Рабочая программа по дисциплине гсэ. Ф. 01 Иностранный язык





НазваниеРабочая программа по дисциплине гсэ. Ф. 01 Иностранный язык
страница5/6
Дата публикации08.01.2015
Размер0.53 Mb.
ТипРабочая программа
100-bal.ru > Информатика > Рабочая программа
1   2   3   4   5   6

Примерный перечень вопросов для обсуждения:

  • (3 семестр):

    1. What is touch pad?

    2. What is a scanner used for?

    3. What types of printers do you know?

    4. What is WWW?

    5. What is a computer virus?

    6. How are viruses spread?

    7. How canyou deal with viruses ?

    8. What is a hacker?



    1. Вопросы к экзамену для проведения аттестации



    2. К концу 4-го семестра студенты должны знать грамматический материал в следующем объеме:

    3. Causative verbs; relative clauses; inclusives; know/know how; clauses of concession; problem verbs; tell/say; redundancy; parallel structure; adverbials at the beginning of a sentence; ing/to; Active voice; Passive voice; reported speech.



    4. Тексты для письменного перевода по специальности

    5. How to become a Computer Consultant



    6. The first key point to realise is that you can't know everything. However you mustn't become an expert in too narrow a field. The second key point is that you must be interested in your subject. The third key point is to differentiate between contract work and consultancy. Good contractors move from job to job every few months. A consultant is different. A consultant often works on very small timescales - a few days here, a week there, but often for a core collection of companies that keep coming back again and again.

    7. There's a lot of work out there for people who know Visual Basic, C++, and so on. And there are lots of people who know it too, so you have to be better than them. Qualifications are important. Microsoft has a raft of exams you can take, as does Novell, and in my experience these are very useful pieces of paper. University degrees are useless. They merely prove you can think, and will hopefully get you into a job where you can learn something useful. Exams like Microsoft Certified Systems Engineer are well worth doing. The same goes for NetWare Certification. However, this won't guarantee an understanding of the product, its positioning in the market, how it relates to other products and so on. That's where the all-important experience comes in. Here's the road map. After leaving university you get a technical role in a company and spend your evenings and weekends learning the tools of your trade - and getting your current employer to pay for your exams. You don't stay in one company for more than two years. After a couple of hops like that, you may be in a good position to move into a junior consultancy position in one of the larger consultancy companies. By the age of 30, you've run big projects, rolled out major solutions and are well known. Maybe then it's time to make the leap and run your own life.



    8. How to become an IT Manager



    9. IT managers manage projects, technology and people. Any large organisation will have at least one IT manager responsible for ensuring that everyone who actually needs a PC has one and that it works properly. This means taking responsibility for the maintenance of servers and the installation of new software, and for staffing a help-desk and a support group.

    10. Medium to large companies are also likely to have an IT systems manager. They are responsible for developing and implementing computer software that supports the operations of the business.

    11. They're responsible for multiple development projects and oversee the implementation and support of the systems. Companies will have two or three major systems that are probably bought off the shelf and then tailored by an in-house development team.

    12. Apart from basic hardware and software expertise, an IT manager will typically have over five years' experience in the industry. Most are between 30 and 45. Since IT managers have to take responsibility for budgets and for staff, employers look for both of these factors in any potential recruit.

    13. Nearly all IT managers have at least a first degree if not a second one as well. Interestingly, many of them don't have degrees in computing science. In any case, the best qualification for becoming a manager is experience. If your personality is such that you're unlikely to be asked to take responsibility for a small team or a project, then you can forget being an IT manager. You need to be bright, communicative and be able to earn the trust of your teams. Most of this can't be taught, so if you don't have these skills then divert your career elsewhere.



    14. INTERNET SECURITY



    15. There are many benefits from an open system like the Internet, but one of the risks is that we are often exposed to hackers who break into computer systems just for fun, to steal information, or to spread viruses.

    16. So how do we go about making our online transactions secure?

    17. Security on the Web

    18. Security is crucial when you send confidential information online. Consider, for example, the process of buying a book on the Web. You have to type your credit card number into an order form which passes from computer to computer on its way to the online bookstore. If one of the intermediary computers is infiltrated by hackers, your data can be copied.

    19. To avoid risks, you should set all security alerts to high on your web browser. Mozilla Firefox displays a lock when the website is secure and allows you to disable or delete cookies - small files placed on your hard drive by web servers so that they can recognize your PCwhen you return to their site.

