НЕПРАВИЛЬНЫЕ ГЛАГОЛЫ АНГЛИЙСКОГО ЯЗЫКА




 

По способу образования прошедшего неопределенного времени действительного залога (Past Simple Active) и причастия прошедшего времени (Past Participle (Participle II)) глаголы делятся на две группы: правильные и неправильные. Правильные глаголы образуют (Past Simple Active и Past Participle путем прибавления к форме инфинитива окончания –ed.

К неправильным глаголам принадлежат глаголы, образующие (Past Simple Active и Past Participle различными другими способами.

Количество неправильных глаголов английского языка относительно невелико, но к ним относятся многие самые употребительные глаголы. Неправильные глаголы рекомендуется заучивать в трех основных формах.

Четвертой формой глагола называют ing-форму, это может быть причастие настоящего времени (Present Participle) или герундий (Gerund). Поскольку образуется эта форма по общим для всех глаголов правилам, то заучивать ее не надо: надо знать орфографические правила при прибавлении -ing.

 

Infinitive Past simple Past participle перевод
be [bi:] was [wɔz], were [wз:] been [bi:n] быть
beat [bi:t] beat [bi:t] beaten ['bi:tn] бить
become [bi:kʌm] became [bi:keim] become[bi:kʌm] становиться
begin [bi'gin] began [bi'gæn] begun [bi'gʌn] начинать
bleed [bli:d] bled [bled] bled [bled] кровоточить
blow [blou] blew [blu:] blown [bloun] дуть
break [breik] broke [brouk] broken ['brouk(e)n] ломать
bring [briŋ] brought [brɔ:t] brought [brɔ:t] приносить
build [bild] built [bilt] built [bilt] строить
burn [bз:n] burnt [bз:nt] burnt [bз:nt] гореть
burst [bз:st] burst [bз:st] burst [bз:st] разразиться
buy [bai] bought [bɔ:t] bought [bɔ:t] покупать
catch [kætʃ] caught [kɔ:t] caught [kɔ:t] ловить, хватать
choose [tʃu:z] chose [ʃəuz] chosen [tʃəuz(ə)n] выбирать
come [kʌm] came [keim] come [kʌm] приходить
cost [cɔst] cost [cɔst] cost [cɔst] стоить
creep [kri:p] crept [krept] crept [krept] ползать
cut [kʌt] cut [kʌt] cut [kʌt] резать
do [du:] did [did] done [dʌn] делать
draw [drɔ:] drew [dru:] drawn [drɔ:n] рисовать, тащить
dream [dri:m] dreamt [dremt] dreamt [dremt] мечтать, дремать
drink [driŋk] drank [dræŋk] drunk [drʌŋk] пить
drive [draiv] drove [drouv] driven ['drivn] водить
eat [i:t] ate [et] eaten ['i:tn] есть
fall [fɔ:l] fell [fel] fallen ['fɔ:lən] падать
feed [fi:d] fed [fed] fed [fed] кормить
feel [fi:l] felt [felt] felt [felt] чувствовать
fight [fait] fought [fɔ:t] fought [fɔ:t] бороться
find [faind] found [faund] found [faund] находить
fit [fit] fit [fit] fit [fit] подходить по размеру
fly [flai] flew [flu:] flown [floun] летать
forget [fə'get] forgot [fə'gɔt] forgotten [fə'gɔt(ə)n] забывать
forgive [fo'giv] forgave [fo'geiv] forgiven [fo'givn] прощать
freeze [fri:z] froze [frouz] frozen ['frouzn] замерзать
get [ get ] got [gɔt] got [gɔt] получать
give [giv] gave [geiv] given [givn] давать
go [gou] went [went] gone [gɔn] идти
grow [grou] grew [gru:] grown [groun] расти
hang [hæŋ] hung [hʌŋ] hung [hʌŋ] вешать
have [hæv] had [hæd] had [hæd] иметь
hear [hiə] heard [hз:d] heard [hз:d] слышать
hide [haid] hid [hid] hidden ['hidn] прятать
hit [hit] hit [hit] hit [hit] попадать в цель
hold [hould] held [held] held [held] держать
hurt [hз:t] hurt [hз:t] hurt [hз:t] ушибить
keep [ki:p] kept [kept] kept [kept] содержать
kneel [ni:l] knelt [nelt] knelt [nelt] стоять на коленях
