All these sentences are false. Make them negative to obtain the right answer.

Boot sector viruses were prevalent in the 1980s. (Not nowadays) A companion virus has host files per se. However, the slow infector approach does not seem very successful. Windows XP uses the MS-DOS command prompt. Trojan horses are viruses in the strict sense because they can replicate puter viruses come into existence spontaneously, they are likely to be created by bugs in regular programs. Resident viruses search for hosts when they are started. This approach fools anti-virus software, however. Anti-virus software changes the underlying capability of host software to transmit viruses.

EXERCISE8

Find in the text sentences containing a word or a group of words from the following. Read them out and translate.

In the same sense,        all kinds of malware, in a single day, along with,  used to spread like wildfire, in their heyday, infamous, eventually, on a specific day or at specific hour, to a great extent        

EXERCISE 9

Work in pairs. Share opinions about.

1) computer viruses and their way of spreading;

2)  boot sector viruses;

3) multipartite viruses;

4) alogic bomb;

5) macro viruses;

6) Trojan horses;

7) computer worms.

Text II

Anti-Virus Software and Other Preventative Countermeasures

EXERCISE 1

Read and translate the text using the list of words and word combinations after the text.

There are two common methods to detect viruses. The first, and by far the most common method of virus detection is using a list of virus signature definitions. The second method is to use a heuristic algorithm to find viruses based on common behaviors. This method has the ability to detect viruses that anti-virus security firms have yet to create a signature for.

НЕ нашли? Не то? Что вы ищете?

Many users install anti-virus software that can detect and eliminate known viruses after the computer downloads or runs the executable. They work by examining the content heuristics of the computer's memory (its RAM, and boot sectors) and the files stored on fixed or removable drives (hard drives, floppy drives), and comparing those files against a database of known virus "signatures". Some anti-virus programs are able to scan opened files in addition to sent and received emails 'on the fly' in a similar manner. This practice is known as "on-access scanning." Anti-virus software does not change the underlying capability of host software to transmit viruses. There have been attempts to do this but adoption of such anti-virus solutions can void the warranty for the host software. Users must therefore update their software regularly to patch security holes. Anti-virus software also needs to be regularly updated in order to gain knowledge about the latest threats.

One may also prevent the damage done by viruses by making regular backups of data (and the Operating Systems) on different media, that are either kept unconnected to the system (most of the time), read-only or not accessible for other reasons, such as using different file systems. This way, if data is lost through a virus, one can start again using the backup (which should preferably be recent). If a backup session on optical media like CD and DVD is closed, it becomes read-only and can no longer be affected by a virus. Likewise, an operating system on a live CD can be used to start the computer if the installed Operating Systems become unusable. Another method is to use different operating systems on different file systems. A virus is not likely to affect both. Data backups can also be put on different file systems. For example, Linux requires specific software to write to NTFS partitions, so if one does not install such software and uses a separate installation of MS Windows to make the backups on an NTFS partition (and preferably only for that reason), the backup should remain safe from any Linux viruses. Likewise, MS Windows can not read file systems like EXT3, so if one normally uses MS Windows, the backups can be made on an EXT3 partition using a Linux installation.

Once a computer has been compromised by a virus, it is usually unsafe to continue using the same computer without completely reinstalling the operating system. However, there are a number of recovery options that exist after a computer has a virus. These actions depend on severity of the type of virus.

EXERCISE 2

Words and word combinations to the text:

executable - исполняемыйфайл

aheuristic algorithm – эвристическийалгоритм

topredate - предшествовать

virus signature – сигнатуравируса

to patch holes – подлататьдыры

to backup data – копироватьданные

on the fly – находу

to be compromised – подвергатьсяриску, опасности

tovoidthewarranty – аннулировать, уничтожитьгарантию

EXERCISE 3

Answer the questions about the text.


How many types of anti-virus methods are described in the article? How does anti-virus software act? What is the practice known as "on-access scanning"? What are the disadvantages of that practice? Can one prevent the damage done by viruses by making regular backups of data? How does it happen? Which another method connected with using different operating systems on different file systems do you know? Once a computer has been compromised by a virus, is it safe to continue using the same computer without completely reinstalling the operating system?

EXERCISE 4

Read and translate the following text with the dictionary. Look at each line and decide if it contains an extra and unnecessary word. These extra words can be from the following groups: articles, auxiliaries, comparatives, conjunctions, prepositions, personal pronouns, modifiers, relative pronouns.

Why we call it “Virus”


0 ٧

The word as virus is derived from and used in the same sense as the biological equivalent.

00

The term "virus" is often used in common parlance to describe all kinds of malware,

1

including those more that are more properly classified as worms or Trojans. Most popular

2

anti-virus software packages defend against all  of these types of attack. In some technical

3

communities, the term "virus" is also extended so to include the authors of malware, in an

4

insulting sense. The English plural of "virus" is "viruses". Some people use "virii" or "viri"

5

as a plural, but this is rare. For a discussion about whether "viri" and "virii" are to correct

6

alternatives of "viruses", see plural of virus. The term "virus" was up first used in an

7

academic publication it by Fred Cohen in his 1984 paper “Experiments with Computer

8

Viruses”, where he credits Len Adleman with coining it. However, a 1972 science fiction

9

novel by David Gerrold, “When H. A.R. L.I. E. Was One”, includes a description of a too

10

fictional computer program called "VIRUS" that worked just like a virus (and was that

11

countered by a program called "VACCINE"). The term "computer virus" with current

12

usage also was appears in the comic book “Uncanny X-Men”, written by Chris Claremont

13

and published in 1982. Therefore, although Cohen's use of "virus" may, perhaps, have been

14

the first, it seems difficult to  trace of the term “virus”.

EXERCISE 5

Speak about viruses and anti-virus programs, using the learnt vocabulary.

PART II

TELECOMMUNICATIONS

UNIT I

WHAT IS TELECOMMUNICATIONS

EXERCISE 1

Read and translate the text

Telecommunications, devices and systems, transmit electronic or optical signals across long distances. Telecommunications enables people around the world to contact one another, to access information instantly, and to communicate from remote areas. Telecommunications usually involves a sender of information and one or more recipients linked by a technology, such as a telephone system, that transmits information from one place to another. Telecommunications enables people to send and receive personal messages across town, between countries, and to and from outer space. It also provides the key medium for delivering news, data, information, and entertainment.

Telecommunications devices convert different types of information, such as sound and video, into electronic or optical signals. Electronic signals typically travel along a medium such as copper wire or are carried over the air as radio waves. Optical signals typically travel along a medium such as strands of glass fibers. When a signal reaches its destination, the device on the receiving end converts the signal back into an understandable message, such as sound over a telephone, moving images on a television, or words and pictures on a computer screen.

Telecommunications messages can be sent in a variety of ways and by a wide range of devices. The messages can be sent from one sender to a single receiver (point-to-point) or from one sender to many receivers (point-to-multipoint). Personal communications, such as a telephone conversation between two people or a facsimile (fax) message (see Facsimile Transmission), usually involve point-to-point transmission. Point-to-multipoint telecommunications, often called broadcasts, provide the basis for commercial radio and television programming.

EXERCISE 2

Words and expressions to be remembered:

Device – устройство

Transmit – передавать

Toaccessinformationinstantly - иметь своевременный доступ к информации

sender - отправитель

Из за большого объема этот материал размещен на нескольких страницах:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42