Базовый курс elementary (A2) часть 2 Методические указания для студентов первого курса всех технических специальностей Новосибирск


НазваниеБазовый курс elementary (A2) часть 2 Методические указания для студентов первого курса всех технических специальностей Новосибирск
страница5/17
ТипМетодические указания
1   2   3   4   5   6   7   8   9   ...   17

FORTRAN - acronym for FORmula TRANslation. This language is used for solving scientific and mathematical problems. It consists of algebraic formulae and English phrases. It was introduced in the United States in 1954.

COBOL - acronym for Common Business-Oriented Language. This language is used for commercial purposes. COBOL, which is written using English statements, deals with problems that do not involve a lot of mathematical calculations. It was first introduced in 1959.

ALGOL - acronym for ALGOrithmic Language .Originally called IAL, which means International Algebraic Language. It is used for mathematical and scientific purposes. ALGOL was first introduced in Europe in 1960.

PL/I - Programming Language I. It was developed in 1964 to combine features of COBOL and ALGOL. Consequently, it is used for data processing as well as scientific applications.

BASIC - acronym for Beginner’s All–purpose Symbolic Instruction Code. It was developed in 1965 at Dartmouth College in the United States for use by students who require a simple language to begin programming.

C - developed in the 1970s to support the UNIX operating system. C is a highly portable general–purpose language.

Other such languages are APL (developed in 1962), PASCA L (named after Blaise Pascal and developed in 1971), LISP and PROLOG, both of which are used for work in artificial intelligence. LOGO is a development of LISP which has been used to develop computer–based training (CBT) packages.

When a program written in one of these high–level languages is designed to do a specific type of work such as to calculate a company’s payroll or calculate the stress factor on a roof, it is called an applications program. Institutions either purchase these programs as packages or commission their own programmers to write them to meet the specifications of the users.

The program produced after the source program has been converted into machine code is referred to as an object program or object module. This is done by a computer program called the compiler, which is unique for each computer.

The compiler is a systems program which may be written in any language, but the computer’s operating system is a true systems program which controls the central processing unit (C P U), the input, the output, and the secondary memory devices. Another systems program is the linkage editor, which fetches required systems routines and links them to the object module (the source program in machine code). The resulting program is then called the load module, which is the program directly executable by the computer. Although systems programs are part of the software, they are usually provided by the manufacturer of the machine.

Unlike systems programs, software packages are sold by various vendors and not necessarily by the computer manufacturer. They are a set of programs designed to perform certain applications which conform to the particular specifications of the user.
3.8 Summarize the information on different high-level computer languages by completing the table below.


Language

Date of development


Purpose

Characteristic





1959













Mathematical and

scientific













Combines features

of COBOL and ALGOL

BASIC















To support Unix

operating system








1962








3.9 Choose the proper word to fill in the gap. Change its form if necessary.

instruction, instruct, instructed, instructor

a) Our math’s _______ explained to us the principles of binary arithmetic.

b) We were _______ to document our programs very carefully.

c) Both ______ and data have to be changed to machine code before the computer can operate on them.

compilation, compiler, compile, compiled

a) Our university computer does not have a PASKAL________.

b) Usually, a programmer _________ his program before he puts in the data.

c) A source program cannot be directly processed by the computer until it has been ____.

result, results, resulting

a) The linkage editor links systems routines to object module. The _______ program, referred to as the load module, is directly executed by the computer.

b) The _________ of these mathematical operations were obtained from the university mainframe and not from my micro.
3.10 Look at the words in bold type in Text A. Can you give your comments from the grammar perspective?

Do you know that…?

The –ing form (present participle) can be used to form adjective from verbs; it then describes the person or thing ‘who/that does the action of the verb’ (active): e.g. ‘This story excites people’ can become ‘This is an exciting story’.

The –ed form* (past participle) can also be used as an adjective; it then describes the person or thing ‘to whom/which the action of the verb is done’ (passive): e.g. we can say, ‘The play in this theatre is exciting the children’ and ‘there are a lot of excited children in this theatre’.

*Do not forget that irregular verbs have specific forms of Past Participle.
Write these sentences, changing the verbs in brackets into the present or past participle.

