you run, you use up energy.
85
If и unless
Unless = except if/ only if (за исключением случаев если,
если только не)
The club is for members only. You can’t go in unless you are
a member. = You can’t go in except if you are a member. =You
can go in only if you are a member.
If not (если не) значит то же самое, что unless (если не).
I can’t see if I don’t wear
glasses.
I wouldn’t say that if I didn’t
believe it.
= I can’t see unless I wear
glasses.
= I wouldn’t say that unless I
believed it.
In case или if
In case (на случай) не то же самое, что if (если). Мы
используем in case, чтобы сказать, почему кто-то что-то делает
(или не делает). Вы делаете что-то сейчас на случай, если что-то
случится позже.
We’ll buy some more food in
case Tom comes. (= Maybe
Tom will come. We’ll buy some
more food now, whether he
comes or not; then we’ll already have the food if he
comes.)
We’ll buy some more food if
Tom comes. (= Maybe Tom will
come. If he comes, we’ll buy
some more food; if he doesn’t
come, we won’t buy any more
food.)
Можно использовать in case + past, чтобы сказать, почему
кто-то что-то сделал:
86
I left my phone switched on in case Jane called. (= because it
was possible that Jane would call)
Используется just in case (на всякий случай) – для менее
вероятных случаев:
I don’t think it will rain, but I’ll take an umbrella just in case.
(= just in case it rains)
In case of не то же самое, что in case. In case of = if there is
In case of fire, please leave the building as quickly as possible. (= if there is a fire)
In case of emergency, call this number. (= if there is an
emergency)
As long as / provided / providing
as long as / so long as, provided (that) / providing (that) – Все
эти выражения означают ‘if’ («если») или ‘on condition that’
(«при условии, что»).
9. Complete the sentences using in case.
It’s possible that Jane will need to contact you, so you agree to
give her your phone number.
You say: I’ll give you my phone number in case you need to
contact me.
1 A friend of yours is going away for a long time. Maybe you
won’t see her again before she goes, so you decide to say goodbye
now. You say: I’ll say goodbye now ………………………………
87
2 You are shopping in a supermarket with a friend. You think
you have everything you need, but maybe you forgot something.
Your friend has the list. You ask her to check it.
You say: Can you ………………………………………….. ?
3 You advise a friend about using a computer. You think he
should back up (= copy) his files because maybe there will be a
problem with his computer (and he could lose all his data).
You say: You should back up ……………………………….
4 I thought that I might forget the name of the book. So I
wrote it down.
I wrote down the name of the book ………………………….
5 I thought my parents might be worried about me. So I
phoned them. I phoned my parents ……………………………….
6 I sent an email to Lisa, but she didn’t reply. So I sent another email because maybe she didn’t get the first one.
I sent her another email ……………………………………….
7 I met some people when I was on holiday in France. They
said they might come to London one day. I live in London, so I
gave them my phone number.
I gave them my phone number ………………………………
10. Look at the information in brackets and complete the
sentences using if or when and a verb in the Present Simple.
1 (I may see Tom tonight.) ……………, I’ll tell him the news.
2 (Melanie is coming soon.) ……..., can you let her in, please?
3 (The alarm will ring soon.) ...........................................we all
have to leave the building.
4 (I might feel better tomorrow.) ……………… I’ll probably
go back to work.
5 (This film finishes at ten.) ........................I’ll stop the video.
6 (The plan may not work.) ……………… we’ll have to think
of something else.
88
11. Which word makes more sense? Put in if or unless.
1. We can’t have a picnic..................... (if it isn’t a nice day)
2. Don’t leave the TV on.............. (if you aren’t watching it)
3. We can’t do the job.......................... (if we don’t get help)
4. I wouldn’t have bought the picture........ (if I didn’t like it)
5. I can’t read your writing.......................... you print clearly.
6. Emma will be upset....................... she doesn’t get the job.
7. You can’t go into the reception …….... you’ve got a ticket.
8. Don’t bother to ring me................................ it’s important.
9. Rachel will be pleased ……...... she passes her driving test.
10. The bus won’t stop ……….………….... you ring the bell.
12. Put in in case or if.
I I’ll draw a map for you in ……. you have problems finding
our house.
2 You should tell the police ………. you have any information
about the crime.
3 I hope you’ll come to Australia sometime. ……….. you
come, you must visit us.
4 This book belongs to Susan. Can you give it to her
…………… you see her?
5 Write your name and phone number on your bag …………..
you lose it.
6 Go to the lost property office …………... you lose your bag.
7 The burglar alarm will ring ………… somebody tries to
break into the house.
8 You should lock your bike to something ………………….
somebody tries to steal it.
9 I was advised to get insurance …………… I needed medical
treatment while I was abroad.
89
13. Jake lives next door to Melanie. Complete their conversation. Put in if, when (x2), unless or in case.
Jake: A man is delivering a washing-machine this morning,
but I have to go to work. I won’t be here (1) ………..he calls.
Could you let him in for me, please, (2) ......... you’re terribly
busy?
Melanie: Oh, that’s no problem.
Jake: Oh, thanks. (3) ................ you could do that, I’d be really grateful. I’ll leave a message on his answerphone. And (4)
...................he doesn’t get the message, I’ll put a note on the door,
just to make sure. He’ll see it (5) ................... he comes.
READING AND SPEAKING
1. Listen, read and memorize.
№
1
2
3
4
5
6
7
8
9
Vocabulary
availability
predominant
multiple
advocates
proponents
manageability
maintenance
fluctuating
adoption
Translation
доступность
преобладающий
многочисленный
защитники
сторонники
управляемость
обслуживание
неустойчивый, меняющийся
принятие
2. Guess the meaning of the words.
Predominant, distribute, multiple, locations, advocates, peak,
virtualization, hybrid, familiarized.
3. Read Text A and answer the question.
90
When does cloud computing rely on?
TEXT A. Cloud Computing
Cloud computing is the on-demand availability of computer
system resources, especially data storage (cloud storage) and computing power, without direct active management by the user. The
term is generally used to describe data centers available to many
users over the Internet. Large clouds, predominant today, often
have functions distributed over multiple locations from central servers. If the connection to the user is relatively close, it may
be designated an edge server.
Clouds may be limited to a single organization (enterprise
clouds), or be available to multiple organizations (public cloud).
Cloud computing relies on sharing of resources to achieve coherence and economies of scale.
Advocates of public and hybrid clouds note that cloud computing allows companies to avoid or minimize up-front IT infrastructure costs. Proponents also claim that cloud computing allows enterprises to get their applications up and running faster, with improved manageability and less maintenance, and that it enables IT
teams to more rapidly adjust resources to meet fluctuating and unpredictable demand, providing the burst computing capability:
high computing power at certain periods of peak demand.
Cloud providers typically use a "pay-as-you-go" model, which
can lead to unexpected operating expenses if administrators are not
familiarized with cloud-pricing models.
The availability of high-capacity networks, low-cost computers and storage devices as well as the widespread adoption of
hardware virtualization, service-oriented architecture and autonomic and utility computing has led to growth in cloud computing.
As of 2017, most cloud computers run a Linux-based operating
system.
91
4. Find in the text the sentence in which it is said that…
Облачные вычисления позволяют компаниям избежать
или минимизировать первоначальные затраты на ИТинфраструктуру, а также запускать свои приложения быстрее,
с улучшенной управляемостью и меньшими затратами на
обслуживание.
Поставщики облачных услуг обычно используют модель
«плати по мере использования», что может привести к
непредвиденным
операционным
расходам,
если
администраторы не знакомы с моделями ценообразования в
облаке.
По состоянию на 2017 г. большинство облачных
компьютеров работают под управлением операционной
системы на базе Linux.
