Professional Documents
Culture Documents
УЧЕБНИК 2 к 2ч +-Конвертирован
УЧЕБНИК 2 к 2ч +-Конвертирован
НАВЧАЛЬНИЙ ПОСІБНИК
ДЛЯ СТУДЕНТІВ ТЕХНІЧНИХ УНІВЕРСИТЕТІВ
Синекоп О.С., Приходько Д.С., Ярмоленко О.А., Клименко О.О., Медкова О.М.
Київ 2015
Англійська мова для науки і техніки. Частина ІV. = English for Science and
Technology. Part IV. : навч. посіб. для студентів технічних університетів /
Синекоп О.С., Приходько Д.С., Ярмоленко О.А., Клименко О.О., Медкова О.М. –
К. : НТУУ "КПІ", – 2015. – 264 с.
Гриф надано
(Протокол № __ від ....2014 р.)
FOREWORD ............................................................................................................ 5
Unit 1. THE HISTORY OF COMPUTERS ............................................................. 6
Unit 2: BIOLOGICAL COMPUTERS ................................................................... 36
Unit 3: QUANTUM COMPUTERS ....................................................................... 60
Unit 4: DRIVING AND CRUISE CONTROL SYSTEMS .................................... 88
Unit 5: HACKERS ................................................................................................ 120
Unit 6: SPAM ........................................................................................................ 143
Unit 7: COOKIES ................................................................................................. 166
Appendix 1: EXTRA READING.......................................................................... 188
Unit 1 ..................................................................................................................... 188
Unit 2 ..................................................................................................................... 191
Unit 3 ..................................................................................................................... 193
Unit 4 ..................................................................................................................... 195
Unit 5 ..................................................................................................................... 196
Unit 6 ..................................................................................................................... 198
Unit 7 ..................................................................................................................... 199
Appendix 2: MINI-DICTIONARY....................................................................... 201
Unit 1 ..................................................................................................................... 201
Unit 2 ..................................................................................................................... 202
Unit 3 ..................................................................................................................... 203
Unit 4 ..................................................................................................................... 204
Unit 5 ..................................................................................................................... 206
Unit 6 ..................................................................................................................... 207
Unit 7 ..................................................................................................................... 208
Appendix 3: MINI-GRAMMAR .......................................................................... 209
Appendix 4: IRREGULAR VERBS ..................................................................... 225
Appendix 5: PHRASAL VERBS .......................................................................... 230
Appendix 6: WRITING HELP .............................................................................. 232
Appendix 7: PROBLEM-SOLVING .................................................................... 237
Unit 1 ..................................................................................................................... 237
Unit 2 ..................................................................................................................... 238
Unit 3 ..................................................................................................................... 239
Unit 4 ..................................................................................................................... 241
Unit 5 ..................................................................................................................... 242
Unit 6 ..................................................................................................................... 243
Unit 7 ..................................................................................................................... 244
Appendix 8: SCRIPTS .......................................................................................... 246
REFERENCES ...................................................................................................... 253
FOREWORD
English for Science and Technology (Part IV) aims to help learners to improve their
competence in communication skills. This is achieved in various ways as the material is
flexible in design. The coursebook can be used by the students of technical universities,
particularly the іусщтв-year-students (the fourth term) of the Institute of Physics and
Technology, at the intermediate level.
The core of the material is the conviction that students will learn more readily and
efficiently if they are actively and personally involved in their language lessons. Thus,
throughout the units, learners are encouraged to express their own opinion on questions
concerning many aspects of science and technology as well as to discuss and evaluate the
role they play in society.
English for Science and Technology (Part IV) consists of seven units ("The History
of Computers", "Biological Computers", "Quantum Computers", "Driving and Cruise
Control Systems", "Hackers", "Spam", "Cookies") and involves all five skills: listening,
reading, speaking, writing and translation. Each unit provides warm-up activities, reading
section, vocabulary and grammar exercises, tasks for technical translation and edition.
Speaking and Listening sections as well as Writing section are also included in every unit.
It is accompanied by different appendices such as: Extra Reading, Mini-Dictionary, Mini-
Grammar, Irregular Verbs, Phrasal Verbs, Writing Help, Problem-Solving, Scripts.
The units are designed to be used either in the classroom or by the self-study
training.
The authentic information for units has been taken from different printed and
electronic sources, that is why the list of references is presented. Unfortunatelly, we have
been unable to trace some articles and would appreciate any information which would
enable us to do so.
While developing the material we have shared a great deal of fun with students,
colleagues and friends. We thank them all for their participation, advice and comments,
and hope that you will share the fun we had working on the course.
Authors
5
Unit 1. THE HISTORY OF COMPUTERS
The computer is no doubt the most amazing
achievement of mankind.
Author unknown
WARM-UP
1. Answer the following questions.
1. What is a computer?
2. What is the origin of the word "computer"?
3. What names of scientists can be mentioned in the connection of the
invention and development of computers?
4. What did the first computers look like?
5. What is a forefather of a computer?
6
Thomas Watson
1957 "I have travelled the length and breadth of this country and talked
with the best people, and I can assure you that data processing is a
fad that won't last out the year."
The editor in charge of business books for Prentice-Hall
1977 "There is no reason anyone would want a computer in their home."
Ken Olson
1980 "DOS addresses only 1 Megabyte of RAM because we cannot
imagine any applications needing more."
Microsoft on the development of DOS
1981 "640k ought to be enough for anybody."
Bill Gates
1989 "We will never make a 32-bit operating system."
Bill Gates
1992 "Windows NT addresses 2 Gigabytes of RAM which is more than
any application will ever need."
Microsoft on the development of Windows NT
1994 "Indeed, it would not be an exaggeration to describe the history of
the computer industry for the past decade as a massive effort to keep
up with Apple."
Byte
7
6. Look at the pictures of the computer machines of the past. Compare
them with the latest generation of computers. What is the main
difference between them?
a) c)
b) d)
READING
8
3. Does the modern society use the abacus today?
4. How long has the slide rule been used? Who is its inventor?
5. Who can be called "the father" of IBM?
6. When did the computer begin to use transistors?
7. How could the application of transistors change the computer?
9
in 1632 Still it was in use: in the 1960's by the NASA engineers of the
programs which landed men on the moon.
In 1642 Blaise Pascal, at age 19, invented the 2) …… as an aid for his
father who was a tax collector. Pascal built 50 of this gear-driven one-
function calculator – adding, but couldn't sell many because of their cost, and
they really weren't accurate (without required precision). Shown below is an 8
digit version of the Pascaline, and two views of a 6 digit version:
Just a few years after Pascal, Gottfried Leibniz (co-inventor with
Newton of calculus) managed to build a four-function (addition, subtraction,
multiplication, and division) calculator that he called the stepped reckoner
because, instead of gears, it employed fluted drums having ten flutes arranged
around their circumference in a stair-step fashion. Although the stepped
reckoner employed the 3) …… number system (each drum had 10 flutes),
Leibniz was the first to advocate use of the 4) …… number system which is
fundamental to the operation of modern computers. Leibniz is considered to
be one of the greatest of the philosophers but he died poor and alone.
In 1801 Joseph Marie Jacquard invented a power loom that could base
its weave upon a pattern automatically read from punched wooden cards, held
together in a long row by rope. Descendents of these punched cards have
been in use ever since.
In 1822 the English mathematician Charles Babbage proposed a steam
driven calculating machine the size of a 5) ……, which he called the
Difference Engine. This machine would be able to compute tables of
numbers, such as logarithm tables. He obtained government funding for this
project due to the importance of numeric tables in ocean navigation. But in
that time the volume of corrections showed that the set had over 1000
numerical errors. It was hoped that Babbage's machine could eliminate errors.
But construction of Babbage's Difference Engine proved exceedingly difficult
10
and the project soon became the most expensive government funded project.
It was one of the main reason why the device was never finished.
Babbage was not deterred, and by then was on to his next brainstorm,
which he called the Analytic Engine. This device, large as a house and
powered by 6 steam engines, would be more general purpose in nature
because it would be programmable, thanks to the punched card technology of
Jacquard. But it was Babbage who made an important intellectual leap
regarding the punched cards.
One early success was the Harvard Mark I computer which was built as
a partnership between Harvard and IBM in 1944. This was the first 6) ……
digital computer made in the U.S. But it was not a purely electronic computer.
Instead the Mark I was constructed out of switches, relays, rotating shafts, and
clutches. The machine weighed 5 tons, incorporated 500 miles of wire, was
8 feet tall and 51 feet long, and had a 50 ft rotating shaft running its length,
turned by a 5 horsepower electric motor. The Mark I ran non-stop for
15 years.
The application of semiconductor electronics could change the history
of computers. They began to use 7) …… in 1955. The IBM company
marketed a computer in which 1250 valves had been replaced by 2220
transistors, reducing the power consumption by 95 per cent.
One of the candidates for granddaddy of the
modern computer was Colossus, built during the
World War II by Britain for the purpose of breaking
the used by Germany. Britain led the world in
designing and building electronic machines dedicated
to code breaking, and was routinely able to read coded Germany radio
transmissions. But Colossus was definitely not a general purpose,
reprogrammable machine.
11
The title of forefather of today's all-electronic digital computers is
usually awarded to ENIAC (Electronic Numerical Integrator and Calculator).
ENIAC was built at the University of Pennsylvania between 1943 and 1945
by John Mauchly and Presper Eckert. ENIAC filled a 20 by 40-foot room,
weighed 30 tons. Note that ENIAC's first task was to compute whether or not
it was possible to build a hydrogen bomb.
But things changed fast. The invention of the microprocessor has made
its contribution into the development of the computer. Computers had been
around for 20 years before the first microprocessor was developed at Intel in
1971. Intel didn't invent an electronic computer. But they were the first to
succeed in cramming an entire computer on a single chip.
10. Look through the list of words and phrases and check if you know
their Ukrainian equivalents. Take turns to ask each other. Use the
MINI-DICTIONARY section to Unit 1 if necessary.
blunder gear-driven-(machine)
to assign to weave
predominantly to punch
a tide chart a punched card
abacus to deter
to slide ubiquitour
an ivory stick a rotating shaft
a slide rule clutch
a calculating clock to cram
reckoner valve
to contribute to scroll
circumference obsolete
12
11. Arrange the following words according to
14. Fill in the gaps with the appropriate words from the list below.
13
A computer's memory is measured in 6) …… . If a computer has
1,024 megabytes of memory, and the memory type is SDRAM, this is
written as 1,024 MB SDRAM, and is pronounced "a thousand and twenty-
four megabytes ess-dee-dram". The processor and memory modules are
located on the 7) …… . Changing a computer's processor is not generally
practical, but the memory can usually be 8) …… .
15. Match the words / phrases (1−10) with their definitions (a−j).
1 abacus a a card perforated according to a code, formerly
used to program computers
2 addition b a quantity representing the power to which a
fixed number (the base) must be raised to
produce a given number
3 logarithm c something used for making mathematical
calculations, in particular a small electronic
device with a keyboard and a visual display
4 slide rule d a simple device for calculating, consisting of a
frame with rows of wires or grooves along which
beads are slid
5 calculator e involving or relating to the use of computer
technology
6 punched card f is a very small piece of silicon with electronic
circuits on it which is part of a computer or other
piece of machinery
7 error g the process of calculating the total of two or more
numbers or amounts
8 semiconductor h a ruler with a sliding central strip, marked with
logarithmic scales and used for making rapid
calculations, especially multiplication and
division
9 digital i solid substance that has a conductivity between
that of an insulator and that of most metals, either
due to the addition of an impurity or because of
temperature effects
10 chip j a measure of the estimated difference between
the observed or calculated value of a quantity and
its true value
14
16. Complete the sentences using the words from Exercise 15. Use the
remaining words to make up sentences of your own.
15
18. Fill in the gaps with the appropriate words / phrases from the list
below. Mind that two words are odd. Translate the sentences into
Ukrainian.
optical, roll, on, scroll up, scroll down, touchpad, joystick, single,
double, pointer, hold down, repetitive strain injury, scroll wheel (mouse
wheel)
1. _____________ to see pages above.
2. _____________ to see pages below.
3. To select text, _____________ the left button, and move the mouse
pointer.
4. If you use a mouse for many hours every day, you can
get _____________ in your fingers.
5. With a laptop computer, plug in a mouse, or use the _____________ in
front of the keyboard.
6. To play some games, you need to use a _____________ instead of a
mouse.
7. To move up and down a page, you can _____________ the mouse
wheel.
8. This mouse doesn't have a ball. It's an _____________ mouse.
9. One click of a mouse button is called a _____________ click.
10. Two clicks of a mouse button are called a _____________ click.
11. Click _____________ the folder to open it.
16
19. Study information in the table. Then, fill in the gaps with the correct
phrasal verb. Make up your own sentences using the suggested
phrasal verbs.
20. Match the verbs with nouns. Make up interrogative and negative
sentences.
1) to consult a) cartridges
2) to book b) the print job
3) to activate c) a mouse
4) to download d) the function
5) to move up e) a mouse pointer
6) to start f) batteries
7) to recharge g) a dictionary
8) to refill up h) some tickets on-line
9) to plug in i) a picture
10) to move j) any info
17
21. Match 1−5 with a−e to make sentences. Translate them into
Ukrainian.
22. Part 1. Can is used to express ability with could, will be able.
Fill the following spaces, using can for present, could for past and will
be able for future. There is no need to use other able forms in this
section. Put to where necessary before the infinitives.
18
Part 2. Could and was / were able to
In some of the following sentences either could or was able could be
used. In others only was / were able is possible. Fill the spaces and put
to where necessary before the infinitives.
1. He was an experienced programmer; he ________ work on the
computers of last two generations.
2. The students solved a mathematical problem and only one ________
solve it.
3. I didn't have a password so I ________ get access.
3. If you had had the right tools, ________ you have done some changes
in engine?
4. They took his notebook so that he ________ finish his laboratory work
(negative).
19
23. Should is the most common modal verb for giving advice.
What do you think? Complete the sentences.
1. I think you should .....................................................................................
2. I think ............................... should ............................................................
3. I don't think you should ............................................................................
4. I don't think ............................... should ...................................................
20
25. Match the explanations 1−5 with the sentences a−e.
Student A
THE HISTORY OF A MOUSE
Today, the mouse is an essential input device for all
modern computers but it 1) had not been / wasn't so long ago
that computers had no mouse and no graphical user interface. Data 2) was /
were entered by typing commands on a keyboard. The mouse was
3) inventing / invented by Douglas Engelbart in 1964 and consisted of a
wooden shell, circuit board and two metal wheels that came into contact with
the surface it 4) had used / was being used on. It was 8 years later in 1972
that Bill English 5) developed / had developed the design further by inventing
what 6) was / is known as the "Ball Mouse" that we know today. The ball
7) replaced / replaces the wheels and was capable of monitoring movement in
any diection. The ball came into contact with two rollers that in turn spun
wheels with graduations on them that 8) can turn / could be turned into
electrical pulses representing direction and speed. At the time Bill English
9) was working / worked for Xerox Parc (Palo Al Research Centre)
21
the research and development center set-up by Xerox to 'design the future of
computing'. The mouse 10) have become / became part of the ground
breaking Xerox Alto computer system which was the first minicomputer
system to offer a graphical user interface. It 11) would be / will be another 8
years before the mouse would be developed any further. An optical mouse
12) had been developing / was developed in around 1980, eliminating the ball
which often became dirty from rolling round the desktop, negatively affecting
its operation. However, 13) it was / they were far too expensive to be used
widely. In fact it wasn't until around 1998 with the increase in microcontroller
processing power and the reduction in component costs that optical mice
became a commercially viable alternative to the ball mouse and infiltrated the
mass consumer market. Today the optical mouse 14) replaces / has
completely replaced the ball mouse being supplied as standard with all new
computers. Engelbart's mouse 15) demonstrated / was first publicly
demonstrated at the 1968 Computer Conference. The mouse on old
computers required a wire for connection. New computers have wireless
capabilities for the mouse, and laptops even have touchpads that don't require
a mouse at all.
Student B
A JOKE
Scientists 1) prepare / were preparing an
experiment to ask the ultimate question. They 2) had
worked / were working for months gathering one each of
every computer that 3) was building / was built. Finally the big day 4) was /
is at hand. All the computers 5) had been linked / were linked together. They
asked the question, "Is there a God?". Lights 6) started / starts blinking,
flashing and blinking some more. Suddenly, there 7) was / were a loud crash,
and a bolt of lightning 8) has come / came down from the sky, 9) struck /
22
strucked the computers, and welded all the connections permanently
together."There 10) are / is now", came the reply.
Student A
THE HISTORY OF THE COMPUTER KEYBOARD
Sometimes it is difficult and even impossible to
name the exact date of birth of this or that component
of the computer. A good example is the development of
a key board. Let’s trace its history.
ІСТОРІЯ КОМП'ЮТЕРНОЇ КЛАВІАТУРИ
Інколи йому є тяжкий та навіть неможливий назвати точну дату
народження того чи іншого компоненту комп'ютеру. Гарний приклад
являє собою розвиток ключового комітету. Дозволений слід його історія.
23
In the far 1st century AD Vitruvius, in his work on architecture,
describes an organ with balanced keys. Some musicians applied the keyboard
to stringed instruments in the first part of the 11th century. After the 15th
century nearly all the makers of key-stringed instruments used the chromatic
scale practically as we find it in the modern piano.
У далекий 1 вікі AD Vitruvius, у його роботі на архітектурі, описує
орган з збалансованим ключем Деякі музиканти застосували клавіатуру
stringed інструменти у першій частині 11 віку. Після 15 віку майже всі
виробники ключа-stringed інструменти використали chromatic шкалу
практично тому що ми знаходимо це у сучасному піаніно.
Student B
As you can see, the modern keyboard has gone through many changes,
however, the basic concept of the key lay-out has been fairly consistent. This
is a result of the order in which the whole tones and semi-tones are arranged,
and has evolved over centuries.
Тому що ви можете побачити, сучасна клавіатура поїхала через
багато змін, але, базова концепція ключа лягла досить стійка. Це є
результат замови у котрій всі тони та напів-тони організовуються, та
еволюціонували над віками.
The invention of the modern computer keyboard began with the
invention of the typewriter. Christopher Latham Sholes patented the
typewriter, that we commonly use today, in 1868 (who also invented the
QWERTY layout). The Remington Company mass marketed the first
typewriters starting in 1877.
Винахід сучасної комп'ютерної клавіатури починався з винаходом
друкарської машинки. Christopher Latham Sholes patented друкарська
машинка, що ми загально використовуємо сьогодні, у 1868 (хто
24
також винайшов QWERTY layout). Remington маса Компанії
рекламувала перші друкарські машинки вихідні 1877.
Student C
Elsewhere, punched card systems were combined with typewriters to
create what was called keypunches. Keypunches were the basis of early
adding machines and IBM was selling over one million dollars worth of
adding machines in 1931.
В іншому місці, закомпостував системи карти були об'єднані з
друкарськими машинками створювати що був закликаний keypunches.
Keypunches являв собою базу ранніх додаючих машин та IBM закінчився
продаж один долар мільону вартого додаючих машин1931.
In 1946, the Eniac computer used a punched card reader as its input and
output device. In 1948, the Binac computer used an electromechanically
controlled typewriter to both input data directly onto magnetic tape (for
feeding the computer data) and to print results.
У 1946, Eniac комп'ютері використало закомпостованого читача
карти як його введення та прилад випуску. У 1948, Binac комп'ютері
використана electromechanically контрольована друкарська машинка до
обидва даних введення прямо на магнітну стрічку (для того, щоб
годувати комп'ютерні даних) та щоб надрукувати результати.
Student D
Several alternatives to QWERTY have been developed over the years,
claimed by their designers and users to be more efficient, intuitive and
ergonomic. Nevertheless, none has seen widespread adoption, due partly to
the sheer dominance of available keyboards and training. The emerging
electric typewriter further improved the technological marriage between the
typewriter and the computer. There are a number of various designs,
especially the various split and ergonomic designs. Today the strangest
25
keyboard there isn’t really a keyboard at all. It’s a laser projector the size of a
cigarette lighter that projects the image of a keyboard onto any flat surface.
Декілька альтернатив до QWERTY були розроблені над роками,
заявленими їхніми дизайнерами та користувачами бути більше
ефективний, intuitive та ергономічний. Але, ніхто не побачило поширене
прийняття, належне частково до абсолютне dominance наявних клавіатур
та підготовки. З'являюча електрична друкарська машинка подальша
покращила технологічний шлюб між друкарською машинкою та
комп'ютером. Є декілька різноманітних проектів, особливо
різноманітної тріщини та ергономічних проектів. Сьогодні найбільш
незвичайна клавіатура є не дійсно клавіатура зовсім. Це − лазерний
проектор величина сигарети більш світлої що проектує образ клавіатури
на будь-яку квартиру поверхня. Примітка! QWERTY (являє собою
найбільш спільний сучасний-день клавіатура layout).
26
комп'ютер як механічний обчислювальний пристрій. В 1946 році
словник поповнився доповненнями, що дозволяють розділити поняття
цифрового, аналового і електронного комп'ютера.
SPEAKING
30. A. You are talking with your friend about different generations of the
computer. Act out the conversation. Use the information given in the
suggested table in Ukrainian and in the text "THE HISTORY OF
COMPUTER TECHNOLOGY" (see the EXTRA READING section
to Unit 1).
27
Iсторія обчислювальної техніки
комп'ютер домашній комп'ютер,
портативний комп'ютер,
особистий цифровий
помічник (PDA), Tablet PC
Квантовий комп'ютер,
хімічний комп'ютер,
Теоретичні та
ДНК комп'ютер,
експериментальні
оптичний комп'ютер,
проекти
спінтронний
комп'ютер
B. Work in pairs. Imagine that you are Charles Babbage and your
groupmate is Ada Byron. You are talking about the scientific
research. Dramatize your dialogue using the additional information
below.
Useful phrases:
I’m interested in ...; I wonder …; I would welcome the chance …; it goes
without saying …; the matter is …; I cannot accept your point of view
(for the following reason) …; you state in your work that …; I have to
admit that …; I wish to maintain cooperation with you
28
Ada earned her spot in history as the first computer programmer. Ada
invented the subroutine and was the first to recognize the importance of
looping. Babbage himself went on to invent the modern postal system,
and the ophthalmoscope, which is still used today to treat the eye.
31. You are talking with your groupmate about computers. Act out the
conversation which develops towards the suggested last line.
A: ___________________________________________________
B: ___________________________________________________
A: ___________________________________________________
B: ___________________________________________________
A: ___________________________________________________
B: ___________________________________________________
A: ___________________________________________________
B: Computers let you waste time efficiently.
32. Study some information about Grace Hopper. Imagine that you are
G. Hopper and you are presenting your work at the conference.
Describe your achievements in computer science.
Useful phrases:
29
language most affected by the infamous Y2K problem. A high-level
language is designed to be more understandable by humans than is the
binary language understood by the computing machinery. A high-level
language is worthless without a program − known as a compiler − to
translate it into the binary language of the computer and hence Grace
Hopper also constructed the world's first compiler. Grace remained active
as a Rear Admiral in the Navy Reserves until she was 79.
30
8. "Imagine if every Thursday your shoes exploded if you tied them the usual
way. This happens to us all the time with computers, and nobody thinks of
complaining."