  1. My sister is (interest) in exotic flowers, and she has some (interest) ones in her garden.

  2. Her friend felt (relax) because he had a (relax) weekend.

  3. Her computer skills were quite (astonish). (Astonish) students used to watch her easily writing complicated programs.

  4. One very windy night Sarah heard the sound of (break)glass upstairs, and when she went to look , she found a (break) window.

  5. John was very (tire) because it was (tire) having so many lessons yesterday.

  6. The tourist agency made a (surprise) suggestion. Mary was quite (surprise) to hear it.

  7. The movie was quite (depress) so she felt (depress).

  8. He was (bore). He listened to very (bore) lecture.

Now give your own examples.
3.11 Read the text. Find sentences with Past Participle and translate them.
Your future life is strictly dependant to the profession you choose. There are various jobs to take up and many ways how to lead the future life.

In my opinion, the best choice is to take up the profession connected with computers. Today computers are considered to be the symbol of modern era. Everything connected with Internet, computers, multimedia and interactive television seems to be the techniques of the future. This advanced techniques is present in every part of our life. Everyone should be familiar with it, because it is essential.

If I would have to choose my future profession right now, I would probably decide to work as programmer, computer scientists or net administrator. I am fond of the new techniques and software and hardware novelties. Computers are my passion.

Now finish the idea: If I would have to choose my future profession right now, I would probably decide to work as programmer…
3.12 Translate into English and reproduce the dialogue.


  • Have you seen an interesting advertisement in the last issue of “The Economist”?

  • Я ещё не читал его.

  • The School of Engineering offers a new program in information system. Applicants are invited for jobs in this field.

  • Профессор Смит говорил мне об этом. Эта программа очень интересна. Она создана, чтобы помочь людям со знанием компьютера найти работу.

  • Don’t you think that our son can lecture on this new program?

  • А почему бы и нет? Он ведь выпускник отделения информационных технологий и несколько лет принимал участие в исследовательском проекте, связанном с проблемами суперкомпьютеров и их производством.

  • As far as I remember his research interests cover software and application.

  • И что они говорят о контракте?

  • It is a three years contract and it may be extended for further two years. I’ll write Mike a letter.

  • Это слишком долго. Я лучше позвоню ему.


3.13 Before reading Text B match the key soft ware terms with their definitions.
software operating system malware virus search engine


  1. The most important program that runs on a computer. Every general-purpose computer must have an operating system to run other programs.

  2. Computer instructions or data. Anything that can be stored electronically is software.

  3. A computer program that retrieves documents or files or data from a database or from a computer network.

  4. Short for malicious software, software designed specifically to damage or disrupt a system, such as a virus or a Trojan horse.

  5. Self-replicating computer program that spreads by inserting copies of itself into other executable code or documents.


3.14 Read Text B using a dictionary and then make a list of software terms which are new for you. Give the definitions to these terms.

TEXT

All about Software

Categories of applications software explained

For years people understood the term software to refer to computer instructions, programs or data. Basically, anything that could be stored electronically on your computer is considered software. Traditionally, software has been divided into two different categories: systems software and applications software. However, in addition to those, an entire new batch of wares has entered the computer vernacular in recent years.

Systems Software

System software, as the diagram above illustrates, sits directly on top of your computer's hardware conponents (also referred to as its bare metal). It includes the range of software you would install to your system that enables it to function. This includes the operating system, drivers for your hardware devices, linkers and debuggers. Systems software can also be used for managing computer resources. Systems software is designed to be used by the computer system itself, not human users.

Applications Software

Unlike systems software, applications software is designed to be used by end-users. Applications software, in essence, sits on top of system software, as it is unable to run without the operating system and other utilities. Applications software includes things like database programs, word processors and spreadsheets, e-mail applications, computer games, graphics programs and such. Generally, people will refer to applications software as software.

All the Other 'Ware Terminology

Today we find new terms created frequently to classify types of applications software. You have classifications based on usage, for example games or accounting software, office applications,and other categories where the category is derived based on the main use of the software. Unfortunately, we also have a newer group of software related terms that have a negative association. Whileethe applications software itself may be useful, , it may also carry hidden programs or utilities that may cause undesirable effects.

Malware

We have a whole selection of software that may come bundled under the name of malware. Short for malicious software, malware is any software that has been designed (programmed) specifically to damage or disrupt a computer system. The most common forms of malware are computer viruses, worms, and Trojan horses.

