You are on page 1of 5

Enter Test 2

I. Listening.
1. Listen and identify whether the sentences are true (T) or false (F).
1. Many people say we will never have an intelligent computer. T
2. We already have computers that run factories and computers which help to build other computers. T

3. We'll be able to program in human emotions, moral responsibility and the uniqueness of the
individual. F
4. Rate of change isn’t accelerating. F
5. Computer will make smarter decisions than we do. T

2. Complete the sentences.


1. We also need to capture the……………… the complexity, range and richness of human intelligence
is that we will explore the human brain from the inside.
2. What I mean ………………………
tiny scanning robots along blood decells to map the brain from the inside.
3. We'll be able to send………………………..
4. When we know how the brain works, we'll be able………………. to recreate its operations using the powerful computers.

5. If you look at the way a signal flows down neurons………………..


they don't move extraordinary quickly but there are billions of them doing it all at once.

ІІ. Reading.
Read the text and do the tasks that follow.
Firewall Security
In computing, a firewall is a software or hardware-based network security system that
controls the incoming and outgoing network traffic by analyzing the data packets and determining
whether they should be allowed through or not, based on applied rule set. A firewall establishes a
barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not
assumed to be secure and trusted.
Many personal computer operating systems include software-based firewalls to protect
against threats from the public Internet. Many routers that pass data between networks contain
firewall components and, conversely, many firewalls can perform basic routing functions. There are
different types of firewalls depending on where the communication is taking place, where the
communication is intercepted and the state that is being traced.
Network layer firewalls, also called packet filters, operate at a relatively low level of the
TCP/IP protocol stack, not allowing packets to pass through the firewall unless they match the
established rule set. The firewall administrator may define the rules; or default rules may apply.
Application-layer firewalls work on the application level of the TCP/IP stack (i.e., all
browser traffic, or all telnet or ftp traffic), and may intercept all packets traveling to or from an
application. They block other packets (usually dropping them without acknowledgment to the
sender).
On inspecting all packets for improper content, firewalls can restrict or prevent the spread of
networked computer worms and trojans. The additional inspection criteria can add extra latency to
the forwarding of packets to their destination.
A proxy server (running either on dedicated hardware or as software on a general-purpose
machine) may act as a firewall by responding to input packets (connection requests, for example) in
the manner of an application, while blocking other packets. A proxy server is a gateway from one
network to another for a specific network application, in the sense that it functions as a proxy on
behalf of the network user.
1. Mark the statements as true (T) of false (F).
1. Firewall is a hardware-based network security system that controls the incoming and outgoing
network traffic. F □
2. A firewall establishes a barrier between a secure internal network and another network. T □
3. Packet filters allow packets to pass through the firewall if they match the established rule set. □ T
4. Application-layer firewalls may intercept all packets traveling to or from an application. T
5. A proxy server is a gateway from one network to another for a specific network application. □ T

2. Answer the following questions:


1. What is a firewall?Software or hardware-based network security system that controls the incoming and outgoing network traffic by
analyzing the data packets and determining whether they should be allowed through or not, based on applied rule set.
2. What functions does it perform?Establishes a barrier between a trusted, secure internal network and another network (e.g., the
Internet) that is not assumed to be secure and trusted
3. What are the criteria of firewalls` classification? Where the communication is taking place, where the communication is
intercepted and the state that is being traced.
4. How does a network layer firewall operate? Operates at a relatively low level of the TCP/IP protocol stack, not allowing packets
to pass through the firewall unless they match the established rule set.
5. How does an application-layer firewall operate?
Works on the application level of the TCP/IP stack (i.e., all browser traffic, or all telnet or ftp traffic), and may intercept all packets traveling to or
from an application.
III. Use of English.
Choose the correct answer