5. Find in the text the equivalents to the following word
combinations:
1) Хранилища данных (облачное хранилище); 2)
пограничный сервер; 3) корпоративные облака; 4)
общедоступное облако; 5) совместное использование
ресурсов; 6) общедоступные и гибридные облака; 7)
минимизировать
первоначальные
затраты
на
ИТинфраструктуру; 8) меньшие затраты на обслуживание; 9)
высокая вычислительная мощность;
10) поставщики
облачных услуг; 11) модели ценообразования в облаке; 12)
высокая пропускная способность; 13) работают под
управлением операционной системы на базе Linux.
6. Finish the sentences defining major landmarks in the
history of water supply.
1. The term is generally used to describe …
92
2. Clouds may be limited to a single organization (enterprise
clouds), or …
3. Cloud computing relies on …
4. Advocates of public and hybrid clouds note that …
5. Cloud providers typically use a "pay-as-you-go" model,
which can lead to …
6. As of 2017, most cloud computers run …
7. Get ready to speak about cloud computing.
8. Listen, read and memorize.
№
1
2
3
4
5
6
7
8
9
10
Vocabulary
acronyms
abstraction
thus
stack
underlying
conversely
hypervisor
pools of hypervisors
11
12
to deploy
arbitrary software
13
dedicated virtual private networks
to scale services up
and down
14
isolated partitions
software bundles
Translation
сокращения
абстракция
таким образом
стопка, кипа
лежащий в основе
наоборот
гипервизор
пулы, облака гипервизоров
изолированные перегородки
пакеты программного
обеспечения
развернуть
произвольное программное
обеспечение
выделенные виртуальные
частные сети
увеличивать и сокращать
объемы услуг
9. Guess the meaning of the words and word combinations.
93
Service-oriented architecture; physical machines; virtual machines; installed in data centers; application software; cloud infrastructure; a utility computing basis.
10. Match the word and its synonym.
1. access
2. customer
3. include
4. install
5. secure
6. underlying
7. deploy
8. application
9. consume
a) involve, consist
b) fix
c) consumer
d) safe
e) admission
f) expand
g) fundamental
h) utilise
i) use
11. Read Text B and answer the question.
What is Iaas?
TEXT B. Service Models. Infrastructure as a Service
Though service-oriented architecture advocates "Everything as
a service" (with the acronyms EaaS or XaaS, or simply aas),
cloud-computing providers offer their "services" according to different models, of which the three standard models per NIST are
– Infrastructure as a Service (IaaS),
– Platform as a Service (PaaS), and
– Software as a Service (SaaS).
These models offer increasing abstraction; they are thus often
portrayed as layers in a stack: infrastructure-, platform- and software-as-a-service, but these need not be related. For example, one
can provide SaaS implemented on physical machines (bare metal),
without using underlying PaaS or IaaS layers, and conversely one
94
can run a program on IaaS and access it directly, without wrapping
it as SaaS.
Infrastructure as a service "Infrastructure as a service"
(IaaS) refers to online services that provide high-level APIs used
to abstract various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup, etc. A hypervisor runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and
the ability to scale services up and down according to customers’
varying requirements. Linux containers run in isolated partitions of
a single Linux kernel running directly on the physical hardware.
Linux cgroups and namespaces are the underlying Linux kernel
technologies used to isolate, secure and manage the containers.
Containerisation offers higher performance than virtualization because there is no hypervisor overhead. IaaS clouds often offer additional resources such as a virtual-machine disk-image library,
raw block storage, file or object storage, firewalls, load balancers,
IP addresses, virtual local area networks (VLANs), and software
bundles.
The NIST‘s definition of cloud computing describes IaaS as
"where the consumer is able to deploy and run arbitrary software,
which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed
applications; and possibly limited control of select networking
components (e.g., host firewalls).
IaaS-cloud providers supply these resources on-demand from their
large pools of equipment installed in data centers. For wide-area
connectivity, customers can use either the Internet or carrier clouds
(dedicated virtual private networks). To deploy their applications,
cloud users install operating-system images and their application
software on the cloud infrastructure. In this model, the cloud user
patches and maintains the operating systems and the application
software. Cloud providers typically bill IaaS services on a utility
95
computing basis: cost reflects the amount of resources allocated
and consumed.
12.Find in the text the equivalents to the following word
combinations:
1) Сервис-ориентированная архитектура; 2) поставщики
облачных вычислений; 3) инфраструктура как услуга;
4) платформа как услуга; 5) программное обеспечение как
услуга; 6) запустить программу и получить к ней прямой
доступ;
7)
высокоуровневые
API-интерфейсы;
8)
масштабирование, безопасность, резервное копирование; 9)
пулы гипервизоров в облачной операционной системе; 10)
изолированные
разделы
одного
ядра
Linux;
11)
дополнительные ресурсы; 12) хранилище необработанных
блоков; 13) хранилище файлов или объектов; 14) виртуальные
локальные сети; 15) пакеты программного обеспечения; 16)
ограниченный контроль отдельных сетевых компонентов; 17)
выделенные виртуальные частные сети; 18) выставлять счета
за услуги IaaS.
13. Form nouns from the words below. All the nouns occur
in Text B.
1. connect connectivity
2. equip
3. carry
4. locate
5. contain
6. apply
7. use
8. store
9. consumer
10. perform
14. Listen, read and memorize.
№
1
2
Vocabulary
capability
acquired applications
Translation
способность
приобретенные приложения
96
3
4
5
6
7
8
9
10
продавцы
среда
инструментарий
доставлять
выполнять
управлять
промежуточное ПО
инструменты визуализации
данных
vendors
environment
toolkit
deliver
execute
govern
middleware
data-visualization tools
15. Read Text C.
TEXT C. Platform as a Service (PaaS)
The NIST‘s definition of cloud computing defines Platform as
a Service as:
The capability provided to the consumer is to deploy onto the
cloud infrastructure consumer-created or acquired applications
created using programming languages, libraries, services, and tools
supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers,
operating systems, or storage, but has control over the deployed
applications and possibly configuration settings for the application-hosting environment.
PaaS vendors offer a development environment to application
developers. The provider typically develops toolkit and standards
for development and channels for distribution and payment. In the
PaaS models, cloud providers deliver a computing platform, typically including operating system, programming-language execution environment, database, and web server. Application developers develop and run their software on a cloud platform instead of
directly buying and managing the underlying hardware and software layers. With some PaaS, the underlying computer and storage
97
resources scale automatically to match application demand so that
the cloud user does not have to allocate resources manually.
Some integration and data management providers also use
specialized applications of PaaS as delivery models for data. Examples include iPaaS (Integration Platform as a Service) and
dPaaS (Data Platform as a Service). iPaaS enables customers to
develop, execute and govern integration flows. Under the iPaaS
integration model, customers drive the development and deployment of integrations without installing or managing any hardware
or middleware. dPaaS delivers integration – and data-management
– products as a fully managed service. Under the dPaaS model, the
PaaS provider, not the customer, manages the development and
execution of programs by building data applications for the customer. dPaaS users access data through data-visualization tools.
16. Search Text C for the English equivalents of the word
combinations listed below:
1) Определение облачных вычислений; 2) развертывание
приложений в облачной инфраструктуре; 3) сеть, серверы,
операционные системы или хранилище; 4) контроль над
развернутыми приложениями, параметрами конфигурации;
5) разрабатывать инструментарий и стандарты для
разработки; 6) среда исполнения на языке программирования;
7) покупать базовое оборудование и программные уровни; 8)
распределять ресурсы вручную; 9) разрабатывать, выполнять
и управлять интеграционными потоками; 10) разработка и
развертывание интеграций без установки или управления
каким-либо оборудованием; 11) получать доступ к данным с
помощью инструментов визуализации данных.
17. Write 10 questions to Text C covering the main points.
Prepare to discuss the text.