Other common types of software is adware and spyware. Adware is considered a legitmate alternative offered to consumers who don't wish to pay for software. Today we have a growing number of software developers who offer their goods as "sponsored" freeware until you pay to register. Generally most or all features of the software are enabled but you will be viewing sponsored advertisements while the software is being used. If you're using legitimate adware, when you stop running the software, the ads should disappear, and you always have the option of disabling the ads by purchasing a registration key.

Unfortunately some applications that contain adware track your Internet surfing habits in order to serve ads related to you. When the adware becomes intrusive like this, then we move it into the spyware category and it then becomes something you should avoid for privacy and security reasons. Spyware works like adware, but is usually a separate program that is installed unknowingly when you install another application. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers. Unlike adware, spyware is considered a malicious program. For more information on spyware and adware, we recommend you check out Webopedia's "The Difference Between Adware & Spyware".

Greyware

Sometimes developers will include tools and programs within software that some may view as malware, but really, it falls into the grey area between malicious software and software, hence the name greyware. Greyware is the term used to categorize all other malicious or annoying software such as adware, spyware, trackware, and other malicious code and malicious software fall under.

In addition to these types of software, there are more terms to describe software that is distributed with common tools and utilities that don't necessarily cause harm to your computer or are a security risk. Some of these terms are slang terms used to describe unwanted features found in applications software.

Freeware is copyrighted software given away for free by the author. The author retains the copyright, which means that you cannot do anything with it that is not expressly allowed by the author. Usually, the author allows people to use the software, but not sell it.

Shareware is software that distributed on the basis of an honor system. Most shareware is delivered free of charge, but the author usually requests that you pay a small fee if you like the program and use it regularly.

Nagware is the term given to software that routinely issues a pop-up window or other form of visual interface asking the user to register a product, purchase an application or take another form of action.

Bloatware is a slang term given to software that has so many features that it requires considerable disk space and memory resources to run.

Abandonware is software that is no longer being sold or supported by its publisher.

Considered a type of adware, slimeware is the slang term used to describe software that interferes with the user experience by changing key settings in order to gain profit. For example, slimeware may change your Internet browser default home page to one where you view a company's banner ad or products for sale.

Software that is remotely accessed online usually with a Web browser, is called webware (although its more formal names are Web applications or online software.

Lastly, there's warez which is a term that has been around for quite some time. Pronounced wayrz or wayrss, it is the name given to commercial systems software or applications software that has been pirated and made available to the public via a BBS or the Internet. Typically, those who pirate software, often called crackers, have figured out a way to de-activate the copy protection or registration scheme used by the software. The use and distribution of warez software is illegal.

(http://www.webopedia.com)

3.15 Work in pairs or small groups. Using the list of software terms and definitions you’ve made check if your partners understand them.
3.16 Use http://www.webopedia.com or any other sites to investigate something new in computer software and present your information to your group.


Unit 4

The Internet
Vocabulary

  1. create

[krı'eıt]

творить, создавать

  1. network

['netwɜ:k]

(инфор.) сеть

  1. spread

[spred]

распространять(ся), простирать(ся)

  1. share

[ʃeə]

делиться; поделиться

  1. transfer

['trænsfɜ:]

перемещать, передавать

  1. backbone

['bækbəυn]

главная опора; основа; суть

  1. maintain

[meın'teın]

(тех.) обслуживать; содержать в исправности

  1. provide

[prə'vaıd]

предоставлять (услуги), давать

  1. provider




(информ.) провайдер, поставщик информационных и коммуникационных услуг

  1. browse

[braυz]

просмотреть

  1. browse facility

[fə'sılətı]

(компьют.) средство просмотра

  1. feature

['fi:tʃə]

(компьют.) функция, функциональность, опция, (сленг) фича (у программного продукта, системы)

  1. surf the Internet

[sɜ:f]

«путешествовать» по Интернету

(тж. surf the net)

  1. etiquette

['etıket]

этикет

профессиональная этика

  1. netiquette

['netıket]

(информ.) сетевой этикет

  1. flood (with spam)

[flʌd]

засыпать; заваливать (спамом)

  1. evaluate

[ɪ'væljυeɪt]

оценивать


4.1 How would you describe what the Internet is? Discuss it with your partner.
4.2 Match the terms and their definitions.

a) Internet

b) World Wide Web

c) e-mail
1. A global network connecting millions of computers.