know [nou] knew [nju:] known [noun] знать
lay [lei] laid [leid] laid [leid] класть
lead [li:d] led [led] led [led] вести
lean [li:n] leant [lent] leant [lent] наклоняться
learn [lз:n] learnt [lз:nt] learnt [lз:nt] учить
leave [li:v] left [left] left [left] оставлять
lend [lend] lent [lent] lent [lent] занимать
let [let] let [let] let [let] позволять
lie [lai] lay [lei] lain [lein] лежать
light [lait] lit [lit] lit [lit] освещать
lose [lu:z] lost [lɔst] lost [lɔst] терять
make [meik] made [meid] made [meid] производить
mean [mi:n] meant [ment] meant [ment] значить
meet [mi:t] met [met] met [met] встречать
mistake [mis'teik] mistook [mis'tuk] mistaken [mis'teik(e)n] ошибаться
pay [pei] paid [peid] paid [peid] платить
prove [pru:v] proved [pru:vd] proven [pru:vn] доказывать
put [put] put [put] put [put] положить
quit [kwit] quit [kwit] quit [kwit] выходить
read [ri:d] read [red] read [red] читать
ride [raid] rode [roud] ridden ['ridn] ездить верхом
ring [riŋ] rang [ræŋ] rung [rʌŋ] звенеть
rise [raiz] rose [rouz] risen ['rizn] подниматься
run [rʌŋ] ran [ræŋ] run [rʌŋ] бежать
say [sei] said [sed] said [sed] говорить
see [si:] saw [sɔ:] seen [si:n] видеть
seek [si:k] sought [sɔ:t] sought [sɔ:t] искать
sell [sel] sold [sould] sold [sould] продавать
send [send] sent [sent] sent [sent] посылать
set [set] set [set] set [set] ставить
sew [sou] sewed [soud] sewn [soun] шить
shake [ʃeik] shook [ʃuk] shaken ['ʃeik(ə)n] встряхивать
show [ʃəu] showed [ʃəud] shown [ʃəun] показывать
shrink [ʃriŋk] shrank [ʃræŋk] shrunk [ʃrʌŋk] уменьшать
shut [ʃʌt] shut [ʃʌt] shut [ʃʌt] закрывать
sing [siŋ] sang [sæŋ] sung [sʌŋ] петь
sink [siŋk] sank [sæŋk], sunk [sʌŋk] sunk [sʌŋk] тонуть
sit [sit] sat [sæt] sat [sæt] сидеть
sleep [sli:p] slept [slept] slept [slept] спать
slide [slaid] slid [slid] slid [slid] скользить
sow [sou] sowed [soud] sown [soun] сеять
speak [spi:k] spoke [spouk] spoken ['spouk(e)n] говорить
spell [spel] spelt [spelt] spelt [spelt] произносить по буквам
spend [spend] spent [spent] spent [spent] тратить
spill [spil] spilt [spilt] spilt [spilt] проливать
spoil [spɔil] spoilt [spɔilt] spoilt [spɔilt] портить
spread [spred] spread [spred] spread [spred] расстилать
spring [spriŋ] sprang [spræŋ] sprung [sprʌŋ] прыгать
stand [stænd] stood [stu:d] stood [stu:d] стоять
steal [sti:l] stole [stoul] stolen ['stəulən] красть
stick [stik] stuck [stʌk] stuck [stʌk] колоть
sting [stiŋ] stung [stʌŋ] stung [stʌŋ] жалить
sweep [swi:p] swept [swept] swept [swept] выметать
swell [swel] swelled [sweld] swollen ['swoul(e)n] разбухать
swim [swim] swam [swem] swum [swʌm] плавать
swing [swiŋ] swung [swʌŋ] swung [swʌŋ] качать
take [teik] took [tuk] taken ['teik(ə)n] брать, взять
teach [ti:tʃ] taught [tɔ:t] taught [tɔ:t] учить
tear [tɛə] tore [tɔ:] torn [tɔ:n] рвать
tell [tel] told [tould] told [tould] рассказывать
think [θiŋk] thought [θɔ:t] thought [θɔ:t] думать
throw [θrəu] threw [θru:] thrown [θrəun] бросать
understand [ʌndə'stænd] understood [ʌndə'stud] understood [ʌndə'stud] понимать
wake [weik] woke [wouk] woken ['wouk(e)n] просыпаться
wear [wɛə] wore [wɔ:] worn [wɔ:n] носить
weep [wi:p] wept [wept] wept [wept] плакать
wet [wet] wet [wet] wet [wet] мочить
win [win] won [wʌn] won [wʌn] выигрывать
wind [waind] wound [waund] wound [waund] извиваться
write [rait] wrote [rout] written ['ritn] писать