98
18. Form nouns from the words below. All the nouns occur in Text C.
1. integrate – integration
2. develop
3. provide
4. define
5. execute
6. manage
7. deploy
8. control
9. scale
10. visualize
19. Read Text D and answer the question.
What are the advantages of SaaS?
Text D. Software as a Service (SaaS)
The NIST‘s definition of cloud computing defines Software as
a Service as:
The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through either a
thin client interface, such as a web browser (e.g., web-based
email), or a program interface. The consumer does not manage or
control the underlying cloud infrastructure including network,
servers, operating systems, storage, or even individual application
capabilities, with the possible exception of limited user-specific
application configuration settings.
In the software as a service (SaaS) model, users gain access to
application software and databases. Cloud providers manage the
infrastructure and platforms that run the applications. SaaS is
sometimes referred to as "on-demand software" and is usually
priced on a pay-per-use basis or using a subscription fee. In the
99
SaaS model, cloud providers install and operate application software in the cloud and cloud users access the software from cloud
clients. Cloud users do not manage the cloud infrastructure and
platform where the application runs. This eliminates the need to
install and run the application on the cloud user’s own computers,
which simplifies maintenance and support. Cloud applications differ from other applications in their scalability – which can be
achieved by cloning tasks onto multiple virtual machines at runtime to meet changing work demand. Load balancers distribute the
work over the set of virtual machines. This process is transparent
to the cloud user, who sees only a single access-point. To accommodate a large number of cloud users, cloud applications can be
multitenant, meaning that any machine may serve more than one
cloud-user organization.
The pricing model for SaaS applications is typically a monthly
or yearly flat fee per user, so prices become scalable and adjustable
if users are added or removed at any point. It may also be free.
Proponents claim that SaaS gives a business the potential to reduce
IT operational costs by outsourcing hardware and software
maintenance and support to the cloud provider. This enables the
business to reallocate IT operations costs away from hardware/software spending and from personnel expenses, towards
meeting other goals. In addition, with applications hosted centrally, updates can be released without the need for users to install
new software. One drawback of SaaS comes with storing the users’ data on the cloud provider’s server. As a result, there could be
unauthorized access to the data. Examples of applications offered
as SaaS are games and productivity software like Google Docs and
Word Online. SaaS applications may be integrated with cloud
storage or File hosting services, which is the case with Google
Docs being integrated with Google Drive and Word Online being
integrated with Onedrive.
20. Find in the text the sentence in which it is said that…
100
1.
Потребителю
предоставляется
возможность
использовать
приложения
поставщика
в
облачной
инфраструктуре.
2. Приложения доступны с различных клиентских
устройств через интерфейс тонкого клиента, такой как веббраузер (например, электронная почта в Интернете), или через
интерфейс программы.
3. Потребитель не управляет и не контролирует лежащую
в основе облачную инфраструктуру, включая сеть, серверы,
операционные системы, хранилище, или даже возможности
отдельных приложений.
4. В модели «программное обеспечение как услуга» (SaaS)
пользователи получают доступ к прикладному программному
обеспечению и базам данных.
5. Пользователи облака не управляют облачной
инфраструктурой и платформой, на которой работает
приложение.
6. Модель ценообразования для приложений SaaS обычно
представляет
собой
ежемесячную
или
годовую
фиксированную плату для пользователя.
7. Сторонники утверждают, что SaaS дает бизнесу
возможность снизить эксплуатационные расходы на ИТ за
счет передачи обслуживания оборудования и программного
обеспечения поставщику облачных услуг.
8. При централизованном размещении приложений
обновления могут выпускаться без необходимости установки
нового программного обеспечения.
9. Одним из недостатков SaaS является хранение данных
пользователей на сервере облачного провайдера. В результате
возможен несанкционированный доступ к данным.
21. Answer the questions.
1. What is cloud computing?
101
2. Does the consumer manage or control the underlying cloud
infrastructure
3. What do users gain access to in a (SaaS) model?
4. How do cloud applications differ from other applications?
5. What is the pricing model for SaaS applications?
6. Is the customer’s data safe on the cloud?
22. Fill in the gaps choosing the words from the box.
Translate the text.
customer, segments, intelligence, rapid, utility,
What is the History of SaaS?
In a 1961 speech to MIT students, John McCarthy, a renowned
computer scientist that won the Turing award for his work in artificial _________ (AI), famously said, “computation may someday
be organized as a public ________.” In other words, the concept of
cloud computing began as a shared resource of computing power.
While the idea has been around for some time, the web-based
technology required to support SaaS matured in the late 1990s.
That’s when companies such as Salesforce – which was founded
specifically to create cloud software – began offering traditional
enterprise solutions, such as __________ relationship management
(CRM), through a SaaS model.
At first, the enterprise software world didn’t take SaaS seriously. But the past decade has shown ________ SaaS growth and
adoption with a new set of businesses using software for the first
time. Cloud software adoptions are growing far quicker than other
102
cloud technology ________, such as Platform- (PaaS) or Infrastructure-as-a-Service (IaaS) products.
23. Summarize the text.
UNIT 5. SYSTEM ADMINISTRATION
Grammar:
I Prepositions: On time and in time, at the end and in the end
II Prepositions: In, on and at (place)
III Prepositions: to / at / in / into
IV Prepositions: in / on / at (other uses)
Reading and Speaking:
Text A: A System Administrator
Text B: Job Description
Text C: New Job Posting: System Administrator
GRAMMAR
I Prepositions: On time and in time, at the end and in the end
On time и in time
On time = punctual, not late, on schedule. Это значит
вовремя, без опозданий, по расписанию. Если что-то
происходит on time, это происходит вовремя, в
запланированное время:
103
The 11.45 train left on time. (= it left at 11.45)
The opposite of on time is late. Противоположным по
значению будет late (опаздывать).
Be on time. Don’t be late.
In time (for something / to do something) = soon enough.
Это значит достаточно рано, чтобы успеть:
I’m in a hurry. I want to get home in time to see the game on
TV. (= soon enough to see the game)
The opposite of in time is too late:
I got home too late to see the game on TV.
Можно использовать just in time = almost too late (чуть
не опоздать, как раз вовремя):
We got to the station just in time for our train.
At the end и in the end
At the end (of something) = at the time when something
ends. В конце (чего-то) = в то время, когда что-то
заканчивается:
at the end of the month
at the end of January
at the end of the game
at the end of the film
at the end of the course
at the end of the concert
I’m going away at the end of January / at the end of the month.
The opposite of at the end (of…) is at the beginning (of ...):
I’m going away at the beginning of January.
In the end = finally. Это значит, наконец, в конце
концов. Мы используем in the end, когда говорим, каков был
окончательный результат, итог ситуации, чем всё
закончилось:
We had a lot of problems with our car. We sold it in the end.
(= finally we sold it)
The opposite of in the end is usually at first.
Противоположным по значению будет at first - сначала:
104
At first we didn’t get on very well, but in the end we became
good friends.
1. Complete the sentences with on time or in time.
1 The bus was late this morning, but it’s usually ……………
2 The film was supposed to start at 8.30, but it didn’t begin ....
3 I like to get up …... to have a big breakfast before going to
work.
4 We want to start the meeting ..........., so please don’t be late.
5 I’ve just washed this shirt. I want to wear it this evening, so
I hope it will be dry………………
6 The train service isn’t very good. The trains are rarely ……
7 I nearly missed my flight this morning. I got to the airport
just..............
8 I almost forgot that it was Joe’s birthday. Fortunately I remembered.......................
9 Why are you never ………...? You always keep everybody
waiting.
10 If the plane is late, we won’t get to Paris ……... for our
connecting flight.
11 We were up very early, .......................... to see the sun rise.
12 How can the buses possibly run …….. with all these traffic
jams?