1. Certificates provide proof of your …………. .


A qualities
B diplomas
C qualifications
D ambitions

2. Ed...........at the clock and realised he was late for the meeting.
A glimpsed
B observed
C glanced
D watched

3. I'd like to speak to the person in ..........please.


A charge
B responsibility
C duty
D obligation

4. Don't...........the potatoes in oil; that's so unhealthy!


A fry
B boil
C bake
D grill

5. Living on a farm in the middle of nowhere, ours is about the most ………… lifestyle you can
have!
A urban
B suburban
C rural
D municipal
6. I want to take these jeans back because they're too small but I can't find the ......... anywhere.
A recipe
B receipt
C receiver
D reception

7. What's the entrance...........for the outdoor music festival?


A ticket
B fare
C price
D fee

8. I'll pick up a ...........on the way home and then we won't have to cook.
A takeaway
B fast-food
C delivery
D microwave

9. Will was made......... three months ago and is still looking for a job.
A sacked
B fired
C retired
D redundant

10. The audience showed their......... by giving the orchestra a standing ovation.
A entertainment
B review
C appreciation
D audition

11. Have we still got lots of time?' 'No,......... get a move on. We're going to be late.'
A you’d rather
B you'd better
C you'd prefer to
D you'd be better off

12. We...........today and I got into trouble because I hadn't done it.
A had checked our homework
B had our homework checked
C were checked our homework
D have checking our homework

13. Let's order a pizza,......... we?


A should
B will
C shall
D could
14. Despite......... president, she felt totally powerless.
A being
B she was
C of having been
D to be

15. The prime minister denied......... anything wrong.


A to do
B having done
C to have done
D to be doing

16. All the flowers for the wedding......... tomorrow.


A will be delivering
B will have delivered by
C are going to deliver
D are going to be delivered

17. The woman......... purse I found has offered to give me a reward.


A whose
B who
C who's
D to whom

18. I wish you ...........so rude to Rosalind last night.


A weren't
B wouldn't be
C hadn't been
D haven't been

19. It's high time they...........


A are leaving
B were leaving
C have to leave
D had been leaving

20. I wonder...........mind watching this bag for me for a moment.


A would you
B you would
C if would you
D whether you would

IV. Translation
Translate the passage into Ukrainian.
Today, computer networks are the core of modern communication. Telephony increasingly runs
over the Internet Protocol, although not necessarily the public Internet. The scope of communication
has increased significantly in the past decade. This boom in communications would not have been
possible without the progressively advancing computer network. Computer networks continue to
drive computer hardware, software, and peripherals industries. The expansion of related industries is
mirrored by growth in the numbers and types of people using networks, from the researcher to the
home user. Сьогодні комп'ютерні мережі є основою сучасного зв'язку. Телефонія все більше працює за протоколом Інтернету, хоча не
обов'язково через глобальну мережу. Обсяг комунікацій значно збільшився протягом останнього десятиліття. Цей розквіт у
комунікаціях не був би можливим без комп'ютерних мереж, які постійно розвиваються. Комп'ютерні мережі продовжують
визначати розвиток апаратних, програмних та периферійних галузей комп'ютерної індустрії. Розширення пов'язаних галузей
відображається у зростанні кількості та типів людей, які використовують мережі, від дослідника до домашнього користувача.
V. Writing.
Write a short composition (12 – 15 sentences) on one of the following topics:
1. The influence technology has had on your hobbies and life.
2. The person responsible for making a difference in my life.
3. Will there ever be a time when there will be no further technological advancements?
Will there ever be a time when there will be no further technological advancements?

In my opinion, there will never be a time when there will be no further technological advancements.
People are coming up and developing new technologies all the time.
Consequently, new technologies cause new problems and require brand-new solutions.
Things get better because of new technology, but they also get more complicated.
Therefore, we have to keep learning and adapting because technology moves fast.
It seems like a vicious circle.
Growing and moving forward is the main goal of whole society.
We live to bring something new and helpful into this world and make it easier for the next generations.
From my point of view, the moment technologies stop developing, a significant part of human life will be missing.
Nowadays everything is revolving around information technology and its improvement.
Even when it seems like there is nothing more that could have been created, humanity still manages to impress the world with new developments.
So I guess we do have a lot ahead of us.

You might also like