 


 

COMPUTER VOCABULARY

adware – a software application which displays unwanted pop-up advertisements on your computer while in use. Adware is often installed at the same time as free software or shareware.

application - any program designed to perform a specific function directly for the user. Microsoft Word, Outlook or Adobe Photoshop are examples of application programs.

back door – a means of accessing your computer that bypasses computer security mechanisms.

back up (verb) – to copy an electronic record to ensure its information will not be lost, often while compressing data to save space.

backup (noun) – a copy of an electronic record, maintained to protect the information from loss and often compressed to save space.

bot – short for robot, a computer on which intruders have installed software that lets them secretly control the system from a remote location on the internet.

botnet – a network of bots connected via the internet to perform tasks, such as installing malware, sending spam, or attacking other computers.

browser A program or tool such as Internet Explorer, Mozilla Firefox or Google that enables you to browse or surf the World Wide Web and view internet sites.

bug A defect or fault in a program that prevents it from working correctly. Bugs are caused by mistakes or errors made by those who write the program.

cache A sort of fast memory used for temporary storage of recently accessed web pages, which enables the browser to display them more quickly on the next visit.

cookies Small piece of information on the times and dates you have visited web sites. A web server can temporarily store this information within your browser. The main purpose is to identify users and possibly prepare customized web pages for them.

compromised computer – a computer that cannot be considered secure, because it has been infected with malware, been accessed by someone without authority to access it, or been subject to some other form of malicious attack.

configure – to choose options in order to create a custom system.

crash - what happens when a program or the entire operating system, unexpectedly stops working.

cursor - a blinking symbol on the screen that shows where any new text will next be entered.

denial of Service (DoS) – an attack that successfully prevents or impairs the authorized functionality of networks, systems or applications by exhausting resources. This activity includes being the victim of or participating in the DoS.

drive-by download – software downloaded by a malicious web site without your knowledge.

driver - a special program which enables a computer to work with a particular piece of hardware such as a printer.

e-business - business done over the internet or any internet-based network.

e-mail - electronic mail: messages sent from one computer to another over the internet.

encryption – the process of transforming information to make it unreadable to anyone who doesn’t have the password needed to decode it.

Extented Validation Certificate (EV Cert) - A certificate that, prior to being issued, requires verification of a web site’s authenticity by a certificate authority. See www.cabforum.org for a list of extended validation guidelines (steps required before a certificate authority issues an EV Cert), and a current list of Certificate Authority Browser Forum members.

FAQ - Frequently Asked Questions.

firewall – a security system that uses hardware and/or software mechanisms to prevent unauthorized users from accessing an organization’s internal computer network.

Any machine connecting to the Internet should use a firewall. There are two types of firewalls. Software firewalls usually run on computers. Hardware firewalls are separate devices designed to efficiently protect computers. They are usually used by businesses, organizations, schools, and governments. All firewall protection creates a barrier between the computers and the Internet.

firmware – software that is embedded into hardware; it can be updated and accessed by the user.

flash drives/thumb drives – very small portable storage devices that may store very large (gigabyte) quantities of information and can be attached to a USB or firewire port quickly and easily to transfer files.

font A particular kind of lettering (e.g. Arial, Verdana, etc.)

hardware The physical equipment or touchable parts of a computer system (the CPU (central processing unit), monitor, keyboard, mouse, external speakers, scanner the printer, etc.)

hit - a visit to a website.

home page - the main page or opening page of a website. It usually contains links to other pages.