Jeff Raskin
LISTENING
34. Before you listen, check if you know the meaning of the words and
phrases: portable, evolution, to enable, subnotebooks, to be
commercialized, wearable computers, feature, to inspire, to restrict.
35. A. Decide whether the facts from the text are true (T) or false (F).
1. 2. 3. 4. 5.
31
WRITING
37. Write an abstract of the text "THE HISTORY OF COMPUTER
TECHNOLOGY" (see the EXTRA READING section to Unit 1). You
may use the suggested phrases: the text is devoted to …; this text
concentrates on ...; it is shown ...; it is reported ...; it is studied ...; the
results show ...; the author pays attention to ...; the author suggests .... .
38. Here are the portraits of the people who have changed the history of
the modern computer sciences. Who is the third remarkable person,
in your opinion, to be named in this row? Write 5−7 sentences to
present the person and his contribution into the computer science.
You can start your sentences with the following phrases: "In my
opinion…", "To my mind…", "As for me…", "I believe…", "I guess…",
"As far as I know…".
39. A. Play a role of a magazine correspondent. You are giving the task to
write an article (up to 180 words) about Steven Jobs to mark his
birthday. Some of the information should be reflected in your article.
Start it with "Apple has lost a visionary and creative genius, and the
world has lost an amazing human being… ."
32
➢ played a role in introducing the Laser Writer, one of the first widely
available laser printers, to the market;
➢ propelled Apple to become the world's most valuable publicly
traded company in 2011;
➢ oversaw the development of the iMac, ITunes, iPod, iPhone,and
iPad;
➢ received a number of honors and public recognition for his
influence in the technology and music industries.
Student A
33
2. Нам достатньо долі секунди, щоби оцінити якість сайту, на який
ми зайшли.
3. Люди, що бояться комп’ютерів і всього, що з ними пов’язано,
називаються кіберофобами.
4. Всупереч поширеній думці, комп’ютери найчастіше ламаються не
від проблем в електричній мережі і не від шкідливих вірусів. Вони
повинні "сказати спасибі" своїм господарям, які проливають на
клавіатуру чай, каву, газовану воду та інші напої.
5. Перші персональні комп’ютери мали дуже обмежений обсяг
пам’яті – всього близько 16 кілобайт.
6. Перший електронний лист відправив у 1971 році Рей Томлінсон –
автор програми для обміну повідомленнями між комп’ютерами.
Він же запропонував використовувати значок @ для розділення
імені користувача і комп’ютера.
7. Знамениту комбінацію – програму "на три пальці" – Ctrl-Alt-Del –
створив і впровадив один із розробників IBM PC Девід Бредлі.
8. Творці пошуковика Google хотіли назвати своє дітище Googol
(10 у сотому ступені – саме стільки сторінок вони збиралися
проіндексувати), але домен з такою назвою був вже зайнятий.
Student B
1. Комп’ютерник – не жіноча професія. У найбільшій світовій IT-
корпорації – Microsoft – працюють 75% чоловіків і лише 25%
жінок.
2. Windows 98 містить 18 мільйонів рядків коду.
3. Першу машину, що віддалено нагадувала сьогоднішній комп'ютер,
придумав Чарльз Беббидж, математик з Англії. Саме він придумав
арифмометр, для того щоб автоматично будувати таблиці
(сучасний Excel).
34
4. Першим портативним комп’ютером був Osborne Computer,
представлений в 1981 році. Він важив близько 12 кілограм, мав 5-
дюймовий монітор, два 5-дюймових дисковода, 64 кб оперативної
пам’яті і коштував 1,795 $.
5. Ідея створення ноутбука належить Алану Кею, начальнику
дослідної лабораторії фірми Xerox. Ще в 1968 році він
замислювався про створення машини розміром з блокнот.
6. Найбільш незвичайний ноутбук був створений ювелірами і мав
кришталевий корпус.
7. Найдорожчий ноутбук був інкрустований платиною, рубінами і
діамантами. Коштував він 355 тисяч доларів.
8. Найлегший ноутбук за всю історію представила компанія Sony.
PROBLEM-SOLVING
35
Unit 2: BIOLOGICAL COMPUTERS
Facts may be stranger than fiction, but fiction
is generally truer than facts.
E. J. Millward
WARM-UP
36
READING
6. Read the text "FIRST BASE" and answer the following questions.
38
this genetic information to direct living processes is carried out. And after the
computer has measured levels of mRNA, the output molecule of the
computation is able to affect the levels of expression of the diseased genes.
5. Dr. Shapiro’s team is interested in applications where direct
processing of biological information is needed – such as medicine. In the
traditional model of medicine, a doctor takes samples, has these analysed and
uses the results to diagnose the presence of a disease. He then administers
some kind of treatment. The paradigm that the team is pursuing is in situ
detection, analysis and treatment of disease. One day, then, a medical
computer might be administered as a drug. At the moment, the computer built
by Dr. Shapiro’s team only works in a watery solution inside a test tube. One
worry about taking such work forward is that the insides of a cell are far more
complicated and unpredictable than the controlled environment of a test tube.
The work, nevertheless, is an important step forward. While it is likely that
getting such a computer to function inside a living cell remains some way off,
the remarkably rapid progress of biological computers in controlled lab
conditions means that that distant day looks to be getting closer.
From The Economist
8. Look through the list of words and phrases and check if you know
their Ukrainian equivalents. Take turns to ask each other. Use the
MINI-DICTIONARY section to Unit 2 if necessary.
esoteric to substitute
carefully engineered biological to build out of
molecules
to compute in parallel blank
enzymes to induce
to diagnose and treat cancer to release short strands of DNA
a notional type of computer to transfer genetic information
changes in the balance to be carried out
39
to affect the presence of a disease
to administer in situ detection
watery solution inside a test tube to pursue
the controlled environment messenger RNA
to indicate to suggest / propose
imbalance an output molecule
9. Explain the meaning of the words and phrases.
10. Fill in the correct word(s) / phrase(s) from the list below.
40
12. Fill in the appropriate word from the list.
scholars, biocomputers, cell, direct, living, carrying
Yaakov (Kobi) Benenson, Professor of Synthetic Biology at ETH
Zurich, has spent a large part of his career developing biological computers
that operate in 1) …… cells. His goal is to construct 2) …… that detect
molecules 3) …… important information about cell wellbeing and process
this information to 4) …… appropriate therapeutic response if the 5) …… is
found to be abnormal. Now, together with MIT professor Ron Weiss and a
team of scientists including post-doctoral 6) …… Zhen Xie and Liliana
Wroblewska, and a doctoral student Laura Prochazka, they made a major step
towards reaching this goal.
13. Fill in the table with the words derived from the given ones.
41
15. Match the words with their Ukrainian equivalents.
42
17. Complete the sentences using the words / phrases from Exercise 16.
Use the remaining words to make up sentences of your own.
18. Choose the word that is closest in meaning to the underlined word.
43
in the environment, detecting and neutralising dangerous toxins such
as arsenic.
A surroundings B entity C exclusion D similarity
5. The researchers were also able to demonstrate that the biological logic
gates could be connected together to form more complex components
in a similar way that electronic components are made.
A constituents B complements C concepts D ideas
6. Current UK prescribing practice prohibits the automatic substitution of
one small-molecule medicine for another, by the pharmacist.
A succession B submission C exchange D subsistence
7. This research may lead to new ways to diagnose cancer and identify
the best treatments for individual patients.
A demolish B detect C devise D compose
8. This network recognizes certain cancer cells using logic combinations
of five cancer-specific molecular factors, triggering cancer cells
destruction.
A evil B corruption C candour D tumour
44
5 The device employs a chain of e DNA in solution.
three-dimensional building
blocks to represent the Turing
machine's tape, and uses
20. Fill in the gaps with the correct phrasal verb. Then make up your
own sentences with the suggested phrasal verbs.
45
21. Translate the sentences into English paying attention to the meaning
of modal verbs (see the MINI-GRAMMAR section, MODAL
VERBS):
22. Use must not (prohibition) or need not (lack of necessity) to fill the
spaces in the following sentences.
1. John got a good mark. He must have translated that article yesterday.
2. The students are without texts at this English lesson. They must have
forgotten all about it.
3. The discussion must have been very interesting. It's a pity I could not
stay.
4. The students may have translated these articles last month.
5. They could have taken their exam in English yesterday.
6. He might have left his book in some other place.
7. I should have done it before.
8. You should have translated those articles long ago.
1. Tom was absent for the first time yesterday. He __________ (be) sick.
47
2. Jane did very well on the exam. She __________ (study).
3. Ned did very badly on the exam. He __________ (study) harder.
4. Sandra failed the test. She __________ (study; negative).
5. John isn't here yet. He __________ (forget) about our meeting.
6. Pete failed the exam. He __________ (study; negative) enough.
48
5. What were we to prepare for today?
6. You are to read this paper before the conference.
C. Translate into English.
1. Що я повинен робити?
2. Студенти повинні здати курсові роботи до 1 травня.
3. Ми зобов'язані вирішити це прямо зараз.
4. Зібрані дані мали б слугувати основою для оцінки точності
математичних моделей.
5. На жаль, цим планам не довелося збутися.
6. Я повинен організувати наукову конференцію у жовтні.
49
28. Find and correct the mistakes in the sentences. There is one mistake
in each sentence.
50
4. But the new mechanical computer is based on the Turing machine,
_______ in 1936 by the British mathematician Alan Turing.
A conceive B conceiving C conceived D to
conceive
5. _______ the concept, Professor Shapiro has built a 30-centimetre-high
plastic model of his mechanical computer.
A Demonstrated B To demonstrate C To be D Demonstrate
demonstrated
6. If it were built from biological molecules it ________ about 25
millionths of a millimetre in length, roughly the size of a cell
component called a ribosome.
A measured B would have C will measure D would
measured measure
7. We also aim _____ understand the computation performed by cells
during organ development, and how the adaptive immune system
detects viruses and cancers in the human body, focusing on mechanism
and function.
A on B to C in D off
8. This is an _______ opportunity to join a young, dynamic team with
excellent opportunities for growth in the future.
A excite B excited C exciting D being
excited
9. The operation of the machine _______ by a finite set of rules that
constitute its "software program."
A has governed B was governed C governs D is governed
10. Scientists already ________ a "biological computer" capable of
deciphering images encrypted on DNA chips.
A developed B develop C have D were
developed developed
51
30. Edit the Ukrainian translation.
SPEAKING
31. Work in pairs. Some questions of the interview with Ehud Keinan
were omitted. Try to reconstruct them. Then role play this dialogue.
A. What does a biological computer look like?
B. Well, it's not exactly photogenic. This computer is "built" by combining
chemical components into a solution in a tube. Various small DNA
molecules are mixed in solution with selected DNA enzymes and ATP. The
latter is used as the energy source of the device. It's a clear solution − you
don't really see anything.
A. __________________________________________________________
B. Our biological computing device is based on the 75-year-old design by
the English mathematician, cryptanalyst, and computer scientist Alan
Turing.
A. __________________________________________________________
B. He was highly influential in the development of computer science,
providing a formalization of the concepts of algorithm and computation,
and he played a significant role in the creation of the modern computer.
Turing showed convincingly that using this model you can do all the
calculations in the world. The input of the Turing machine is a long tape
containing a series of symbols and letters, which is reminiscent of a DNA
string. A reading head runs from one letter to another, and on each station it
does four actions: 1) reading the letter; 2) replacing that letter with another
letter; 3) changing its internal state; and 4) moving to next position. A table
of instructions, known as the transitional rules, or software, dictates these
actions.
53
A. __________________________________________________________
B. Our device is based on the model of a finite state automaton, which is a
simplified version of the Turing machine.
A. __________________________________________________________
B. The ever-increasing interest in biomolecular computing devices has not
arisen from the hope that such machines could ever compete with
electronic computers, which offer greater speed, fidelity, and power in
traditional computing tasks.
33. You are talking about biological computers. Act out the conversation
which develops towards the suggested last line.
A: ___________________________________________________
B: ___________________________________________________
A: ___________________________________________________
B: ___________________________________________________
A: The remarkably rapid progress of biological computers in controlled
lab conditions means that that distant day looks to be getting closer.
34. Imagine you are Professor Ehud Shapiro of the Computer Science
Department at the Weizmann Institute of Science. You have
developed the prototype computer and are going to present it at the
Fifth International Meeting on DNA-Based Computers at the
Massachusetts Institute of Technology. It is a 30-centimetre-high
plastic model of the mechanical computer. You hope that the advent
of improved techniques for making and assembling molecules will
mean the day, when your computer could be made, is not far off. Tell
the participants of the meeting about a biological computer. Be ready
to answer the questions. Also use the information from the text
54
"FIRST BASE". Cover the following points: definition, structure,
background, applications, advantages, limitations.
35. You are a journalist. With the aim of comparing conventional
computers with biological ones you've outlined some points. Fill in
this table and comment it on.
CONVENTIONAL VS. BIOLOGICAL COMPUTERS
Component
materials
Processing scheme
Current max.
operations
Quantum effects −
a problem
Toxic components
Energy efficient
LISTENING
You are going to listen to some information about DNA Computing
Technology. Be ready to do the following tasks:
36. Before you listen, check if you know the meaning of the
words / phrases: encryption, salesman, sticking, DNA strands, to
eliminate, to outline, potential, to introduce the idea, to solve.
37. A. Decide whether the facts from the text are true (T) or false (F).
1. 2. 3. 4. 5. 6.
55
2. Adleman is known to be a co-inventor of the Rivest-Shamir-Adleman
cryptosystem in 1977.
3. The travelling problem is a problem where a list of cities and their
pairwise distances are given. The task is to find the approximate
possible tour that visits each city exactly once. It is a special case of the
Traveling purchaser problem.
4. DNA computing has been shown to have potential as a means to solve
mathematical problems.
5. Traditional silicon computers also offer much lower power
consumption than DNA computing.
6. One of the disadvantages of the Adleman DNA computer is that it
needs the involvement of a human being.
56
7 the shortest g potential
8 silicon-based h strands
WRITING
39. Write a short summary of the text "FIRST BASE" (50−60 words).
Follow the steps:
✓ Read the text.
✓ Make notes of the main points of the text.
✓ Start your piece of writing with one sentence that summarizes the
idea of the whole text.
✓ Write your summary, including all the main points. Use your own
words.
✓ Check if your summary is clear, complete and it makes sense.
40. You are asked to write an abstract of the Ukrainian article. You may
use the suggested phrases: the article is devoted to …, this article
concentrates on ..., it is shown ..., it is reported ..., it is studied ..., the
results show ..., the author pays attention to ..., the author suggests .... .
57
Так само як в електроніці транзистор працює з потоком
електронів, транскриптор контролює потік спеціальних білків, РНК-
полімерази, в їхньому переміщенні уздовж ланцюга ДНК.
Використовуючи транскриптор, група вчених створила те, що
електротехніці відомо як логічний вентиль. Він може вирішити майже
будь-які біохімічні завдання, які були дані клітині. Транскриптори самі
по собі не являють собою біокомп’ютери, але вони є їхньою важливою
складовою, яка може працювати в межах окремої живої клітини.
Щоб створити транскриптори та логічні вентилі, команда ретельно
підбирала поєднання ферментів − інтеграз − для управління потоком
РНК-полімерази вздовж ниток ДНК. Провівши паралель з електронікою,
ДНК виконують роль дротів, а РНК-полімерази − електронів.
"Вибір ферментів є важливим, − говорить Жером Боне (Jerome
Bonnet), один з авторів дослідження. − Ми ретельно підбирали
ферменти, які можуть діяти в бактеріях, грибах, рослинах та тваринах,
так щоб можна було спроектувати біо-комп’ютери в різних організмах".
Також Дрю Енді та його команда зробили ще 2 важливих
відкриття, пов’язаних зі створенням генетичного комп’ютера. Перше
стосувалось зберігання цифрових даних у ДНК. Друге − розробки
механізму передачі генетичної інформації від клітини до клітини,
налагодили свого роду "біологічний Інтернет."
Свої досягнення у сфері біотехнологій вони зробили відкритими −
кажуть, таким чином хочуть передати свої досягнення у загальне
користування, щоб ними могли скористатись науковці з усього світу.
58
41. Work in teams. Write your story about Biological Computers using
words in vertical columns. You should work horizontally and add
words of your own. The sentences may be any length but must be
grammatically and syntactically correct.
PROBLEM-SOLVING
42. Read and say if the statements are true (T) or false (F) (see the
PROBLEM-SOLVING section to Unit 2).
59
Unit 3: QUANTUM COMPUTERS
No matter how difficult they might be to fabricate,
quantum computers are even more difficult to explain.
Oakland Ross
WARM-UP
1 2
3 4
60
Unscramble the words below and match them to corresponding pictures.
1. What does quantum physics study? Do you know the main ideas of the
Quantum Theory?
2. What is a quantum computer? Is it the wild imagination of quantum
physicists or reality? Do you think we really need quantum computers?
3. Put the words / phrases below into the appropriate gaps and discuss
the quotations in pairs.
61
READING
4. Underline the stressed syllable in each word as in the example.
Practise saying the words.
qubit, quantum, parallelism, bizarre, to cease, ion, simultaneously,
photon, microscopic, to utilize, entanglement, decoherence, conscious,
polarization
5. Fill in the first two columns of the chart. Then read the text
"QUANTUM COMPUTERS. IN SEARCH OF THE HOLY GRAIL"
and fill in the third column.
What I know about What I would like to What I found out
quantum computers know about quantum about quantum
computers computers
62
computer would equal the processing power of a conventional
computer that could run at 10 teraflops.
C. According to Raymond Laflamme from the Institute for Quantum
Computing, quantum computers will eventually ignite a revolution in a
variety of fields other than cryptography and computing. These might
include the development of new drugs, the creation of new
superconducting materials, or a range of other innovations currently
impossible to predict.
At least since the 1970s, computer scientists have been familiar with
Moore’s law, which states that computing power will double every two years,
as transistors get smaller and smaller. At this rate, sometime between 2020
and 2030, processors will have become so small that they will be affected by
the bizarre rules of quantum mechanics. Classical computing will have
reached a natural limit and will cease to evolve. And the logical next step
63
will be to create quantum computers, which will harness the power of atoms
and molecules.
Quantum computers aren't limited to two classical states; they encode
information as quantum bits, or qubits, that describe the state of particles,
including atoms and subatomic particles, such as ions, electrons and photons.
For example, a qubit might be represented by the direction in which an
electron spins or the polarization of a photon of light. Qubits can be either a
"0" or a "1," or both simultaneously − a characteristic called superposition.
1 ……
To control and store qubits, scientists use different control devices. Ion
traps capture ions using optical or magnetic fields. Optical traps control
microscopic particles with light waves. The impurities in doped
semiconductors can catch free electrons in the electron fields of "unwanted"
atoms. Quantum dots, also constructed out of semiconductor material, can be
used to hold and manipulate electrons. Superconducting circuits allow
electrons to flow at low temperatures with minimal resistance.
Quantum computers utilize an aspect of quantum mechanics known as
entanglement, in which measurement on one qubit determines the state of
another. The quantum computer's main drawback is quantum decoherence. If
you interact with a qubit in superposition to determine its value, it will
immediately change. To make a practical quantum computer, scientists have
to devise ways of making measurements indirectly to preserve the system's
integrity.
2 ……
64
so powerful that search engines would respond to queries almost like a human
being, answering questions immediately and in any language.
The theories of quantum computation suggest that every physical
object, even the universe, is in some sense a quantum computer. If this is the
case, then according to Turing's work which says that all computers are
functionally equivalent, computers should be able to model every physical
process. Ultimately this suggests that computers will be capable of simulating
conscious rational thought. So, maybe the quantum computer will be the key
to achieving true artificial intelligence.
3 ……
9. Look through the list of words and phrases and check if you know
their Ukrainian equivalents. Take turns to ask each other. Use the
MINI-DICTIONARY section to Unit 3 if necessary.
65
with minimal resistance at low temperature
entanglement quantum decoherence
to factor large numbers within the life span of the universe
staggering power spin
to utilize drawback
simultaneously to utilize
10. Find the words in the text which match the following Ukrainian
equivalents.
11. Fill in the gap with the word or phrase from the list below. Use each
word / phrase only once. Translate the collocations into Ukrainian.
1 to manipulate …… 6 to encode ……
2 to reach …… 7 to search ……
3 to determine …… 8 to harness ……
4 to ignite …… 9 to flow ……
5 to be limited to …… 10 to break ……
66
12. Select the definitions (a–j) from the list to match the terms (1−10) on
the topic "Quantum computing".
67
that no measurement on the system alone can demonstrate any
interference between two quantum states of the system.
13. Complete each gap with the appropriate word from the text. You are
given the first letter of the missing word.
68
14. Fill in the missing letters to make synonyms to the given words. The
words can be found in the text "QUANTUM COMPUTERS. IN
SEARCH OF THE HOLY GRAIL."
15. Fill in the blanks with the appropriate word in italics. Use each word
only once.
69
16. Divide the words below into groups according to what part of speech
they belong to. Some words fit into more than one group.
A. Adjectives:
B. Nouns:
C. Verbs:
D. Adverbs:
17. Fill in the table with the words derived from the given ones.
1. 2. 3. 4. 5.
70
B. Conventional computers almost never achieve optimal results, because
they are not fast or accurate enough.
C. Nondeterministic polynomial (NP) problems are considered the most
difficult problems on earth to solve.
D. Every value in the problem must be calculated, compared to and then an
optimal solution can be found.
E. NP problems are everywhere from database searching to pattern-
matching to medicine.
19. Study the information in the table below and then fill in the gaps with
the phrasal verbs in the appropriate form.
2. The qubits are _________ such that all entanglements necessary for the
calculation are set up at the very beginning.
3. Whatever the origin of the qubits, the same problem has always
_________: doing calculations while maintaining the entanglements is
incredibly difficult.
71
4. Scientists ___________ that getting research groups to commit to
experiments with cluster states may take a while.
21. A. Put the verbs in brackets into the correct tense to make zero type
conditional sentences.
72
B. Put the verbs in brackets into the correct tense to make type 1
conditional sentences.
1. If the test tubes _____ (be / not) dirty, the sample _____ (be) pure.
2. If there _____ (be / not) insects, many flowers _____ (be able / not /
reproduce).
3. If all these NP type problems _____ (can / solve), life on earth _____
(be) thousands of years ahead and extremely more advanced.
4. If a practical quantum computer _____ (be built), it _____ (be able) to
store more bits of information in its memory than there are particles in
the universe.
5. If you _____ (can / perform) this thought experiment with an actual
card, you _____ (undoubtedly / find) that classical physics is wrong.
6. If I _____ (do) something with my life instead of just thinking about it,
maybe things _____ (improve).
D. Put the verbs in brackets into the correct tense to make type 3
conditional sentences.
Example: The launching of the rocket was delayed half an hour by bad
weather. – But for the bad weather, the launching of the rocket wouldn’t
have been delayed.
Example: I didn't see the signal, so I didn't stop. – If I had seen the signal,
I would have stopped.
74
3. The astronauts didn't walk very far on the moon because they were
hampered by the thick dust.
4. The space shuttle wasn’t built. As a result, scientists lost expensive
equipment.
5. You work too fast; that's why you make so many mistakes.
6. English people speak very quickly. Perhaps, that's why I can't
understand them.