2. The transmission of messages over communications networks.

3. A system of Internet servers that support specially formatted documents.
4.3 Now read the text and try to describe the Internet again using the key vocabulary in bold type.
Believe it or not, the Internet was created way back in 1969, during the Cold War, by the United States military. It was meant to be a "nuke-proof"(1) communications network. Today, the Internet spreads across the globe and consists of countless networks and computers, allowing millions of people to share information. Data that travels long distances on the Internet is transferred on huge lines known collectively as the Internet backbone. The Internet is now maintained by the Internet service providers.

Many people think the Internet and the World Wide Web are the same thing. They're not! The World Wide Web is what you are browse. It is one of the many features of the Internet. E-mail, FTP(2), and Instant Messaging (3) are also features of the Internet.

(http://www.sharpened.net)

(1) "nuke-proof" устойчивый к воздействию ядерного оружия

(2) FTP File Transfer Protocol протокол передачи файлов (используемый в Internet протокол передачи файлов между хост-компьютерами)

(3) Instant Messaging система мгновенной передачи текстовых сообщений
4.4 Interview your partners if they surf the Internet. Use the questions given below.

  1. Do you often surf the Internet? Which websites do you usually visit?

  2. Do you download any programs from the Internet? If so, what are they?

  3. Do you belong to any chat forum? Why? / Why not?

  4. What feature of the Internet do you consider the most attractive? Why?

  5. What is netiquette?

4.5 Read the passage below and think if you always follow the netiquette. Why? / Why not? Discuss it with your partner.
Netiquette, or net etiquette, refers to etiquette on the Internet. Good netiquette involves respecting others' privacy and not doing anything online that will annoy or frustrate other people. Three areas where good netiquette is highly stressed are e-mail, online chat, and newsgroups. For example, people that spam other users with unwanted e-mails or flood them with messages have very bad netiquette. You don't want to be one of those people. If you're new to a newsgroup or online chat room, it may help to observe how people communicate with each other before jumping in.
4.6 Think of good and bad points of the Internet and fill in the table. You can work either individually or in pairs.


Advantages of the Internet

Disadvantages of the Internet








4.7 Read Text A, compare your ideas with information given, and extend the table. How many advantages/disadvantages are there in your table?

First, study the vocabulary you may need to understand the text.
mankind [mæn'kaɪnd] (n) 1) человечество; человеческий род

['mænkaɪnd] 2) мужчины, мужской пол

magnitude ['mæɡnɪtju:d] (n) 1) величина, paзмеры, 2) важность; значимость

outweigh [̗aυt'weɪ] (v) быть тяжелее, превосходить в весе

wealth [welθ] (n) изобилие, избыток

target ['tɑ:ɡɪt] (n) цель

advent ['ædvent] (n) наступление (какой-л. эпохи, какого-л. события),

available [ə'veɪləbl] (adj) доступный; имеющийся в распоряжении,

entertainment [̗entə'teɪnmənt] (n) развлечение; зрелищное мероприятие

numerous ['nju:mǝrəs] (adj) многочисленный

available [ə'veɪləbl] (adj) доступный; имеющийся в распоряжении

theft [θeft] (n) воровство, кража

obstruct [əb'strʌkt] (v) препятствовать, затруднять, мешать

prone (adj) подверженный (чему-л.)
Text A

Advantages and Disadvantages of the Internet
The Internet has been perhaps the most outstanding innovation in the field of communication in the history of mankind. As with every single innovation, the Internet has its own advantages and disadvantages. But usually, greater magnitude of advantages outweighs its disadvantages.

Today the Internet has brought a globe in a single room. Right from news across the corner of the world, wealth of information to shopping, purchasing the tickets of your favourite movie.

Advantages

Communication

The main target of the Internet has always been the communication. By the advent of the Internet, our earth has become a global village. Now we can communicate with a person who is sitting in the other part of the world.

Information

Information is probably the biggest advantage the Internet offers. Students and children are among the top users who surf the Internet for research. Today, it is almost required that students should use the Internet for research purpose of gathering resources.

Entertainment

Downloading games, visiting chat rooms or just surfing the Web are some of the entertainments. In fact, the Internet has been successfully used by people to find life long partners. When people surf the Web, there are numerous things that can be found. Music, hobbies, news and more can be found and shared on the Internet.