2. Complete the sentences using at the end + the following:
the course the game
the interview the month the race
1 The players shook hands …………………………….
2 I usually get paid..........................................................
3 The students had a party……………………………..
4 Two of the runners collapsed.......................................
5 To my surprise, I was offered the job ………………..
105
3. Write sentences with in the end. Use the verb in brackets.
1 We had a lot of problems with our car. (sell) .......................
2 Anna got more and more fed up with her job. (resign) ........
3 I tried to learn German, but I found it too difficult.
(give up) ……………………………………………………..
4 We couldn’t decide whether to go to the party or not.
(not/go) ………………………………………………………
4. Put in at or in.
1 I’m going away ………. the end of the month.
2 It took me a long time to find a job ….... the end I got a job
in a hotel.
3 Are you going away the beginning of August or..... the end?
4 I couldn’t decide what to buy Laura for her birthday. I didn’t
buy her anything ………….. the end.
5 We waited ages for a taxi. We gave up ……… the end and
walked home.
6 I’ll be moving to a new address …….. the end of September.
7 We had a few problems at first, but........... the end everything was OK.
8 I’m going away.............. the end of this week.
9 A: I didn’t know what to do.
B: Yes, you were in a difficult position. What did you do
…….. the end?
II Prepositions: In, on and at (place)
IN обозначает внутри
in the phone box
in the kitchen
in a street (GB)
in a town/country
work in the garden
swim in the pool
in the sky / in the world
in an office / in a department
106
Who is the woman in that photo?
When I go to the cinema, I like to sit in the front row.
ON
on the ground floor / on the
first floor / on the second
floor
on a river / on a road
on the pavement
Paris is on the Seine. Don’t buy anything that’s not on the list.
Nick’s dog is on the rug. There is a number on the door.
Говорят on a bus / on a train / on a plane / on a ship НО in
a car / in a taxi:
The bus was very full. There were too many people on it.
Laura arrived in a taxi.
Мы говорим on a bike (= bicycle) / on a motorbike /
on a horse:
Jane passed me on her bike.
AT обозначает точку
sit at my desk
wait at the bus stop
at the crossroads
wait at the traffic lights
At an event:
at the party
At a house/an address:
at Mike’s (house)
at 65 Shirley Road
At a place as a point or station
on a journey:
Does this train stop at York?
In и at со зданиями
Используют in, когда
имеем в виду внутри здания.
There are 400 seats in the
Но мы обычно используем
at, когда говорим о том, что
там происходит
I was at the cinema.
107
cinema.
It was raining, so we waited
in the pub.
(= watching a film)
We were at the pub.
(= having a drink)
Запомните:
in the front / in the back of a car
I was sitting in the back (of the car) when we crashed.
at the front / at the back of a building / theatre / group of
people etc.
The garden is at the back of the house.
Let’s sit at the front (of the cinema).
on the front / on the back of a letter / piece of paper etc.
I wrote the date on the back of the photo.
in the corner of a room
TV is in the corner of the room.
at the corner or on the corner of a street
There is a small shop at/on the corner of the street.
Устойчивые выражения, которые нужно запомнить:
IN
ON
AT
108
in prison / hospital
in the lesson
in a book /
newspaper
in the photo
/picture
in the countryside
in a queue /line
/row
in bed
on the platform
on the farm
on the page/map
on the menu
on the list
on the screen
on the island / beach /
coast
drive on the right /left
on the left-hand side /
on the right-hand side
at the station
/airport
at home /work
/school
at the seaside
at the
top/bottom of
at the end of a
corridor
on the way
5. Complete the sentences. Use in, at or on + the following:
the west coast the world the back of the class the sky
the front row the right the back of this card the way to work
1 It was a lovely day. There wasn’t a cloud...............................
2 In most countries people drive..............................................
3 What is the tallest building . . . . . . . . . . . . ……………….. ?
4 I usually buy a newspaper . . . . . . . . . . . . …. in the morning.
5 San Francisco is .................................... of the United States.
6 We went to the theatre last night. We had seats.....................
7 I couldn’t hear the teacher. She spoke quietly and I was sitting....................
8 I don’t have your address. Could you write it.......................
6. Complete the sentences with in, at or on.
1 Write your name …………the top of the page.
2 Is your sister ............ this photograph? I don’t recognize her.
3 I didn’t feel very well when I woke up, so I stayed …… bed.
109
4 We normally use the front entrance to the building, but
there’s another one…….. the back.
5 Is there anything interesting……… the paper today?
6 There was a list of names, but my name wasn’t …… the list.
7 …. the end of the street, there is a path leading to the river.
8 I love to look up at the stars ……. the sky at night.
9 When I’m a passenger in a car, I prefer to sit ….... the front.
10 I live in a very small village. You probably won’t find it
…….. your map.
11 Joe works .......... the furniture department of a large store.
12 Paris is ......... the river Seine.
13 I don’t like cities. I’d much prefer to live … the country.
14 My office is........ the top floor. It’s the left as you come out
of the lift.
15 The passengers had to stand .................. a queue.
7. Complete the sentences. Use in, at or on + the following:
the plane
Tokyo
hospital
school
a taxi
prison
the station
the airport
the cinema
the sports centre
1 My train arrives at 11.30. Can you meet me ………………?
2 We walked to the restaurant, but we went home...................
3 I’d like to see a film. What’s on …………… this week?
4 Some people are…….. for crimes that they did not commit.
5 ‘What does your sister do? Does she have a job?’ ‘No, she’s
still …………………..
6 I play basketball ............... on Friday evenings.
7 A friend of mine was injured in an accident a few days ago.
She’s still ……………..
8 Our flight was delayed. We had to wait ………………..
9 I enjoyed the flight, but the food.....................................
10 Vicky has gone to Japan. She’s living …………………
8. Complete these sentences with in, at or on.
110
1 We went to a concert ……… the National Concert Hall.
2 It was a very slow train. It stopped ……… every station.
3 My parents live. .......... a small village about 50 miles from
London.
4 I haven’t seen Kate for some time. I last saw her ……….
David’s wedding.
5 We stayed ………… a very comfortable hotel when we
were ……… Amsterdam.
6 There were about fifty rooms ……… the hotel.
7 I don’t know where my umbrella is. Perhaps I left it ........
the bus.
8 ‘Where were you on Monday evening?’ ‘I was ……… a
friend’s house.’
9 There must be somebody …….. the house. The lights are on.
10 The exhibition …….. the Museum of Modern Art finishes
on Saturday.
11 Shall we travel your car or mine?
12 I didn’t expect you to be ……. home. I thought you’d be
……… work.
13 ‘Did you like the movie?’ ‘Yes, but it was too hot ……….
the cinema.’
14 Paul lives …….. Birmingham. He’s a student ……………..
Birmingham University.
III Prepositions: to / at / in / into
Говорят go/come/travel (etc.) to
a place or event (в какое-то
место или событие).
go to China
go to bed
go back to Italy
go to the bank
return to London
go to a concert
welcome somebody to a place
111
come to my house
be taken to hospital
be sent to prison
drive to the airport
Таким же образом употребляется ‘a journey to / a trip to /
a visit to / on my way to ...’ etc.:
Did you enjoy your trip to Paris / your visit to the zoo?
Сравните: to используется для описания движения, это
ответ на вопрос «куда?», а in/at – для местоположения, это
ответ на вопрос «где?»:
They are going to France. НО They live in France.
‘Can you come to the party? НО I’ll see you at the party.
Мы говорим been to a place or an event:
I’ve been to Italy four times, but I’ve never been to Rome.
Amanda has never been to a football match in her life.
Get и arrive (добраться, приехать)
Мы говорим get to a place:
What time did they get to London / to work / to the hotel?
НО arrive in или arrive at (НЕ arrive to).
Мы говорим arrive in a town, city or country:
They arrived in London / in Spain a week ago.
Для других мест (зданий), событий мы используем arrive
at:
When did they arrive at the hotel / at the airport / at the party?