7. He doesn't help me, possibly because I never ask him for help.
75
7. In order for a quantum computer to show / showing its superiority it
has to / needs to use new algorithms which can / could exploit the
phenomenon of quantum parallelism.
8. When it is coming / comes to data crunching, quantum computers will
leave/ will have left today's fastest processors in the dust.
9. There have been / were great advances in the writing of quantum
algorithms which are now armed / had been armed with astonishing
sophistication.
10. Quantum computers can, and a paradox must / may it be, solve
unsolvable problems which will define / have defined the future of our
world.
A. The first commercial quantum computer in the world has been made by
D-Wave Systems Inc. The quantum computer is called the 'Orion' and is
made up of 16 qubits which is the most ever for a quantum computer. The
Orion was built using a superconducting metal called niobium. In order
for qubits to maintain their quantum state, they must be cooled. Therefore,
the Orion is supercooled to almost absolute zero. The biggest advantage
of the Orion is the ability it has to solve nondeterministic polynomial
problems in just a few cycles. The classical computer takes thousands
76
of cycles and gives less accurate solutions. When the Orion was
demonstrated in Mountain View (Silicon valley), it solved a Sudoku
puzzle in seconds! Skeptics believe that the system D-Wave has created
isn't scaleable, and that many of the claims on D-Wave's Web site are
simply impossible (or at least impossible to know for certain given our
understanding of quantum mechanics).
B. Перший комерційний квантовий комп'ютер у світі була зроблена D
хвиля Systems, Inc квантового комп'ютера називається "Оріон" і
складається з 16 кубітів, яка є найбільш небудь для квантового
комп'ютера. Оріон був побудований з використанням надпровідного
металу називається ніобію. Для того, щоб кубітів для підтримки їх
квантового стану, вони повинні бути охолоджені. Таким чином,
Оріон переохолодженої майже до абсолютного нуля. Найбільшою
перевагою Orion є здатність вона повинна вирішити проблеми
недетермінованих многочлена протягом декількох циклів.
Класичний комп'ютер приймає тисячі циклів і дає менш точні
рішення. Коли Orion був продемонстрований в Маунтін-В'ю
(Силіконова долина), він вирішив головоломки Судоку в лічені
секунди! Скептики вважають, що система D-Wave створив не
масштабований, і що багато з претензій на веб-сайті D-Wave просто
неможливо (або, принаймні неможливо знати напевно, враховуючи
наші розуміння квантової механіки).
SPEAKING
77
c) someone is very rude to you?
d) somebody pushes in front of you in a queue?
✓ What would happen if
a) everyone went colour-blind?
b) we forgot how to read?
c) the wind stopped?
d) there were no clouds?
e) we were all telepathic?
f) people could become invisible when they wish?
2. Work in pairs.
Student A
✓ Read the instructions below.
✓ Complete the sentences in a way which you think is true about
Student B.
✓ Read your sentences to B. Were you right?
✓ Now, listen to B’s sentences about you. Tell him / her if they are right
or wrong and why.
1. If you could go on holiday anywhere in the world, I think you’d go to
____________ .
2. If you decided to learn another language, I think you’d learn
____________ .
3. If you could play any musical instrument, I think you’d choose
____________ .
4. If someone offered to buy you a new car, I think you’d choose
____________ .
5. If you could meet a famous person, I think you’d choose
____________.
78
Student B
✓ Read the instructions below.
✓ Complete the sentences in a way which you think is true about
Student A.
✓ Listen to A’s sentences about you. Tell him / her if they are right or
wrong, and why.
✓ Now, read your sentences to B. Were you right?
1. If you could live anywhere in the world, I think you’d
choose _________ .
2. If a friend wanted to buy you a pet, I think you’d ask for a _________ .
3. If you decided to go to an English-speaking country, I think you’d go
to _________ .
4. If you could have something to eat or drink right now, I think you’d
have _________ .
5. If you could learn one more skill, I think you’d learn ___________ .
1. If you could change one thing about yourself, what would you change?
2. If you could have anything in the world you wanted, what would you ask
for?
3. If you could have only one food for the rest of your life, which food
would you choose?
4. If everybody in the world could have what they wanted, would the world
be a better place?
5. If you were given three wishes, what would you wish for?
6. Where would you go if you could travel in time?
79
28. Work in pairs. Study the timeline that shows the first 100 years of
quantum mechanics. Choose one event and describe it to your partner
without mentioning exactly what it is. Your partner should guess.
Then swap roles.
80
29. A. Do some research to find information about one of the physicists
shown below who laid the foundations of quantum mechanics in their
works. Share this information with your groupmates.
81
30. Work in pairs. You are going to read about advances in quantum
computing (see the EXTRA READING section to Unit 3).
LISTENING
You are going to listen to the text about the history of quantum
computing. Be ready to do the following tasks:
32. Before you listen, check if you know the meaning of the following
words and phrases: theoretical paper, factorization, handful, to upscale,
miniaturization, to theorize, a realm, trivial.
33. Decide whether the facts from the text are true (T) or false (F).
1. 2. 3. 4. 5.
82
3. The first quantum computer could maintain decoherence for a few
nanoseconds.
4. In 2007, scientists built a 7-qubit quantum computer.
5. Serge Haroche and David Wineland worked together during their
research on quantum computers.
Serge Haroche,
2012
David J. Wineland
a) ground-breaking _______________
b) quantum __________________
c) trivial __________________
d) basic __________________
e) active _________________
83
f) full-scale ____________________
g) initial __________________
h) sound ___________________
WRITING
36. Imagine what it would be like if you were completely fluent in the
English language right now. Write four sentences describing what
would be different or what you would do.
Example:
Example:
"Speak with native speakers regularly. If you speak with native speakers
regularly, you have better pronunciation."
38. Work in groups of three. Each write three questions in English to one
of the passages. Ask each other. Translate one passage into English.
84
це можуть бути завдання навігації усіх видів транспорту, аналіз
фінансових ризиків, розпізнавання образів, класифікації зображень,
декодування найскладніших секретних кодів у режимі реального
часу, моделювання клімату, довготривалих прогнозів погоди,
розрахунків термоядерного синтезу, створення нових продуктів
генної інженерії, моделювання галактики з її 100 мільярдами зірок.
B. Квантова криптографія − метод захисту комунікацій, який базується
на певних явищах квантової фізики. На відміну від традиційної
криптографії, яка використовує математичні методи, квантова
криптографія зосереджена на фізиці, розглядаючи випадки, коли
інформація переноситься за допомогою об'єктів квантової механіки.
Процес відправки та прийому інформації завжди виконується
фізичними засобами, наприклад за допомогою електронів в
електричному струмі, або фотонів в лініях волоконно-оптичного
зв'язку. А підслуховування може розглядатися як вимірювання
певних параметрів фізичних об'єктів − у нашому випадку, носіїв
інформації.
C. Технологія квантової криптографії спирається на принципову
невизначеність поведінки квантової системи − неможливо
одночасно отримати координати і імпульс частинки, неможливо
виміряти один параметр фотона, не спотворивши інший. Ця
фундаментальна властивість природи у фізиці відома як принцип
невизначеності Гейзенберга, сформульований у 1927 році.
Використовуючи квантові явища, можна спроектувати і створити
таку систему зв'язку, яка завжди може виявляти підслуховування.
Це забезпечується тим, що спроба вимірювання взаємопов'язаних
параметрів у квантовій системі вносить до неї порушення,
руйнуючи вихідні сигнали, а значить, за рівнем шуму в каналі
85
легітимні користувачі можуть розпізнати ступінь активності
перехоплювача.
39. Translate the following sentences into Ukrainian for the article on
quantum computers.
1. In offices and laboratories scattered around the globe, some of the finest
scientific minds are busily pursuing the same goal, a computing device
whose fundamental components are so small as to be invisible to humans
but whose calculating power would far outstrip any conventional
computer you could imagine, even one as big as the universe itself.
2. Comparing a fully realized quantum computing device to even the most
powerful classical computers now in existence is a bit like comparing a
vast galaxy of swirling planets and radiant stars to a basement bachelor
apartment in a neighbourhood of Toronto.
3. One big obstacle on our way to practical quantum computers involves the
inherent instability of the quantum universe, a territory where
superposition mysteriously collapses the very instant a human observer
interferes with the process in any way, even by looking at a particle
through an electron microscope.
4. Ultra-fast computers of the future might consist of tiny pieces of
superconducting material linked electrically to equally small mechanical
resonators, the former providing the processing power and the latter the
memory.
5. A single quantum computer would have the ability to simulate a whole
world in a holographic environment, replicate biological systems to
understand diseases and find cures, solve the loads of equations necessary
to create extremely accurate weather forecasting and simulate how
subatomic particles interact, showing fundamentally how everything in
the universe works.
86
40. Choose one of the statements and write your comments (up to
100 words). See the WRITING HELP section.
41. Using the information from the unit write a short post about
quantum computers for your blog (up to 200 words). See the
WRITING HELP section.
PROBLEM-SOLVING
87
Unit 4: DRIVING AND CRUISE CONTROL SYSTEMS
WARM-UP
1. A. Write down reasons for and against having a car. Discuss your
ideas in pairs and then with the rest of the class.
B. Work in pairs and choose a suitable car for these people. Tell the
class what sort of a car you have chosen and why.
Ordinary car
Hybrid car
Electric car
Velomobile
Which one would you like to have? What criteria would you pay most
attention to if you were choosing a car for yourself?
88
3. Discuss the following quotations. Which quotation is closer to your
own ideas?
1. "Middle Age − When you want to see how long your car will last
instead of how fast it will go."
Roger B. Smith
2. "If GM had kept up with technology like the computer industry has, we
would all be driving $25 cars that got 1000 MPG."
Bill Gates
3. "Have you ever noticed? Anybody driving slower than you is an idiot,
and anyone going faster than you is a maniac."
George Carlin
4. "Each year it seems to take less time to fly across the ocean and longer
to drive to work."
Unknown
5. "The cars we drive say a lot about us."
Alexandra Paul
6. "Google is working on self-driving cars, and they seem to work. People
are so bad at driving cars that computers don’t have to be that good to
be much better."
Marc Andreessen
4. Try to remember what cars these logos stand for.
A B C D E F
I J K L
G H
M N O P Q R
89
5. Read the facts about cars and driving and decide if they are true (T)
or false (F).
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
90
READING
7. Read the text and put ten sentences which have been removed by
mistake into their appropriate places. Two sentences are from
another text.
91
I. The reason is that to be truly fault-tolerant you need more than multiple
computer control systems; you need multiple sensors and actuators too,
and these all add to the weight of the vehicle.
J. It might be sensible to start thinking about
giving additional training to the drivers of
drive-by-wire cars.
K. They point out that fly-by-wire has
transformed aircraft performance, and say
that it is time to do the same for cars.
L. By making the brakes, suspension and
steering work together, for example, a computer can optimise them to
ensure the car grips the road better on bends.
9. From memory, decide if the statements below are true (T) or false (F),
then read the text again and check your answers.
1. 2. 3. 4. 5. 6. 7.
Soon we will start to see cars adopting one of the key elements of
aircraft design. They will take the radical step of severing all mechanical
connections between the driver and the car. The automotive equivalent, drive-
by-wire, is not quite ready for market, but all the major car makers are
developing it and the first cars using elements of the technology are already
on the road.
According to the manufacturers, drive-by-wire will make cars easier to
handle, more fuel efficient and, above all, safer. 1) … .
The idea of handing control of your car over to a computer is nothing
new. Computerised cruise control has been around for years, and today there
are cars that automatically correct your steering when you stray out of your
lane, or sense when you are about to crash and apply the brakes. 2) … .
But drive-by-wire goes much further. Rather than adding non-essential
functions, drive-by-wire places the car's critical control systems directly under
the computer's command. 3) … . The motivation for doing so lies in the
competitive nature of the motor industry, where companies will go to
extraordinary lengths to gain even a small advantage over their rivals.
From a driver's point of view, however, very little will change: most
drive-by-wire cars will look and feel like a conventional car. 4) … . But
behind the scenes the car will make subtle modifications to your driving,
improving the way you take corners, smoothing acceleration and making sure
you don't throw the car into a skid when you hit the brakes.
As well as improving performance, drive-by-wire can lead to new
capabilities. 5) … . Similarly when the vehicle hits ice or a tyre blows, the
computer can react faster, and probably in a more appropriate way, than any
driver could to ensure the car does not skid out of control.
93
As far as the industry is concerned, it is only a matter of time before
drive-by-wire becomes standard. But some safety experts are questioning the
wisdom of this radical change. 6) … . Will the car industry learn from these
mistakes, they ask, or make them all over again?
All software designers strive for reliability, but for safety-critical
systems such as electronic brakes the mantra is more demanding - "reliability
and availability". This means that the system must keep working even if the
software starts playing up.
One technique for providing reliability and availability in aviation is to
have four completely different computers looking after each critical system.
They use different programs, written by different programmers in different
languages. Before any action is carried out the computers vote on how to
proceed. 7) … .
Drive-by-wire will use the same approach. But this leads to an
unexpected problem: it is difficult to cram all the computing power into a car
without eating into its performance. 8) … . And while there are weight
savings to be had from removing mechanical systems such as the steering
column, the first drive-by-wire cars will probably have to keep the mechanical
systems as back-up.
However, with the safeguards in place, things can still go wrong. 9) … .
Indeed, most experts agree that the greatest challenge for drive-by-wire lies in
anticipating how people will use it. The designers of drive-by-wire systems
may fail to predict all the actions that could be taken by drivers in response to
the car's behaviour, leaving loopholes in the system that could lead to an
accident.
The intimate meshing of driver and software raises another question:
who can be said to have ultimate control over a drive-by-wire vehicle?
10) … . Given the "at fault" nature of car insurance, this is more than a
hypothetical question.
94
Whatever teething troubles drive-by-wire suffers, the motor industry will
probably overcome them, just as fly-by-wire innovators did in aviation. And
no doubt people will accept the technology.
From New Scientist
10. Look through the list of words and phrases and check if you know
their Ukrainian equivalents. Take turns to ask each other. Use the
MINI-DICTIONARY section to Unit 4 if necessary.
95
11. Explain the meaning of the phrases below. Translate them into
Ukrainian.
A. mean
1) coverage by a contract binding a party to indemnify another against
specified loss in return for premiums paid;
2) to express uncertainty about the validity, truth, etc., of (something);
doubt;
3) ability to apply knowledge or experience or understanding or common
sense and insight;
4) any often repeated word, formula, or stock phrase;
5) to express or signify will or choice in a matter;
6) the property of a system to continue operating properly in the event of
the failure of some of its components;
7) system whose failure or malfunction may result in death or serious
injury to people, or loss or severe damage to equipment or
environmental harm;
8) the psychological feature that arouses an organism to action toward a
desired goal; the reason for the action;
B. have the following Ukrainian equivalents
9) конкурент; 10) впевнитися; 11) надійність; 12) люк; 13) колесо;
14) керування; 15) вказувати; 16) запобігати; 17) передбачати;
18) затягувати; 19) згладжувати; 20) заносити; 21) забезпечувати;
96
22) поворот; 23) запобіжні заходи; 24) злиття, поєднання;
25) новатор.
a) synonyms
result in, mesh, sever, play up, stray, point out, separate, layer, equivalent,
lead to, comment, forecast, parallel, act up, relate, drift, cram, anticipate,
stiff, level;
b) opposites
unambitious, sense, halt, weaken, radical, proceed, question, tighten,
abandon, overlook, permit, trivial, accept, competitive, adopt, prevent.
14. Match the words / phrases in the left-hand column with the words /
phrases in the right-hand column to make phrases from the text. Use
each word only once. Translate the collocations into Ukrainian.
97
15. Unscramble the words / phrases (1−10) in the left-hand column and
match them with their definitions (a−j).
1 ctaaturo a the past record of the accomplishments and failures
2 dunerycdan b an alternate or substitute kept in reserve
16. Fill in the gaps with the correct words from the text. The first letter
has been given.
98
3. In recent years, the incorporation of computers in automobile
d_________ has led to a number of significant advances in areas such as
f_________ e___________, traction/stability, c__________
r__________, and driver information and navigation.
4. An airbag takes only 40 milliseconds to inflate after an a____________.
5. By analysing images of the driver’s eyes, facial features, and posture, the
car may be able to tell when the driver has a high probability of being
impaired (sleepy, drunk, or sick) and take a____________
a___________.
6. In 2001, GM launched a range of four-w_______-steering
v___________ in which the front and back wheels can be turned
simultaneously to manoeuvre into a tight p__________ s____________.
7. BMW's semi-autonomous test car "automatically brakes, a___________
and passes slower vehicles − at over 70 miles per hour." It can also
change l___________, slow down to let traffic merge, and keeps track of
its surroundings through self checks and GPS.
8. This model of car has all-weather t_________ to reduce the risk of
s__________ in wet weather.
17. Fill in the gaps with the words / phrases given below.
legal stop; cruise control; ignition key; speed sensor; directions; fuel;
fine; sign; horns; rear-view mirror; transmission; traffic jams; bike lane;
windscreen; pedestrians; police departments; throttle
1. "The best car safety device is a …… with a cop in it."
Dudley Moore
2. "You know, somebody actually complimented me on my driving today.
They left a little note on the ……, it said 'Parking ……'".
Tommy Cooper
99
3. "Natives who beat drums to drive off evil
spirits are objects of scorn to smart
Americans who blow …… to break up
…… ."
Mary Ellen Kelly
4. "The longest journey begins with a single
step, not with a turn of the ……."
Edward Abbey
5. "Restore human legs as a means of
travel …… rely on food for …… and
need no special parking facilities."
Lewis Mumford
6. "Speed Limit – A …… that tells you at what speed the car that's rapidly
fading from view in your rearview mirror is going; a law that provides the
sole means of support for many small-town …… ."
Richard Turner
7. "It finally happened. I got the GPS lady so confused, she said, "In one-
quarter mile, make a …… and ask …… ."
Robert Brault
8. The vehicle's …… which is mounted on the output shaft of the ……
sends electrical pulses to the computer, pulses which are generated by a
magnet spinning past a sensor coil.
9. The overall size of the Velomobile is comparable to a small car; this
improves visibility and helps it blend in with other vehicles in the
transportation grid, rather than being a thing for the …… .
10. Drive-by-wire technology is creeping into the showrooms: it already
controls the …… in some cars equipped with …… .
100
18. Solve the clues to learn more words connected with cars and driving.
10. A liquid added to cooling water to lower its freezing point, esp for
use in an internal-combustion engine.
101
4) battery, air filter, spark plug, boot;
5) hub cap, muffler, grill, fender;
6) steering wheel, seat-belt, hood, rearview mirror.
20. Study the information in the table below and then fill in the gaps with
the phrasal verbs in the appropriate form.
102
4. Renewable energy simply won’t _________ any time soon, like
biofuels, hydroelectric, wind, and solar.
5. If cellulose can be ___________ biofuel, it could be more efficient than
current biofuels, and emit less carbon dioxide.
6. In many countries, ethanol usually __________ between 10 and 15% of
gasoline.
7. For poorer nations, the use of land for biofuels, which __________ the
cost of food, can have a tremendous impact.
Example: I don’t know his phone number so I can’t call him. – If I knew
his phone number, I would call him.
1. Kim doesn’t study very hard so she won’t pass her exam.
2. I haven’t got time so I can’t help you.
3. He doesn't work overtime, so he doesn't earn as much as I do.
4. My number isn't in the directory so people don't ring me up.
5. People drive very fast. That's why there are so many accidents.
103
3. We didn't listen carefully; perhaps that's why we made this mistake.
4. It rained all the time. Perhaps that's why he didn't enjoy his visit.
5. It took us a long time to find his house because the streets were not
clearly marked.
22. Write the sentences in full using the words given. Put the verbs into
the correct form.
Example: What / would / you / done / if / I not / lend / you / the money? −
What would you have done if I hadn’t lent you the money?
23. Put the verbs in brackets into the correct conditional form making
necessary changes. In some cases, more than one answer is possible.
105
out of the exhaust … (be) cleaner than the air going into the engine
intake."
Dennis Weaver
24. Rewrite the following sentences as mixed type conditionals.
25. Choose the phrase which best completes the conditional statement.
1. Be careful about the time. If you spend too long on the first question, …
a) you won’t have enough time to do the others properly.
b) you could have enough time to do the others properly.
c) you wouldn’t have enough time to do the others properly.
2. Tell him to bring his bicycle inside. If he leaves it outside, …
a) someone might steal it.
b) someone should steal it.
c) someone would steal it.
3. If she misses the bus, …
a) I take her to work by car.
b) I would take her to work by car.
106
c) she has to walk.
4. If he studies a lot, …
a) he might pass the exam.
b) he would pass the exam.
c) he is going to pass the exam.
5. I would get a new job …
a) if I was you.
b) being you.
c) if I were you.
6. He will surely fail his exams …
a) if he not work harder.
b) unless he begins to study.
c) if he weren't serious.
7. She would live in New York now …
a) if she stays.
b) if she had stayed.
c) if she was to stay.
8. He would have decided differently …
a) if he had known that.
b) if he knew that.
c) supposing he knew that.
9. We'll have to break the ice on the pond; otherwise the ducks …
a) wouldn’t be able to swim.
b) won’t be able to swim.
c) aren’t able to swim.
10. Why do people always wear dark clothes at night? Drivers could see
pedestrians much more easily if they …
a) were wearing light coloured clothes.
b) would have worn light coloured clothes.
107
c) could wear light coloured clothes.
11. The experiment might have been a failure …
a) if he couldn’t have taken the necessary measures in time.
b) if he hadn’t taken the necessary measures in time.
c) if he wouldn’t have taken the necessary measures in time.
12. We'll meet for lunch …
a) if you've finished your work.
b) if you should finish your work.
c) unless you finish your wok.
26. Find and cross out seventeen extra words in the text.
In the US, Ford has been just sued by a number of customers who are
claim their drive-by-wire and cruise controls caused in sudden surges of
acceleration or with no prompting from the drivers. Some other experts are
pointing to the finger at inadequate shielding of any electronic components
which governing the cruise control, making them vulnerable to
electromagnetic interference out from elsewhere in the whole vehicle. Ford
denies indeed that its cruise control is being at fault in these cases. It claims
though that its engineers cannot to repeat the supposed at fault and denies that
interference is not a problem.
108
of interest. (Some units have 11) … (back up) dead-reckoning systems based
on the car’s 12) … (move), for use when GPS 13) … (signalling) are lost or
14) … (distortion) because of 15) … (build) or other obstacles).
An 16) … (alternate) to in-car systems is the smartphone or PDA
17) … (equipment) with GPS and navigation software. These have the
advantage of also being 18) … (use) for pedestrians or 19) … (hike). Users
should look for navigation systems that have features such as: large, clear,
20) … (read) display; overhead display and display from driver’s point of
view; uncluttered user interface to avoid 21) … (distract) the driver; voice
22) … (announce) of driving directions and other information;
23) … (comprehend) maps and database including the 24) … (able) to load
supplemental 25) … (cover) for other area.
An important and sometimes overlooked issue with mobile navigation
systems is the need to design the display and user interface so as to
26) … (minimum) distraction. A 27) … (combine) of large displays without
unnecessary 28) … (complex) and the use of 29) … (speak) driving
directions can help. A more 30) … (controversy) approach is to disable many
functions of the system (such as entering new destinations) while the car is in
motion.