Services

Many services are now provided on the Internet such as online banking, job seeking, purchasing tickets. Often these services are not available off-line or can cost you more.

E-Commerce

It has got a really amazing and wide range of products from technology to household needs.

Disadvantages

Theft of personal information

If you use the Internet, you may be facing danger as your personal information such as name, address, credit card number, etc. can be accessed and used by a criminal.

Spamming

Spamming refers to sending unwanted e-mails, which provide no purpose and obstruct the entire system.

Virus threat

Computers attached to the Internet are more prone to virus attacks and they can end up into crashing your whole hard disk.

Pornography

This is perhaps the biggest threat related to your children’s healthy mental life.

(http://www.buzzle.com)
4.8 Match the words below to make word partners.

  1. global a. chat rooms

  2. surf b. privacy

  3. visit c. danger

  4. download d. village

  5. household e. needs

  6. face f. disk

  7. hard g. the Internet

  8. respect h. games


4.9 Now use the word partners to complete these sentences.


  1. McLuhan believes that the world is rapidly becoming a ________, in which mankind is interconnected by contemporary technology, especially television and the world wide web.

  2. This method will allow you to _________ without leaving any information about what browser you're using, which computer system you have.

  3. Many people who ________ use them as a place to discuss their problems and get a kind of a support.

  4. People of all ages visit special free sites to safely ___________ of high quality.

  5. You are not computer addict, so low-powered computer is suitable for all your _________.

  6. How does computer software usually react when it ________ of virus attack?

  7. _____ can store anywhere from 20MB to more than 200GB.

  8. Sites like Facebook must ___________. They should not tell my friends what I buy on other sites.


4.10 Analyse the “-ing” words in bold type in Text A. Are they gerunds? Why/Why not?

Do you know that…?

Because a gerund (base form of VERB+ -ing) acts as a noun, it can be used after prepositions, too. (e.g. That computer programmer is famous for spilling coffee into his keyboard.



Complete the sentences, using gerund.

  1. He never thought of ____.

  2. This student is very clever at _____.

  3. I don’t insist on ____.

  4. We were tired of _____.

  5. Did you succeed in ____?

  6. Who is responsible for ____?

  7. They were grateful for ____.

  8. He had some difficulty in ____.

Now give your own examples.
4.11 Work in pairs or in small groups. Discuss if you always trust the information from the Internet? Why/Why not?

Now skim Text B and say what the main idea of the text is.
4.12 Read Text B and give your ideas on what could help Zack to understand that Professor Butz's Web page wasn't a reliable source of information?

(To understand the text better use the vocabulary given below.)
TEXT B

The Web - Teaching Zack to Think

As more and more students access the Internet for research, it's important that they learn how to validate online information. The Internet is a place where you can find "proof" of almost any belief system that you can imagine. And, for too many students, "If it's on the Internet, it must be true."

The following story is also true.

Fourteen-year-old Zack was asked to research a unique topic for his history class. Zack knew a bit about using reliable sources on the Internet, so when he found some information on a Web page on the US Northwestern University site he felt sure that he had found a reliable source of information for his project. The topic was unique too—Holocaust Revisionism—Zack had never heard of that before, so he decided to write his history paper on "How the Holocaust Never Happened."

Zack found his "information" from a Web page at http://pubweb.northwestern.edu/~abutz/ (no longer at this URL), titled "Home Web Page of Arthur R. Butz." On his low-key home page, Butz explained that he wrote "A short introduction to the study of Holocaust revisionism" and that his material was intended for "advanced students of Holocaust revisionism." At the top of the page Butz identified himself as "Associate Professor of Electrical and Computer Engineering, Northwestern University». His article began with the following: “I see principal reasons for the widespread but erroneous belief in the legend of millions of Jews killed by the Germans during World War II:

During both world wars Germany was forced to fight typhus… That was one of the main reasons for a high death rate in the camps, and the crematoria...