Home
Мы говорим go home / come home / get home / arrive
home / on the way home – без предлога.
I’m tired. Let’s go home now.
I met Lisa on my way home.
Into
112
Go into, get into etc. =
enter (a room / a building /
a car etc.) – войти
I opened the door, went into the room and sat down.
Every month, my salary is paid directly into my bank account.
С некоторыми глаголами (особенно go/get/put) часто
используют in (вместо into):
She got in the car and drove away. (= She got into the car ...)
I read the letter and put it back in the envelope.
The opposite of into is out of. Противоположным по
значению к into – out of:
She got out of the car and went into a shop.
Говорят get on/off a bus / a train / a plane:
She got on the bus and I never saw her again.
9. Have you been to these places? If so, how many times?
Choose five of the places and write a sentence using been to.
Athens
Rome
Australia
Singapore
Hong Kong Mexico
Paris
Sweden Tokyo the United States
I’ve never been to Australia. / We’ve been to Mexico once.
10. Put in to/at/in/into where necessary. If no preposition
is necessary, leave the space empty.
1 Three people were taken…… hospital after the accident.
2 We left our luggage ……… the station and went to find
something to eat.
3 Shall we take a taxi …….. the station or shall we walk?
113
4 I have to go ............ the bank today. What time does it open?
5 The Amazon flows ……… the Atlantic Ocean.
6 ‘Do you have your camera with you?’ ‘No, I left it ..........
the car.’
7 I had lost my key, but I managed to climb ……... the house
through a window.
8 We got stuck in a traffic jam on our way ............ the airport.
9 We had lunch ............... the airport while we were waiting
for our plane.
10 Welcome ….. the hotel. We hope you enjoy your stay here.
11 We drove along the main road for about a kilometre and
then turned ………. a narrow side street.
12 Did you enjoy your visit ………. the museum?
13 I’m tired. As soon as I get ......... home, I’m going …. bed.
14 Marcel is French. He has just returned ……. France after
two years ……. Brazil.
15 Carl was born …... Chicago, but his family moved …….
New York when he was three. He still lives …….. New York.
11. Put in to/at/in where necessary. If no preposition is
necessary, leave the space empty.
1 What time does this train get.…..…. London?
2 We arrived…….. Barcelona a few days ago.
3 What time did you get………. home last night?
4 What time do you usually arrive….....work in the morning?
5 When we got.... the cinema, there was a long queue outside.
6 I arrived………. home feeling very tired.
12. Write sentences using got + into / out of / on / off.
1 You were walking home. A friend passed you in her car.
She saw you, stopped and offered you a lift. She opened the door.
What did you do? ............................................................................
114
2 You were waiting for the bus. At last your bus came. The
doors opened. What did you do then? I............................the bus.
3 You drove home in your car. You stopped outside your
house and parked the car. What did you do then? .........................
4 You were travelling by train to Manchester. When the train
got to Manchester, what did you do? ……………………………
5 You needed a taxi. After a few minutes a taxi stopped for
you. You opened the door. What did you do then? ......................
6 You were travelling by air. At the end of your flight, your
plane landed at the airport and stopped. The doors were opened,
you took your bag and stood up. What did you do then? ……….
IV Prepositions: in / on / at (other uses)
Запомните
следующие
предлогов in / on / at
случаи
использования
IN
in the rain / in the sun / in the shade / in the dark / in bad weather
(write) in ink / in pen / in pencil / biro / felt-tip / in writing
(write) in words / in figures / in capital letters
(be/fall) in love (with somebody)
in (my) opinion = from my point of view
in cash
Please write your name in capital letters.
Write the story in your own words. (= don’t copy somebody
else)
They’re very happy together. They’re in love.
ON
on TV / on television / on the radio
(be/go) on strike
115
on the phone
on the Internet
(be/go) on a diet
(be) on fire
on the whole (= in general)
on purpose (= intentionally)
on behalf of
on the market
(be/go) on holiday / on business / on a trip / on a tour / on a cruise
ИЛИ go to a place for a holiday
I’ve never met her, but I’ve spoken to her on the phone a few
times.
Sometimes I have problems at work, but on the whole I enjoy
my job.
I’m sorry. I didn’t mean to annoy you. I didn’t do it on purpose.
Emma’s away on business at the moment.
AT
at the age of 16 / at 120 miles an hour/ at 100 degrees
Tracy left school at 16. = at the age of 16.
We are now flying at a speed of 800 kilometres an hour and at
an altitude of 9,000 metres.
13. Complete the sentences using on/in + the following:
business
purpose
a diet
strike
fire
TV
holiday
a tour
the phone
the whole
writing
cash
1 I’m sorry. It was an accident. I didn’t do it ………………....
2 Richard has put on a lot of weight recently. I think he should
go ……………………
3 Jane’s job involves a lot of travelling. She often has to go
away ……………
4 A: I’m going ............... next week.
B: Where are you going? Somewhere nice?
5 A: Is Sarah here?
116
B: Yes, but she’s ………. at the moment. She won’t be long.
6 A: How was your exam?
B: Well, there were some difficult questions, but ..................
it was OK.
7 Look! That car is ………..! Somebody call the fire brigade.
8 Workers at the factory have gone........... for better pay and
conditions.
9 Soon after we arrived, we were taken of the city.
10 I feel lazy this evening. Is there anything worth watching
………………?
11 They’ve promised me more money, but I haven’t got it .....
12 It’s cheaper if you pay …………………….
14. Complete the sentences using in/on + the following:
capital letters
pencil
cold weather
the rain
love
the shade
my opinion
the whole
1 They fell .................. almost immediately and were married
in a few weeks.
2 Please write your address clearly, preferably........................
3 It’s too hot in the sun. I’m going to sit ……………………..
4 Amanda thought the restaurant was OK, but ………….... it
wasn’t very good.
5 Don’t go out …………... Wait until it stops.
6 Matt likes to keep warm, so he doesn’t go out much............
7 If you write ………….. and make a mistake, you can rub it
out and correct it.
8 ……… it’s a good idea, but there are one or two problems.
15. Complete the sentences with in, on or at.
1 He got married ….. 17, which is rather young to get married.
117
2 I heard an interesting programme ................ the radio this
morning.
3 ..... my opinion, that’s obvious, unreliable news should not
be present ………… the Internet.
4 I wouldn’t like to go …….. a cruise. I think I’d get bored.
5 She’s always ……… a diet but she never loses any weight.
6 I usually go to work ………… foot.
7 The earth travels round the sun ………. 107,000 kilometres
an hour.
8 ‘Did you enjoy your holiday?’ ‘Not every minute, but
................... the whole, yes.’
9 A lot of houses were damaged ……….. the storm last week.
10 Water boils ……… 100 degrees Celsius.
11 When I was 14, I went ….. a trip to France organized by
my school.
12 There was panic when people realized that the building was
......... fire.
13 Lucy’s …….. the phone.
14 Can you turn the light on, please? I don’t want to sit ......
the dark.
15 We didn’t go….. holiday last year. We stayed …….. home.
15 I hate driving ………. fog. You can’t see anything.
16 Technology has developed …….. great speed.
17 That wasn’t an accident! You did it ………. purpose.
READING AND SPEAKING
1. Vocabulary. Listen, read and learn.
№
1
2
3
4
5
Vocabulary
seek
acquire
separate
maintain
upkeep
Translation
стремиться
приобретать
отдельный
поддерживать
содержание
118
6
7
8
9
10
failed
redundant
array
approach
sensitive data
вышедший из строя
избыточный
множество
подход
конфиденциальные данные
2. Read Text A.
TEXT A. A System Administrator
A system administrator, or sysadmin, is a person who is responsible for the upkeep, configuration, and reliable operation of
computer systems; especially multi-user computers, such as servers. The system administrator seeks to ensure that the uptime, performance, resources, and security of the computers they manage
meet the needs of the users, without exceeding a set budget when
doing so.