Instant messaging (IM) – the ability to exchange short messages online with coworkers or others. IM solutions can take several forms. They can use an existing Internet-based service, or they can be an Intranet-only solution implemented and controlled within an IT department. The latter is significantly more secure than the former, but lacks access to business partners.

keylogger – software that records everything you type, then sends it off to whomever installed the software.

login - process by which a user enters a name and password to access a computer.

malware – a contraction of “malicious software,” malware is a general term used to describe software that infiltrates or damages a computer.

mobile device (contemporary devices are typically called smart phones or tablets) – a portable device that can be used to perform computer-like tasks, such as browsing the web or reading email, but does not run under a standard desktop operating system, such as Windows, OS X or Linux. This distinction is what makes mobile devices a particular security challenge; standard forms of protection are unavailable or not feasible for general use. The devices typically offer Internet activity through Wi-Fi and/or a telecommunications company data service.

modem - a device that enables a computer to send and receive information over a telephone line (internet, email, fax).

netiquette - network etiquette: a set of informal rules defining proper behaviour on the internet.

portal - a website that acts as a gateway or entry point to the internet (for example, Yahoo).

Typically, a portal offers a search engine and links to other sites grouped into categories, as well as news or other services.

peer-to-peer (P2P) – a network of computers that can directly access each other’s files.

phishing – the process of attempting to acquire sensitive information used for identity theft, such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an email or instant message, or via a web site or telephone call.

program - a sequence of instructions that a computer can interpret and execute in order to do a particular job. Programs are collectively referred to as 'software'.

provider – a company that provides access to the internet.

scanner – a piece of hardware, or peripheral device, used to scan a document and create a digital copy.

Software patches – fixes to correct a problem. People are constantly finding security holes (vulnerabilities) in computer software that could be used to infect your computer with a virus, spyware, or worse. When vulnerabilities are discovered, the software vendor typically issues a fix (patch) to correct the problem. Patches should be applied as soon as possible because the average time for someone to try to exploit a security hole can be as little as a few days.

spam - unwanted, irrelevant or inappropriate e-mail messages, especially commercial advertising. Also referred to a 'junkmail'.

spyware - software that collects information, without your knowledge, about your web-surfing habits and uses it for marketing purposes. Very often contained in free downloads or shareware programs.

Trojan - a computer program that is hidden in a useful software application and actually used to gain access to your computer. It then performs malicious actions such as displaying messages or erasing files. Trojans may be found in a hacked legitimate program or in free software.

SSL (Secure Sockets Layer) – a method that uses data encryption and digital certificate authentication to secure information traveling over the Internet.

Trojan – malware that appears to perform a benign or useful action but in fact performs a malicious action, such as transmitting a computer virus.

URL (Uniform Resource Locator) – the Internet address on the World Wide Web. It usually begins with https:// followed by the rest of the name of the resource. It is the common name for a site’s web page.

videoconference - interactive, audiovisual meeting between two or more people in different geographic locations using two-way video technology.

virus – self-replicating malware that attaches itself to a digital document or application, then spreads through copies of that document or application that are shared, frequently via email or USB drives. Viruses almost always corrupt or modify files. It acts in a similar way to a biological virus, and the infected file is called a host.

vulnerability – a weakness in a computer that allows an attacker to make unauthorized changes. Vulnerabilities include weak passwords, poor configuration, or software bugs.

worm – self-replicating malware that can move from computer to computer on the network. Unlike a virus, it does not need to attach itself to an existing document or application. Worms almost always cause harm to the network, if only by consuming bandwidth.

Wysiwyg - What you see is what you get (pronounced ' wizzy-wig').

A WYSIWYG application enables you to see on the screen exactly what will appear when the document is printed.

WWW - World Wide Web: a hypertext information system consisting of a network of web pages which runs on the internet and can be accessed with a browser.

zip - to zip a file is to compress it so that it occupies less storage space and can be transferred quickly over the internet.

zombie – a computer that has been compromised, often by a botnet, so that an unauthorized person has complete control to use the computer to perform malicious tasks.

KEYS (КЛЮЧИ)

Unit I.

