1 ВАРИАНТ
1. A. Read the whole text and answer this question.
1. What is flash memory?
Memory in a flash!
Flash memory is a type of non-volatile memory that can be electronically erased and reprogrammed. Its name was invented by Toshiba to express how much faster it could be erased - 'in a flash, which means 'very quickly'. Unlike RAM, which is volatile, flash memory retains the information stored in the chip when the power is turned off. This makes it ideal for use in digital cameras, laptops, network switches, video game cards, mobile phones and portable multimedia players. In addition, it offers fast read access times (although not as fast as RAM), with transfer rates of 12MB per second. Unlike ROM chips, flash memory chips are rewritable, so you can update programs via software. Inside the chip, data is stored in several floating gate transistors, called cells. Each cell traditionally stores one bit of data (1 = erased and 0 = programmed). New devices have a multi-level cell structure so they can store more than one bit per cell. The chips are constructed with either NOR or NAND gates. NOR chips function like a computer's main memory, while NAND works like a hard drive. For example, in a camera, NOR flash contains the camera's internal software, while NAND flash is used to store the images. Flash memory is used in several ways:
- Many PCs have their BIOS basic input/output system) stored on a flash memory chip so it can be updated if necessary.
- Modems use flash memory because it allows the manufacturer to support new protocols.
- USB flash drives are used to save and move MP3s and other data files between computers. They are more easily transported than external hard drives because they use solid-state technology, meaning that they don't have fragile moving parts that can break if dropped. However, USB flash drives have less storage capacity than hard drives.
New U3 smart drives allow users to store both applications and data. They have two drive partitions and can carry applications that run on the host computer without requiring installation. Flash memory cards are used to transfer games in video consoles, to record voice and music on MP3 players or to store movies on MP4 players. They are as small as a stamp and capacity can range from 8MB to several gigabytes. The only limitation is that flash cards are often not interchangeable between devices. Some formats include: CompactFlash, Secure Digital, Multi Media Card , mini SD card, and xD-Picture Card. Sony has its own product called the Memory Stick, used in its digital still cameras, video camcorders and the PlayStation Portable. The photos stored in a digital camera can be offloaded to a computer via cable or wirelessly. Another option is to have a flash card reader permanently connected to your PC; you simply eject the card from the camera and put it into the reader instead of having to plug the camera in. The future of hard drives may be hybrid hard drives. Hybrid hard drives combine a magnetic hard disk and flash memory into one device. This allows computers to boot, or start, more quickly, and also reduces power consumption.
B. Find words or phrases in the text with the following meanings.
1. permanent; able to hold data without power
2. able to be rewritten many times
3. different sections of a disk drive or storage area
4. to make a copy of a file so that the original is not lost
5. transferred to another device
6. a peripheral device that reads and writes flash memory cards
7. a product that integrates two different technologies
2. Translate these terms and abbreviations.
1) TCP / IP - |
2) Wi-Fi - |
3) URL - |
4) http// - |
5) Density - |
6) Back up - |
7) Capacity - |
8) NOR - |
9) NAND - |
10) BIOS - |
11) Erased - |
12) Data - |
13) GUI - |
14) WIMP - |
15) SSL - |
16) Spyware |
17) Attempt (not try ) |
18) ISP - |
19) ADSL - |
20) PDA - |
21) FTP - |
Task 1. Complete the extracts with words from the box
millisecond, chat and IM, field, decryption, query, drive, giga
1.Thousandth of second, abbreviated to ms used to measure the access time of hard drives.