To meet these needs, a system administrator may acquire, install, or upgrade computer components and software; provide routine automation; maintain security policies; troubleshoot; train or
supervise staff; or offer technical support for projects.
Many organizations staff offer jobs related to system administration. In a larger company, these may all be separate positions
within a computer support or Information Services (IS) department. In a smaller group they may be shared by a few sysadmins,
or even a single person.
– A database administrator (DBA) maintains a database system, and is responsible for the integrity of the data and the efficiency and performance of the system.
– A network administrator maintains network infrastructure
such as switches and routers, and diagnoses problems with these or
with the behavior of network-attached computers.
– A security administrator is a specialist in computer and network security, including the administration of security devices
119
such as firewalls, as well as consulting on general security
measures.
– A web administrator maintains web server services (such as
Apache or IIS) that allow for internal or external access to web
sites. Tasks include managing multiple sites, administering security, and configuring necessary components and software. Responsibilities may also include software change management.
– A computer operator performs routine maintenance and upkeep, such as changing backup tapes or replacing failed drives in a
redundant array of independent disks (RAID). Such tasks usually
require physical presence in the room with the computer, and
while less skilled than sysadmin tasks, may require a similar level
of trust, since the operator has access to possibly sensitive data.
– An SRE Site Reliability Engineer – takes a software engineering or programmatic approach to managing systems.
3. Find in the text the equivalents to the following word
combinations:
1) отвечать за обслуживание, настройку и надежную
работу
компьютерных
систем;
2)
соответствовать
потребностям пользователей; 3) приобретать, устанавливать
или обновлять компьютерные компоненты и ПО; 4)
предложить техническую поддержку проектов; 5) отдел
компьютерной поддержки; 6) администратор базы данных; 7)
отвечать за целостность данных; 8) сетевой администратор; 9)
поддерживать сетевую инфраструктуру; 10) администратор
безопасности; 11) веб-администратор; 12) обеспечивать
внутренний или внешний доступ к веб-сайтам; 13) управление
несколькими сайтами; 14) управление изменениями
программного обеспечения;
15) плановое техническое
обслуживание и ремонт; 16) доступ к потенциально
конфиденциальным данным.
4. Answer the questions:
120
1. What is a system administrator?
2. What are the functions of a system administrator?
3. What kinds of jobs are related to system administration?
4. What positions do larger companies offer?
5. What are the duties of a web administrator?
6. What are the responsibilities of a computer operator?
7. What do SRE Site Reliability Engineers do?
8. What is a security administrator?
9. What is a database administrator responsible for?
5. Form nouns from the words below. All the nouns occur
in Text A.
1. organize – organization
2. maintain
3. present
4. trust
5. support
6. operate
7. compute
8. specialize
9. perform
10. inform
6. Match the word and its definition:
1. security
2. web
3. software
4. automation
a) programs for a computer
b) the person responsible for maintaining the
operation of a computer system.
c) protection of a person, building, organization,
or country against threats such as crime or attacks by foreign countries
d) a part of the Internet accessed through a
graphical user interface and containing docu121
5.sysadmin
ments often connected by hyperlinks
e) the automatic operation or control of equipment, a process, or a system
7. Fill in the gaps choosing the words from the box. Translate the text.
software, type, job, assistants, services
System Administration
System administration is a _______ done by IT experts for an
organization. The job is to ensure that computer systems and all
related __________ are working well. The duties in system administration are wide ranging and often vary depending on the _____
of computer systems being maintained, although most of them
share some common tasks that may be executed in different ways.
Common tasks include installation of new hardware or
__________, creating and managing user accounts, maintaining
computer systems such as servers and databases, and planning and
properly responding to system outages and various other problems.
Other responsibilities may include light programing or scripting to
make the system workflows easier as well as training computer
users and ___________.
8. Read Text B using a dictionary.
TEXT B. Job Description
Job Description. A System Administrator job description involves ensuring that the peripheral systems are in proper working
condition. IT system administrators have to quickly arrange for
replacement or resolve the issues in case of any hardware failure.
They have to create file systems and manage network communica122
tion. Part of the system administrator requirements include being
responsible for taking care of the backup and recovery policy.
System administrator requirements include updating the new
version of OS and application software, along with executing the
policies for the use of the computer system and network. Additionally, system administrator requirements include setting up security
policies for users and taking care of identity management.
System Administrator Responsibilities.
– Configuring and maintaining the networked computer system,
including hardware, system software, and applications.
– Ensuring data is stored securely and backed up regularly.
– Diagnosing and resolving hardware, software, networking,
and system issues when they arise.
– Replacing and upgrading defective or outdated components
when necessary.
– Monitoring system performance to ensure everything runs
smoothly and securely.
– Researching and recommending new approaches to improve
the networked computer system.
– Providing technical support when requested.
– Documenting any processes which employees need to follow
in order to successfully work within our computing system.
Educational Qualifications. After opting for system administration as your career path, it is mandatory that you select a relevant
bachelor’s degree. The basic requirement is a bachelor’s degree in
computer science, information system management, information
technology or other related fields. However, other degree programs with an emphasis on hardware, computer networks, and system administration do exist. Plus, as a system administrator, you
can focus on different networks like Wide Area Network (WAN),
Local Area Network (LAN), as well as several types of servers
like mail servers, file servers, etc.
123
Certifications
Microsoft Certified Solutions Expert (MCSE)
Oracle Linux System Administrator (Oracle)
Red Hat Certified Engineer (RHCE)
CompTIA Server+
VMware Certified Professional 6- Data Center Virtualization
9. Find in the text the sentences in which it is said that:
1. Системные администраторы ИТ должны быстро
организовать замену или решить проблемы в случае отказа
оборудования.
2. Требования системного администратора включают
обновление новой версии ОС и прикладного ПО, а также
выполнение политики использования компьютерной системы
и сети.
3. В обязанности системного администратора входит
настройка и обслуживание сетевой компьютерной системы,
обеспечение безопасного хранения данных и регулярного
резервного копирования, диагностика и устранение проблем с
оборудованием, программным обеспечением, сетью и
системой при их возникновении.
4. Выбрав системное администрирование в качестве своей
карьеры, вы обязательно должны получить соответствующую
степень бакалавра в области компьютерных наук, управления
информационными системами, информационных технологий
или других смежных областей.
5.
Как системный
администратор, вы можете
сосредоточиться на различных сетях, таких как глобальная
сеть (WAN), локальная сеть (LAN), а также на нескольких
типах серверов, таких как почтовые серверы, файловые
серверы и т. д.
10. Read Text С and answer the question:
124
What are the main responsibilities of the advertised position?
TEXT C. New Job Posting: System Administrator
Bell Tower Industries is seeking a full-time system administrator to join our growing company. The system administrator will
be responsible for setting up and maintaining Bell Tower’s computer system.
Main job duties will involve:
– Installing and maintaining system servers
– Configuring and repairing computer hardware and peripherals
– Regular performance tuning of networks
This position involves several other duties as well. When it is
necessary, the administrator will install patches for our operating
systems and software. He or she will also perform weekly backups. These backups prevent critical files and data from becoming
lost or damaged. The administrator will also be responsible for
regular file archiving. In addition, the administrator will regularly
purge old data to protect client information.
The ideal candidate for this job will be able to think and act
quickly. He or she will have experience offering troubleshooting
help. Candidates must have a degree in a technical field. Candidates must also have experience working with Unix®. Experience
working with additional operating systems is a plus. Interested applicants can send a resume and cover letter to hr@belltower.net
11. Discuss the questions:
1. What vacancy does the company Bell Tower Industries
have?