Text 2

1) 1-d, 2-c, 3 –a, 4 –b

2) 1-d, 2 –a, 3 –b, 4 -c

3) 1. calculates, 2. has evolved, 3. has enabled, 4. aid

4) abacus, device, nevertheless, in a nutshell, in less than no time, this is what computing is all about, enable, to input data, output the result, to crunch, to process

 

Text 3

3) processes – Present Simple, has changed – Present Perfect, entertain- Present Simple, are - Present Simple, means – Present Simple, digitizes - Present Simple, has advanced – Present Perfect, filled – Past Simple, is advancing – Present Continuous, wrote - Past Simple, has dropped - Present Perfect, has risen- Present Perfect, were - Past Simple, exceeded - Past Simple, were running – Past Continuous, had reached - Past Perfect

 

Text 4

1) a) 2, 8, b) 7, 5, 1, 4, 3, 6

2) uses, began, was, pioneered, exist, expanded, are, needed, are, have, are integrating,

Text 8

1) title –c, 2) 1-d, 2-e, 3- a, 4-b, 5-c; 3) 1- the latter, 2 – inefficient, 3 – slow, 4 – difficult, complicated, 5 –out-of-date, 6 - worse, 7 – many, a lot

ex. 4) 1. Computers process the data faster and more efficiently than humans.

2. Computers are used in industry when the time saved offsets their cost.

3. The speed at which a computer works means it can replace weeks of pencil-and-paper work.

4. The spreadsheet's basic component is a cell.

ex. 5) 1. better, more efficiently, 2. faster, 3. less expensive, 4. the most complicated, 5. easier

Text 9

ex 3. 1)original PCs, 2) pass through the CPU to be processed, 3) are able to temporarily store data, 4) status and control flags, 5) can access, 6) 16-bit bus, 7) consider them identical, 8) extra programming features, 9) let it execute programs, 10) support for multitasking, 11) to perform several tasks at a time, 12) calculating a spreadsheet, 13) memory, 14) sophisticated control software, 15) allocate memory among several different tasks, 16) protected-mode memory management, 17) to address memory 32 bits, 18) flexible memory management

Ex.4 - «- s/es» - 3-го лица ед ч гл в Pr Ind – controls, enters, passes, uses, applies, supports, means, reserves, offers; - «- s/es» мн ч сущ – computers, registers, pointers, flags, bytes, models, purposes, features, tasks, modes, programs, functions; -’s - притяж пад сущ - program’s

 

A. 1. half past three

2. one thousand and two hundred and twenty-two

3. a quarter to seven o’clock

4. flight number - BA eight hundred fifty five eight

5. five o'clock pm

6. the room is three metres at by four metres

7. three hundred s of people

8. four point five hundred and sixty - six nine

9. two pounds and a half fifty (£2.50)

 

B. 1. an (one) hour and a half

2. two point nought seven five

3. double oh double four one four two four double two double three double four

4. eleven fifty am or ten to twelve in the morning

5. thirty three point six three percent

6. one hundred and twenty five

7. BA three five six

8. GB – the twelfth of November nineteen ninety-five, US – the eleventh of December nineteen ninety-five

9. twenty sixteen or two thousand sixteen

10. one hundred kilometers

 

C. 1. http slash three w dot с o double m c o l dot co dot uk

2. m a l p r e double s at a o l dot com

3. http colon double slash amecenter dot ucsf dot edu

4. Credit note number seven five slash one two C

5. The rate is sixty-two pounds per person per day, including VAT.

6. Items marked asterisk carry a twenty percent discount.

7. One pound equals approximately one dollar sixty five cents.

8. The password is a semicolon four underscore g six oh backslash r eight.

9. The room is about three metres by four metres.

10. My account number is three two two six four two.

11. You can use symbols like percent colon asterisk at parenthesis in your password.

 

D. 1. How to find Microsoft Word in Windows:

- In Windows Click Start

- In the search type word and if Word is installed should show in the results. For example, you may see Microsoft Word 2010, Microsoft Word 2013, or Microsoft Word 365.

2. Visit WinRAR home page https://www.rarsoft.com

3. To use Google Docs visit https://docs.google.com/

4. pz/1uses 60 symbols.