    20. If you use online banking services, make sure they use digital certificates- files that are like digital identification cards and that identify users and web servers. Also be sure to use a browser that is compliant with SSL (Secure Sockets layer), a protocol which provides secure transactions.

    21. Email privacy

    22. Similarly, as your email travels across the Net, it is copied temporarily onto many computers in between. This means that it can be read by people who illegally enter computer systems.

    23. The only way to protect a message is to put it in a sort of virtual envelope - that is, to encode it with some form of encryption. a system designed to send email privately is Pretty Good Privacy, a freeware program written by Phil Zimmerman.

    24. Network security

    25. Private networks can be attacked by intruders who attempt to obtain information such as Social Security numbers, bank accounts or research and business reports. To protect crucial data, companies hire security consultants who analyse the risks and provide solutions. The most common methods of protection are passwords for access control, firewalls and encryption and decryption systems. Encryption changes data into a secret code so that only someone with a key can read it. Decryption converts encrypted data back into its original form.

    26. Malware protection

    27. Malware (malicioussoftware) are programs designed to infiltrate or damage your computer, for example viruses worms, Trojans and spyware. A virus can enter a PC via a disc drive if you insert an infected disc or via the Internet. A worm is a self-copying program that spreads through email attachments; it replicates itself and sends a copy to everyone in an address book. A Trojan horse is disguised as a useful program; it may affect data security. Spyware collects information from your PC without your consent. Most spyware and adware (software that allows pop-ups - that is, advertisements that suddenly appear on your screen) is included with “free”downloads.

    28. If you want to protect your PC, don't open email attachments from strangers and take care when downloading files from the Web. Remember to update your anti-virus software as often as possible, since new viruses are being created all the time.



    29. Прочитать без словаря текст по специальности. Кратко изложить его содержание на иностранном языке. Объемтекста - 600 печатныхзнаков.



    30. Kevin Mitnick is the hackers' hero. His latest spell in jail was a 46-month sentence for fraud relating to breaking into the systems of several multinational corporations. He was released on condition that he did not have any contact with a computer.

    31. Hotmail, Microsoft's free email service, was hacked into last September, exposing the correspondence of more than 40m users. A group calling itself Hackers Unite posted a Web address with details of how to access any Hotmail account. The service was shut down for five hours.

    32. In March 2000, a Welsh teenager allegedly stole information from more than 26,000 credit card accounts across Britain, the US, Japan, Canada and Thailand, and published the details on the Internet. FBI agents and British police raided the home of Raphael Gray,18, and arrested him and his friend. He has been charged with 10 counts of downloading unauthorised information.

    33. The UK Department of Trade and Industry has twice been prey to hackers, once in 1996 and again in 2000 when a DTI computer was programmed to reroute email. The Home Office investigated nine cases of hacking last year, one of which was the leaking of a report on a murder. In August 1996 hackers ran up a £lm phone bill for Scotland Yard but did not access flies.

    34. In 1998 Washington revealed that an Israeli hacker called 'The Analyser' was responsible for 'the most organised attempt to penetrate the Pentagon's computer systems'. He turned out to be Ehud Tenenbaum, 18, who had planted a list of his own passwords in the Pentagon system and passed them to other hackers.

    35. In 1997 the son of a fraud squad detective walked free from a court in London after charges of breaching the security of the US air force were dropped. Three years earlier Mathew Bevan, then 19, and a friend, Richard Pryce, 16, used the Internet to gain access to several US military bases. Pryce was fined £1,200 after admitting several other offences.

    36. In 1997 hackers got into the Yahoo! website, replacing the homepage with a ransom note demanding the release of their hero, Kevin Mitnick. Unless the demand was met, the note said, a virus would be released in all Yahoo!'s computers. The company dismissed the threat as a hoax, but the 'Free Kevin' slogan continued to appear on other hijacked sites.