2. What are the main job requirements?
3. What skills should an ideal candidate have?
4. What degree must a candidate have?
5. What documents can applicants send?
125
12. Find in the text the equivalents to the following word
combinations:
1) Штатный системный администратор; 2) настройка и
обслуживание компьютерной системы; 3) основные
должностные обязанности; 4) установка и обслуживание
системных серверов; 5) настройка и ремонт компьютерного
оборудования и периферии; 6) настройка производительности
сетей;
7) еженедельное резервное копирование; 8) отвечать
за регулярное архивирование файлов; 9) очищать старые
данные для защиты информации о клиентах; 10) опыт работы
с дополнительными операционными системами; 11) отправить
резюме и сопроводительное письмо.
13. Match the words with their definitions:
1. configure
a) a copy of information held on a computer
that is stored separately from the computer
2. backup
b) a member or employee of
3.
trouble- c) arrange or order a computer system or an
shooting
element of it so as to fit it for a designated task
4. join
d) physically remove or expel (something)
completely
5. purge
e) discovering why something does not work
effectively and making suggestions about how
to improve it
14. Read the dialogue between two employees at Bell Tower Industries. Role play the dialogue.
Employee 1: Mary, how many applicants did we get for the
system administrator’s position?
126
Employee 2: Quite a few, but two candidates really stand out.
Employee 1: Who are they?
Employee 2: A former IT employee and a recent engineering
grad.
Employee 1: What are the IT employee’s qualifications?
Employee 2: He is very familiar with managing servers and
troubleshooting. He has almost ten years of IT work experience.
Employee 1: He sounds pretty qualified. Does he have any
weaknesses?
Employee 2: Only one. He hasn’t worked with Unix® at all.
Employee 1: Well, that’s the major concern. What’s the engineering student like?
Employee 2: She has lots of training in configuring computer
systems and service, and she is very familiar with Unix and a few
other operating systems.
Employee 1: Any concern about her?
Employee 2: Well, she doesn’t have much work experience.
Employee 1: That may not be a big issue. Especially since she
is so knowledgeable about the other aspects.
Employee 2: That’s true. She may be easy to train.
Employee 1: Ok, will it fit them both? I think she will be a
better choice.
Employee 2: You’re probably right. I’ll contact them both
tomorrow.
15. Read top 20 system administrator interview questions
and answers.
Top 20 System Administrator Interview Questions
and Answers
System administrators or sysadmins ensure that a company’s
client computers and servers remain secure and perform well.
Thus, the most appropriate candidate for this role should be skilled
127
and show a clear understanding of the technical feats needed to
keep systems running smoothly.
But how to find the right candidate from among a multitude of
applicants? It is all about asking the right questions and getting
them answered correctly. Here are the top 20 system administrator
interview questions and answers to help you get the most appropriate individual.
1. Describe your daily routine as a system administrator.
Sample Answer As a sysadmin, my responsibilities include
performing software installations and updates, creating user accounts, and providing system access control. Other duties include
reviewing system logs, allocating storage to resources, optimizing
and monitoring computer systems, creating backups, and ensuring
data recovery measures are in place.
2. What qualities should a system administrator possess?
Sample answer A sysadmin should be a problem solver since the
role is often faced with issues that need to be resolved. Keen intuition
coupled with precise and quick decision making is very vital.
People skills are necessary as sysadmins deal with end users
who don’t know much about IT. Such users need to be guided in a
concise and clear manner.
Patience is another great quality in this role because it involves
handling tasks that need concentration and much time to complete.
Besides, the willingness to learn and being a team player are
other vital qualities in system administration.
3. What is Windows Deployment Services (WDS)?
Sample Answer WDS is a server role that offers the ability to
remotely deploy Windows operating systems. It can be used to set
up new computers in network-based installations so that each operating system doesn’t have to be installed.
4. What is the advantage of using RAID?
Sample Answer A RAID is a virtualization data storage technology that integrates multiple components of a physical disk drive
into a single or several logical units. The advantage of using RAID
128
is that it increases a system’s storage capacity, improves overall
performance, and offers fault tolerance.
5. Define DHCP and Explain its Importance
Sample Answer Dynamic Host Configuration Protocol or
DHCP is a protocol that is used to automatically assign dynamic IP
addresses to computers or other devices on a network. This means
a device acquires a new IP address every time it’s connected to the
network. The benefit of DHCP is that it reduces operation tasks
such that a sysadmin doesn’t have to manually configure each device. Besides, the protocol optimizes the IP addressing plan meaning that unused addresses are made available to new devices or
clients.
6. What three attributes make you a Great Systems Administrator?
Sample Answer I am curious and analytical. I always explore a
problem to find out what really caused it. If the root cause of an
issue is not identified and resolved, the problem will reoccur and
hurt the business. Besides, I am a good communicator with the
ability to share insights in a jargon-free language.
7. Is it a good idea to restore a DC that was backed up 7
months ago?
Sample Answer Restoring a domain controller that was last
backed up 7 months ago is a bad idea. This is because lingering
objects are likely to be encountered that will lead to inconsistent
data. The general rule is that backup files shouldn’t be more than
180 days old.
8. Briefly tell us about your technical background
Sample Answer I graduated four years ago with a bachelor’s
degree in computer science. Besides, I have earned a CompTIA
certification and also worked mainly in the area of server and PC
installation. In my previous assignments, I have been esteemed for
identifying faulty machines early on and providing lasting solutions.
9. What are you proud of in your working with endpoint systems and offering support to users?
129
Sample Answer I am especially proud of being able to identify
users’ problems and resolve them effectively using appropriate
tools. My clients as well as the users I have supported have often
referred their friends to me to help them resolve their computer
issues. I always resolve issues without taking much of my clients’
time.
10. What is an active directory?
Sample Answer An active directory offers centralized control
for network security and administration. It stores all settings and
information in a central database and enables a system administrator to deploy and update software as well as assign policies. Server
computers that are configured with an active directory are called
domain controllers.
11. What is a Domain?
Sample Answer A domain consists of a group of network objects that are organized logically and share the database of a single
active directory. These objects include users, computers, and network devices among others.
12. Differentiate a gateway from a router.
Sample Answer Basically, a router is a layer-3 device that
functions by forwarding data packets between networks. On the
internet, a router directs traffic. On the other hand, a gateway is a
network device that functions as an entrance to a network.
13. Which port is used to perform a ping command?
Sample Answer The ping command utilized ICMP, which
doesn’t use TCP or UDP communication services. In particular, it
makes use of the ICMP echo packets and echo requests.
14. Explain the Proc File system.
Sample Answer The proc file system or procfs is a special file
system in Linux operating systems that offer an interface to the
kernel data structures. Although majority of files in this file system
are read-only, some are writable meaning that they permit kernel
variables to be altered. Besides, procfs have a hierarchy of special
files that reflect the kernel’s current state.
130
15. What do you understand by forests and trees in system administration?
Sample Answer A tree consists of a collection of one or several
domains or domain trees that are found in a contiguous namespace,
which is connected in a transitive trust hierarchy.
On the other hand, a forest refers to a tree collection, which
shares a common global catalog, directory configuration, logical
structure, and directory schema.
16. What is the difference between NTFS and FAT?
Sample Answer NTFS refers to the current file system utilized
by Windows. This file system offers various features including
security permissions, back up, and quotas so that one can fill up a
disk.
FAT is an older file system developed by Microsoft that was
chiefly used in Windows operating systems up to the XP version.
FAT doesn’t offer most of the key features including security and
back up that are provided by NTFS.
17. Differentiate an antivirus from a firewall.
Sample Answer An antivirus is a program that is designed to
protect a computer from viruses. Once installed on a computer, an
antivirus monitors the system continuously to identify any threat
from the internet, external storage devices, or other sources.