3. The physical mechanism that accepts, reads and writes data on a disk.
4. A single piece of information in a record.
5. A tool that allows you to extract information that meets certain criteria.
6. This company uses ………. Techniques to decode secret data.
7. Have a live conversation online.
2 ВАРИАНТ
1. A. Read the whole text and answer the questions.
Internet security
Security and privacy on the Internet
There are many benefits from an open system like the Internet, but one of the risks is that we are often exposed to hackers, who break into computer systems just for fun, to steal information, or to spread viruses (see note below). So how do we go about making our online transactions secure? Security is crucial when you send confidential information online. Consider, for example, the process of buying a book on the Web. You have to type your credit card number into an order form which passes from computer to computer on its way to the online bookstore. If one of the intermediary computers is infiltrated by hackers, your data can be copied. To avoid risks, you should set all security alerts to high on your web browser. Mozilla Firefox displays a lock when the website is secure and allows you to disable or delete cookies - small files placed on your hard drive by webservers so that they can recognize your PC when you return to their site. If you use online banking services, make sure they use digital certificates - files that are like digital identification cards and that identify users and web servers. Also be sure to use a browser that is compliant with SSL (Secure Sockets Layer), a protocol which provides secure transactions. Similarly, as your email travels across the Net, it is copied temporarily onto many computers in between. This means that it can be read by people who illegally enter computer systems. The only way to protect a message is to put it in a sort of virtual envelope - that is, to encode it with some form of encryption. Private networks can be attacked by intruders who attempt to obtain information such as Social Security numbers, bank accounts or research and business reports. To protect crucial data, companies hire security consultants who analyse the risks and provide solutions. The most common methods of protection are passwords for access control, firewalls, and encryption and decryption systems. Encryption changes data into a secret code so that only someone with a key can read it. Decryption converts encrypted data back into its original form. Malware (malicious software) are programs designed to infiltrate or damage your computer, for example viruses, worms, Trojans and spyware. A virus can enter a PC via a disc drive - if you insert an infected disc - or via the Internet. A worm is a self-copying program that spreads through email attachments; it replicates itself and sends a copy to everyone in an address book. A Trojan horse is disguised as a useful program; it may affect data security. Spyware collects information from your PC without your consent. Most spyware and adware (software that allows pop-ups - that is, advertisements that suddenly appear on your screen) is included with free downloads. If you want to protect your PC, don't open email attachments from strangers and take care when downloading files from the Web. Remember to update your anti-virus software as often as possible, since new viruses are being created all the time.
B. Read the text more carefully and answer these questions.
1. Why is security so important on the Internet?
2. What security features are offered by Mozilla Firefox?
3. What security protocol is used by banks to make online transactions secure?
4. How can we protect your email and keep it private?
5. What methods are used by companies to make internal networks secure?
6. In what ways can a virus enter a computer system?
7. How does a worm spread itself?
2. Translate these terms and abbreviations.
1) Back up - |
2) Capacity - |
3) NOR - |
4) TCP / IP - |
5) Wi-Fi - |
6) URL - |
7) http// - |
8) NAND - |
9) BIOS - |
10) Erased - |
11) Data - |
12) ADSL - |
13) PDA - |
14) VoIP - |
15)IM - |
16) Attempt (not try) - |
17) Density - |
18) FTP - |
19) Spyware - |
20) ISP - |
Task 1. Complete the extracts with words from the box
Erasable, Hotspot, Database, Password, Email, DVD, Sort
1. Capable of being deleted
2. Abbreviation of digital versatile disc
3. A collection of data stored in a PC in a systematic way
4. To classify records into numerical or alphabetical order
5. Sers have to enter a ………… to gain access to a network.
6. Send message to another person via the Internet
7. The geographical region covered by one or several access points is called a …
KEYS
1 ВАРИАНТ
№ 1 (B)
- non-vоlatile
- rewritable
- partitions
- to back up
- offloaded
- flash card reader
- hybrid
№ 2.
- Transmission Control Protocol / Internet Protocol
- Wireless Fedility
- Uniform Resource Locator
- Hyper Text Transfer Protocol
- Плотность
- Резервная копия
- Вместимость
- Not Or не или
- Not and - и не
- Basic Input/Output System
- Cтирать (информацию)
- База данных
- Graphical User Interface
- Windows Icons, menus and pointer
- Secure Sockets Layer
- Шпионская атака
- Пытаться
- Internet Service Provider
- Asymmetric Digital Subscriber Line
- Personal Digital Assistant
- File Transfer Protocol
Task 1
- millisecond.
- giga
- drive
- Field
- query
- decryption
- Chat and IM
2 ВАРИАНТ
№ 1 (B)
- Because the Internet is an open system and hackers break into computer system.
- Mozila Firefox displays a lock when the website is secure, warns you and allows you to disable or delete cookies.
- Banks use SSL.
- We can encode our emails.
- The most common methods are passwords, firewalls and encryption and decryption.
- A virus can enter a computer system via an infected disk or the Internet.
- A worm spreads itself through email attachments.
№2
- резервная копия
- вместимость
- Not Or не или
- transmission control protocol / Internet protocol
- Wireless Fedility
- Uniform Resource Locator
- HyperText Transfer Protocol
- Not and - и не
- basic input/output system
- стирать (информацию)
- база данных
- Asymmetric Digital Subscriber Line
- Personal Digital Assistant
- Voice over Internet Protocol
- Instant Messaging
- пытаться
- плотность
- File Transfer Protocol
- Шпионская атака
- Internet Service Provider
Task 1
- erasable
- DVD
- Database
- Sort
- password
- hotspot