    37. Примерный перечень вопросов для обсуждения:

    1. When did the first personal computer appear?

    2. What is a personal computer?

    3. What are the main spheres of PC applications?

    4. What professions are in great need of computers?

    5. What is modem and what is it used for?

    6. What is RAM/ROM?



    1. What storage devices do you know?

    2. What is the function of the CPU?

    3. What is a scanner used for?

    4. What types of printers do you know?

    5. What is WWW?

    6. What is a computer virus?

    7. How are viruses spread?

    8. How canyou deal with viruses ?

    9. What is a hacker?

    10. How easy do you think it is to infiltrate the Internet and steal sensitive information?

    11. How can you protect your computer from viruses and spyware?

    12. Why is security so important on the Internet?

    13. What security features are offered by Mozilla Firefox?

    14. What security protocol is used by banks to make online transactions secure?



    1. Тестовые задания для контроля остаточных знаний

    2. I. TEXT

    3. Read and translate the text. Put ten different questions to the text.



    4. Computer viruses



    5. The Maltese Amoeba may sound like a cartoon character, but if it attacked your computer, you wouldn't be laughing. The Maltese Amoeba is a computer virus. It is a form of software which can infect your system and destroy your data. Making computer viruses is only one type of computer crime. Others include hacking (changing data in a computer without permission) and pirating (illegally copying software programs).

    6. Viruses are programs which are written deliberately to damage data. Viruses can hide themselves in a computer system. Some viruses are fairly harmless. They may flash a message on screen, such as ‘Gotcha! Bet you don't know how I crept in'. The Yankee Doodle virus plays this American tune on the computer's small internal speaker every eight days at 5 p.m. Others have serious effects. They attach themselves to the operating system and can wipe out all your data or turn it into gobbledygook. When the Cascade virus attacks, all the letters in a file fall into a heap at the bottom of the screen. This looks spectacular but it's hard to see the funny side when it's your document.

    7. Most viruses remain dormant until activated by something. For example, the Jerusalem B virus is activated every Friday the 13th and erases any file you try to load from your disk. The Michelangelo virus was programmed to become active on March 6th 1992-the 517th birthday of Michelangelo. It attacked computer systems throughout the world, turning data on hard disks into nonsense.

    8. Viruses are most commonly passed via disks but they can also spread through bulletin boards, local area networks, and email attachments. The best form of treatment is prevention. Use an antivirus program to check a floppy before using it. Always download email attachments onto a floppy and check for viruses.

    9. If you do catch a virus, there are antivirus programs to hunt down and eradicate the virus. The problem is that around 150 new viruses appear every month and you must constantly update your antivirus package to deal with these new forms.

    10. 2. Согласуйте слова в левой колонке с их интерпретацией, предложенной справа.

    11. 1. Computer a) an electronic device accepting data processing results from the computer system;

    12. 2. Inputb) the unit performing arithmetic operations called for in the instructions;

    13. 3.Outputс) the unit coordinating all the activities ofvarious components of the computer. It reads information, interprets instructions, performs operations, etc.;

    14. 4. Software d) a set of programs designed to control theoperation of a computer;

    15. 5. Hardware e) lists of instructions followed by the control unit of the CPU:

    16. 6. Storage f) an electronic device keying informationinto the computer;

    17. 7. CPU g) the unit holding all data to be processed,intermediate and final results of processing;

    18. 8. CU h) visible units, physical components of adata processing system;

    19. 9. ALU i) the unit that directs the sequence of system operations, selects instructions and interpretes them;

    20. 10. Program j) a device with a complex network of electronic circuits that can process information, make decisions, and replace people in routine tasks.



    21. 3.Выберитеправильныйвариантответа.



    22. 1. If the weather ... fine tomorrow, we'll go fishing.

    23. a) is b) we'll be c) is going d) was

    1. Thisbook... into 14 languages.

    1. a) translated b) has translated c) has been translated d) is translating

    2. 3. I want... at the airport.

    3. a) that you meet me b) you meet me c) you to meet me d) met

    4. 4. John decided not... a car.

    5. a) buying b) to buy c) have bought d) bought



    1. Mr. Jones doesn't let anyone ... this computer.

    1. a) use b) using c) to use d) used



    1. I wonder what you ... when you come back. .

    1. a) do b) will do c) to do d) does

    2. 7. If you help me, ... finish the job much sooner.
      a) can b) we'll be able to c) will able d) could

    1. Everybody... fineweather.

    1. a) like b) dislike c) likes d) is liking



    2. 9. I …. smoke a lot, but now I don't.