A firewall consists of a program that protects a system from
hackers, intruders, or outsiders. Attacks from these sources may be
viruses or unauthorized access intended to steal or destroy sensitive and valuable information. Firewalls come either as software or
hardware. A software firewall is installed on a computer while organizations install a hardware firewall to safeguard all their systems.
18. What do you understand by VOIP?
Sample Answer VOIP is an acronym for Voice Over Internet
Protocol. It is a category of software and hardware that helps people in using the internet as a medium of transmission for telephone
calls. This is accomplished by forwarding data in packets through
an IP instead of the traditional circuit transmissions.
131
19. Explain how a tracert works.
Sample Answer Tracert or traceroute consists of a commandline tool that can be initiated using a prompt. It is used to track the
path taken by IP packets to their destination. A Tracert command
tracks a route by sending ICMP echo packets to a given destination. In the end, the command helps you determine where the chain
of connection stops.
20. As a system administrator, is team work part of your typical day?
Sample Answer As a sysadmin, I would often provide technical support to teams and end-users. This may involve software
installation, technical troubleshooting, or other technical duties
associated with the role. Thus, I would not be engaged directly in
teamwork. However, I would work with teams occasionally in developing and explaining technological strategies.
16. Practise answering the interview questions.
ЗАКЛЮЧЕНИЕ
Учебное пособие представляет собой взаимосвязанный
комплекс материалов, в процессе работы с которым
обучающиеся
должны
овладеть
профессиональной
англоязычной
терминологией,
активизировать
грамматические
структуры,
усовершенствовать
их
реализацию во всех видах речевой деятельности. Таким
образом, принципиальным отличием содержательной стороны
учебного пособия является то, что его освоение позволяет
формировать коммуникативные навыки и компетенции, т. е.
умение соотносить языковые средства с конкретными
сферами,
ситуациями,
условиями
и
задачами
профессионального общения, предполагающего ознакомление
с международными практиками и инновационными
132
технологиями, а также осуществление профессионального
взаимодействия и обмен опытом в профессиональной
деятельности.
Многообразие учебного материала позволяет варьировать
объем заданий и может способствовать решению сложных
задач, связанных с дифференцированным подходом к
обучению, учетом индивидуальных особенностей и степени
подготовки
обучающихся. Так как характер учебного
материала, его методическая организация делают возможным
взаимосвязанное обучение всем видам речевой деятельности
на
иностранном
языке,
способствуют
изучению
грамматического строя английского языка, обучению чтению
и переводу англоязычной литературы, они также
обеспечивают постепенный переход к работе с аутентичными
профессионально ориентированными текстами.
СПИСОК ЛИТЕРАТУРЫ
1. Alexander L. G. Longman English Grammar Practice for
Intermediate Students. – 1998. – 302 p.
2. Davis F., Rimmer W. Active Grammar Level 1 with Answers. – Cambridge University Press, 2011. – 201 p.
3. Eastwood J. Oxford Practice Grammar Intermediate. – Oxford, UK: Oxford University Press, 2011. – 445 p.
4. Five Emerging Customer Identity Threats. – Режим
доступа:
https://www.securityinfowatch.com/cybersecurity/informationsecurity/article/21107868/5-emerging-customer-identity-threats
133
5. How Does Antivirus Software Work? – Режим доступа:
https://www.usnews.com/360-reviews/antivirus/how-doesantivirus-software-work
6. Identity Theft | Keeping Your Details Safe | Lloyds Bank. –
Режим
доступа:
https://www.marylandattorneygeneral.gov/ID%20Theft%20Docu
ments/Identitytheft.pdf
7. Murphy R. English Grammar in Use: Cambridge University
Press, 2012. – 399 p.
8. Murphy R. Essential Grammar in Use: Cambridge University Press, 2011. – 320 p.
9. What is Pharming and How to Protect Yourself. – Режим
доступа:
https://www.kaspersky.com/resourcecenter/definitions/pharming
10. Protect Yourself from Malware. – Режим доступа:
https://support.google.com/googleads/answer/2375413?hl=en
11. Reflexive pronouns. – Режим доступа: https://puzzleenglish.com/directory/reflexive-pronouns
12. Relative Clause в английском языке: виды и правила
использования. – Режим доступа: https://engblog.ru/relativeclause
13. Relative clauses (who/that/which/whose/where/why). –
Режим
доступа:
https://interneturok.ru/lesson/english/7-8klassy/otnositelnye-pridatochnye-relative-clauses/who-that-whichwhose-where-why
14.
System
Administration.
–
Режим
доступа:
https://www.techopedia.com/definition/22441/systemadministration
15. Ten FAQs Software Service Questions. – Режим доступа:
https://www.softwareadvice.com/resources/saas-10-faqs-softwareservice/
16. There или it. –
Режим доступа: https://puzzleenglish.com/exercise/there-it
17. Top 20 System Administrator Interview Questions and
Answers.
–
Режим
доступа:
134
https://www.projectpractical.com/top-20-system-administratorinterview-questions-and-answers/
18.
Victim.
–
Режим
доступа:
https://www.collinsdictionary.com/dictionary/english/victim
19. Vince M. First Certificate Language Practice. English
Grammar and Vocabulary. – Macmillan Publishers Limited, 2003.
– 350 p.
20. What is a Keylogger? – Режим доступа:
https://enterprise.comodo.com/what-is-a-keylogger/
21. What is an antivirus product? Do I need one? – Режим
доступа: https://www.ncsc.gov.uk/guidance/what-is-an-antivirusproduct
22. What is Antivirus Software? Definition. – Режим
доступа: https://www.sdxcentral.com/security/definitions/what-isantivirus-software-definition/
23. What is Malware and How to Protect Against It? – Режим
доступа: https://www.kaspersky.com/resource-center/preemptivesafety/what-is-malware-and-how-to-protect-against-it
24. Зверховская Е. В. Грамматика английского языка:
Теория. Практика : учеб. пособие / Е. В. Зверховская,
Е. Ф. Косиченко. – 2-е изд., испр. – СПб.: БХВ – Петербург,
2015. – 304 с.
25. Качалова К. Н. Практическая грамматика английского
языка / К. Н. Качалова, Е. Е. Израилевич. – М.: изд. дом
«Успех», 2004.
26. Мюллер В.К. Современный англо-русский словарь в
новой редакции [Электронный ресурс] / В. К. Мюллер. –
Электрон. текстовые данные. – М.: Аделант, 2012. – 800 c. –
Режим доступа: http://www.iprbookshop.ru/44150.html – ЭБС
«IPRbooks»
27. Разница между Either, Neither и Both. – Режим
доступа:
https://www.englishdom.com/blog/raznica-mezhdueither-neither-i-both/
135
28. Что такое клавиатурный шпион (кейлоггер)? – Режим
доступа:
https://www.kaspersky.ru/resourcecenter/definitions/keylogger
ОГЛАВЛЕНИЕ
Введение……………………………………………………
UNIT 1. Identity Theft……………………….…………….
UNIT 2. Preventative Measures............................................
UNIT 3. Anti-Virus Software.................................................
UNIT 4. Cloud-Computers....................................................
UNIT 5. System Administration…………….........................
Заключение…………………………………………………
Список литературы………………………………………
136
3
4
31
54
77
103
132
133
137
Учебное издание
Погребняк Наталья Владимировна
Карамышева Светлана Геннадьевна
ИНОСТРАННЫЙ ЯЗЫК
(АНГЛИЙСКИЙ)
В СФЕРЕ ИНТЕРНЕТ-ТЕХНОЛОГИЙ
Учебное пособие
В авторской редакции
Макет обложки – Н. П. Лиханская
Подписано в печать
2022. Формат 60 × 84 1/16.
Усл. печ. л. – 8,0. Уч.-изд. л. – 6,2 .
Тираж 500 экз. Заказ №
–100 экз.
Типография Кубанского государственного аграрного университета.
350044, г. Краснодар, ул. Калинина, 13
138
Download