28. Put the verbs in bold into the correct form and fill in the gaps (a−m)
with the prepositions given below.
into, in, with, by, to, around, in, through, for, into, with, over, at
The first fly-by-wire planes 1) … (develop) (a) … the military (b) … the
early 1970s. Aeronautical engineers 2) … (seek) to make jets more
manoeuvrable discovered that there 3) … (be) a trade-off: the more agile they
made the jets, the more unstable they 4) … (become). This instability could
5) … (compensate) (c) … 6) … (use) the ailerons, rudder and other control
surfaces, but the reaction times 7) … (require) were far faster than a human
109
pilot could manage. So the engineers decided 8) … (dispense) (d) …
traditional controls and hand them (e) … to computers. Where previously the
pilot controlled the ailerons and rudder directly, 9) … (use) a joystick and
pedals, now a computer-based flight control system intervened to manage the
lot.
Today, many commercial aircraft use fly-by-wire, most notably the
Airbus A320, which 10) … (go) (f) … service in 1988 and 11) … (since /
become) a workhorse of the industry. Pilots still 12) … (operate) cockpit
controls similar (g)… the old stick and rudder, but their commands
13) … (feed) (h) … 150 onboard computers before 14) … (translate) (i) …
action. "It's a computer network (j) … a plane 15) … (wrap) (k) … it," says
Peter Mellor, an expert (l) … software reliability (m) … City University in
London.
110
a proper distance between vehicles in the same lane. This is achieved through
a radar headway sensor, digital signal processor and longitudinal controller. If
the lead vehicle slows down, or if another object is detected, the system sends
a signal to the engine or braking system to decelerate. Then, when the road is
clear, the system will re-accelerate the vehicle back to the set speed.
Адаптивний круїз-контроль схожий на звичайний круїз-контроль,
що вона підтримує заданий швидкості транспортного засобу. Проте, на
відміну від звичайного круїз-контролю, ця нова система може
автоматично регулювати швидкість, щоб підтримувати належний
відстань між транспортними засобами по тій же смузі. Це досягається за
допомогою датчика радара вперед, цифровий сигнальний процесор і
поздовжні контролера. Якщо ведучий транспортний засіб
сповільнюється, або якщо інший об'єкт виявлений, то система посилає
сигнал у систему двигуна або при гальмуванні для уповільнення. Потім,
коли дорога вільна, система буде повторно прискорити автомобіль назад
до швидкості.
Adaptive cruise control is just a preview of the technology being
developed by both companies. These systems are being enhanced to include
collision warning capabilities that will warn drivers through visual and/or
audio signals that a collision is imminent and that braking or evasive steering
is needed.
Адаптивний круїз-контроль тільки попередній перегляд
розроблюваної технології обох компаній. Ці системи в даний час
розширена і включає попередження про зіткнення можливості, які
будуть попереджати водіїв через візуальні та / або звукові сигнали, що
зіткнення неминуче, і що гальмуванні або ухильні рульового необхідна.
111
SPEAKING
32. Make a mind map on one of the topics below. Improvise from it a
two-minute talk for your groupmates. You might need to do some
research on the Internet.
113
33. Look at the photos of two personal mobility devices. Would you like
to have one of these? Why (not)? Do you think they will be popular in
future? What are their disadvantages?
34. Choose one of the suggested cartoons and comment on it. What did
artists want to say? Which cartoon do you like more? Why?
114
B
LISTENING
You are going to listen to a piece of news about a new "smart highway"
being developed in the Netherlands. Be ready to do the following tasks:
35. Before you listen, check if you know the meaning of the following
words and phrases: lane, hybrids, induction coils, to pilot, streetlights,
budget, timing, car accident fatalities, a stretch, to dip.
36. Which of the statements about a new "smart highway" are true (T) or
false (F)?
1. 2. 3. 4. 5. 6. 7. 8. 9.
115
6. The highway can charge electric cars in motion.
7. Building such a road doesn’t require much money.
8. The marking on the road will glow at night.
9. The road is only a project on paper.
a) _____________ equation
b) frozen ____________
c) _____________ transit information
d) _____________ lighting
e) _____________ induction coils
f) _____________ roads
g) budget _____________
h) temperature-responsive
_________________
i) poetic, Matrix-like ________________
j) to run out of ________________
k) _____________ streetlights
l) to pilot _______________
m) exotic ______________
B. Do you think such a highway really has future? What are their
potential downsides?
WRITING
38. Work in pairs. Complete the sentences with one of the conditional
forms. You score an X or O for each sentence that is grammatically
correct and makes sense.
116
39. A. Read the article about smart cars (see the EXTRA READING
section to Unit 4). Write an abstract (4−5 sentences) of the article.
You may use the phrases: the article is devoted to …, this article
concentrates on ..., it is shown ..., it is reported ..., it is studied ..., the
results show ..., the author suggests .... .
Useful phrases:
117
B. Using the information in the picture below write your own short
post about Google’s self-driving car. Use up to 180 words.
118
B. "Instead of destroying an area for a paltry amount of oil, we should be
increasing fuel standards for automobiles and focusing our efforts on
biofuels and other alternatives."
Raul Grijalva
C. "Humans have always had a complex relationship with technology.
Automobiles, for instance, changed the nature of life in America, where
we live, how we work, what we can do with our leisure time. But they
have also brought us traffic jams and contributed to global warming.
The impact of information technology may be equally profound, and
these are things we need to think about and study."
Michael Quinn
PROBLEM-SOLVING
42. Solve the crossword puzzle to revise vocabulary on cars and driving
(see the PROBLEM-SOLVING section to Unit 4).
119
Unit 5: HACKERS
Code is never finished, only abandoned.
Anonymous
WARM-UP
A B
C D
2. Spend one minute writing down all of the different words you
associate with the word 'hacker'. Share your words with your
partner(s).
120
4. In pairs, discuss the following questions.
121
4. "Are hackers a threat? The degree of threat presented by any conduct,
whether legal or illegal, depends on the actions and intent of the
individual and the harm they cause."
Kevin Mitnick
5. "Hackers are breaking the systems for profit. Before, it was about
intellectual curiosity and pursuit of knowledge and thrill, and now
hacking is big business."
Kevin Mitnick
6. "Hackers often describe what they do as playfully creative problem
solving."
Heather Brook
6. Read the facts about hackers below and decide if they are true (T) or
false (F).
1. 2. 3. 4. 5. 6. 7.
122
6. It took IBM researcher Scott Lunsford just one day to penetrate the
network of a nuclear power station: "I thought, 'Gosh, this is a big
problem."
7. In 1978 Robert T. Morris created a worm, or self-replicating program,
purportedly to evaluate Internet security.
123
6. _________________ is a person with political motivations, such as
someone defacing a website and leaving messages on the hacked site for
the world to see.
7. __________________ knows the technical aspects of computer
networking and security. This person could attack a network protected
by a firewall or IPS by fragmenting packets.
8. ___________________ is typically an employee or student at an
institution of higher education. They would use the institutions
computing resources to write malicious programs.
9. ___________________ tends to focus more on home computing. Such
as, modifying existing hardware or software, use software without a
license, unlock Apple iPhone.
READING
9. Read the text "Hacking at light speed" and answer the following
questions.
124
10. Find the synonyms to the highlighted words in the text.
125
Kuhn has found that it is possible to reconstruct the image of someone's
computer screen by grabbing its reflected glow. You don't need to see the
screen directly. Its diffuse flickering will do.
Most monitors work like a TV set, using "raster" scanning. An electron
beam sweeps across the phosphor dots on the screen line-by-line, and its
varying intensity determines how brightly each of the dots glows. The
intensity of the beam is governed by the varying voltage of the video signal
sent from computer to monitor.
Screen phosphors have an afterglow of milliseconds, which helps to
ensure that the eye sees a complete picture rather than a moving spot of light.
But there is a sharp, detectable fall-off in intensity as soon as the beam leaves
the phosphor spot. As the beam scans the dots, its fluctuating brightness can
be picked up by off-the-shelf light sensors called photodiodes.
Kuhn's team used an electronic filter to reduce the "noise" produced by
ambient light, and they easily "tuned out" light from electric lamps because it
flickers at a different frequency to the monitor. When the remaining signal
was processed and fed to another monitor, the text from the original screen
was clearly legible, Kuhn says. A snooper could even record these screen
images on a video, and then read them at their leisure.
So how close does a spy have to be for it to work? Not very Kuhn says
you could pick up the signal from 100 meters away or more by using a
telescope to home in on a patch of reflected screen light on, say, a ceiling tile
in an office block.
Kuhn says exposing this new risk will help people take
countermeasures. Simple solutions include swamping the screen glow by
choosing fluorescent office lights with similar phosphors to the monitor.
Avoiding darkened rooms, and using flat LCD screens, which are dimmer and
have slower refresh rates, should make signals harder to track.
From New Scientist
126
11. Look through the list of words and phrases and check if you know
their Ukrainian equivalents. Take turns to ask each other. Use the
MINI-DICTIONARY section to Unit 2 if necessary.
13. Fill in the gaps with the words given below. Use each word only once.
Translate the collocations into Ukrainian.
127
14. Fill in the blanks with the appropriate word in italics. Use each word
only once.
128
15. Match the words / phrases (1−10) with their Ukrainian
equivalents (a−j).
16. Match the words (1−7) from the text with their definitions (a−g).
129
17. Fill in the table with the words derived from the given ones.
18. Rearrange the letters in bold to make words that fit into the gaps.
130
many users created a kind of environmental niche in which these self-
described hackers could flourish. Indeed, while administrators sometimes
complained that hackers took up too much of the available computer time,
they often 6) _____________ (nepdeded) on them to fix the bugs that
infested the first versions of time-sharing operating 7) ____________
(ytsesms). Hackers also tended to work in the wee hours of the night while
normal users slept.
19. Fill in the correct word derived from the words in brackets.
131
20. Match 1−5 with a−e to make sentences.
21. Work in small groups. Arrange the following words and phrases in
the correct order to make the sentences. The first word is underlined.
132
22. Study the information in the table below and then fill in the gaps with
the phrasal verbs in the appropriate form.
133
6. They had that bad accident because they were careless. If only they had
been more careful.
134
26. Nine words in the passage are in the wrong form. Find and correct
them.
2. A few highly skilled hackers work on / for commercial firms with the
job to protect that company's software and data from outside hacking.
135
3. They often enjoy to program / programming and have expert-level
skills in one particular program.
4. If you are the only user on the computer and new programs installed /
are installed, this could be an indication of a hacked computer.
6. In 1995 Kevin Mitnick has been arrested / was arrested for stealing
credit card numbers and for gaining illegal entry into numerous systems
via the internet.
10. The movie War Games portrayed teenage hackers taken / taking
control of nuclear missile facilities.
28. A. Translate into Ukrainian. What is the main idea of the extract.
137
6. Звичайно, серед хакерів переважають молоді люди, але пропорція
представниць прекрасної статі вища, ніж в інших технічних
професіях.
7. В основному думка комп'ютерного світу про хакерів або суто
негативна (хакери − це злочинці), або скромно позитивна (хакери
− санітари лісу). Насправді у цієї проблеми є щонайменше дві
сторони: одна позитивна, інша − негативна, і між ними проходить
чітка межа. Ця межа розділяє всіх професіоналів, пов'язаних з
інформаційною безпекою, на хакерів (hackers) і зломщиків
(crackers).
8. Зломщик, за своєю суттю, ні чим не відрізняється від звичайного
злодія, що зламує чужі квартири і краде чужі речі. Зломщик же
зламує чужі обчислювальні системи і краде чужу інформацію. Ось
в чому полягає кардинальна відмінність між тими, кого можна
назвати хакерами і зломщиками: перші − дослідники комп'ютерної
безпеки, другі − просто злодії або вандали. При цьому хакер в
даній термінології − це, за визначенням, фахівець.
SPEAKING
29. You are a journalist. Now you are interviewing Markus Kuhn whose
research is devoted to the optical hacking. Using information from the
text "HACKING AT LIGHT SPEED" role play the conversation that
starts with the following statements.
138
B: ___________________________________________________
30. Work in pairs. Make up a list of the most Frequently Asked
Questions (FAQs) about hacking. Then act out your dialogue.
32. The topic of your presentation for your next English lesson is "The
world of hackers". Be ready to share some interesting information
with your groupmates.
33. You are a hacker and you can share some information with hackers
who begin their hacking activity. Prepare a presentation on the topic
"The ways that computer hackers can control your machines."
LISTENING
34. Before you listen, check if you know the meaning of the following
words and phrases: an issue, to exploit, to conduct, weaknesses and
vulnerabilities, to penetrate, to prevent, to anticipate.
35. Define whether the sentences given below are true (T) or false (F).
1. 2. 3. 4. 5.
4. Before you can become an ethical hacker, you must have .... .
WRITING
37. Conduct a survey "What computer problems do you have?" Rate the
suggested points and share your ratings with your partner: 8 = I
absolutely hate this; 1 = this doesn’t bother me at all. Change partners
and share your ratings again. Compare the results of your
groupmates and write a short report (10−12 sentences) summarizing
the obtained information.
a) spam mail _____
b) virus _____
c) pop-ups ______
d) frozen screen _____
e) slow downloads _____
f) forgotten password ______
140
g) cyber attack from a hacker ______
h) Internet won’t connect ______
38. Read the text "HACKERS AND CRACKERS" (see the EXTRA
READING section to Unit 5). Write a summary of the text
(50−60 words).
Follow the steps:
✓ Read the text.
✓ Make notes of the main points of the text.
✓ Start your piece of writing with one sentence that summarizes the
idea of the whole text.
✓ Write your summary, including all the main points. Use your own
words.
✓ Check if your summary is clear, complete and that it makes sense.
"If you wanna know how not secure you are, just take a look around.
Nothing's secure. Nothing's safe. I don't hate technology, I don't hate
hackers, because that's just what comes with it, without those hackers we
wouldn't solve the problems we need to solve, especially security."
Fred Durst
When you write comments, try to keep these things in mind:
✓ Write only relevant information.
141
✓ Express your ideas logically.
✓ Use the correct spelling, punctuation, grammar.
✓ Read over your comment to check if it makes sense.
✓ Edit your comment if it is necessary.
Hackers are users that have all the good programs for hacking
personal computers via the Internet. Hackers try to get their actions illegal
access to computer data of another user. This member can be used to own
a computer, and may host computer large company. Almost all the
countries considered illegal hacking attempt because their job is in all
sorts of fraud. But in any case, hackers continue to attack computers.
Every year an increasing number of hackers and consequently breakups.
Many large companies have failed because of hackers.
PROBLEM-SOLVING
142
Unit 6: SPAM
Like almost everyone who uses e-mail, I receive a ton
of spam every day. Much of it offers to help
me to get out of debt or to get rich quick.
It would be funny if it weren't so exciting.
Bill Gates
WARM-UP
1. Spend one minute writing down all words that you associate with the
word "spam".
143
3. There are different types of spam. Match the pictures (1−6) with the
types of spam (A−F).
1) 2) 3)
4) 5) 6)
A. Junk Fax
B. Unsolicited Text Messages
C. Email Spam
D. Instant Messenger Spam
E. Comment Spam
F. Social Networking Spam
1. "No one bill will cure the problem of spam. It will take a combined effort
of legislation, litigation, enforcement, customer education, and technology
solutions."
David Baker
2. "I'd rather send out a mass email than hang posters all over the place."
Todd Barry
144
3. "Who has time to manually spam web sites? That can't be very cost
effective."
Eric Cheng
4. "I hate when I have to confirm my email to sign up for something."
Unknown
5. In pairs, discuss the points below. Are they true? Rate them: 10 = very
true, 1 = not at all true. Talk about the reasons for your scores.
6. Talk with your partner about the e-mail problems given below. Agree
on the three biggest and smallest ones. Change partners and share
your findings.
a) spam;
b) time taken to send mail;
c) file size;
d) connection speed;
e) viruses;
f) personal information;
g) phishing;
h) losing mails;
i) other ___________ .
145
READING
8. Read the text "THE INTERNET SPAM, SPAM, SPAM, SPAM" and
put ten sentences which have been removed by mistake into their
appropriate places.
10. Decide if the following sentences of the text are true (T) or false (F).
1. 2. 3. 4. 5.
146
3. Filtering e-mail by server is a good way of protecting it from spam.
4. Some users complain that filtering their e-mails by the ISP is interfering
with their privacy.
5. The Internet users should make everything possible to avoid spam by
themselves.
147
end of writs from the larger ISPs. But while these cases are grinding their way
through the courts, the ISPs are trying to find more technical solutions to the
problem of spamming.
(6) C.______. E-mail that is not intended for a user with an account on
a particular server, or that has not originated from such a user, is not accepted,
and thus not sent onward. This blocks the most common spam attacks, and
provides protection for users as well as ISPs, since it makes misuse of the
servers by retransmission more difficult.
(7) More complex schemes are also being put into place − particularly
by the larger ISPs, which have more users and higher mail volume, and
therefore more resources to be wasted. Some identify specific servers or even
whole Internet "domains" that are known sources of spam, and do not accept
any incoming e-mail from them. However, this requires constant, labour-
intensive upkeep of a blacklist.
(8) A variant on blocking blacklisted servers and domains involves
software filters that eliminate suspicious e-mail after it
has been received by the server, but before it is delivered
to a user's mailbox. Typically, the criteria used to filter
e-mail are the same as those used to decide which
servers and domains to block. D.______. This does not stop spammers from
labelling their missives with false addresses-of-origin − a common practice.
But even these are recognisable and filterable, and filtering has the advantage
that it allows for more precise spam removal, since it can prevent the need to
block off entire domains.
(9) As with any blacklisting scheme, the danger of mistakenly damning
something innocent is real. And at least some of the recipients of even the
junkiest spam still feel they have a right to receive their messages uncensored.
By filtering their e-mail, they complain, an ISP is interfering
with their privacy. Indeed, Netcom, a large international ISP based
148
in California, had to dismantle its anti-spam filters because of the potential for
an appearance of this sort of impropriety. Filtering e-mail based on its
contents, even if the only content examined by the filtering software is a
message's addressing information, proved too sensitive.
(10) It is not clear whether better solutions exist. Legislation similar to
that which prevents junk faxes in America, or junk mail in Germany, would
be hard to enforce on the Internet. Those who do not wish to be spammed can,
however, take some precautions. E.______. Many Web sites masquerade as
harmless entertainment, but are actually lures to extract e-mail addresses from
the naive. At present, therefore, the best solution for people who wish to avoid
having their virtual mailboxes stuffed with spam is to follow a version of
mother's famous advice: do not give your virtual address to strangers.
From The Economist
11. Look through the list of words and phrases and check if you know
their Ukrainian equivalents. Take turns to ask each other. Use the
MINI-DICTIONARY section to Unit 6 if necessary.
149
12. Explain the words and phrases.
150
15. Match the words with their antonyms.
1 carelessness a deny
2 generosity b cautiousness
3 allow c insert
4 extract d inaccurate
5 precise e greed
16. Fill in the table with the words derived from the given nouns.
17. Fill in the gaps with the appropriate words from the list below.
151
4. If the server is busy, it may have returned an …… status to ask the
Googlebot to crawl the site more slowly.
5. This is widely used in the number theory, either directly or through the
discriminant, which is essentially the …… of a polynomial and its
derivative.
18. Put the words in the following sentences in order. The first word in
each sentence has been underlined.
19. Study information in the table and fill in the correct phrasal verb.
1. Spam is always annoying, but you shouldn't hold ............ your anger. It
will only make you feel worse.
2. We were held ............ in traffic. That's why we arrived late.
152
3. Spamming is holding ............ quite well, despite all the measures taken
by ISPs.
4. The answering machine asked me to hold ............ until an operator was
ready to take my call.
5. The joke was so funny that Jake couldn't hold ............ his laughter.
6. Simon held ............ because he wasn't sure if it was the right thing to
do.
7. The demonstrators held ............ for three weeks before ending their
protest outside the factory.
153
6. Many Internet start-up companies did not expect _____ changes in their
fortunes.
a) to see
b) to have seen
7. Scientists said that the world temperature ________ by 5°C in 50 years.
a) would increase
b) will increase
8. The engineer says that this integrity _________by a combination of
manual and computer based controls.
a) had been achieved
b) has been achieved
9. Alex was sure that he would get the letter __________ .
a) tomorrow
b) the following day
10. I thought that I __________ use this widget on multiple websites.
a) could
b) can
1. The chief said / told us to design a new section for our website.
2. Ann says / tells: "I don't have a lot of experience in object oriented
programming languages like Java".
3. Mark told / said to us that most of his experience was in back-end
programming.
4. The teacher said / told: "SQL is pronounced as "sequel".
5. The teacher said / told to pronounce C# as "see sharp".
6. Kevin said / told me,"I've written 100 lines of code."
7. "I'm not really familiar with that programming language" Alice said /
told.
154
8. Peter says / tells / asks if someone can get this to work properly.
9. They say / tell that ASP.NET is a much more powerful language than
classic ASP.
10. The programmer said / told: "This is a password generator script that I
have written".
155
5. Багато експертів не змогли вирішити, чи шкідливе телебачення
для розумової діяльності людини.
6. Ми дізналися на лекції, що електрика все ще вважається основним
джерелом нових технологічних розробок.
7. Ми знаємо, що він працює над проблемами космічного зв'язку.
8. Новачок запитав, коли почнуться наші лекції.
9. Крім того, він попросив показати йому, де знаходиться хімічна
лабораторія.
10. Декан повідомив нам, що будуть важливі зміни у розкладі.
A B
• Her: "So you're the one who won't let me email my son!"
• Me: "Excuse me?"
• Her: "Well, I bought my computer here and you guys set up my Internet."
156
• Me: "Yes...?"
• Her: "Every time I try to email my son, YOU email me back saying you
won't deliver my message."
• Me: "Ma'am, I don't have anything to do with delivering email to anyone,
and I'm sure I haven't sent you any messages."
• Her: "I just heard you tell the person on the phone that YOU were
Damon."
3. Many spam messages are either / neither advertising nor any type of
commercial proposition.
6. Since then spam has been associated / are associated with unwanted,
obtrusive, excessive information which suppresses required messages.
7. Spam was created / created by the Hormel Company in 1937 and was a
popular staple during World War II.
10. Blog spam, or "blam" for a short / for short, is spamming on weblogs.
157
26. A. Translate into Ukrainian.
SPEAKING
158
3. Software companies should make better software to block spam.
4. Many people do not realize their e-mail address is as important as
their home address.
5. Old people are easy targets.
6. I’m worried a virus from a spam mail might infect my computer.
7. Why is it called "spam"? Seems a stupid word.
8. Google’s Gmail is the best one – it’s revolutionary.
9. Email should always be free.
10. Email should never include advertising.
11. People who send spam should go to prison for 25 years.
12. Voice mail will one day replace email.
13. Our written language skills are going down because of email.
14. I cannot live without email.
28. Quick role play. Student A thinks that sending spam e-mails isn’t a
criminal offence; Student B thinks that sending spam e-mails is a
serious crime. Change partners again and talk about your roles and
conversations.
29. You are an IT specialist. You have been invited to the KPI to tell the
students about spamming. Cover the following points:
✓ definition,
✓ history,
✓ types,
✓ ways of preventing spam,
✓ political issues,
✓ court cases.