    3. a) use to b) used to c) did use to d) am used

    1. Heenjoys …. .

    1. a) to dive b) diving c) to diving d) dive


  • 1   2   3   4   5   6

    Похожие:

    Рабочая программа по дисциплине гсэ. Ф. 01 Иностранный язык iconРабочая программа по дисциплине гсэ. Ф. 01 Иностранный язык
    Курс «Иностранный язык» занимает важное место в лингвистической подготовке будущих работников сферы «Социальный сервис и туризм»
    Рабочая программа по дисциплине гсэ. Ф. 01 Иностранный язык iconРабочая программа по дисциплине гсэ. В. 02. Деловой иностранный язык
    ...
    Рабочая программа по дисциплине гсэ. Ф. 01 Иностранный язык iconУчебно-методический комплекс по дисциплине гсэ. Ф. 4 Русский язык и культура речи
    ...
    Рабочая программа по дисциплине гсэ. Ф. 01 Иностранный язык iconРабочая программа по дисциплине гсэ. Ф. 1 Иностранный язык (немецкий)
    Электропривод и автоматика промышленных установок и технологических комплексов (ЭП)
    Рабочая программа по дисциплине гсэ. Ф. 01 Иностранный язык iconРабочая программа по дисциплине гсэ. Ф. 01 Иностранный язык
    Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования
    Рабочая программа по дисциплине гсэ. Ф. 01 Иностранный язык iconУчебно-методический комплекс по дисциплине гсэ. Р. 3
    Иностранный язык с дополнительной специальностью Иностранный язык и знакомит студентов с культурой Древней Греции и Рима, с проникновением...
    Рабочая программа по дисциплине гсэ. Ф. 01 Иностранный язык iconРабочая программа по дисциплине гсэ. Ф. 1 Иностранный язык (английский)...
    Строительство/190700 Организация перевозок и управление на транспорте, 18000 Морская техника
    Рабочая программа по дисциплине гсэ. Ф. 01 Иностранный язык iconРабочая программа по дисциплине иностранный язык "английский язык" Цикл гсэ
    Специфика артикуляции звуков, интонации, акцентуации и ритма нейтральной речи в изучаемом языке; основные особенности полного стиля...
    Рабочая программа по дисциплине гсэ. Ф. 01 Иностранный язык iconРабочая программа по дисциплине иностранный язык "немецкий язык" Цикл гсэ
    Специфика артикуляции звуков, интонации, акцентуации и ритма нейтральной речи в изучаемом языке; основные особенности полного стиля...
    Рабочая программа по дисциплине гсэ. Ф. 01 Иностранный язык iconРабочая программа по дисциплине иностранный язык "немецкий язык" Цикл гсэ
    Специфика артикуляции звуков, интонации, акцентуации и ритма нейтральной речи в изучаемом языке; основные особенности полного стиля...
    Рабочая программа по дисциплине гсэ. Ф. 01 Иностранный язык iconРабочая программа по дисциплине иностранный язык "немецкий язык" Цикл гсэ
    Специфика артикуляции звуков, интонации, акцентуации и ритма нейтральной речи в изучаемом языке; основные особенности полного стиля...
    Рабочая программа по дисциплине гсэ. Ф. 01 Иностранный язык iconРабочая программа по дисциплине гсэ. Ф. 01 Иностранный язык
    Курс английского языка состоит из двух основных разделов – «Язык для общих целей» (General language) на 1-м курсе, и «Язык для специальных...
    Рабочая программа по дисциплине гсэ. Ф. 01 Иностранный язык iconРабочая программа по дисциплине гсэ. Ф. 01 Иностранный язык по специальности
    Рабочая программа составлена на основании гос впо специальности (направления) 080502 Экономика и управление на предприятии (по отраслям)...
    Рабочая программа по дисциплине гсэ. Ф. 01 Иностранный язык iconРабочая программа по дисциплине гсэ. Ф. 1 Иностранный язык (английский)
    Омский институт водного транспорта (филиал) фбоу впо «Новосибирская государственная академия водного транспорта»
    Рабочая программа по дисциплине гсэ. Ф. 01 Иностранный язык iconРабочая учебная программа дисциплины Учебно-методическое обеспечение...
    Специальность 050303. 65 Иностранный язык (английский) с дополнительной специальностью 050303. 65 Иностранный язык (немецкий); 050303....
    Рабочая программа по дисциплине гсэ. Ф. 01 Иностранный язык iconРабочая программа по дисциплине б иностранный язык
    Курс «Иностранный язык» занимает важное место в лингвистической подготовке будущих работников сферы туризма


    Школьные материалы


    При копировании материала укажите ссылку © 2013
    контакты
    100-bal.ru
    Поиск