Look at the above situation from the perspective of a 14-year-old, untrained to think critically about information. He's researching the Holocaust, and suddenly finds this Web page. His teacher told him to find a unique topic, and this certainly fit the bill. The page is simple and clear. It's written in a calm, logical tone. The page is clearly intended for experts in its field. Best of all is the source: Northwestern University! And a professor to boot! Perfect.
validate ['vælɪdeɪt] v проверять достоверность

proof [pru:f] (n) доказательство

belief [bɪ'li:f] (n) убеждение, мнение; вера

reliable [rɪ'laɪ əbl] (adj) заслуживающий доверия, достоверный

reliable information - достоверные сведения

reliable source – достоверный, надежный источник

low-key (adj) 1) неброский; сдержанный

2) гамма тёмных тонов

in a low key - в тёмных тонах

Associate Professor доцент университета

widespread ['waɪdspred] (adj) широко распространённый

erroneous [ɪ'rəυnɪəs] (adj) ложный; ошибочный;

typhus ['taɪfəs] (n) сыпной тиф

fit the bill отвечать всем требованиям

to boot к общей пользе; вдобавок; к тому же
4.13 Now read Text C and check your ideas.

(To understand the text better use the vocabulary given below.)
TEXT C

Thinking about What We've Found
The fact is that students increasingly depend on the Internet for information, so it's important that they develop ways to evaluate their findings. Zack could have used some, or all, of the following techniques to decide whether the site was a reliable source for information.

Purpose

Try to determine a Web site's purpose. What is it trying to do? Why was it created? Most Web sites are designed to sell services and products, present information, put ideas forward, or entertain. Many sites do several of these at once.

A Web site's purpose will not always be clear. Look at Butz's site. His purpose is surely advocacy, although he comes across as an objective information provider, especially in the closing sentence of his article: "Surely any thoughtful person must be skeptical." Would a 14-year-old know how to distinguish between objective information and propaganda?

Understand the purpose(s) of a Web site, and that those purpose(s) may not be entirely obvious.

Author

The next step in validation involves the site's author. We all know that it's easy to fool people. Many people will believe someone if he or she sounds authoritative. Butz is a professor, sure, but he's an Engineering professor. How does that qualify him to speak as an expert on the Holocaust? It doesn't. But people see "Professor" and take what he says seriously.

Zack didn't know anything about Butz, but could have researched his background. If Zack ran a search for "Arthur Butz," on the search engine Google, he would find Butz's name on a page titled "Holocaust Deniers" at the Web site for the anti-hate organization HateWatch (http://www.splcenter.org/intel/hatewatch/). Similarly, Zack would find Butz's article at a second hate directory site listed under "A Guide to Hate Groups on the Internet: Hate Books, Newsletters and Articles". Zack would find Butz mentioned negatively in a March 1998 USA Today article titled, "College anti-Semitism on the rise, according to new report." Zack would also find Butz's book described as popular among "anti-Semites" in a review of Deborah Lipstadt's book Denying the Holocaust.

If Zack had run this multi-search on Butz, he would have seen how other people categorize Butz' work.

Establish the credibility of the author.

Meta-Web Information

Meta-Web information validates Web pages solely within the context of other Web pages.

Let's start with the URL, or address, of a Web page. You need to know when they're accessing a personal home page. Most Internet Service Providers give their subscribers a few megabytes of free space on a Web server to use as they want.

Here are two sample URLs: and . An experienced Web user knows that both URLs point to personal home pages.

In the first example, the word "users" is the user name of someone who accesses the Internet through cdsinet.net. In the second example, focus on the ~. A tilde (~) indicates a Web site that has been created by someone given space on a Web server. "stefan" is the user name of someone who accesses the Internet through icon-stl.net.

Knowing the above, if Zack had looked at Butz's URL - - he'd have seen the ~, an indicator that this is a personal Web site.

Just as Zack can know something about individuals by their clothing, he can learn about a Web site by looking at its URL. Clothing tells us a lot, but the company a person keeps tells us more. Learning how a Web page interacts within the network of all other Web sites is valuable information.

Meta-information sources.

It is always a good idea to look beyond the Internet for sources of authentic information.
evaluate [ɪ'væljυeɪt] (v) оценивать; определять количество, качество и т. п.

technique [tek'ni:k] (n) метод; способ

determine [dɪ'tɜ:mɪn] (v) определять; устанавливать

entertain [̗entə'teɪn] (v) развлекать, занимать

advocacy ['ædvəkəsɪ] (n) 1) защита

2) пропаганда (взглядов и т. п.)

distinguish [dɪ'stɪŋɡwɪʃ] (v) различать, распознавать

authoritative [ɔ:'θɒrɪtətɪv] (adj) авторитетный; надёжный

deny [dɪ'naɪ] (v) отрицать, отвергать

denier тот, кто что-либо отвергает

credibility [̗krədə'bɪlətɪ] (n) вероятность, правдоподобие

experienced [ɪk'spɪərɪənst] опытный, знающий

tilde ['tɪldə] (n) (полигр.) тильда (tilde)

beyond [bɪ'jɒnd] (prep) за; по ту сторону, вне

authentic [ɔ:'θentɪk] (a) 1) подлинный, аутентичный

2) достоверный, верный
4.14 Translate the text into English and then finish it. Use the vocabulary from the Texts B,C.
Все большее количество студентов используют Интернет как источник информации для своих исследований. Сегодня в Интернете можно найти доказательства любых идей, которые могут прийти вам в голову. А ведь многие считают ту информацию, которая представлена в Интернете вполне достоверной. Но это не так. Поэтому очень важно научиться оценивать достоверность такой информации. Для того чтобы определить является ли сайт надежным источником информации, можно использовать несколько методов: ___________
4.15 Write a list of recommendations to help students critically evaluate the reliability of a Web site.

1   2   3   4   5   6   7   8   9   ...   17

Похожие:

Базовый курс elementary (A2) часть 2 Методические указания для студентов первого курса всех технических специальностей Новосибирск iconБазовый курс beginnerS (A1) часть 1 Методические указания для студентов...
Методические указания предназначены для студентов I курса всех технических специальностей нгту, изучающих английский язык (уровень...

Базовый курс elementary (A2) часть 2 Методические указания для студентов первого курса всех технических специальностей Новосибирск iconМетодические указания для студентов всех технических специальностей заочного отделения
Настоящее издание адресовано студентам I курса всех технических специальностей, изучающим английский язык на заочном отделении нгту,...

Базовый курс elementary (A2) часть 2 Методические указания для студентов первого курса всех технических специальностей Новосибирск iconМетодические указания по выполнению графических работ для студентов...
Методические указания предназначены для самостоятельного изучения предмета, выполнения контрольной работы и подготовки к экзамену...

Базовый курс elementary (A2) часть 2 Методические указания для студентов первого курса всех технических специальностей Новосибирск iconМетодические указания для студентов и магистрантов всех специальностей...
«Международная конференция» магистрантами и студентами всех факультетов как на занятиях по английскому языку, так и в режиме самостоятельной...

Базовый курс elementary (A2) часть 2 Методические указания для студентов первого курса всех технических специальностей Новосибирск iconКонтрольная работа по дисциплине «Английский язык»
Методические указания предназначены для студентов 2 курса всех специальностей заочной формы обучения

Базовый курс elementary (A2) часть 2 Методические указания для студентов первого курса всех технических специальностей Новосибирск iconМетодические указания, программа и контрольные задания для студентов...
Математика. Экономико-математические модели : программа, методические указания и контрольные задания для студентов 4 – 5-го курсов...

Базовый курс elementary (A2) часть 2 Методические указания для студентов первого курса всех технических специальностей Новосибирск iconМетодические указания «Кинематический и силовой расчеты рычажного шестизвенника»
Методические указания предназначены для студентов технических специальностей очной полной и сокращенной формы обучения

Базовый курс elementary (A2) часть 2 Методические указания для студентов первого курса всех технических специальностей Новосибирск iconПрофессиональное образовательное учреждение республики башкортостан...
Методические указания предназначены для студентов I курса всех специальностей гапоу рб "Уфимский медицинский колледж" для организации...

Базовый курс elementary (A2) часть 2 Методические указания для студентов первого курса всех технических специальностей Новосибирск iconМетодические указания, программа, решение типовых задач, программированные...
Методические указания, программа, решение типовых задач, программированные вопросы для самопроверки и контрольные задания для студентов-заочников...

Базовый курс elementary (A2) часть 2 Методические указания для студентов первого курса всех технических специальностей Новосибирск iconМетодические рекомендации для студентов 1 курса всех профессии по...
...

Вы можете разместить ссылку на наш сайт:


Все бланки и формы на filling-form.ru




При копировании материала укажите ссылку © 2019
контакты
filling-form.ru

Поиск