159
30. Search the Internet and find some information on different types of
offers made via spam. Fill in the table and think of the possible
prevalence of different types of offers. Be ready to share your findings
with your groupmates.
Investment / Business
Opportunity
Adult
Health and Medicine
Computers and the Internet
Finance
Education
Political Spam
Antispam Solutions
Leisure / Travel
Products / Services
31. Search the Internet and find some information about spamming in
Ukraine. What does Ukrainian government do to
defeat spam? Prepare some information on this
topic.
160
32. Look at the bar chart and describe it. Use the Simple Present and the
Present Perfect describing the suggested chart.
✓ introduction;
✓ message of the diagram;
✓ conclusions.
Useful phrases:
the bar chart deals with ...; the chart is divided into ... parts; it
highlights ...; ... has the largest (number of) ...; ... has the second largest
(number of) ...; ... is twice as big as ...; more than ... per cent ...; less than
half ...; the number ... does not change / remains stable; the number ...
increases / goes up / grows by ...; so we can say ...
161
33. Look at the cartoon and create the story using reported speech.
LISTENING
You are going to listen to the story about spamming. Be ready to do the
following tasks:
34. Before listening check if you know the meaning of the following
words: to vanish, to raid, allegedly, recruited, strangely enough, to
promote, cybercriminals, botnet, a trick, to estimate to promote, to infect.
35. Decide if the following statements are true (T) or false (F).
162
36. A. Answer the following questions.
WRITING
38. Imagine you are a spammer. You need to write a spam letter (up
to 50−60 words) devoted to the offer
a) "Antispam Solutions"
___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________
________________________________________________________
{Link}
163
b) "Education"
___________________________________________________________
___________________________________________________________
___________________________________________________________
___________________________________________________________
________________________________________________________
{Link}
164
✓ unsubscribe.
M. Mokhonoana
PROBLEM SOLVING
165
Unit 7: COOKIES
I have an aversion to anyone saving anything on my
computer so I regularly delete all cookies.
Anonymous
WARM-UP
book beetle
Cookies
sky wall
2. Make conjectures why Internet cookies are called exactly so. Share
your ideas with groupmates.
166
4. Match the types of cookies (1−7) with their definitions (a−g).
2. HTTP Only b. This type of cookie is put onto your computer when
Cookies you are logged onto a website. From the time you log
on until the time you log off is called a session
3. Zombie Cookie c. These are cookies that are used only when
transmitting a HTTP request, so that other non-HTTP
technologies such as javascript and APIs of other
websites cannot use the cookie to manipulate your
computer.
167
READING
6. Read the text about cookies and decide whether the statements are
true (T) or false (F). Compare your answers with the information
from the text.
1. 2. 3. 4. 5.
168
8. Find the synonyms to the highlighted words.
A.
Cookies are very small text files placed on your computer by a Web
server when you view some sites online (not all Web sites place cookies).
They're used to store data about you and your preferences so that the Web
server doesn't have to repeatedly request this information, potentially slowing
down load time.
Cookies are commonly used to store personal registration data like your
name, your address, the contents of a shopping cart, your preferred layout for
a Web page, what map you might be looking at, and so on. Cookies make it
easy for Web servers to personalize information to fit your specific needs and
preferences when you're visiting a Web site.
B.
There are different explanations for where cookies got their name.
Some people believe that cookies got their name from "magic cookies" which
are part of UNIX, an operating system. Many people believe that the name
originates from the story of Hansel and Gretel, who were able to mark their
trail through a dark forest by dropping cookie crumbs behind them.
C.
The easiest answer is that cookies, in and of themselves, are completely
harmless. However, some Web sites use them to track users as they browse
the Web, collecting highly personal information and often surreptitiously
transferring that information to other Web sites without permission or
warning. This is why we often hear about Web cookies in the news.
169
D.
Because cookies are simple text files, text files cannot execute
programs or carry out tasks. Nor can they be used to view data on your hard
disk, or capture other information from your computer.
Furthermore, cookies can only be accessed by the server that initiated
them. This makes it impossible for one Web server to snoop around in
cookies set by other servers, grabbing sensitive bits of your personal
information.
E.
Although cookies can only be retrieved by the server that set them,
many online advertisement companies attach cookies containing a unique user
ID to banner ads. Many of the major ad companies online serve ads to
thousands of different Web sites, so they can retrieve their cookies from all of
these sites, too. Though the site that carries the ad can't track your progress
through the Web, the company that serves the ads can.
This may sound ominous, but tracking your progress online isn't
necessarily such a bad thing. When tracking is used within a site, the data can
help site owners tweak their designs, enhancing popular areas and eliminating
or redesigning "dead ends" for a more efficient user experience. Tracking data
can also be used to give users and site owners more targeted information or to
make recommendations on purchases, content, or services to users, a feature
many users appreciate.
F.
This is a question that has different answers depending on how you
want to use the Web.
If you go to websites that personalize your experience extensively, you
won't be able to see much of that if you disable cookies. Many sites use these
simple text files to make your Web browsing session as personalized and
efficient as possible simply because it's a much better user experience
170
to not have to keep entering in the same information every time you visit. If
you disable cookies in your Web browser, you won't get the benefit of the
time saved by these cookies, nor will you have a completely personalized
experience.
Users can implement a partial stop on Web cookies by setting Web
browsers on a high sensitivity level, giving you a warning whenever a cookie
is about to be set, and allowing you to accept or reject cookies on a site by site
basis. However, because so many sites use cookies these days that a partial
ban will probably force you to spend more time accepting or rejecting cookies
than in actually enjoying your time online. It's a trade-off, and really depends
on your level of comfort with cookies.
The bottom line is this: cookies really do no harm to your computer or
your Web browsing experience. It's only when advertisers are not as ethical as
they should be with the data stored in your cookies where things get into a bit
of a grey area. Still, your personal and financial information is completely
safe, and cookies are not a security risk.
G.
Cookies, small text files containing very small amounts of data, were
originally designed to make life easier for Web searchers. Popular sites use
them to deliver highly customized, personal Web pages that deliver targeted
content to users.
Unfortunately, some websites and Internet advertisers have found other
uses for cookies. They can and do gather sensitive personal information that
might be used to profile users with advertisements that seem almost intrusive
with how targeted they are.
Cookies do offer quite a few very useful benefits that make Web
browsing very convenient. On the other hand, you might be concerned that
your privacy has the potential to be violated. However, this isn't something
171
that Web users should necessarily be concerned about. Cookies are absolutely
harmless.
Wendy Boswell
9. Look through the list of words and phrases and check if you know
their Ukrainian equivalents. Take turns to ask each other. Use the
MINI-DICTIONARY section to Unit 7 if necessary.
cookies to tweak
to transfer to appreciate
to execute programs to disable
to capture to implement
to initiate harmless
to snoop around intrusive
controversial targeted
to retrieve ominous
to track sensitive personal information
11. Find the adverbs in the text that match the following Ukrainian
equivalents.
хоча; з іншого боку; до того ж; на жаль; все-таки; через те, що; проте;
однак; майже
172
12. Match the words / phrase (1−8) from the text with the
definitions (a−h).
14. Fill in the blanks with the appropriate word in italics. Use each word
only once.
173
with information likely to be of interest to them. (Many e-mail addresses are
also gathered to be sold for use for 4) …… e-mail.) An even more 5) ……
technique involves the surreptitious installation of software on the user’s
computer for purposes of displaying advertising content or gathering
information. In turn, programmers have distributed free utilities for
identifying and removing such "adware" or 6) …… .
15. Match the words and phrases (1−10) with their Ukrainian
equivalents (a−j).
1 to store a порушений
2 experience b компроміс
3 to be violated c цільовий
4 convenient d відхиляти куки
5 intrusive e досвід
6 targeted f нав'язливий
7 to deliver g перегляд даних
8 browsing h зберігати
9 trade-off i передавати
10 reject cookies j зручний
16. Fill in the table with the words derived from the given adjectives.
174
17. Fill in the crossword with the following words.
18. Fill in the gaps with the correct words from the text. The first letter
has been given.
COOKIE THEFT
Cookies are supposed to be sent only between the Web
1) b__________ and the server or servers in the same domain that set the
cookie. But, if the cookie is being sent over an ordinary HTTP connection,
it is visible to anyone across the network 2) u__________ a packet sniffer.
This means cookies really cannot contain sensitive 3) i__________. This is
sometimes overcome by using HTTPS to encrypt the connection, but that's
175
not the solution because it only solves one of the problems associated with
having 4) s__________ data 5) s__________ in cookies.
For example, cross-site scripting can be used to send cookies to
6) s__________ that should not be receiving that 7) d__________.
Encryption does not help stop this cookie theft, which is often done with a
simple snippet of HTML posted to a site that 8) u__________ can be
tricked into clicking on, and which sends their cookie for that 9)
s__________ to a location that the attacker specifies. Because the request is
coming from the same 10) d__________ intended for the cookie, there are
no problems. These cookies can then be exploited by connecting to the
same site using the stolen cookies, thus spoofing the original owner of the
11) c__________.
19. Fill in the gaps with the correct words derived from the ones in
brackets.
WHY ARE COOKIES USED?
Cookies are a convenient way to carry information from one session on a
website to another, or between sessions on 1) _______ (relate) websites,
without having to burden a server machine with massive amounts of data
storage. 2) _______ (Store) the data on the server without using cookies
would also be problematic because it would be difficult to retrieve a particular
user's information without requiring a login on each visit to the website.
If there is a large amount of information to store, then a cookie can
3) _______ (simple) be used as a means to identify a 4) _______ (give) user
so that further related information can be looked up on a server-side database.
For example, the first time a user visits a site they may choose a username
which is 5) _______ (store) in the cookie, and then provide data such as
password, name, address, preferred font size, page layout, etc. − this
information would all be stored on the database 6) _______ (use)
the username as a key. 7) _______ (Subsequent) when the site is revisited
176
the server will read the cookie to find the username, and then retrieve all the
user's information from the database without it having to be re-entered.
21. Study information in the table below and fill in the correct phrasal
verb.
keep away to stay away триматися подалі (від)
(from)
keep back to conceal приховувати
keep on to continue in spite of продовжувати робити
difficulties; to continue щось незважаючи на
doing something; to carry труднощі;
on продовжувати
keep out of to stay away from (trouble) уникати
keep up to maintain something at підтримувати щось на
the same level тому ж рівні
177
keep up with to proceed at an equal pace не відставати від; йти в
with; to continue to be ногу з
informed (news, events)
22. Put the words in the following sentences in order. The first word in
each sentence has been underlined.
178
23. Turn the following sentences into reported speech.
1. "If we look around, we can see that electricity is serving us in one way
or another", the professor said.
2. "If we had tested this material, we should have used it in our work",
James said to me.
3. "If supercomputers had not been used for thermodynamic calculations,
designers would have spent all their lives on computations", he said.
4. "If you know English well, you will be able to read books in the
original", my teacher said.
5. "I would have had more opportunities, if I had passed the test", Mel
said.
6. "If he had had all the necessary books, he would have made his report
in time", Mary said.
7. "If there were no computers, space flights would be impossible", the
lector said.
179
25. Turn the following requests, suggestions, and
instructions into reported speech.
180
6. She told us that the new furniture had been delivered the day before.
a. "The new furniture had been delivered yesterday."
b. 'The new furniture was delivered yesterday."
7. They said that the manager would inspect the office the following day.
a. "The manager will inspect the office the following day."
b. "The manager will inspect the office tomorrow."
8. He said that if we hadn't acted so quickly, the accident would have been
even worse.
a. "If you hadn't acted so quickly, the accident would have been even
worse."
b. "If you haven't acted so quickly, the accident would be even worse."
27. There are seven mistakes in the text. Find and correct them.
1. Cookies are supposed / suppose to be sent only to the server that set
them or another server in the same Internet domain.
181
2. It is also important know / to know that the only real restriction on
cookies is a maximum of 300 at a time, which is respected by most
browser manufacturers.
4. A / The first thing you need to do is know just what cookies are being
created by the application and when.
5. You need to examine the cookies you have been gathering / have
gathered to try to get an idea of what they are supposed to tell the
server or store.
7. Then, the user examines the cookie storing / stored on his system from
that site to see whether the cookie includes the total cost of the items in
the attacker's cart.
9. Web users must agree to let cookies to be saved / be saved for them,
but, in general, it helps Web sites to serve users better.
11. A persistent / session cookie remains in the browser's subfolder for the
duration period set within the cookie's file.
12. Cookies can / must help a website to arrange content to match your
preferred interests more quickly.
182
29. A. Translate into English.
183
SPEAKING
A: What is a cookie?
B: ___________________________________________________
A: How do cookies work?
B: ___________________________________________________
A: Are cookies dangerous?
B: ___________________________________________________
A: ___________________________________________________
B: ___________________________________________________
A: ___________________________________________________
B: ___________________________________________________
A: ___________________________________________________
B: ___________________________________________________
A: ___________________________________________________
B: ___________________________________________________
31. You are an IT specialist. At the conference you need to clarify
information in your presentation "Internet Cookie":
✓ definition,
✓ history,
✓ the content of a typical cookie,
✓ purpose of cookies,
✓ types of cookies,
✓ privacy and cookie policy.
Use some information from this unit.
32. Your friend asks you to clarify information about cookie risks:
✓ cookie theft,
✓ cookie poisoning,
✓ cookie inaccuracies,
184
✓ cross-site cooking.
34. Every browser has a way to show you the cookies that are stored on
your behalf. Figure out and tell your groupmates how to find, view,
edit and delete your cookies.
LISTENING
You are going to listen about cookie law. Be ready to do the following
tasks:
35. Before listening check if you know the meaning of the following
words: to affect, consent, shopping cart, amended, wording, prior, voice,
to comprise, compliance.
36. Decide whether the following statements true (T) or false (F).
1. 2. 3. 4. 5.
185
37. A. Complete the sentences.
1. On 26th May 2011, new laws came into force in the UK that ……. .
2. The only cookies that do not need users' consent are those that are
necessary to ……… .
3. The authorities have differing views on whether consent should be
obtained prior to ……….. .
4. Many cookies are used by advertising networks across ………. .
5. The ICO and the UK Government have not ruled out the use of browser
settings to ………. .
B. Summarize information of the text in five / seven sentences.
WRITING
38. Write down 10 sentences with the words and phrases from the MINI-
DICTIONARY section to Unit 7. Use in one sentence several words
and phrases.
186
✓ Check if your summary is clear, complete and that it makes sense.
PROBLEM-SOLVING
187
Appendix 1: EXTRA READING
Unit 1
HISTORY OF COMPUTER TECHNOLOGY
The evolution of digital computing is often divided into generations.
Each generation is characterized by dramatic improvements over the previous
generation in the technology used to build computers, the internal
organization of computer systems, and programming languages.
THE MECHANICAL ERA (1623−1945)
The idea of using machines to solve mathematical problems can be
traced at least as far as the early 17th century. Mathematicians who designed
and implemented calculators that were capable of addition, subtraction,
multiplication and division included Wilhelm Schickhard, Blaise Pascal and
Gottfried Leibnitz.
The first multi-purpose, i.e. programmable, computing device was
Charles Babbage’s Difference Engine, which was begun in 1823. In spite of
never building a complete working machine, Babbage and his colleagues
recognized several important programming techniques, including conditional
branches, iterative loops and index variables.
George Scheutz by 1853 had constructed a machine that could process
15-digit numbers and calculate fourth-order differences. One of the first
commercial uses of mechanical computers was by the US Census Bureau,
which used punch-card equipment designed by Herman Hollerith to tabulate
data for the 1890 census. In 1911 Hollerith’s company merged with a
competitor to found the corporation which in 1924 became International
Business Machines.
FIRST GENERATION ELECTRONIC COMPUTERS (1937−1953)
The first general purpose programmable electronic computer was the
Electronic Numerical Integrator and Computer (ENIAC), built by J. Presper
Eckert and John V. Mauchly. Work began in 1943. The machine wasn’t
completed until 1945, but then it was used extensively for calculations during
the design of the hydrogen bomb. Eckert, Mauchly, and John von Neumann, a
consultant to the ENIAC project, began work on a new machine before
ENIAC was finished. The main contribution of EDVAC, their new project,
was the notion of a stored program. ENIAC was controlled by a set of
external switches and dials; to change the program required physically
altering the settings on these controls. Through the use of a memory that was
large enough to hold both instructions and data, and using the program stored
in memory to control the order of arithmetic operations, EDVAC was able to
run orders of magnitude faster than ENIAC.
188
Software technology during this period was very primitive. The first
programs were written out in machine code, i.e. programmers directly wrote
down the numbers that corresponded to the instructions they wanted to store
in memory. By the 1950s programmers were using a symbolic notation,
known as assembly language, then hand-translating the symbolic notation into
machine code.
As primitive as they were, these first electronic machines were quite
useful in applied science and engineering. The first problem run on the
ENIAC, a numerical simulation used in the design of the hydrogen bomb,
required 20 seconds, as opposed to forty hours using mechanical calculators.
SECOND GENERATION (1954−1962)
Electronic switches in this era were based on discrete diode and
transistor technology. The first machines to be built with this technology
include TRADIC at Bell Laboratories in 1954 and TX-0 at MIT’s Lincoln
Laboratory. Memory technology was based on magnetic cores which could be
accessed in random order.
During this second generation many high level programming languages
were introduced, including FORTRAN (1956), ALGOL (1958), and COBOL
(1959). Important commercial machines of this era include the IBM 704 and
its successors, the 709 and 7094.
The second generation also saw the first two supercomputers designed
specifically for numeric processing in scientific applications. They were
machines that overlapped memory operations with processor operations and
had primitive forms of parallel processing.
THIRD GENERATION (1963−1972)
The third generation brought huge gains in computational power.
Innovations in this era include the use of integrated circuits, or Ics
(semiconductor devices with several transistors built into one physical
component), semiconductor memories starting to be used instead of magnetic
cores, microprogramming as a technique for efficiently designing complex
processors, the coming of age of pipelining and other forms of parallel
processing (described in detail in Chapter CA), and the introduction of
operating systems and time-sharing.
Early in the third generation Cambridge and the University of London
cooperated in the development of Combined Programming Language. CPL
was large with many features that were hard to learn. In 1970 Ken Thompson
of Bell Labs developed simplification of CPL called simply B, in connection
with an early implementation of the UNIX operating system.
189
FOURTH GENERATION (1972−1984)
The next generation of computer systems saw the use of large scale
integration (LSI – 1000 devices per chip) and very large scale integration
(VLSI – 100,000 devices per chip) in the construction of computing elements.
At this scale entire processors will fit onto a single chip, and for simple
systems the entire computer (processor, main memory, and I/O controllers)
can fit on one chip. Gate delays dropped to about 1ns per gate.
Developments in software include very high level languages such as
Prolog (programming in logic). These languages tend to use a declarative
programming style as opposed to the imperative style of Pascal, C and
FORTRAN. These languages are not yet in wide use, but are very promising
as notations for programs that will run on systems with over 1,000 processors.
Two important events marked the early part of the third generation: the
development of the C programming language and the UNIX operating
system, both at Bell Labs. In 1972, Dennis Ritchie, seeking to generalize
Thompson’s B, developed the C language. Thompson and Ritchie then used C
to write a version of UNIX for the DEC PDP-11. This C-based UNIX was
soon ported to many different computers, relieving users form having to learn
a new operating system each time they change computer hardware. UNIX or a
derivative of UNIX is now a de facto standard on virtually every computer
system.
FIFTH GENERATION (1984−1990)
The development of the next generation of computer systems is
characterized mainly by the acceptance of parallel processing. Until this time
parallelism was limited to pipelining and vector processing, or at most to a
few processors sharing jobs. The fifth generation saw the introduction of
machines with hundreds of processors that could all be working on different
parts of a single program. The scale of integration in semiconductors
continued at an incredible pace – by 1990 it was possible to build chips with a
million components – and semiconductor memories became standard on all
computers.
In the area of computer networking, both wide area network (WAN)
and local area network (LAN) technology developed at a rapid pace,
stimulating a transition from the traditional mainframe computing
environment toward a distributed computing environment in which each user
has their own workstation for relatively simple tasks (editing and compiling
programs, reading mail) but sharing large, expensive resources such as file
servers and supercomputers. This period also saw a marked increase in both
the quality and quantity of scientific visualization.
190
SIXTH GENERATION (1990−... )
Transitions between generations in computer technology are hard to
define, especially as they are taking place. Some changes, such as the switch
from vacuum tubes to transistors, are immediately apparent as fundamental
changes, but others are clear only in retrospect. Many of the developments in
computer systems since 1990 reflect gradual improvements over established
systems and thus it is hard to claim they represent a transition to a new
“generation”, but other developments will prove to be significant changes.
This generation is beginning with many gains in parallel computing, both in
the hardware area and in improved understanding of how to develop
algorithms to exploit diverse, massively parallel architectures. Parallel
systems now compete with vector processors in terms of total computing
power and most expect parallel systems to dominate the future.
Combinations of parallel / vector architectures are well established, and
one corporation (Fujitsu) has announced plans to build a system with over
200 of its high end vector processors. Manufacturers have set themselves the
goal of achieving teraflops (1012 arithmetic operations per second)
performance by the middle of the decade, and it is clear this will be obtained
only by a system with a thousand processors or more. Workstation technology
has continued to improve, with processor designs now using a combination of
RISC, pipelining, and parallel processing. As a result it is now possible to
purchase a desktop workstation for about $30,000 that has the same overall
computing power (100 megaflops) as fourth generation supercomputers. This
development has sparked an interest in heterogeneous computing: a program
started on one workstation can find idle workstations elsewhere in the local
network to run parallel subtasks.
One of the most dramatic changes in the sixth generation will be the
explosive growth of wide area networking. Network bandwidth has expanded
tremendously in the last few years and will continue to improve for the next
several years.
From The Computational Science Education Project
Unit 2
"LIVING COMPUTERS" COULD BECOME REALITY AS
SCIENTISTS BUILD TINY COMPONENTS OUT OF BACTERIA
CELLS
Scientists are one step closer to making a biological computer after
building basic components for digital devices out of bacteria and DNA.
Some scientists believe that, in the future, small biological computers
could roam our bodies monitoring our health and correcting any problems
they find.
191
Researchers from Imperial College London have demonstrated they can
build the 'logic gates' which are the building blocks of today's
microprocessors out of harmless bugs and chemicals.
The biological logic gates described in Nature Communications are the
most advanced 'biological circuitry' ever created by scientists.
Professor Richard Kitney said: 'Logic gates are the fundamental
building blocks in silicon circuitry that our entire digital age is based on.
Without them, we could not process digital information.
'Now that we have demonstrated we can replicate these parts using
bacteria and DNA, we hope that our work could lead to a new generation of
biological processors, whose applications in information processing could be
as important as their electronic equivalents.'
Although still a long way off, the team suggests these biological logic
gates could one day form the building blocks in microscopic biological
computers.
Devices may include sensors that swim inside arteries, detecting the
build up of harmful plaque and rapidly delivering medications to the affected
area.
Other applications may include sensors that detect and destroy cancer
cells inside the body and pollution monitors that can be deployed in the
environment, detecting and neutralising dangerous toxins such as arsenic.
Previous research only proved biological logic gates could be made.
The advantage of the biological logic gates over previous attempts is that they
behave more like their electronic counterparts.