5. As far as I know they created this password using 6 digits and 3 special characters.

6. 0.25:25=0.01

7. Credit note No. 842/39B

8. The computer laboratory is large enough: 6m by 4m.

9. You can reach my company's Web site by typing into a browser either microsoft.com or www.microsoft.com – but "www." is not part of the domain name.

Unit 2

Text 1

Ex.1 1 –PDA, 2 – supercomputer, 3- mainframe, 4- touchpad, 5- workstation, 6- microcomputer

Ex. 3 1- с – требоваться, 2- а- огромный, 3 –h- выполнять, 4- g – одновременный, 5- b – направлять, 6- f -способный, 7 –d- устаревший, 8 –e – смутный

Ex. 4 1 – require, 2- channeled, 3 – capable, 4 – vague, 5 – obsolete, 6 – concurrent, 7 - execute

Ex.5 1 - a mainframe, 2 - a workstation, 3 – a PDA, 4 – a hand-held computer/a palmtop/ a

pocket computer, 5 – a pen-based computer, 6 - In the past years, the distinction between large minicomputers and small mainframes has blurred/become vague. 7 - PC is intended for work and recreation. 8 – The hand-held computer/a palmtop/ a pocket computer incorporates handwriting and voice recognition features.

Ex.6 1 - fastest, the most expensive, 2 – less expensive, 3 – better, better, 4 - more powerful, more, 5- faster, 6 – more powerful, less powerful, 7 – smaller, bigger, 8 - as powerful as, 9 – so powerful as, 10 – faster, larger, 11 - the smallest

Ex.7 supercomputer – 4, 13, 8, 15, mainfraime – 1, minicomputer – 7, workstation – 2, 6, 12, 14, PDA – 3, 5, 10, 11, 9

Text 2

Ex.2 1- perform, 2- supercomputer, 3 - graphic, 4- chips, 5 - store, 6 - research, 7 – forecasts, 8 - theoretical, 9 – home-made, 10 - prestigious

Ex.3 1. What is the name of the world’s fastest computer?

2. How many operations a second can the Tianhe-1A perform?

3. What will the new computer be used for?

4. Why did China enter the race for the world’s fastest computer?

5. How many graphic processors does the Tianhe-1A have?

6. How much do the processors weigh?

7. Can the computer store information equal to about a hundred million books?

8. How many Intel chips does it have?

9. How much faster is the Chinese supercomputer than the fastest American computer?

10. What country had the world’s fastest computer before America got the title?

Text 5

Ex.6 1) on the move/on the go, 2) broadband connection, 3) to set apart, 4) high-end laptop, 5) to go hand in hand, 6) at the low/high end, 7) ebb and flow, 8) on the rise, 9) to be a perfect match, 10) keep costs as low as possible

Ex.7 A. 1- d, 2 – i, 3 – b, 4 –g, 5 – c, 6 – a, 7 –j, 8 – f, 9 – e, 10 -h

B. 1- c, 2 – e, 3 – g, 4 –a, 5 – d, 6 – f, 7 – b

C. 1- g, 2 – d, 3 – a, 4 –c, 5 – e, 6 – b, 7 –f

Ex.9 1 – chassis, 2- slots, 3- desktop model, 4 - tower model, 5 - ultrabooks, 6 - notebook, 7 - specs, 8 - slate, 9 - maintenance, 10 - convertible

Ex.10 1 – customizing, Present Simple, Active Voice, 2- handles, Present Simple, Active Voice, 3- outperformed, Present Perfect, Active Voice, 4 - mounted, Present Simple, Passive Voice, 5 - render, Present Simple, Active Voice, 6 - assembled, Present Continuous, Passive Voice

Ex.11 1- with, Present Perfect, Passive Voice 2 – in, Present Simple, Passive Voice, 3 – out, Past Simple, Active Voice, 4 – to, Present Simple, Active Voice, 5 – on, Future Simple, Active Voice 6 , Present Simple, Active Voice, 7 – to, Present Simple, Passive Voice, 8 – apart, Past Simple, Active Voice, 9 – on, Present Simple, Active Voice

