Академический Документы
Профессиональный Документы
Культура Документы
Российской Федерации
ФГБОУ ВО «Кубанский государственный
аграрный университет имени И. Т. Трубилина»
Н. В. Погребняк
АНГЛИЙСКИЙ ЯЗЫК
English for IT students: Internet
Учебное пособие
Краснодар
КубГАУ
2021
УДК 811.111:004 (075.8)
ББК 81.432.1
П43
Рецензенты:
А. В. Зиньковская – профессор кафедры английской филологии
Кубанского государственного университета,
доктор филол. наук, доцент;
Т. А. Хитарова – доцент кафедры иностранных языков
Кубанского государственного аграрного университета,
канд. филол. наук
Погребняк Н. В.
П43 Английский язык English for IT students: Internet: учеб.
пособие / Н. В. Погребняк. – Краснодар : КубГАУ, 2021. –
111 с.
ISBN 978-5-907430-76-1
Учебное пособие содержит грамматический материал,
систематизированный, представленный в виде правил, таблиц,
упражнений. Включены аутентичные тексты по специальности,
научно–популярные статьи из зарубежных периодических изданий, а
также упражнения, направленные на развитие навыков говорения,
чтения и перевода оригинальной литературы в профессиональной
сфере.
Предназначено для обучающихся по программам бакалавриата
направления подготовки: «Информационные системы и технологии»,
«Прикладная информатика».
Grammar
Question Forms
6
course. OR I’m afraid I’m rather busy.
Suggestion: Shall we have a coffee? ~ Yes, OK. OR Sorry, I
can’t. I have to go.
Offer: Can I give you a hand? ~ Yes, please. That’s very kind of
you. OR It’s OK, thanks. I can manage.
Invitation: Would you like to come to the barbecue? ~ Yes,
please. I’d love to. OR I’d love to, but I’ll be away.
Short negative answers would sound strange or impolite here.
Question tags
1. A sentence with a question 5. We sometimes tell people to
tag has a main clause (You do things using the question
know Simon ...) and a ques- tags will / would / can / could
tion tag (... don’t you?). The you? In these situations, the
question tag has an auxiliary question tag is in the affirma-
(e.g. is, do, have) or a modal tive, not the negative.
(e.g. will, can) + a subject Be quiet, could you?
pronoun. Stop it, will you?
main clause question tag
He’s coming, isn’t he? 6. We use a rising intonation
They won’t go, will they? (our voice goes up) if we
7
If there is no auxiliary or aren’t sure of the answer. We
modal, use a form of do in use a falling intonation (our
the correct tense. voice goes down) if we are
You know Dr. Jones, don’t fairly sure of the answer.
you? You’re American, aren’t you? ⤵
I’m in the main clause ➪ (You have an American
aren’t I in the question tag. accent.)
I’m right, aren’t I? You’re American, aren’t you? ⤴
(Or are you Canadian?)
2. Usually, if the main clause
is affirmative, the question 7. Make a short answer with a
tag is negative. subject pronoun and an auxil-
She’s a dentist, isn’t she? iary verb.
It could help, couldn’t it? A: You’re OK, aren’t you?
If the main clause is negative, B: Yes, I am.
the question tag is affirma- A: Did you see the dentist?
tive. B: No, I didn’t.
You don’t feel well, do you?
We won’t need so many teeth, 8. We can agree to affirmative
will we? statements with so + auxiliary
However, I’ll in the main verb + subject, or subject +
clause ➪ shall I in the ques- auxiliary verb + too.
tion tag. A: I’m a dentist.
I’ll buy some toothpaste, shall B: So am I. / I am too.
I? A: Boys like science.
B: So do girls. / Girls do too.
3. If there is a negative word In conversation, we can use
like never, no and nobody in Me too. This is informal.
the main clause, the question A: I’m hungry. B: Me too!
tag is affirmative.
There is nothing wrong with 9. We can agree to negative
my teeth, is there? statements with neither + aux-
After somebody, nobody and iliary verb + subject, or subject
everybody, the verb in the + auxiliary verb + not + either.
8
main clause is singular but A: I don’t like Biology.
the tag is plural. B: Neither do I. / I don’t ei-
Nobody knows, do they? ther.
4. Use question tags in speak- A: Jack hasn’t finished.
ing to check information or B: Neither have we. /
to check that the listener We haven’t either.
agrees with you. In conversation, we can use
Chocolate isn’t good for your Me neither. This is informal.
teeth, is it? A: I’m not happy about it.
We should clean our teeth eve- B: Me neither.
ry day, shouldn’t we?
9
7. the / time / start / what / game / does
8. in / standing / are / rain / why / the / you
2. Read the text and write questions about the missing in-
formation (?).
10
c At the age of 2. d At the age of 3.
1 Yes, I did.
2 No, she didn’t.
3 Yes, we have.
4 No, they weren’t.
5 Yes, you did.
(I expect Claude has won lots of prizes.) Have you won a lot of
prizes?...............................
1. (I wonder if he’s a rich man.) ...............................................
2. (Perhaps quizzes are his only hobby.) ..................................
3. (I expect he worked hard at school.) ....................................
4. (I wonder if he’s got any other interests.) .............................
5. (I wonder if it’s an interesting life.) ......................................
6. (Perhaps his wife asks him quiz questions.) .........................
7. (And maybe he answers questions in his dreams.) ...............
You want to know if Mark has been to Los Angeles. Ask Sarah.
Has Mark been to Los Angeles?
1 You aren’t sure if Rachel and Vicky are going to America. Ask
them.
2 You want to know if Laura plays tennis. Ask Trevor.
3 You are wondering if Claire enjoyed her holiday. Ask her.
4 You want to suggest to Rachel that you both go for a walk.
5 You need to know if David will be at the club tonight. Ask him.
6 You want to know if the train is on time. Ask Mark.
11
7 You are wondering if Mike and Harriet go camping. Ask David.
8 You want to ask Matthew if you can borrow his squash racket.
9 You want to know if Nick has got a motor bike. Ask him.
Are you French? ~ No, I’m not. I’m Italian. I’m from Milan.
1 Will you and Laura be here in August? ~ …….. We’re going
to France.
2 Did you remember to bring the photos? ~
......................................I’ll give them to you in a minute.
3 Has Rita broken up with her boyfriend? ~
...................................... It’s all over, she told me.
4 Did you see that documentary about the ozone layer on tele-
vision last night? ~ .................... I was working late, unfortunately.
5 Does Laura like these old songs? ~ ....................................She
loves Elvis Presley.
6 Are you and Mike staying the night here? ~
....................................We have to get home tonight.
7 Can we afford a taxi? ~ .........................It’s quite a long way.
8 Are you OK, Vicky? ~ .............................I feel really awful.
12. Andrew has just met Jessica at a party. They are find-
ing out that they have a lot in common. Put in the structures
with so and neither.
Text A
History of the Internet
15. Read the text again and choose the answer (A, B, or C)
for questions 1–5 which you think fits best according to the text.
1. The Internet
A) stores all the information
B) communicates with different computers
C) allows to get information from different computers
2. The project ARPANET got financial aid from
A) government
B) charity
C) business companies
3. TCP/IP are
A) two networking protocols
B) two models of information distribution
C) two standards for computer industry
4. The NSFNET
A) was introduced earlier than the ARPANET
B) was very popular among military
C) became a substitute for the ARPANET
5. The Internet’s backbone now belongs to
17
A) ISPs
B) military research agencies
C) university computer networks
Text B
What is the Difference Between the Internet and
the World Wide Web?
Although the World Wide Web and the Internet are often used
interchangeably, they are technically two different things. If you
want to get technical, here is the difference:
The first difference between the Internet and the Web is the
chronology of their creation. The Internet grew gradually out of
projects like ARPANET, which established a packet switching
connection in 1969. The World Wide Web only dates back to 1991,
when Tim Berners-Lee led the creation of the first Web page using
HTML as well as HTTP.
The Internet was originally created to help share scarce com-
puter resources by allowing remote time-sharing so more people
could use the existing computers, thus furthering the development
of the new field of computer science. In 1971, Ray Tomlinson cre-
ated a functional email program that added a new aspect to the In-
ternet and quickly became one of the primary ways people used it.
Other innovations, such as newsgroups, Internet role-playing
games, protocols to transfer files, etc., then followed.
The World Wide Web (WWW, or Web) can be viewed as an-
other innovation on the Internet. The Web made it possible for peo-
ple to access information on Web pages and navigate through them.
They didn’t need to request access to a machine’s directory or
email for a file to be sent. They just needed to navigate to a domain
to see what was there.
In the simplest terms, the Web is a part of the Internet.
The Web in World Wide Web is not referring to a web of con-
18
nected computers, but a web of information connected
by hyperlinks. The linked network of computers, the Internet, is the
base upon which the Web has been built and we depend on the In-
ternet to give us access to that Web and allow us to add to it. With-
out the Internet, there is no World Wide Web. That being said, the
Web is the most popular part of the Internet, so it’s easy to see why
the average person considers the terms to be synonymous.
19
enter a web address (also known as a URL) into the address
field
launch your browser (for example, Internet Explorer,
Netscape Navigator or Mozilla Firefox)
perhaps wait for a few seconds while the web-page down-
loads
view the page
Web addresses
Web address / URL: http://www.acblack.co.uk
domain name www.acblack.co.uk
host: acblack
protocol: http://
type of site: .co.uk
country code: .uk
21. Read Part 1 of the Internet FAQs and choose the cor-
rect answers.
22
How much does broadband access cost?
It depends on which company you choose. Nowadays, some
companies even offer free broadband.
Why do you need a modem?
A modem (modulator/demodulator) converts digital signals
into analogue signals so that data can be transmitted across the
phone or cable network.
What does TCP/IP mean?
The language used for data transfer on the Internet is known as
TCP/IP (transmission control protocol/Internet protocol). This is
like the internet operating system. Every computer connected to the
Net is identified by a unique IP address.
Are there other ways of accessing the Internet?
Other methods of internet access include Wi-Fi, satellite,
mobile phones and TV sets equipped with a modem. Wi-Fi-enabled
laptops or PDAs allow you to connect to the Net if you are near a
wireless access point, in locations called hotspots (for example, a
Wi-Fi café, park or campus). Satellite services are used in places
where terrestrial access is not available (for example, on ships at
sea). High-end mobile phones provide access through the phone
network.
Email
Email lets you exchange messages with people all over the
world. Optional attached files can include text, pictures and even
audio and animation. A mailing list uses email to communicate
messages to all its subscribers - that is, everyone that belongs to the
list.
Which email program is the best?
Outlook Express is a popular program, but many users use
web-based email accounts such as Hotmail.
The Web
The Web consists of billions of documents living on web serv-
ers that use the HTTP protocol. You navigate through the Web us-
ing a program called a web browser, which lets you search, view
and print web pages.
How often are web pages updated?
It depends entirely on the page. Some are updated thousands of
times a day.
Chat and Instant Messaging (IM)
Chat and Instant Messaging technologies allow you to have re-
al-time conversations online, by typing messages at the keyboard.
FTP
FTP, or file transfer protocol, is used to transfer files over a
TCP/IP network. Nowadays, this feature is built into Web
browsers. You can download programs, games and music files from
a remote computer to your hard drive.
Telnet
24
Telnet is a protocol and a program used to log onto remote
computer systems. It enables you to enter commands that will be
executed as if you were entering them directly on the remote server.
Newsgroups
Newsgroups are the public discussion areas which make up a
system called Usenet. The contents are contributed by people who
post articles or respond to articles, creating chains of related pos-
tings called message threads. You need a newsreader to subscribe
to newsgroups and to read and post messages. The newsreader may
be a stand-alone program or part of a web browser.
How many newsgroups are there?
There are approximately 30,000 active newsgroups.
Where can you find newsgroups?
Your newsreader may allow you to download the newsgroup
addresses that your ISP has included on its news server. An al-
ternative to using a newsreader is to visit web forums instead,
which perform the same function but without the additional soft-
ware.
25
26. Translate the word combinations and learn them:
26
UNIT 2
INTERNET PRIVACY
Grammar: Indirect Speech (1)
Reporting statements
Text A: What does Internet Privacy
mean?
Text B: IP Addresses and Anonymizers
Text C: Website Privacy Policy &
Cookies
Grammar
Indirect Speech (1)
Reporting statements
3. When the main verb is in the past, the verb in the indirect
statement usually moves into the past.
28
4. The verb in the indirect statement does not need to
change if the information is still true or relevant now.
Mr. Green was sure that balloons are safe.
People did not know that the earth is round.
29
8. Indirect statements can also come after adjectives and
nouns.
It’s sad that some people will do anything to get on TV.
I love the idea that he was hiding in the garage!
9. That often links the main verb of the sentence to the in-
direct statement. That can be left out, especially in conversation
and informal language.
The police didn’t think (that) it was funny.
It is lucky (that) Kevin didn’t get into the balloon.
30
2. Write a dialogue using the underlined information in the
text.
33
7. Complete the text using the correct forms of the words in
the box.
34
2. ‘I must put you on a very strict diet,’ she told me.
...........................................................................................................
3. ‘You’re putting on a lot of weight,’ she said.
...........................................................................................................
4. ‘You have gained 5.5 kilos in six months,’ she added.
....................................................................................................
5. ‘You gained 10 kilos last year,’ she reminded me.
...........................................................................................................
6. ‘You will get very fat if you go on like this,’ she told me.
...........................................................................................................
7. ‘You should eat very little,’ she said.
....................................................................................................
8. ‘So I’ll have to live on nuts and water,’ I said nervously.
...........................................................................................................
9. ‘You can live on nuts and water without the nuts,’ she
said.
...........................................................................................................
35
What does Internet Privacy mean?
What do you know about anonymizers and cookies?
Text A
What does Internet Privacy mean?
36
Early biometric designs included thumbprint and retina scan
devices, but many of these were not very feasible due to hardware
requirements and integration requirements. Now, the promise of
voice-based authentication adds a key functionality to Internet pri-
vacy technology.
There is an opinion, that it is nearly impossible to maintain pri-
vacy online. Users may be giving out personal information, includ-
ing e-mail addresses and contact information, without knowing it.
There are many ways for users privacy to be violated online. How-
ever, there are some ways to avoid these privacy issues, and to get
around them. Properly configuring the Web browser is one way to
ensure that privacy is not invaded. In the browsers Setup, Options,
or Preferences menus users have the option of using a pseudonym
instead of their real names; users may also withhold their e-mail
address, and other personally identifiable information. It is also ad-
visable to turn on cookie notices in the Web browser, and use cook-
ie management software. There are many cookies that can be used
for data mining purposes to track how much time a user spends on a
specific Web site, what links are clicked on, and other details a
company would record for marketing purposes. If a user is mailing
to an unknown party, posting to a newsgroup, mailing lists, chat
rooms, and other public spaces on the Internet that mentions their
email address, the users should use a pseudonymous or alternate e-
mail address.
Users should only use their main e-mail address on small,
members-only lists, and with individuals they trust. Free e-mail
service providers, such as Yahoo and Hotmail are best for creating
a side e-mail account. Users should never give their personal details
to strangers or other users they just met. It is important for users to
realize that they can’t trust any person that is asking for their per-
sonal information online. There is a lot of personal information us-
ers may prefer to withhold until they meet the other person, which
includes their full name, place of employment, phone number, and
street address.
37
12. Answer the questions:
38
14. Read Text B:
Text B
IP Addresses and Anonymizers
39
If you connect to the Internet over a phone line, then your IP
address is probably assigned dynamically by your Internet service
provider from an available pool of addresses each time you log on.
If your computer is permanently connected to an Internet network,
such as at the office or on a high speed home connection, then your
IP address could be permanently assigned, or could be reassigned
each time you reboot your computer.
As described in the pages on confidentiality and privacy, Inter-
net sites can and do track your IP address and other information. If
you want to block or disguise your IP address, you can use an
anonymizer.
An anonymizer is a proxy server that makes Internet activity
untraceable. An anonymizer protects personally identifying infor-
mation by hiding private information on the user’s behalf.
An anonymizer may also be known as anonymous proxy.
While an electric anonymizer can aid in computer security, it
can also serve malicious purposes by protecting the users’ identities
when they use the Internet to promote slanderous statements or har-
ass others. Such users can avoid legal and/or social repercussions if
they anonymize in an effective manner.
Some social advocacy groups use anonymizer technologies so
that they can report human or animal abuses as well another civil
abuse reporting, including business malpractice or other unethical
behavior. In business it can help to avoid the risk of being fired
from their jobs if they become whistle blowers.
41
4. There are a lot of organizations managing the allocation of
IP addresses.
5. All IP addresses are allocated to ISPs.
6. ISPs have got a variety of IP addresses for users connected
to the Internet over a phone line.
7. An IP address may be known as anonymous proxy.
8. An electric anonymizer can also serve malicious purposes.
Risk minimization
Taboo electronic communications
Identity theft prevention
Protection of search history
Avoidance of legal and/or social consequences
42
2. If you set your web browser start page to an anonymiz-
er/anonymous site, then every subsequent web access you make
from that page will also be anonymized.
3. A static IP address is a permanent address, while a (an) ac-
tive/dynamic address changes with each new Internet session.
4. Though the Internet might feel anonymous, it is not an
anonymous environment by default/on default.
5. You can set your browser to refuse/reject cookies.
6. Sites that provide anonymous surfing/penetration keep the
user’s IP address hidden from the Internet.
7. The solution of establishing a secure communication is a
(an) encryption/decryption method called Public Key Cryptography
(PKC).
Text C
Website Privacy Policy & Cookies
46
UNIT 3
INTERNET SERVICES
Grammar: Indirect speech (2)
Reporting questions. Reported
requests, orders and advice
Text A: Structure of the Internet
Text B: Internet Services
Text C: 9 Shocking Facts about
Blogging You Need to Know
Grammar
Indirect speech (2)
Reporting questions
48
advise forbid invite order persuade remind warn
1 ‘Six O’clock.’
I wanted to know what time it was.
2 ‘February 15th.’
I asked ........................................................................
3 ‘I’m not feeling very well.’
I wondered ..................................................................
4 ‘Yes, it should be great!’
I asked ..........................................................................
5 ‘My friend Sam.’
I was interested to know................................................
6 ‘No, I don’t have enough money.’
Do you know .................................................................
3. Read the dialogue and then complete how Suki later re-
ported the meeting to a friend.
Use say, tell or ask for the reporting verb and standard
changes in the tenses.
Reporting a meeting
50
I saw a colleague called Eric when I went shopping. He
…asked… me …what I was doing…in Brighton. I
1................................... him that I 2…………………to visit my
aunt. I also 3………………. that I 4…………………..to stay for a
couple of days. I 5………………….him 6…………....... in Bright-
on and he 7...................... me that he 8 ……………..here since
2004. Then he 9………….. me 10………………and I
11………………. That I 12.............................. a small flat near
Gatwick Airport. He 13......................................me he
14.....................................to the aquarium later and
15...................................... me 16 ...................................... to join
him. I 17…………………. that I 18……………………because
some friends 19 ………………….to see us. We’ll see each other
next week, anyway.
51
5. Report these subject-questions moving the clauses ‘one
tense back’ only where necessary.
1. ‘Wait for me,’ I said to him. (tell)…. I told him to wait for me...
2. ‘Go on holiday when the weather gets warmer,’ she told him.
(advise) .............................................................................................
3. ‘Keep out of this room at all times,’ she said to them. (warn)
...........................................................................................................
4. ‘Remember to post those letters,’ he said to me. (remind)……..
5. ‘Don’t go into my study,’ he said to them. (ask) ………………
6. ‘Don’t wait for me,’ I said to him. (tell) ………………………
7. ‘Don’t go on holiday yet,’ she told him. (advise) …………….
52
8. ‘Don’t ever enter this room,’ she said to them. (warn) ……….
53
HELEN I’m not sure that you’d like administrative work.
There isn’t much opportunity for you to use all of your skills.
ZARA Are there any other vacancies?
HELEN The company doctor is looking for a new assistant, I’ll
speak to him and I’ll let you know what he says.
54
5. ‘What should I do?’ He asked me ..........................................
6. ‘Why should I pay this bill?’ She wanted to know ................
7. ‘Whose car should I borrow?’ He wanted to know ................
8. ‘Why should I be punished?’ She asked ................................
Text A
Structure of the Internet
11. Read the text again and answer the following questions.
Text B
Internet Services
Communication Services
There are various Communication Services available that of-
fer exchange of information with individuals or groups:
Electronic Mail
Used to send electronic message over the internet.
Telnet
Used to log on to a remote computer that is attached to internet.
58
Newsgroup
Offers a forum for people to discuss topics of common interests.
Internet Relay Chat (IRC)
Allows the people from all over the world to communicate in real
time.
Mailing Lists
Used to organize group of internet users to share common infor-
mation through e-mail.
Internet Telephony (VoIP) – voice over internet protocol
Allows the user to make voice calls over the internet. E.g. Google
Hangouts, Discord, TeamSpeak, Skype.
Instant Messaging
Offers real time chat between individuals and group of people. E.g.
Yahoo messenger, MSN messenger, WhatsApp.
DISADVANTAGES OF INSTANT MESSAGING
1. Because it is immediate, you have no time to reflect on the
message you are sending, unlike an email where you can review the
draft before sending it
2. Messages are not always saved
3. Instant messaging takes away the face to face, personal
experience that people have when they are speaking to someone in
person.
59
Archie
It’s updated database of public FTP sites and their content. It helps
to search a file by its name.
Cloud computing
is the delivery of different services through the Internet, including
data storage, servers, databases, networking, and software.
Cloud-based storage makes it possible to save files to a remote da-
tabase and retrieve them on demand.
Services can be both public and private – public services are pro-
vided online.
Gopher
Used to search, retrieve, and display documents on remote sites.
Streaming
is a service that allows the user to view live events, series,
movies and sporting events over the internet. This includes stream-
ing to your smartphone, smart television or computer. E.g. Twitch,
Netflix, Showmax.
ADVANTAGES OF STREAMING
1. You are in control of what you watch and when you want to
watch it
2. Streams can be paused, rewound and resumed as you please
3. It does not require you to have the shows on your computer
and, therefore, saves storage space
Very Easy Rodent Oriented Netwide Index to Computer
Achieved (VERONICA)
VERONICA is gopher based resource. It allows access to the in-
formation resource stored on gopher’s servers.
Web Services
Web services allow exchange of information between applications
on the web. Using web services, applications can easily interact
with each other.
The web services are offered using concept of Utility Computing.
60
WWW is also known as W3. It offers a way to access docu-
ments spread over the several servers over the internet. These doc-
uments may contain texts, graphics, audio, video, hyperlinks. The
hyperlinks allow the users to navigate between the documents.
Video Conferencing
Video conferencing or Video teleconferencing is a method of
communicating by two-way video and audio transmission with help
of telecommunication technologies.
Modes of Video Conferencing:
Point-to-Point
This mode of conferencing connects two locations only.
Multi-point
61
This mode of conferencing connects more than two locations
through Multi-point Control Unit (MCU).
15. Write down the correct answer for each of the follow-
ing questions.
VoIP
FTP
Cloud computing and grid computing
Cloud-based file sharing
63
Streaming
BLOGGING
64
Jung von Matt, a German advertising firm, called blogs ‘the
toilet of the Internet’. What do you think they meant by saying this?
What, in your opinion, are the main reasons why people run
blogs?
Some people think that blogging is a manifestation of exhi-
bitionism. Do you agree with this opinion?
According to Technorati, a search engine for blogs, 41 % of
blogs are in Japanese, 28 % in English, 14 % in Chinese and only 1
% in German. How can you explain these statistics?
Mr Bhatia, who started Hotmail, thinks that in five years
everybody will have a blog. Do you believe in this prediction?
Some critics worry that bloggers do not present credible
news and if their influence is bigger we can be easily manipulated.
Do you share these fears?
Some companies employ bloggers to promote their products
or services. Do you think such activities are fair?
What common features do you notice among the blogs?
Are there some features common to some, but not all, of the
blogs?
More than 60% of blogs are in English. What are the other
prominent languages?
What primary differences you notice between the blog sites
and the nonblog sites? Now give a definition of a blog. As you cre-
ate your definition, consider:
What are the key characteristics of a blog?
What makes a blog a blog?
Are there "essential elements" of a blog?
65
20. Put the words in the spaces:
attach browse field inboxes open send size
21. Read text C and decide which of the facts about blogs
are the most interesting and the most surprising for you?
66
67
22. Make 10 questions to “9 Shocking Facts…” you have
read.
Hi Tony
Thanks for sending through that a/w so quickly. Just one
problem – I couldn’t open the attachment. I’m not sure why. My
inbox is virtually empty, so there’s plenty of room, and the at-
tachment limit is 20MB, so there’s no problem there. Perhaps
there was a glitch somewhere. Anyway, rather than trying to
figure out what went wrong, could you just send it again?
Did we discuss file format? I don’t know much about TIFFs,
JPEGs etc, but I meant to tell you that if you have any queries
on this, you could get in touch with Steve, our designer. His
email address is steve@stevegreendesign.co.uk.
One other thing. When you resend me the a/w, could you cc
it to Angela? I’ve asked her to have a quick look at it before we
put it in the brochure.
I’m looking forward very much to seeing those pics – fin-
gers crossed that they’ll come through OK this time. However, if
I still can’t download them, I’ll ask you to put them on a disk
and mail them.
All the best
Jenny
1. Jenny didn’t receive the a/w because her inbox is too small.
2. The attached files came to less than 20MB in total.
3. Jenny has resolved a technical problem, and the attachment
will come through without any problems next time.
4. Tony will have to resend the a/w.
68
5. Jenny is a graphic design expert
6. Tony is also going to put the files onto a disk and mail them.
7. Angela has already seen the a/w.
8. The style is too informal – business emails should always be
more formal than this.
1. artwork _________________________________________
2. a small technical problem __________________________
3. type of file ______________________________________
4. questions about this _______________________________
5. send again ______________________________________
6. email a copy to __________________________________
7. communicate with ________________________________
8. with luck________________________________________
24. Make eight your own sentences using the words and
expressions from exercise 23 B.
69
UNIT 4
ONLINE PAYMENT SYSTEMS
Grammar: Zero Conditional
First Conditional
Text A: Electronic Commerce
(E-Commerce)
Text B: Three Ways to Make Sure Your
Online Credit Card Transaction
is Safe
Text C: Public Key Cryptography
Grammar
Zero Conditional and First Conditional
Zero Conditional
70
PRESENT SIMPLE + if + PRESENT SIMPLE
I feel bad if I eat too much.
First Conditional
72
1 If......................(the weather/be) nice tomorrow,…..……...
(we/drive) to the coast.
2 If ...................... (she/post) the letter now,……….
(they/receive) it tomorrow.
3 ....................(Fiona/be) angry if…….(John/arrive) late again.
4 .................... (I/go) to the party if……. (I/have) enough time.
5 If..................... (she/not/pass) this exam, ……... (she/not/get)
the job that she wants.
6 ………… (you/learn)a lot if………... (you/take) this course.
7 If........................ (I/get) a ticket, ………(I/go) to the concert.
8 .................... (I/buy) that camera if…..(it/not/cost) too much.
9 If...................... (you/run) very fast, …... (you/catch) the bus.
10……. (I/go) to the doctor’s if…(I/not/feel) better tomorrow.
11 If..............(they/win) this game,….(they/be) the champions.
73
5 A Could I have some information about this year’s concerts,
please?
B Yes, if ....................... (you/fill in) this form, ........................
(I/send) it to you in the post.
74
6. Supply the correct forms of the missing verbs.
75
8. Read Text A:
Text A
Electronic Commerce (E-Commerce)
10. Look at the table and decide which are the features of
Traditional Commerce and which are of E-Commerce?
79
to compare and select the cheaper and better options.
A customer can put review comments about a product and
can see what others are buying, or see the review comments of oth-
er customers before making a final purchase.
E-commerce provides options of virtual auctions.
Text B
Three Ways to Make Sure Your Online Credit Card
Transaction is Safe
In the age of the Internet and busy schedules, more people are
finding it more convenient to do their shopping and banking online.
Nowadays, people are working longer hours and are too busy with
other activities to be able to fit in time to travel to the local shop-
ping center. Instead they can go straight home from work and with
a few clicks of the mouse, have a package ready to ship to their
front door. The Internet now comes first before the importance of
the television and telephone. Playing an important part in people’s
lives, the computer is the fastest way to communicate, bank and
shop. Many online consumers are using debit and credit cards to
pay for their purchases, while other methods such as e-wallets,
Paypal, mobile and other wireless transactions are following close
behind.
The Federal Trade Commission (FTC) wants all online con-
sumers to be well informed about the new payment technologies
and how the consumers can make their online transactions as secure
81
and as safe as possible. Although it’s impossible to control the
fraud and deception on the Internet, the FTC encourages all online
consumers to take the necessary steps to ensure the security of your
personal information and all other online transactions.
As an online consumer, it’s up to you, and only you, to protect
yourself from theft. Here are three ways to make sure that your
online credit card transactions are safe:
1. Use a secure web browser. Using software that encrypts
online purchase information will help to secure your transactions.
Make sure that your web browser is updated on its encryption ca-
pabilities. You can ensure this update by using the latest version of
encryption software from the manufacturers. Some web browsers
offer free downloads over the Internet. While submitting your in-
formation, be sure to look for the icon "lock" in the web browsers
status bar. This will ensure your information is secure during the
transmission.
2. Read before you write. Never provide any personal infor-
mation to any website before first checking with the website’s pri-
vacy policy. This way you can be aware if your information will be
shared or used in any way with other online merchants. You will
also want to know exactly what security features are established so
your personal information can not be acquired fraudulently. You
should be able to understand the privacy, shipping and refund poli-
cies before you provide any information or make a purchase. If af-
ter reading the privacy policy, you are not comfortable, then you
may want to consider taking your business elsewhere.
3. Review all financial statements. Always review your bank
and credit card statements and look for any unauthorized purchases
or errors. Statements can be fairly confusing to look over, but take
your time and be thorough, if you notice anything questionable,
contact your bank or credit card company immediately. You should
also contact these financial institutions if your purse or wallet is lost
or stolen, or even if you think there are unauthorized uses of your
accounts. Always keep records of your online transactions and read
all your e-mails from those merchants from which you have made
82
purchases from. Those merchants may be sending you important
information about your purchase or account with them.
E-MONEY
83
15. Read Text C:
Text C
Public Key Cryptography
84
6) It is possible to decrypt a message with public key, that was
used for encrypting this message.
17. Write the sequence of actions from the list below for
the following task: send message that can be read only by the
receiver (some actions are not used).
18. Write the sequence of actions from the list below for
the following task: the receiver should be sure that the message
was written by the sender and no one changed or faked it (some
actions are not used).
20. Find the words and word combinations in the texts you
have read before. Can you guess the meaning from context?
Give Russian equivalents.
85
municate, bank and shop immediately
3. use e-wallets 18. unauthorized uses of ac-
4. Federal Trade Commis- counts
sion (FTC) 19. public-key cryptography
5. as safe as possible 20. one-way hash functions
6. to control the fraud and 21. challenge-response proto-
deception on the Internet cols
7. it’s up to you 22. public key & a private key
8. encrypt online purchase 23. A message encrypted with
information the public key can be decrypted
9. while submitting your in- only with the corresponding
formation private key
10. the icon "lock" 24. exposed and accessible to
11. web browsers status bar the public
12. can not be acquired fraud- 25. just-in-time
ulently 26. to simplify the business
13. to understand the privacy, processes
shipping and refund policies 27. relevant detailed infor-
14. Review all financial mation
statements 28. heavy dependency on
15. take your time and be 29. a uniform strategy
thorough 30. all information is available
16. affluent people at one place
21. Read the text and decide which word best fits each
space.
DIGITAL SIGNATURE
86
ical (2)__________. That value is (3)___________ using a private
cryptographic key and the result linked to the things that were
signed. So to make a digital signature you have to generate or buy a
private cryptographic key and a (4)_________ public key and cer-
tificate.