The new biological gates are also modular, which means that they can
be fitted together to make different types of logic gates, paving the way for
more complex biological processors to be built in the future.
In one experiment the researchers showed how biological logic gates
can replicate the way their electronic counterparts process information by
either switching 'on' or 'off'.
The scientists constructed a type of logic gate called an 'AND Gate'
from bacteria E.Coli, which is normally found in the lower intestine.
The team altered the E.Coli with modified DNA, which reprogrammed
it to perform the same switching on and off process as its electronic
equivalent when stimulated by chemicals.
The researchers were also able to demonstrate that the biological logic
gates could be connected together to form more complex components in a
similar way that electronic components are made.
In another experiment, the researchers created a 'NOT gate' and
combined it with the AND gate to produce the more complex 'NAND gate'.
The next stage of the research will see the team trying to develop more
complex circuitry that comprises multiple logic gates.
192
One of challenges faced by the team is finding a way to link multiple
biological logic gates together, similar to the way in which electronic logic
gates are linked together, to enable complex processing to be carried out.
From Daily Mail Reporter
Unit 3
193
in hospitals (see How Magnetic Resonance Imaging Works for details). Led
by Dr. Isaac Chuang, the IBM team was able to solve in one step a
mathematical problem that would take conventional computers repeated
cycles. The problem, called order-finding, involves finding the period of a
particular function, a typical aspect of many mathematical problems involved
in cryptography.
2001
Scientists from IBM and Stanford University successfully demonstrated
Shor's Algorithm on a quantum computer. Shor's Algorithm is a method for
finding the prime factors of numbers (which plays an intrinsic role in
cryptography). They used a 7-qubit computer to find the factors of 15. The
computer correctly deduced that the prime factors were 3 and 5.
2005
The Institute of Quantum Optics and Quantum Information at the
University of Innsbruck announced that scientists had created the first qubyte,
or series of 8 qubits, using ion traps.
2006
Scientists in Waterloo and Massachusetts devised methods for quantum
control on a 12-qubit system. Quantum control becomes more complex as
systems employ more qubits.
2007
Canadian startup company D-Wave demonstrated a 16-qubit quantum
computer. The computer solved a sudoku puzzle and other pattern matching
problems. Skeptics believe practical quantum computers are still decades
away, that the system D-Wave has created isn't scaleable, and that many of
the claims on D-Wave's Web site are simply impossible (or at least
impossible to know for certain given our understanding of quantum
mechanics).
Kevin Bonsor and Jonathan Strickland
194
ion. The clock is so precise that, had it started ticking at the dawn of the
universe, it would have only lost about 4 seconds by now. Such clocks are
precise enough to measure the slowing of time caused by changes in gravity,
as predicted by Einstein's theory of relativity.
Haroche was awarded the prize for his work on optical cavities, small
superconducting mirrors placed just a few centimetres apart and cooled to just
above absolute zero. A photon entering the cavity can bounce between the
mirrors for more than a tenth of a second, long enough to travel 40,000
kilometres.Caging photons in this way lets you investigate their quantum
behaviour. Haroche fires rubidium atoms one by one into the cavity, where
they interact with the photon before passing out the other side. This atomic
drive-by shifts the atom's quantum state but, crucially, does not destroy the
photon. In this way Haroche can measure the atom and learn about the
detailed evolution of the photon's state over time.
Wineland's work takes the opposite approach: he traps charged atoms
or ions within electric fields and fires lasers at them to force the ions into a
particular quantum state. The lasers cool the ions by suppressing random
motion due to heat, forcing them into their lowest energy state. Precise laser
pulses can then boost the energy of the ions by a tiny amount, creating
a quantum superposition in which the ion has an equal chance of occupying
both the lowest energy state and the next one up.
Wineland and Haroche and their teams have shown just how strange
the quantum world really is and opened up the potential for new technologies
undreamt of not so long ago.
From New Scientist
Unit 4
195
and maintain mobility for a rapidly aging population. Such events as the
annual DARPA automated vehicle challenge show considerable progress
being made: Automated cars are already driving cross-country, with the
human driver or follow-on vehicle serving only as a safety backup. In 2005
for the first time some competitors actually made it across the finish line.
"Stanley," a robotic Volkswagen Touareg designed by Stanford University,
won the race over an arduous 131-mile Mojave Desert course, navigating by
means of a camera, laser range finders, and radar. In 2007 the contest entered
a more difficult arena, where the robot vehicles had to deal with simulated
urban traffic, negotiate intersections and traffic circles, and merge with traffic,
all while obeying traffic laws.
Meanwhile efforts continue for developing a practical automated
system that could be used for everyday driving. A "tethered" system using
magnetic or radio frequency guides embedded in the road would reduce the
complexity of the on-board navigation system, but would probably require
dedicated roads. A "free" system linked only wirelessly would be much more
flexible, but would require the ability to visualize and assess a constantly
changing environment and, if necessary, make split-second decisions to avoid
accidents. Such systems may also feature extensive automatic
communication, where cars can provide each other with information about
road conditions as well as their intended maneuvers.
The biggest obstacles to implementation of a fully automated highway
system may be human rather than technical: the cost of the infrastructure, the
need to convince the public the system is safe and reliable, and concerns
about potential legal liability. Ironically, just as information technology is
making cars safer, such activities as cell phone use, text messaging, and use
of in-car entertainment systems seem to be making drivers more distracted.
Whether cars will get smart fast enough to compensate for increasingly
inattentive drivers remains an open question.
From Encyclopedia of Computer Science and Technology
Unit 5
HACKERS AND CRACKERS
WHAT IS THE DIFFERENCE BETWEEN A HACKER AND A
CRACKER?
There have been many articles written (particularly on the Internet)
about the difference between hackers and crackers. In them, authors often
attempt to correct public misconceptions.
For many years, the American media has erroneously applied the word
hacker when it really means cracker. So the American public now believe
that a hacker is someone who breaks into computer systems. This is untrue
196
and does a disservice to some of our most talented hackers. There are some
traditional tests to determine the difference between hackers and crackers.
First, I want to offer the general definitions of each term. This will provide a
basis for the remaining portion of this chapter. Those definitions are as
follows:
A hacker is a person intensely interested in the arcane and recondite
workings of any computer operating system. Most often, hackers are
programmers. As such, hackers obtain advanced knowledge of operating
systems and programming languages. They may know of holes within
systems and the reasons for such holes. Hackers constantly seek further
knowledge, freely share what they have discovered, and never, ever
intentionally damage data.
A cracker is a person who breaks into or otherwise violates the system
integrity of remote machines, with malicious intent. Crackers, having gained
unauthorized access, destroy vital data, deny legitimate users service, or
basically cause problems for their targets. Crackers can easily be identified
because their actions are malicious.
These definitions are good and may be used in the general sense.
However, there are other tests. One is the legal test. It is said that by applying
legal reasoning to the equation, you can differentiate between hackers (or any
other party) and crackers. This test requires no extensive legal training. It is
applied simply by inquiring as to mens rea.
Mens rea is a Latin term that refers to the guilty mind. It is used to
describe that mental condition in which criminal intent exists. Applying mens
rea to the hacker-cracker equation seems simple enough. If the suspect
unwittingly penetrated a. computer system-and did so by methods that any
law-abiding citizen would have employed at the time − there is no mens rea
and therefore no crime. However, if the suspect was well aware that a security
breach was underway − and he knowingly employed sophisticated methods of
implementing that breach − mens rea exists and a crime has been committed.
By this measure, at least from a legal point of view, the former is an unwitting
computer user (possibly a hacker) and the latter a cracker. In my opinion,
however, this test is too rigid.
At day's end, hackers and crackers are human beings, creatures too
complex to sum up with a single rule. The better way to distinguish these
individuals would be to understand their motivations and their ways of life.
From Macmillan Computer Publishing
197
Unit 6
198
The researchers aim to make their software available soon, and hope
that it will spread rapidly, as the system's success depends on it having a large
number of users. "The main strength of the idea," says Boykin, "is that
essentially everyone on the planet would be collaboratively filtering spam."
From New Scientist
Unit 7
PROBLEMS WITH COOKIES
Cookies are not a perfect state mechanism, but they certainly make a lot
of things possible that would be impossible otherwise. Here are several of the
things that make cookies imperfect.
• People often share machines − Any machine that is used in a public
area, and many machines used in an office environment or at home, are
shared by multiple people. Let's say that you use a public machine to
purchase something from an online store. The store will leave a cookie on
the machine, and someone could later try to purchase something from the
store using your account. Stores usually post large warnings about this
problem, and that is why. Even so, mistakes can happen.
• Cookies get erased − If you have a problem with your browser and
call tech support, probably the first thing that tech support will ask you to
do is to erase all of the temporary Internet files on your machine. When you
do that, you lose all of your cookie files. Now when you visit a site again,
that site will think you are a new user and assign you a new cookie. This
tends to skew the site's record of new versus return visitors, and it also can
make it hard for you to recover previously stored preferences. This is why
sites ask you to register in some cases − if you register with a user name
and a password, you can log in, even if you lose your cookie file,
and restore your preferences. If preference values are stored directly on the
machine, then recovery is impossible. That is why many sites now store
all user information in a central database and store only an ID value on the
user's machine.
• Multiple machines − People often use more than one machine
during the day. For example, I have a machine in the office, a machine at
home and a laptop for the road. Unless the site is specifically engineered to
solve the problem, I will have three unique cookie files on all three
machines. Any site that I visit from all three machines will track me as
three separate users. It can be annoying to set preferences three times.
Again, a site that allows registration and stores preferences centrally may
make it easy for me to have the same account on three machines, but the
site developers must plan for this when designing the site. If you visit the
199
history URL demonstrated in the previous section from one machine and
then try it again from another, you will find that your history lists are
different. This is because the server created two IDs for you, one on each
machine.
There are probably not any easy solutions to these problems, except
asking users to register and storing everything in a central database.
Marshall Brain
200
Appendix 2: MINI-DICTIONARY
Unit 1
THE HISTORY OF COMPUTERS
201
Unit 2
FIRST BASE
202
Unit 3
QUANTUM COMPUTERS
203
to spin обертатися
spin спін
drawback недолік / вада
to capture захопити / піймати
register регістр
conventional computer звичайний / традиційний
комп’ютер
polarization поляризація
Unit 4
204
specifications технічні умови, специфікації
to lead to an accident призводити до аварії
to stray out of the lane виїхати зі своєї смуги руху
to protect passengers захищати пасажирів
to tighten the seat belts затягнути паски безпеки
to press the pedal тиснути на педаль
to ensure / to anticipate забезпечувати / передбачати
to turn the steering wheel повертати руль
to grip the road better on bends мати краще зчеплення з дорожнім
покриттям на поворотах
to smooth acceleration робити прискорення більш
плавним
to question the wisdom of the брати під сумнів розважливість
radical change радикальних змін
the front wheels передні колеса
to throw the car into a skid призвести до заносу машини
to vote голосувати
fault-tolerant нечутливий до пошкодження
the steering column штурвальна колонка
to be responsible for the нести відповідальність за наслідки
consequences
to leave loopholes залишати лазівки
to raise the question піднімати питання
205
Unit 5
HACKERS
206
Unit 6
SPAM
207
Unit 7
COOKIES
cookies кукі-файли
to transfer передавати
to execute programs запустити програму
to capture збирати (дані)
to initiate створити
to snoop around розшукувати
controversial сумнівний
to retrieve повертати
to track відслідковувати
ominous загрозливий
to tweak коригувати
to appreciate оцінювати
to disable блокувати
to implement втілювати
harmless безпечний
intrusive нав'язливий
targeted націлений
208
Appendix 3: MINI-GRAMMAR
MODAL VERBS
The verbs must, can, could, may, might, will, would, shall, should and
ought (to) are modal verbs. They express meanings such as obligation,
necessity, certainty, ability, possibility, lack of necessity, offers, suggestions,
requests, logical assumptions, permission, prohibition, advice and criticism.
Modal verbs:
✓ do not take an -s, -ing or -ed suffix
e.g. She must study. (NOT: She musts study)
✓ are followed by a bare infinitive except for ought which is followed by a
to-infinitive
e.g. He may be ill. (NOT: He may to be ill.)
She ought to listen to you.
✓ go before the subject in questions and are followed by not in negations.
e.g. Can I talk to you? He couldn't speak.
✓ do not usually have tenses. They can refer to the present or the future.
e.g. You can call now. (present) You can call tomorrow, (future)
FUNCTION EXAMPLES
a) You must sign the contract.
Obligation / duty / (You are obliged to / You have to / You need to / It
necessity is necessary.)
209
FUNCTION EXAMPLES
Lack of necessity a) He doesn't need to/doesn't have to/needn't get a
taxi. I'll give him a lift.
(It isn't necessary.)
b) He didn’t need to get a taxi because I gave him a
lift.
(It wasn't necessary for him to get a taxi.)
c) He needn't have got a taxi.
(It wasn’t necessary for him to get a taxi, but he
did.)
Advice a) You ought to / should revise for your test.
(I advise you to / you had better)
b) You must revise for your test.
(I strongly advise you to.)
Suggestions a) We can / could go out for a meal later.
b) Shall we go out for a meal later?
(Let's ... / Why don’t we ...? / How about...?! What
about...?)
Ability a) Kim is five years old. She can read and write.
(present)
b) When she was three, she could count to ten. (past
repeated action)
c) Tony was able to win the race. (managed to do;
past single action)
Lack of ability a) Ann can't play the piano. (present)
b) She couldn’t swim fast when she was young.
(past repeated action)
c) She couldn't reach the top shelf, even though she
tried. (past single action)
Asking for a) Can I open the window, please? (informal)
permission to do smth. b) Could I open the window, please? (more polite)
c) May I / Might I open the window, please?
(formal)
(Do you mind if...? / Would you mind if...?)
Asking for
permission not to do Must / need I do this exercise?
smth.
Giving permission a) You can leave your luggage here.
(you are allowed to do smth; informal)
b) You may leave your luggage in this area. (you
are allowed to do smth; formal − probably written)
210
FUNCTION EXAMPLES
Refusing permission a) You can’t/mustn't park here. (you are not
allowed to do smth; informal)
b) You may not park in this area. (you are not
allowed to do smth; formal − usually written notice)
Requests a) Can / Will you help me with this exercise?
(Informal)
b) Could/Would you help me with this exercise?
(more polite)
c) May I have one of those leaflets? (formal)
d) Might I have one of those leaflets? (very formal)
Prohibition You mustn’t / can’t / are not / may not lie in court.
(It's forbidden/you aren't allowed to/it's against the
rules)
Asking for suggestions
When / How shall I contact you?
or instructions
Possibility a) She could / may / might finish her work by six
o'clock. (it is possible/it is likely/perhaps)
b) She could / might have been late. (... Luckily,
she wasn't late.)
Offers Shall I Can / Could I help you translate this
article? (Would you like me to help you cross the
road?)
Logical assumptions a) She must be on holiday. (positive; I'm sure she
is.)
b) She can’t be working. (negative; I'm sure she
isn’t)
c) He must have been on holiday. (positive)
d) He can’t have been at home. (negative)
Criticism He ought to / should have told her the truth.
(It would have been better if he had told her the
truth.)
Order You will / must / are to speak to her.
Reproach You might have brought her a few flowers. It was
her birthday.
Expected Action in the
Present-Future; in the The lecture is / was to begin at 7o'clock.
Past
211
CONDITIONALS
Conditional clauses consist of two parts: the if - clause (hypothesis) and
the main clause (result). The order of these two clauses does not matter,
sometimes the if-clause is at the beginning, sometimes at the end of the
sentence. When the if-clause comes before the main clause, the two clauses
are separated with a comma. When the main clause comes before the if-
clause, then no comma is necessary.
ZERO CONDITIONALS
(something that is certain or real: general facts, universal truths, or
personal results in a given situation)
General Fact:
e.g. If you press the button, the machine switches on.
Universal Truth:
e.g. If you cut a man, he bleeds.
Personal Truth:
e.g. If I eat chocolate, I break out.
We can use when (=whenever) instead of if. We use if to show that
something might happen. We use when to show that something will definitely
happen.
FIRST TYPE CONDITIONALS
(real / very probable situation in the present or future)
212
e.g. If you want to understand time, you might need to grab some
measurements from the future, watch a big bang explode at the edge of
the universe, or delve into the anomalies presented by the most unruly of
the subatomic particles.
SECOND TYPE CONDITIONALS
(unreal / imaginary situations in the present)
e.g. It would be much easier to compute satellite orbits if the Earth were
perfectly spherical and had no atmosphere.
e.g. If you were more serious about your work, you could find a new job.
In formal language situations, the verb "be" is conjugated as "were"
rather than "was" in the if-clause when the subject is I, you, she / she / it. For
informal speech, "was" is an acceptable alternative.
e.g. If I were going to buy a car, I would get insurance.
THIRD TYPE CONDITIONALS (PAST)
213
We do not normally use will, would in an if-clause. However, we can
use will or would after if to make a polite request or express insistence or
uncertainty (usually with expressions such as I don't know, I doubt, I wonder,
etc.) In this case, if means whether.
e.g. If you will wait a minute, Mr Carrington will be able to see you. (Will you
please wait ... − polite request)
e.g. If you will go on making so much noise, I'll send you out. (If you insist on
making ... − insistence)
e.g. I wonder if he’ll call me tomorrow. (I wonder whether ... − uncertainty)
We can omit if and use inversion in Type 1, 2 and 3Conditionals. This
structure is more common in formal English.
e.g. Should he fail to be re-elected, it would be a great disappointment for
him.
e.g. Were he more careful, he would make fewer mistakes.
e.g. Had she been asked, she would have given her permission.
FIRST CONDITIONAL ALTERNATE FORMS
Going to
"Going to" is often used to replace "will" in the first conditional. This is
often done to emphasize a certain result.
e.g. If you apply to that school with your excellent marks, you're going to be
accepted!
"Going to" is also used to mean "intend to" after "if":
e.g. If you're going to skip school, you certainly won't pass your exams.
Unless
"Unless" means "if ... not". For example, in the sentence "The reactor
will explode unless the pressure is released" "...unless the pressure is
released" could also be written "…if the pressure is not released."
Present Perfect
With the first conditional, the present perfect is used to focus on the
completion of an action.
e.g. We'll meet for lunch if you've finished your work.
Should
"Should" implies that something is possible, but improbable:
e.g. If he should arrive, we'll invite him along to dinner.
214
This is stronger than in the second conditional in which an unreal or
imaginary situation is presented. Compare:
e.g. If he studied, he'd pass the exam.
In this example, I am sure that the student will NOT pass the exam, the
second conditional expresses an IMAGINARY situation.
e.g. If he should study, he'll pass the exam.
In this case, I think that the student will probably not study, but if he
does, he'll pass the exam.
If and Adjectives
With the verb "to be" plus an adjective, the subject and verb of the "if"
clause can be omitted. The result clause follows in the imperative form.
e.g. If interested, apply for the position.
Provided (that), As long as
"Provided (that)"and "as long as" are used instead of "if" to show
specific conditions that must be met in order for something to happen.
e.g. Provided he finishes his studies, he'll find an excellent job.
Second Conditional Alternate Forms
Were to
If followed by subject + "were to" emphasizes the hypothetical
character of the statement.
e.g. If I were to buy a new car, what would you say?
If it were not for
"If it were not for" emphasizes that one event depends on another for
completion. This form is often used to show the negative results without a
certain person or thing.
e.g. If it weren't for his dedication, this company wouldn't exist!
Supposing
"Supposing" is used in place of "if" to emphasize the imaginary. It is
more commonly used in everyday speech.
e.g. Supposing he came to visit you, what would you do?
215
Third Conditional Alternate Forms
But for
"But for" replaces "if not" and is followed by a noun. It is usually used
in formal speech.
e.g. But for our savings, we wouldn't have been able to make the payments.
If it hadn't been for
"If it hadn't been for" emphasizes that one event depended on another
for completion. This form is often used to show what the negative results
would have been without a certain person or thing.
e.g. If it hadn't been for Jack, we would have failed.
WOULD RATHER / UNREAL PAST
Would rather / sooner (=would prefer to)
This construction is used to introduce an alternative action the speaker
wishes somebody else would do. It is a polite form of wish + would.
e.g. Clare has asked to borrow my car but I want her to borrow Michael's
car.
e.g. I'd rather you borrowed Michael's car.
When the subject of would rather is also the subject of the following verb, we
use the following constructions:
a) would rather + present bare Infinitive (present / future)
e.g. I'd rather do my shopping tomorrow.
b) would rather + perfect bare infinitive (past)
e.g. I'd rather not have gone to the dinner party last night.
c) would rather + bare infinitive + than (+ bare Infinitive)
e.g. I'd rather watch a comedy than (watch) a thriller.
When the subject of would rather is different from the subject of the
following verb, we use the following constructions:
a) would rather + past tense (present/future)
e.g. I'd rather Kate stayed with us tonight.
b) would rather + past perfect (past)
e.g. I'd rather Sam hadn't taken his father's car yesterday.
216
It's (about / high) time
The past simple is used with the structure it's (about/high) time
e.g. It's (about/high) time you went to bed.
As if / as though + unreal past
This construction is used to make a hypothetical comparison which you know
is impossible.
(Your friend is describing a car he doesn't own.)
e.g. You talk as if you owned it yourself.
When we are making a hypothetical comparison which may or may not
be possible, we use the present or present perfect form.
(A colleague is describing a city. You don't know whether he has ever visited
it.)
e.g. You talk as though you've lived there yourself.
(A stranger is describing a sports club. You don't know whether she is a
member)
e.g. You sound as if you 're a member.
MIXED CONDITIONALS
We can form mixed conditionals, if the context permits it, by combining
an if- clause from one type with a main clause from another − 1 and 2 or 2
and 3.
For example, a result clause can use the conditional to express a present
hypothetical result based on a past action.
e.g. If she hadn't helped me, I wouldn't work here now.
217
WISHES
We use the verb wish and the expression if only to express a wish. If
only is more emphatic than I wish.
Wish + would
This construction expresses a desire for something to change when the
situation is outside the control of the speaker. It is often used to express
annoyance.
e.g. I wish those students would stop talking.
Wish + simple past / past continuous
This construction expresses dissatisfaction or personal regret about a
present situation.
e.g. (You are unhappy about being short.) – I wish I was taller.
e.g. (You are annoyed because it is snowing.) − I wish it was not snowing.
Were is often used after wish in formal English.
Wish + past perfect
This construction is used to express regret for an action in the past.
(You failed an exam because you didn't work hard enough.)
e.g. I wish Ed worked harder for that exam.
After the subject pronouns I and we, we use could instead of would.
e.g. I wish I could travel abroad. (NOT: I wish I would travel….)
218
REPORTED SPEECH
Say or Tell?
Say and tell have similar meanings. They both mean to communicate verbally
with someone. But we often use them differently.
The simple way to think of say and tell is:
You say something.
You tell someone something.
SAY TELL
Mary said that she had made a Mary told Jane that she had made a
report. report.
Andrew says you study physics. Andrew tells me you study physics.
Sam told James that he lived in a
Sam said: "I live in a hostel."
hostel.
Say "to someone"
With say, we sometimes use "to someone":
e.g. He said to me that he was tired.
Direct Speech
We can use say with direct speech. We use tell only with direct speech
that is an instruction or information:
e.g. Amanda said, "Hello John. How are you?"
"That's great'" she said.
He told her: "Open the door quietly."
She told me, "I have never been to England."
We can use say with direct questions, but we cannot use tell:
e.g. She said: "Do you speak Russian?"
The policeman said to the prisoner, "Where were you at 8pm?"
Reported Speech
We can use say and tell to talk about reported information:
e.g. She said that it was raining.
She told me that she would call at 2pm.
We cannot use say or tell to talk about reported questions. We must use
ask (or a similar verb):
e.g. She asked if I had ever been there.
They asked what I wanted to eat.
She asked where he lived.
He asked if she wanted to go home.
219
Orders, advice
We use tell + object + infinitive for orders or advice:
e.g. She told him to sit down.
They told me not to wait.
Tell Neil to have a holiday and forget her.
Phrases
Here are a few fixed phrases with tell. We cannot use say with these
phrases:
• tell (someone) a story,
• tell (someone) a lie,
• tell (someone) the truth
• tell the future (= to know what the future will bring)
• tell the time (= know how to read a clock)
say someone to do
Tara said Jo to go away. Tara told Jo to go away.
something
say someone Panita said me that she Panita told me that she
something was hungry. was hungry.
say a lie Siriluck always says lies. Siriluck always tells lies.
220
These are NOT
We cannot ... These are possible ...
possible ...
born in 1985."
221
DIRECT SPEECH INDIRECT SPEECH
She Present Perfect Continuous Past Perfect Continuous
said:
I have been carrying out this She said she had been carrying out
experiment for 5 hours. the experiment for 5 hours.
She Can/May Could, Might
said:
I can install this program. She said she could install the
program.
She Should / Would / Could / Should / Would / Could / Might
said: Might
You should be careful. She said that he should be careful.
She Must Must, Had to
said:
We must obey the rules. She said that we must obey the
rules.
222
REPORTING CONDITIONALS
In Type 1 conditionals tenses change in reported speech as follows: the
Present Simple becomes Past Simple in the if-clause and will becomes would
in the main clause.
e.g. "If you ask Liz", shall help you / he said.
He said (that) if I asked Liz, she would help me.
In Type 2 and Type 3 conditionals tenses do not change.
e.g. "If I had more time, I would take up a hobby," Eric said to me. − Eric
told me (that) if he had more time, he would take up a hobby,
e.g. "If I hadn't parked my car on a double yellow line, I wouldn't have got a
ticket," Sam said. Sam said (that) if he hadn't parked his car on a double
yellow line, he wouldn't have got a ticket.
The verb tenses can either change or remain the same in reported
speech:
a) in up-to-date reporting;
b) when reporting a general truth or law of nature.
e.g. The teacher said, "Paris is the capital of France." The teacher said (that)
Paris is / was the capital of France.
REPORTING QUESTIONS
Reported questions are usually introduced with the verbs ask, Inquire,
wonder or the expression want to know. The verb is in the affirmative. The
question mark and words/expressions such as please, well oh, etc. are omitted.
The verb tenses, pronouns and time expressions change as in statements.
e.g. "What did you make for dinner yesterday?" Bob asked me. − Bob asked
me what I had made for dinner the day before.
When the direct speech begins with a question word (who, where, how
old, how long, when, why, what, etc.), the reported question is introduced with
the same question word. When the direct question begins with an auxiliary (is,
do, have) or a modal verb (can, may, etc.), then the reported question begins
with If or whether.
e.g. "Why do you want to leave your job?" Pam asked me. Pam asked me why
I wanted to leave my job. "Do you like rock music?" he asked us. He
asked us if / whether we liked rock music. "Can you ride a motorcycle?"
Ben asked David. Ben asked David if / whether he could ride a
motorcycle.
223
REPORTING COMMANDS, INSTRUCTIONS, REQUESTS,
SUGGESTIONS
To report commands, instructions, requests or suggestions in reported
speech, we use an appropriate introductory verb (ask, order, beg, suggest, tell,
etc.) and the to-infinitive, -ing form or that-clause depending on the
introductory verb.
e.g. "Stop the car!" the policeman said to him. − The policeman ordered him
to stop the car.
e.g. "Put all the ingredients in a bowl," she said to me. She told me to put all
the ingredients in a bowl.
e.g. "Will you please hold this bag for me?" Laura said to Helen. − Laura
asked Helen to hold the bag for her.
e.g. "How about going to the cinema?" I said to them. − I suggested going to
the cinema.
224
Appendix 4: IRREGULAR VERBS
IRREGULAR VERBS
225
IRREGULAR VERBS
226
IRREGULAR VERBS
227
IRREGULAR VERBS
переробляти, редагувати
rid rid rid позбавляти від чогoсь,
звільнятися від чогось
ride rode ridden їхати верхи
ring rang rung дзвонити, телефонувати
rise rose risen сходити, підводитися,
збільшуватися
run ran run бігти
saw sawed sawn, sawed пиляти, розпилювати
say said said говорити, сказати
see saw seen бачити, розумiти
seek sought sought шукати, прагнути
sell sold sold продавати
send sent sent посилати, передавати
set set set ставити, розташовувати
sew sewed sеwn, sewed шити
shake shook shaken трясти, тремтiти
shine shone shone свiтити(ся), освiтлювати
shoot shot shot стрiляти
show showed shown показувати
shrink shrапk shrunk скорочувати (ся),
зменшувати (ся)
shut shut shut зачиняти (ся)
sing sаng sung спiвати
sink sank sunk, sunken тонути
sit sat sat сидіти
sleep slept slept спати
smell smelt, smelled smelt, smelled нюхати
speak spoke spoken говорити,сказати
speed sped, speeded sped, speeded збiльшувати швидкiсть,
розганятися
spell spelt, spelled spelt, spelled писати (вимовляти) по
буквам
spend spent spent витрачати, проводити (час)
spill spilt, spilled spilt, spilled розливати
spin spun, span spun крутити (ся)
split split split розколювати (ся)
spoil spoilt spoilt псувати (ся)
228
IRREGULAR VERBS
229
Appendix 5: PHRASAL VERBS
add up to to have a particular result призводити до,
підсумовувати
break away to leave something тікати, віддалятися
break down to become very upset не витримати,
втратити
самовладання
break into to enter by force проникати незаконним
способом
break off to break a piece from відламувати
something
break through to pass through a barrier прорватися, пробитися
bring about to cause something to спричиняти
happen
carry on to continue продовжувати
carry out to do; to perform виконувати
carry over to move a total to the next переносити на іншу
row of figures for adding to сторінку; робити
other numbers перенос суми
carry through to complete or finish доводити до кінця
something successfully
come about to happen; to occur траплятися
come up to manifest itself; to arise виникати
draw up to compose or write in a set складати, створювати
form; to write out
dream up to invent by ingenuity and вигадувати
imagination
drive up to force prices etc to rise призводити до
quickly підвищення, росту
go about to go from place to place ходити
hold back to control (tears, laughter) стримувати
hold in to restrain; keep under приборкувати
control (feelings)
hold on to wait (on the phone) чекати
hold out to last витримувати
230
doing sth; to carry on труднощі;
продовжувати
keep out of to stay away from (trouble) уникати
keep up to maintain sth at the same підтримувати щось на
level, to keep somebody тому ж рівні
out of bed, to keep sth in
good condition
keep up with to proceed at an equal pace не відставати від; йти
with, to continue to be в ногу з
informed (news, events)
lay out to arrange планувати, розкладати
make up to constitute, form складати
point out to make or write a зазначати, вказувати
comment on
run out to use all of something and закінчуватися,
not have any of it left вичерпатися
see about to consider, or to get дізнаватись
information about
something
set about to start doing something починати
turn into to become something перетворювати(ся)
different
turn off to stop the operation, вимикати, відключати
activity
turn out to be found to be, as after виявити(ся), з’ясувати
experience or trial; to result
turn to to direct one's interest or звертатися до
attention towards
something
231
Appendix 6: WRITING HELP
ABSTRACT
A text / an article abstract is a brief summary of the text / article. It
provides the key information of the text / article in a short form; gives the
reader the idea about the topic of the text / article.
An abstract is characterized by 1) logicality and sequence of information;
2) neutrality of the author; 3) factual information of the text / article
including:
– What the author did;
– How the author did it;
– What the author found;
– What the author concluded.
ABSTRACT REQUIREMENTS
1. It must contain one paragraph (3−4 sentences).
2. It must give both general information and specific information about the
text / article.
3. It is characterized by the use of present tenses (for general information),
past tense (for results), third person, passive, and the non-use of negatives.
It is necessary to avoid subordinate clauses, abbreviation, jargon, symbols,
repetition, meaningless expressions, superlatives, illustrations, descriptive
details, examples.
4. It must be self-contained and unambiguous.
5. The information of an abstract has to be conveyed in a neutral, logical,
coherent, precise and condense way.
USEFUL PHRASES
1. It is analysed … Аналізують ...
2. It is considered Розглядають
3. The author recommends … Автор рекомендує ...
4. It is described … Описують ...
5. It is suggested … Пропонують ...
6. The author pays attention to ... Автор звертає увагу на ...
7. It is represented / presented ... Представляють ...
8. The text / article is devoted to Текст / стаття присвячується ...
…
9. It is shown ... Показують ...
10. It is underlined ... Підкреслюють ...
11. It is revealed ... Показують ...
232
12. It is given the Даються рекомендації ...
recommendations ...
13. This text / article examines / Текст / стаття розглядає /
focuses on ... зосереджується на ...
14. This text / article Текст / стаття зосереджує ...
concentrates on ..
15. It is designed ... Розробляють ...
16. It is created ... Створюють ...
17. It is reported ... Повідомляють ...
18. It is characterized ... Характеризують ...
19. The results show ... Результати показують ...
20. It is observed ... Спостерігають ...
21. This text / article Текст / стаття демонструє ...
demonstrates ...
22. It is explained ... Пояснюють ...
23. It is investigated ... Досліджують ...
24. It is used ... Використовують ...
25. It is studied ... Вивчають ...
26. It is applied ... Застосовують ...
Example:
ABSTRACT
THE RISE OF THE ENVIRONMENTAL JUSTICE PARADIGM
This article uses social movement theory to analyse environmental
justice rhetoric. It argues that the environmental justice frame is a master
frame that uses discourses about injustice as an effective mobilizing tool. The
article identifies an environmental justice paradigm and compares it with the
new environmental paradigm. In addition, the article discusses why the
environmental justice movement grew so fast and why its adherents find the
environmental justice frame so appealing.
SUMMARY
Summary is a shortened version of the text / article that highlights its
key points.
Follow these steps to write summary:
✓ Read the text.
✓ Make notes of the main points of the text.
233
✓ Start your piece of writing with one sentence that summarizes the idea
of the whole text.
✓ Write your summary, including all the main points. Use your own
words.
✓ Check if your summary is clear, complete and that it makes sense.
Example:
Air, water, and land pollution is a result of increasing population and
industry. Air pollution, such as acid rain and photochemical smog, can
destroy forests and crops, kill animals and cause illness in humans. Water
pollution from toxic chemicals, herbicides, pesticides, and waste can cause
human tragedy and upset the food chain. Land pollution can cause toxic
waste, fires, and explosions. This can affect both humans and their
environment.
COMMENTS
To write comments means writing explanatory or critical notes upon a
text.
When you write comments, try to keep these things in mind:
✓ write only relevant information;
✓ express your ideas logically;
✓ use the correct spelling, punctuation, grammar;
✓ read over your comment to check if it makes sense;
✓ edit your comment if it is necessary.
ARTICLE VS. ESSAY
Article and essay are two words that are often confused due to the
similarity in their meanings. Strictly speaking, there are differences between
these two words. An article is short and a descriptive account of something
connected with a given niche. On the other hand, an essay is long.
An article is written to throw light on a given aspect of a niche. On the
other hand, an essay is written or prepared for examination point of view.
Essays are asked to be written as part of college assignment. On the other
hand, articles are asked to be written as part of content writing.
Another important difference between articles and essays is that essays
contain quotations from various authors and experts. On the other hand,
articles do not usually contain quotations from experts and authors.
Essays are written on historical events and historical characters,
scientific experiments, great lives etc. On the other hand, articles are generally
written on different niches, such as technology, book reviews, product
reviews etc.
234
It is thus understood, that niche plays an important role while writing
an article. On the other hand, events play a great role while writing an essay.
Article writing is taken up as a profession. Essay writing is used more for
academic purposes.
ESSAY
An essay is a short literary composition on a particular theme or
subject, usually in prose and generally analytic, speculative, or interpretative.
It must have at least three paragraphs, but a five-paragraph essay is a common
length for academic writing.
The structure of an essay includes:
✓ an introduction (state the problem and its consequence(s);
✓ a main body (suggestions);
✓ a conclusion (summarise your opinion).
ARTICLE
✓ is a piece of writing usually intended for publication in a newspaper,
magazine or journal;
✓ is written for a wide audience, so it is essential to attract and retain the
readers’ attention;
✓ may include amusing stories, reported speech and descriptions;
✓ can be formal or informal, depending on the target audience;
✓ should be written in an interesting or entertaining manner;
✓ should give opinions and thoughts, as well as facts;
✓ is in a less formal style than a report.
236
Appendix 7: PROBLEM-SOLVING
Unit 1
COMPUTER HISTORY QUIZ
1. Steve Jobs and Steve Wozniak built their first computer using a
wooden box. Their company has grown and is still around today. The
name of the company is _________ .
A. Microsoft
B. Linux
C. Apple
D. Windows
2. This invention replaced vacuum tubes and made computers much
smaller and faster. However, it was eventually replaced by another
invention − _________ .
A. RAM
B. ENIAC
C. transformer
D. transistor
3. Who invented the Internet?
A. Steve Jobs
B. More than one person
C. Al Gore
D. William Shockley Correct
4. In 1954 scientists were able to predict exactly what computers would
look like today.
A. True
B. False
5. This man is known for starting the company Microsoft back in the year
1975. Since then, he has become one of the richest people in the world.
His name is _________ .
A. Steve Jobs
B. Bill Gates
C. Konrad Zuse
D. Charles Babbage
6. This invention was 1,000 times faster than any machine built before it.
It was so big that it could fill up a house.
A. Apple I
B. ENIAC
C. Windows
D. Z3
237
7. This person created a machine called The Analytical Engine. His ideas
were some of the first that led to the creation of computers.
A. Simon Konrad
B. Charles Babbage
C. John Lovelace
D. William Howard
8. This invention helped make computers much smaller and faster. What
is it called?
A. Vacuum Tube
B. Random Access Memory
C. Central Processing Unit
D. Integrated Circuit
9. This person is often called the inventor of the modern computer. He
actually created the first fully electronic computer.
A. Konrad Zuse
B. Byron Lovelace
C. William Gates
D. Steve Jobs
10. This person created what is now known as the first computer program.
The program was made to help the Analytical Engine calculate
numbers.
A. Charles Babbage
B. Konrad Apple
C. Ada Lovelace
D. William Zuse
Unit 2
Unit 3
THE QUANTUM PHYSICS QUIZ
1. What was Max Planck studying when he stumbled across the principles
of quantum mechanics?
A. The ultraviolet catastrophe
B. Relativity
C. Particle turbulence
D. Hypercalculus
2. Quantum mechanics says photons and electrons are ____________ .
A. waves
B. particles
C. waves and particles
D. indivisible
3. Who disliked quantum theory and said God does not play dice with the
universe?
A. Marie Curie
B. Albert Einstein
C. J. Robert Oppenheimer
D. Carl Jung
4. What does the Uncertainty Principle say?
A. The act of measuring one aspect of a particle blurs other aspects.
B. Space and time are linked.
C. Matrix and wave mechanics are the same.
D. No one can know the meaning of the universe.
5. Spintronics exploits the spin state of electrons to carry and store
information.
A. Fact
B. Fiction
6. Could spin technology lead to more energy-efficient devices?
A. Yes
B. No
7. The equivalent of bits are called this in quantum computing.
A. Qubits
239
B. Quarks
C. Bytes
D. Nuons
8. This technology protects information by using the principle that you
cannot observe a particle without changing it.
A. string theory
B. quantum cryptography
C. flux capacitation
D. Heisenbergian code
9. ___________ theory accounts for dark matter.
A. Supersymmetry
B. Relativity
C. Obsidian radiation
D. Wavicle infarction
10. Experiments with ultra-cold atom gases may someday lead to a better
understanding of this bane of travelers.
A. Disorientation
B. Seasickness
C. Homesickness
D. Turbulence
11. This links two quantum particles in a way that makes them two parts of
the same entity.
A. Twinning
B. Mirroring
C. Cloning
D. Entanglement
12. This was one of the first inventions to come out of the study of
quantum mechanics.
A. Transistors
B. Computers
C. X-ray machines
13. Physicians can now use these particles to detect cancer cells.
A. Quantum detectors
B. Quantum dots
C. Nanometers
240
14. Is Schrodinger's cat alive or dead at the end of the hypothetical
experiment?
A. alive
B. dead
C. zombie
D. Who knows?
Unit 4
CARS AND DRIVING
Clues Across
2 to increase speed
6 an intersection with circular movement of traffic
8 a fuel for vehicles
10 to operate a vehicle
11 to go past another vehicle travelling in the same direction
13 rapidity
14 a light with a reflector and lens mounted on the front of an automobile,
or other vehicle
241
Clues Down
1 money paid as a penalty for offences
3 a transmission device in vehicles
4 a long line of traffic stretching back from an obstruction
5 a place where two or more roads meet
7 to slow down
9 a post supporting a sign that has information or directions.
12 any of the parallel strips into which the carriageway of a major road or
motorway is divided
Unit 5
HACKERS QUIZ
242
7. Adrian Lamo gained news attention for his connection with which
controversial Web site?
A. WikiLeaks
B. Pirate Bay
C. Napster
8. Which hacker preferred to call himself a "social engineer" instead of a
"hacker"?
A. Kevin Poulsen
B. Gary McKinnon
C. Kevin Mitnick
9. John Draper's nickname is ___________ .
A. Captain Crunch
B. Lucky Charms
C. Count Hackula
Unit 6
243
6. How many email accounts should you have?
A. 1
B. 2
C. 3
7. Some spammers make money every time you click a link in their email.
A. True
B. False
8. Anti-spam filters block spam messages based on _________ .
A. the sender’s reputation
B. the message content
C. the time of day the message was sent
Unit 7
INTERNET COOKIE QUIZ
244
7. The small, 1x1 pixel cookies implanted in banner ads are called ________ .
A. Web scum
B. Web bugs
C. devil cookies
8. Cookies are written in what kind of text?
A. Name-value pairs
B. ASCII
C. DOS
245
Appendix 8: SCRIPTS
Unit 1
THE HISTORY OF PORTABLE COMPUTERS
As it turned out the idea of a laptop-like portable computer, existed
even before it was possible to create one. Portable or, as they are called
mobile computers, by their nature, are generally microcomputers. Portable
computers, because of their size, are also commonly known as 'Lunchbox' or
'Luggable' computers. They can also be called a 'Portable Workstation' or
'Portable PC'. Of course, much of the evolution of portable computers was
enabled by the evolution of microprocessors, LCD displays, battery
technology and so on. This evolution ultimately allowed computers to become
even smaller, more portable and smarter than laptops, such as sub-notebooks,
PDAs (personal digital assistants), tablets, pocket computers, smartphones,
wearable computers with handsfree interface, speech recognition and speech
synthesis.
The IBM 5100 Portable Computer, introduced in September 1975 was
perhaps the first portable computer.
In 1976 Alan Kay developed Portable PC at Xerox PARC and called it
the Dynabook and intended it for children. This first portable computer named
Notetaker was not so popular. Only 10 ones were produced.
The first laptop that was commercialized was Osborne 1 in 1981, with a
small 5″ monitor and a keyboard that sits inside of the lid when closed. Later
portable computers included Bondwell 2 released in 1985, which was among
the first with a LCD display. The first portable computers which resemble
modern laptops in features were Apple’s Powerbooks, which first introduced
a built-in trackball, and later a trackpad and optional color LCD screens.
IBM’s ThinkPad was largely inspired by Powerbook’s design, and the
evolution of the two led to laptops and notebook computers as we know them.
Portable computers have been increasing in popularity over the past
decade, as they do not restrict the user in terms of mobility as desktop
computers would. Wireless Internet, extended battery life and more
comfortable ergonomics have been factors driving this increase in
popularity.All-in-One PCs such as the iMac can also be considered portable
computers and often have handles built-in to the case.
246
Unit 2
247
Unit 3
Unit 5
249
and vulnerabilities of IT systems so that necessary measures may be taken to
properly secure them.
Ethical hackers must explore different hacking methods to check if a
company’s IT system can be penetrated using different methods. Basically,
their job is to mimic the actions of a hacker and exhaust all possible hacking
options to prevent illegal hacking. A career in ethical hacking can be very
rewarding and profitable, as hackers are usually paid a lot of money.
However, before you can become an ethical hacker, you must have the
necessary experience, knowledge and skills in networking and programming.
You also need to have a good grasp of all available operating systems so that
you can properly anticipate different hacking methods. Before you decide to
become an ethical hacker you need to know the different types of hackers.
This way, you will be able to make an informed decision on what type of
ethical hacker you want to be.
From Simplilearn
Unit 6
Unit 7
COOKIE LAW
On 26th May 2011, new laws came into force in the UK that affect
most web sites. If cookies are used in a site, the Privacy and Electronic
Communications Regulations 2011 provide that certain information must be
given to that site's visitors and the user must give his or her consent to the
placing of the cookies.
The UK Regulations mean that a website operator must not store
information or gain access to information stored in the computer (or other
web-enabled device) of a user unless the user "is provided with clear
251
and comprehensive information about the purposes of the storage of, or access
to, that information" and "has given his or her consent". The consent
requirement in the UK Regulations replaces the previous position which
provided that visitors should be given the option to refuse cookies.
The only cookies that do not need users' consent are those that are
necessary to fulfill the user's request. That will cover, for example, the use of
cookies to remember the contents of a user's shopping cart as the user moves
through several pages on a website. Other cookies, including those used to
count visitors to a site and those used to serve advertising, will require
consent.
The consent requirement has been the subject of much discussion since
the publication of the amended E-Privacy Directive. Various authorities have
voiced conflicting opinions on how the consent requirement will operate in
practice. The authorities, (Working Party, the UK Government, and the
Information Commissioner's Office (ICO)) have differing views on whether
consent should be obtained prior to the placing of cookies. It is difficult to see
how anything other than prior consent will comply with the wording of the
UK Regulations.
The Working Party did not go as far as to say that every website needs
to ask every visitor to accept every cookie, though. Many cookies are used by
advertising networks across multiple sites. For these cookies, consent can be
given once to a network and cover all the sites that network serves, according
to the Working Party.
Shortly before the publication of the Regulations the Information
Commissioner published guidance that offers advice on when and how the
consent may be given.
Although the guidance suggests a number of methods to obtain consent
it stops short of providing definitive guidance on how to achieve compliance,
leaving it to businesses and organisations to review their use of cookies and
consider how they might be able to obtain the necessary consent.
Both the ICO and the UK Government have not ruled out the use of
browser settings to achieve compliance in the future. The Government has set
up a working group comprising Mozilla, Apple, Microsoft, Google, Yahoo,
the Internet Advertising Bureau and Adobe to work on a technical solution. In
the meantime the ICO advises businesses to obtain consent some other way.
From About Cookies
252
REFERENCES
253
14. Соколенко А.П. Грамматика английского языка в таблицах : учеб.
пособие / А.П. Соколенко, В.В. Дудкина, А.С. Татаринова. − К. :
Укртиппроект : АСМ, 1992.
15. 44 слова, которые ненавидят СПАМ-ФИЛЬТРЫ. –
[Электронный ресурс] − Режим доступа: http://www.unisender.com/r
u/blog/2011/08/44_words_for_spam_filters/
16. Тест по английскому языку "Sequence of Tenses". –
[Электронный ресурс] − Режим доступа: http://www.native-
english.ru/exercises/sequence
17. Хакери − хто вони? − [Електронний ресурс] − Режим доступу:
http://ua.textreferat.com/referat-7961-1.html
18. A breakthrough in quantum computing. Cartoon. – [Electron resource] −
Available from: http://ars.userfriendly.org/cartoons/?id=20110327
19. Addressing Email Loss with SureMail: Measurement, Design, and
Evaluation. – [Electron resource] − Available from:
http://static.usenix.org/event/usenix07/tech/full_papers/agarwal/agarwal
_html/
20. Additional Exercise. Tense Sequence – [Electron resource] − Available
from:
http://wps.pearsonlongman.com/long_aaron_lbch_8/211/54121/1385517
1.cw/index.html
21. A Few Words about Spam. Photo. – [Electron resource] − Available
from: http://www.mdavid.com.au/spam.html
22. Aron J. Manipulators of quantum world win physics Nobel. / Jacob Aron
/ 09 October 2012. – [Electron resource] − Available from:
http://www.newscientist.com/article/dn22360-manipulators-of-quantum-
world-win-physics-nobel.html
23. A Trillion Computers in One Drop. − [Electron resource] − Available
from: http://wis-wander.weizmann.ac.il/the-ultimate-nano-
computer#.UQv8H6XszPx
24. Biological Computers. − [Electron resource] − Available from:
http://www.tech-faq.com/biological-computers.html
25. Biological 'Computer' Destroys Cancer Cells: Diagnostic Network
Incorporated Into Human Cells. − [Electron resource] − Available from:
http://www.sciencedaily.com/releases/2011/09/110901142056.htm
26. Bone S. The Hitchhiker's Guide To Quantum Computing. / Simon Bone.
– [Electron resource] − Available from:
http://www.doc.ic.ac.uk/~nd/surprise_97/journal/vol1/spb3/
27. Bonsor K. How DNA computers will work. / Kevin Bonsor. −
[Electron resource] − Available from:
http://computer.howstuffworks.com/dna-computer1.htm
254
28. Bonsor K. How Quantum Computers Work. / Kevin Bonsor, Jonathan
Strickland. – [Electron resource] − Available from:
http://www.howstuffworks.com/quantum-computer.htm
29. Break the speed limit. Cartoon. Matt Pritchett. – [Electron resource] −
Available from: http://www.chrisbeetles.com/gallery/cartoon/break-
speed-limit-i-want-photo-us-using-toll-road.html
30. Business English/ESL / Topic: English for Computer Programmers –
[Electron resource] − Available from:
http://www.businessenglishsite.com/exercise_itprog1.html
31. Canada a Haven for Spam. Cartoon. – [Electron resource] − Available
from: http://technology.lilithezine.com/Canadian-Spam.html
32. Car Facts. 10 Interesting Facts About Cars. – [Electron resource] −
Available from: http://www.ianallanford.co.uk/guide.asp?buyersid=26
33. Cars and driving crossword - an advanced level English resource. On the
road crossword. – [Electron resource] − Available from:
http://linguapress.com/puzzles/xwd-s215-ontheroad.htm
34. Cartlidge E. Quantum computers turn mechanical. / Edwin Cartlidge / 15
February 2013. – [Electron resource] − Available from:
http://physicsworld.com/cws/article/news/2013/feb/15/quantum-
computers-turn-mechanical
35. Cho A. New Form of Quantum Computation Promises Showdown With
Ordinary Computers. / Adrian Cho / 21 December 2012. – [Electron
resource] − Available from:
http://news.sciencemag.org/sciencenow/2012/12/new-form-of-quantum-
computation-.html
36. Clarke, P. Adaptive cruise control takes to the highway. / Peter Clarke. /
1998. – [Electron resource] − Available from:
http://eetimes.com/electronics-news/4036396/Adaptive-cruise-control-
takes-to-the-highway
37. Colorado marks first texting-while-driving ticket. 2010. – [Electron
resource] − Available from:
http://www.fox21news.com/news/story.aspx?id=405541
38. Computer air bag. Cartoon. Randy Glasbergen. – [Electron resource] −
Available from:
http://www.uprb.edu/profesor/ntorres/chistescomputarizados.htm
39. Computer may grow. Engineering and Physical Sciences Research
Council. − [Electron resource] − Available from:
http://www.epsrc.ac.uk/newsevents/news/2011/Pages/computermaygrow
.aspx
40. Computer Stupidities. Email Magic. – [Electron resource] − Available
from: http://www.rinkworks.com/stupid/cs_email.shtml
41. Conditional Forms Quiz. – [Electron resource] − Available from:
http://esl.about.com/library/quiz/bl_conditionals1.htm
255
42. Conversation Questions. Cars and Driving. – [Electron resource] −
Available from: http://iteslj.org/questions/cars.html
43. Cookson C. How bacteria may power computers. / Clive Cookson.
[Electron resource] − Available
from: http://www.ft.com/intl/cms/s/2/25a1f6d4-ff5e-11e0-aa11-
00144feabdc0.html#axzz1cjfiNUDt
44. Cookie Law. – [Electron resource] − Available from:
http://www.aboutcookies.org/default.aspx?page=3
45. Cookie Policy. – [Electron resource] − Available from:
http://www.saabcars.com/en/footer/information/cookies/
46. Crossword puzzle. Driving & Traffic. – [Electron resource] − Available
from: http://www.learn-english-today.com/wordgames/xwords-
printable/driving-traffic.htm
47. Cruise Control Basics. – [Electron resource] − Available from:
http://www.misterfixit.com/cruise1.htm
48. David Deutsch quote. – [Electron resource] − Available from:
http://www.brainyquote.com/quotes/quotes/d/daviddeuts181532.html
49. Different Types of Spam and How to Avoid Them. / Paul Mah / 22
September, 2010: − [Electron resource] − Available from:
http://www.allspammedup.com/2010/09/6-different-types-of-spam-and-
how-to-avoid-them/
50. Difrawi, A. Google Self-Driving Car Crashes. / Alec Difrawi / 2011. –
[Electron resource] − Available from:
http://www.alecdifrawi.com/business-technology/google-self-driving-
car-crashes/
51. Dynamic dispatch. − [Electron resource] − Available from:
http://en.wikipedia.org/wiki/Dynamic_dispatch
52. Distribution of spam origins. – [Electron resource] − Available from:
http://blogs.msdn.com/b/tzink/archive/2009/02/12/distribution-of-spam-
origins.aspx
53. Dooley J. Grammarway 4 / Dooley Jenny, Virginia Evans // Express
Publishing., 1999. – 278 p.
54. Dooley J. Grammarway 4 / Dooley Jenny, Virginia Evans // Express
Publishing., 1999. – 115 p.
55. Easy Diagram Software. – [Electron resource] − Available from:
http://www.englisch-hilfen.de/en/words/charts.htm
56. Email Spam. – [Electron resource] − Available from:
http://en.wikipedia.org/wiki/Email_spam
57. Emspak J. Quantum Computer to Log Onto Quantum Internet. / Jesse
Emspak / 22 February 2013. – [Electron resource] − Available from:
http://news.discovery.com/tech/gear-and-gadgets/quantum-computer-
log-onto-quantum-internet-130222.htm
256
58. Environmental Bird Poo Pundit. Cartoon. – [Electron resource] −
Available from: http://bizarrocomics.com/2011/09/24/environmental-
bird-poo-pundit/
59. ESL Tic-Tac-Toe. Conditional Forms. – [Electron resource] − Available
from: http://esl.about.com/library/lessons/bl_ttt_conditionals.htm
60. Future technology briefing. − [Electron resource] − Available from:
http://ru.scribd.com/doc/18241653/Biological-Computers
61. Graham-Rowe, D. Now who's in the driver's seat? / Duncan Graham-
Rowe / New scientist. Issue 2420. − 2003. – P. 28−31.
62. Hacking Discussion. Hundreds more free handouts. – [Electron resource]
− Available from: http://www.esldiscussions.com/h/hacking.pdf
63. Hartman D. Funny Facts About Cars. / Dennis Hartman. – [Electron
resource] − Available from: http://www.ehow.com/about_5280598_funn
y-cars.html#ixzz2RZdUZWsB
64. Heisenberg Uncertainty Principle Humor. – [Electron resource] −
Available from:
http://plaza.ufl.edu/foertter/files/28fa8b50913492e4a59848935aa585b9-
4.html
65. Henderson H. Encyclopedia of Computer Science and Technology.
Revised Edition / Harry Henderson. − Infobase Publishing, 2009. –
580 p.
66. How Internet Cookies Work. – [Electron resource] − Available from:
http://www.howstuffworks.com/cookie.htm/printable
67. How do quantum computers differ from conventional computers? –
[Electron resource] − Available from:
http://curiosity.discovery.com/question/quantum-differ-conventional-
computers
68. How is quantum entanglement useful in computing? – [Electron
resource] − Available from:
http://curiosity.discovery.com/question/quantum-entanglement-useful-
computing
69. How the Word "Spam" Came to Mean "Junk Message". / Daven Hiskey
/ 10 September 2010 − [Electron resource] − Available from:
http://www.todayifoundout.com/index.php/2010/09/how-the-word-
spam-came-to-mean-junk-message/
70. How to Become a Paid Ethical Hacker?
− [Electron resource] − Available from:
http://www.simplilearn.com/resources/it-security-management-artic
71. How to Eliminate Unsolicited Text Messages. Photo. − [Electron
resource] − Available from:
http://www.ehow.com/how_2203166_eliminate-unsolicited-text-
messages.html
257
72. How to Steal Cookies? Cartoon. − [Electron resource] − Available from:
http://hyderabadhackersinn.blogspot.com
73. Interesting and amazing facts about cars. – [Electron resource] −
Available from: http://www.techsoulz.com/2012/12/interesting-and-
amazing-facts-about.html
74. I still don’t understand quantum theory. Cartoon. – [Electron resource] −
Available from:
http://www.cartoonstock.com/directory/q/quantum_theory.asp
75. Internet Jokes. Photo. − [Electron resource] − Available from:
https://www.pinterest.com/danieldlaine/internet-jokes/
76. Junk Fax. Photo. − [Electron resource] − Available from:
http://www.choosewhat.com/starticles/wp-
content/uploads/2008/12/junk-fax-150x150.jpg
77. Keep your e-mails to yourself! Photo. − [Electron resource] − Available
from: http://www.thecontentsquad.com/internet-marketing-
blog/?Tag=spam%20emails
78. Living computers" could become reality as scientists build tiny
components out of bacteria cells. − [Electron resource] − Available
from: http://www.dailymail.co.uk/sciencetech/article-
2050500/Biological-computers-soon-reality-scientists-build-basic-
components-bacteria-DNA.html
79. Logo quiz. – [Electron resource] − Available from:
http://www.tttwe.com/tips/car-logo-quiz-android-answers-and-solution-
level-1-5.htm
80. Lower Spam Complaints on Your Email Marketing Campaigns. Photo. –
[Electron resource] − Available from:
http://www.ecommercecircle.com/lower-spam-complaints-email-
marketing-campaigns_3912630.html
81. Martin M. Smart Cars. Internet Connections, Theft by War-Texting, and
Self
Driving. / Marilyn K. Martin. − [Electron resource] − Available from:
http://webserver.computoredge.com/online.mvc?zone=na&issue=2945&
article=cover&session=
82. Massey R. The cappuccino car that runs on coffee... so will you have to
use the filter lane? / Ray Massy / 10 March 2010. – Electron resource:
http://www.dailymail.co.uk/sciencetech/article-1255867/Cappuccino-
car-runs-coffee--use-filter-lane.html
83. Master P. English grammar and technical writing. / Peter Master. –
United States Department of State Office of English Language
Programs. 2004. – 348 p.
84. Maura A. Vulnerability Case Study: Cookie Tampering. – Electron
resource: http://www.infosectoday.com/Articles/Cookie_Tampering.htm
258
85. Murphy's computers laws. – [Electron resource] − Available from:
http://www.murphys-laws.com/murphy/murphy-computer.html
86. News in 5 minutes. Road ready. – [Electron resource] − Available from:
http://blog.nownews.com/article.php?bid=20744&tid=2101112
87. Nice, K. How Cruise Control Systems Work / Karim Nice. – Electron
resource: http://www.howstuffworks.com/cruise-control4.htm
88. No Spam. Photo. − [Electron resource] − Available from:
http://bloggingreece.blogspot.com/
89. Obama’s car. Cartoon. – [Electron resource] − Available from:
http://bbs.stardestroyer.net/viewtopic.php?f=22&t=133252&start=200
90. One fifth of the world's spam has been stopped. And you may have been
helping send it. Audio. – [Electron resource] − Available from:
http://www.marketplace.org/topics/tech/one-fifth-worlds-spam-has-
been-stopped-and-you-may-have-been-helping-send-it
91. Our site uses Cookies. Photo. – [Electron resource] − Available from:
http://www.birch-utilities.co.uk
92. Pain M. The DNA Computer. / Michael Pain − [Electron resource] −
Available from: http://users.tpg.com.au/aoaug/dna_comp.html
93. Palmer J. Quantum computing: Is it possible, and should you care? /
Jason Palmer / BBC News. – [Electron resource] − Available from:
http://www.bbc.co.uk/news/science-environment-17688257
94. Phrasal Verbs D−F. − [Electron resource] − Available from:
http://www.esl-lounge.com/student/phrasal-verbs/phrasal-verbs-d-
f.php#carry
95. Physics quotes. – [Electron resource] − Available from:
http://www.famousquotesabout.com/on/Physics
96. Podcast: What are Spam, Spim, Sping, Splog and Spit? –
[Electron resource] − Available from:
http://whatis.techtarget.com/reference/Podcast-What-are-Spam-Spim-
Sping-Splog-and-Spit
97. Pyle A. M. Test of English as a Foreign Language. Preparation Guide. /
Michael A. Pyle, M.A., Mary Ellen Munoz Page, M.A. − USA : Cliffs. −
1982.
98. Quantum computing. – [Electron resource] − Available from:
http://library.thinkquest.org/07aug/01632/power.html
99. Quantum computing quotes. – [Electron resource] − Available from:
http://timesofindia.indiatimes.com/topic/Quantum-Computing/quotes/
100. Quiz: 8 Questions About Spam You Should Be Able to Answer. –
[Electron resource] − Available from:
http://www.allspammedup.com/2012/10/quiz-8-questions-about-spam-
you-should-be-able-to-answer/
101. Quotes about spam. – [Electron resource] − Available from:
http://www.goodreads.com/quotes/tag/spam
259
102. Reported Orders.Cartoon. – [Electron resource] − Available from:
http://www.englishclub.com/grammar/reported-orders.htm
103. Resultant. – [Electron resource] − Available from:
http://en.wikipedia.org/wiki/Resultant
104. Ross O. Quantum computing the ‘Holy Grail’ for University of Waterloo
scientists. / Oakland Ross / 06 January 2013. –
[Electron resource] − Available from:
http://www.thestar.com/news/insight/2013/01/06/quantum_computing_t
he_holy_grail_for_university_of_waterloo_scientists.html
105. Say or Tell? – [Electron resource] − Available from:
http://www.englishclub.com/vocabulary/cw-say-tell.htm
106. Scientists Develop Biological Computer to Encrypt and Decipher
Images. − [Electron resource] − Available from:
http://www.sciencedaily.com/releases/2012/02/120207202803.htm
107. Sci/Tech Biological computer prototype unveiled. −
[Electron resource] − Available from:
http://news.bbc.co.uk/2/hi/science/nature/370035.stm
108. Schrodinger cat. Cartoon. – [Electron resource] − Available from:
http://draguunthor.deviantart.com/art/Schrodinger-s-Cat-163302750
109. Server errors. – [Electron resource] − Available from:
https://support.google.com/webmasters/answer/2409687?hl=en
110. Session Diagram. – [Electron resource] − Available from:
http://cs.wellesley.edu/~cs304/lectures/15-Sessions/
111. Spam. – [Electron resource] − Available from:
http://www.brainyquote.com/quotes/quotes/d/davidbaker405826.html
112. Spam Filter cartoon. – [Electron resource] − Available from:
http://www.cartoonstock.com/directory/s/spam_filter_gifts.asp
113. Spam, Spit & Spim. / Vangie Beal / –
[Electron resource] − Available from:
http://blackboxnetworkslivoice.wordpress.com/2010/12/27/spam-spit-
spim/
114. Spam, Scams & Phishing Attempts Disguised as News Is Commonplace.
Photo. − [Electron resource] − Available from:
http://solutions.webtitan.com/blog/bid/84875/Spam-scams-phishing-
attempts-disguised-as-news-is-commonplace
115. Spam Using Social Networking Sites. Photo. − [Electron resource] −
Available from: http://labs.m86security.com/category/spam/page/6/
116. Sprung R. How to Write a Blog Post: A Simple Formula to Follow. /
Rachel Sprung – [Electron resource] − Available from:
http://blog.hubspot.com/marketing/how-to-write-blog-post-simple-
formula-ht
117. Stone Z. Take a Trip Down the Glowing, Electric-Car Charging
Highway of the Future. / Zak Stone. − [Electron resource] − Available
260
from: http://www.scientificamerican.com/article.cfm?id=take-a-trip-
down-the-glowing-electr-2013-01
118. Strange smart car. Photo. – [Electron resource] − Available from:
http://farm3.static.flickr.com/2136/2369048522_ed4a4ba42e.jpg
119. Student driver. Cartoon. – [Electron resource] − Available from:
http://www.cartoonstock.com/directory/s/student_driver.asp
120. Super-Positioning & Infinite Possibilities. Cartoon. –
[Electron resource] − Available from:
http://www.mysticalmindtraining.org/quantum/superpositioning.html
121. Symantec: 80% Email Di Dunia Merupakan Spam. Cartoon. –
[Electron resource] − Available from:
http://us.teknologi.news.viva.co.id/news/read/211834-peredaran-spam-
tembus-80-persen
122. Tech Talk: Internet Cookie Quiz. –
[Electron resource] − Available from:
http://computer.howstuffworks.com/internet/basics/internet-cookie-
quiz.htm
123. Tegmark M., Wheeler J.A. 100 Years of Quantum Mysteries. / Max
Tegmark and John Archibald Wheeler / Scientific American. 284(2).−
01 February 2001. – P. 68−75.
124. The far side. Gary Larson. Cartoon. − [Electron resource] − Available
from: http://claesjohnsonmathscience.wordpress.com/2011/12/15/scienti
sts-and-science-in-cartoons/
125. The free dictionary by Farlex. – [Electron resource] − Available from:
http://www.thefreedictionary.com/
126. The History of Internet Spam. / Cheryl Bowman
− [Electron resource] − Available from: http://www.life123.com/technol
ogy/internet/spam/history-of-internet-spam.shtml
127. The Internet Spam, spam, spam, spam. − [Electron resource] − Available
from: http://www.economist.com/node/104859
128. The New Green GM. Cartoon. Tree Humper. –
2009. − [Electron resource] − Available from: http://treehumper.org/ne
w-green-gm/
129. The quantum physics quiz. – [Electron resource] − Available from:
http://dsc.discovery.com/tv-shows/curiosity/topics/quantum-physics-
quiz.htm
130. The Velomobile concept. – [Electron resource] − Available from:
http://www.designbuzz.com/concept-puts-velomobile-in-an-american-
form/
131. Threat against Internet Freedom. Cartoon. − [Electron resource] − Availa
ble from: http://motella.blogspot.com/2009_02_01_archive.html
132. Tiny electric car. Cartoon. − [Electron resource] − Available from:
http://www.cartoonstock.com/directory/t/tiny.asp
261
133. Top 15 Interesting Car Facts. – [Electron resource] − Available from:
http://www.articlesbase.com/advertising-articles/top-15-interesting-car-
facts-757366.html
134. Top Spam E−Mail Sender Stays in Prison. − [Electron resource] − Avail
able from: http://www.breakingnewsenglish.com/0803/080304-
spam.html
135. 20 most interesting facts about cars. − [Electron resource] − Available
from: http://blog.carid.com/20-most-interesting-facts-about-cars
136. UNI-CUB is Honda’s New Mobility Device. –
[Electron resource] − Available from: http://www.greenpacks.org/2012/0
5/17/uni-cub-is-hondas-new-mobility-device-video/
137. University of Lincoln Students' Union Cookie Policy. –
[Electron resource] − Available from: http://lincolnsu.com/about-
us/cookie-policy
138. Web Browser Cookies: Just the Facts. –
[Electron resource] − Available from: http://websearch.about.com/od/we
bbrowsers/p/Web-Browser-Cookies-Just-The-Facts.htm
139. What are Cookies? – [Electron resource] − Available from:
http://www.whatarecookies.com/
140. What devices do scientists use to control qubits? –
[Electron resource] − Available from: http://curiosity.discovery.com/que
stion/devices-scientists-use-control-qubits
141. What is a quantum computer? – [Electron resource] − Available from:
http://curiosity.discovery.com/question/what-is-a-quantum-computer
142. What Would You Rather? 6 ESL Activities for Reviewing the
Conditional. – [Electron resource] − Available from:
http://busyteacher.org/11707-6-esl-activities-teach-conditionals-
review.html
143. Why aren't quantum computers currently practical? –
[Electron resource] − Available from: http://curiosity.discovery.com/que
stion/quantum-computers-not-practical
144. Why I Hate Spam. / Bill Gates / 23 June 2003 –
[Electron resource] − Available from: http://www.microsoft.com/presspa
ss/ofnote/06-23wsjspam.mspx
145. Why Service Level Activation, OAM and Performance Monitoring
Matter in Real-Time Cloud-Based Services. / Uday Mudoi / 23 August
2012. − [Electron resource] − Available from: http://www.computer.org/
portal/web/computingnow/networking/content?g=53319&type=article&
urlTitle=why-service-level-activation-oam-and-performance-monitoring-
matter-in-real-time-cloud-based-services
146. Wogan D. Hyundai’s egg-mobile. Is this the future of personal
mobility? / David Wogan. – [Electron resource] − Available from:
262
http://blogs.scientificamerican.com/plugged-in/2013/04/03/hyundais-
egg-mobile-is-this-the-future-of-personal-mobility/
147. Worst Spam Countries. Photo. – [Electron resource] − Available from:
http://images.businessweek.com/ss/09/02/0211_spam_countries/2.htm
148. Would you like to save cookies. – [Electron resource] − Available from:
http://www.quickmeme.com/meme/35nxcd
149. Zimmerman J. A. What Is a Quantum Computer? / Andrew Zimmerman
Jones / 13 April 2012. – [Electron resource] − Available from:
http://physics.about.com/od/quantumphysics/f/quantumcomp.htm
263
NOTES
264