Ex.12 1 - Netbook, 2 - Ultraportable, 3 - Mid-size Laptop, 4 - Large-size Laptop, 5- Tablet, 6 -Tower Model, 7- Desktop Model, 8 - All-In-One, 9 - Small Form Factor

Text 6

Ex 1. 1- Desknote, 2 – Nanocomputer, 3 – Smartdust, 4 - Wearable computer

ex.2 1-laptop, 2- tablet, 3- minicomputer, 4- nanocomputer

ex.3 1- Supercomputer, 2 –Minisupercomputer, 3- Mainframe computer, 4- Minicomputer, 5- Server, 6 –Workstation, 7 - Tower PC, 8 - Mid-Tower PC, 9 - Mini-Tower PC, 10 - Desktop computer, 11- Desknote, 12 –Laptop, 13 -Notebook, 14 -ultraportable laptop, 15 - Small Form Factor computer, 16 – Netbook, 17 – Tablet, 18 - Personal digital assistant, 19- Handheld PC/ Palmtop computer, 20 -Pocket personal computer, 21- Smartphone, 22- Wearable computer, 23- Smartdust, 24-Nanocomputer

Text 7

ex.2 1) transmission, 2) device, 3) data, 4) cable, 5) transmit, 6) refer, 7) convergence, 8) imply, 9) network, 10) hierarchy, 11) plug, 12) socket

ex.4 1.modem, ports; 2. configured, errors; 3. devices, compatible; 4. packets, protocol; 5. connected, password; 6. logged, mail; 7. throughput, download; 8. sysop, compressed; 9. outputs, printer; 10. programs, transmit

Unit 4

Text 4

Ex. 2 A 1. F 2. T 3. F 4. F 5. T

ex. 5 1- d, 2 – g, 3 – i, 4 – f, 5 – l, 6 – j, 7 –с, 8 – b, 9 – k, 10 – m, 11 – n, 12 – e, 13 – h, 14 – a

ex.6 1- prosper, 2 – adopt, 3 – hit, 4 – invented, 5 – semester, 6 – public, 7 – a great deal, 8 – available, 9 – field, 10 - resigned

Text 6

Ex.1 1 –d, 2 – b, 3 – f, 4 – e, 5 – a, 6 – с

Text 7

Ex. 1 1- D, 2- A, 3- F, 4- B, 5- E, 6 -C


ЛИТЕРАТУРА

1. Е.В.Гольцова. Английский язык для пользователей ПК и программистов. Самоучитель. - СПб.:Корона Принт, 2008. - 512 с.

 

2. И. Ф. Турук, О. Д. Кнаб. Английский язык в компьютерной сфере: учебно-практическое пособие. – М.: IDO Press: Университетская книга, 2012. - 297с.

 

3. Н. Евдокимова Английский язык для IT-специалистов. Учебник. - Феникс, Высшее образование, 2014. - 336c.

 

4. V. Evans, J. Dooley, S. Wright. Information Technology. - Express Publishing, 2011. - 40p.

 

5. M. Olejniczak. English for Information Technology 1. - Pearson Longman, 2012. - 80 p.

 

6. E.H. Glendinning, J.McEwan. Oxford English for Information Technology. - Oxford: University Press, 2006. - 225 с.

 

7. N. Brieger, A. Pohl. Technical English Vocabulary and Grammar. - Summertown Publishing, 2006. – 148p.

 

8. E.H. Glendinning, J.McEwan. Basic English for Computing. - Oxford: University Press, 2002. - 130 p.

 

ИНТЕРНЕТ-ИСТОЧНИКИ

 

1. https://www.euronews.com/

2. https://www.theguardian.com/international

3. https://www.bbc.com/news

4. https://www.webopedia.com/

5. https://www.learn-english-today.com/business-english/computer-vocabulary2.html

6. https://time.com/3649540/internet-smartphone-mobile-web/

7. https://news.nationalpost.com/news

8. https://www.gcflearnfree.org/computerbasics/1/print

 



Поделиться:




Поиск по сайту

©2015-2024 poisk-ru.ru
Все права принадлежать их авторам. Данный сайт не претендует на авторства, а предоставляет бесплатное использование.
Дата создания страницы: 2017-06-11 Нарушение авторских прав и Нарушение персональных данных


Поиск по сайту: