Learn the following words and expressions.
Malware (malicioussoftware) – поражающиевирусомпрограммы
malicious – злонамеренный, злокозненный
malevolent - недоброжелательный
crucial – значительный, ключевой
tobootup – загружаться, выполнять начальную загрузку
spreadlikewildfire - распространяться со сверхъестественной быстротой
toreside – обитать, пребывать
intheirheyday – в зените славы, расцвета
topropagate – распространяться
notorious - пользующийся дурной славой; печально известный; пресловутый;
vulnerable – уязвимый
dormant – дремлющий, потенциальный, скрытый
topinpoint – указать точно, засечь
breed – племя
a generic term – общееназвание
in common parlance - впросторечии
benign - добрый, милостивый
perse - сам по себе, по существу
EXERCISE 3
Answer the questions after reading the text.
· What viruses do you know?
· Where is the word ‘virus’ derived from? Do you know its plural form?
· Have you ever experienced destroying activity of any virus?
· Make a list of damages caused by viruses.
· What anti-virus programme do you have in your computer? Do you find it safe enough?EXERCISE
EXERCISE 4
Words can combine to make new compound words. Look at the examples. Then make as many compounds as you can combining a word from A with a word from B. Check the meaning.
Example: a computer program; an E-mail address
A | B | ||
computer | program | ||
address | |||
companion | file | bomb | spreadsheets |
time | Logic | sector | databases |
boot | data | loss | reformatting |
system | new-age | crash | application |
Excel | Access | browser | memory |
web | hard disk | virus | software |
Macro |
EXERCISE EXERCISE 5
Look through the text about viruses again. Write questions to the answers.
____________________________________ ?
a. To replicate itself and execute itself.
____________________________________ ?
b. Like a real biological virus.
____________________________________ ?
c. In January, 2004.
____________________________________ ?
d. Trojan horses and worms.
____________________________________ ?
e. It doesn’t affect files.
____________________________________ ?
f. A combination of boot sector viruses and file viruses.
____________________________________ ?
g. It lies inert until specific conditions are met.
____________________________________ ?
h. ‘Friday the 13th’ virus.
____________________________________ ?
i. They are known to be platform-independent.
_ ___________________________________ ?
j. To destroy and delete files.
____________________________________ ?
k. It is the method in which they reproduce and spread.
EXERCISEEXERCISE 6
Open brackets. Use the correct form of an adverb (Present Participle or Past Participle).
1. A computer virus is a computer program (written/writing) to alter the way a computer operates.
2. Multipartite viruses come in through (infected/infecting) media and reside in memory.
3. With the (increased/increasing) capabilities of macro languages in applications, macro viruses are major threats.
4. The user often finds the banners (annoying/annoyed).
5. Trojans can also open back doors so that computer hackers can gain access to passwords and other personal information (storing/stored) on a computer.
6. The first PC virus was a boot sector virus (calling/called) (c)Brain, created in 1986 by two brothers, Basit and Amjad Farooq Alvi from Pakistan.
7. Traditional computer viruses emerged in the 1980s, (driven/driving) by the spread of personal computers.
8. If a user tries to start an (infecting/infected) program, the virus code may be executed first.
9. Some viruses try to avoid detection by killing the tasks (associated/associating) with antivirus software before it can detect them.
10. As computers and operating systems grow larger and more complex, old hiding techniques need to be (updated/updating) or (replaced/replacing).
EXERCISEEXERCISE 7
All these sentences are false. Make them negative to obtain the right answer.
1. Boot sector viruses were prevalent in the 1980s. (Not nowadays)
2. A companion virus has host files per se.
3. However, the slow infector approach does not seem very successful.
4. Windows XP uses the MS-DOS command prompt.
5. Trojan horses are viruses in the strict sense because they can replicate automatically.
6. Computer viruses come into existence spontaneously, they are likely to be created by bugs in regular programs.
7. Resident viruses search for hosts when they are started.
8. This approach fools anti-virus software, however.
9. Anti-virus software changes the underlying capability of host software to transmit viruses.
EXERCISE EXERCISE8
Find in the text sentences containing a word or a group of words from the following. Read them out and translate.
In the same sense, all kinds of malware, in a single day, along with, used to spread like wildfire, in their heyday, infamous, eventually, on a specific day or at specific hour, to a great extent
EXERCISE EXERCISE 9