There are basically two kinds of cryptography in use. Secret
key (symmetric), and public/private key (asymmetric). With secret
key, the same key is used to encrypt information and decrypt in-
formation. (5)__________ the operation is symmetric. With pub-
lic/private key, the two keys are of different values. Encryption is
done using one of them, and (6)___________ can then only be done
using the other. Hence the operation is asymmetric. You can give
your (7)____________ key to everyone. Then, if they want to send
something to you they encrypt it with your public key and they
know that only you can (8)___________ it. By the same terms, if
you encrypt something using your private key, then anyone who
has your public key can check to see if they can (9)___________ it,
and if they can, they know it must have come from you.
87
UNIT 5
E-MAIL SERVICE
Grammar: Second Conditional
Third Conditional
Text A: Deciphering Internet E-Mail
Text B: E-Mail Working
Text C: E-Mail Protocols
Grammar
Second Conditional
88
If Sara passes her exam tomorrow, I’ll be very pleased. (first
conditional; likely)
If Sara passed her exam tomorrow, I’d be very pleased.
(second conditional; unlikely)
Third Conditional
90
I wish / If only I had heard those songs when they were new.
(= It’s a pity that I didn’t hear those songs then.)
92
5. Rewrite sentences to match these situations.
1 If she ...were/was (be) here now, she ... could give (give) us
some advice.
2 If he ............................. (fail) in his present job, he
.............................. (think) about another career.
3 If you .................. (can play) a musical instrument, you
................. (help) with the school orchestra.
4 If they .................. (have) the right qualifications, they
.................. (be able to) apply for better jobs.
5 If she .......................... (can have) some lessons, she
........................... (improve) her performance.
6 If we ................................ (run) our own business, we
................................. (be) more independent.
7 If John ..................................... (go) to his home town, he
..................................... (visit) his mother.
8 If Susan ........................................... (borrow) your book, she
........................................... (return) it.
9 If Frank ...................................... (want) advice, he
..................................... (ask) his bank manager.
93
7. Look at these first conditional sentences. Do they refer to
a probable future event, or an unlikely situation? If they refer
to an unlikely situation, change them to second conditional
sentences.
95
10. Comment on each situation using a Third Conditional
with if. Use would have, could have or might have.
97
Which browser-based e-mail clients do you know?
Text A
Deciphering Internet E-Mail
Internet E-mail
According to the research about 31 billion e-mails are sent
worldwide every day − and that number is only expected to rise.
With the capability to send pictures, documents or even video mes-
sages to anyone in the world who has an email address, it has be-
come a massively popular form of communication.
How Does Sending & Receiving E-mail Work?
Using an e-mail client (software such as Microsoft Outlook or
Eudora) you can compose an e-mail message and send it to another
person anywhere, so long as you know their e-mail address. All
online services and Internet Service Providers (ISPs) offer e-mail,
and support gateways so that you can exchange e-mail with users of
other systems. Usually, it takes only a few seconds for an e-mail to
arrive at its destination.
When you initially set-up your e-mail client you will need spe-
cific information from your ISP, such as your network user ID,
SMTP and POP server address. The network ID will provide you
with your e-mail address, the SMTP server handles the communica-
tions as you send an e-mail message, and the POP server provides
the transmission for receiving e-mail.
SMTP – Simple Mail Transfer Protocol
When you send an e-mail message, your e-mail client connects
to your ISP’s mail server, which is an SMTP (Simple Mail Transfer
Protocol) server. It is common for your e-mail message to be bro-
ken down into small packets of data (for a speedier transmission),
which is reassembled when it reaches its destination. The SMTP
server will generally hand-off the message to another server that is
98
able to translate the domain name of the recipient’s address and
find the correct IP address to deliver the message to. This process
may be repeated multiple times until the e-mail is routed to the cor-
rect destination server.
POP – Post Office Protocol
While SMTP provides the protocol for sending an e-mail, it is a
different server that receives your e-mail at your ISP. POP, short
for Post Office Protocol, is a protocol used to retrieve e-mail from a
mail server. Your ISP will have set up a mailbox on the POP server
for all its customers. When incoming e-mails are received by the
POP server, it is then filtered down to the correct user mailbox.
When you use your e-mail client and connect to the POP server,
you log in with your ID (network username), which allows the
server to locate your mailbox. Access to the contents of the mailbox
is granted by entering in your password. The POP server will deliv-
er your e-mail to your local system and will delete the messages
from the server as well.
Most e-mail applications use the POP protocol. There are two
versions of POP. The first, called POP2, became a standard in the
mid-80’s and requires SMTP to send messages. The newer version,
POP3, can be used with or without SMTP. While most people will
refer to POP with a version number (e. g. POP3), when using the
term POP without a number, like any other protocol, it is generally
assumed you would be referring to the most recent version any-
ways.
IMAP: Internet Message Access Protocol
The Post Office Protocol is designed to be a simple protocol
offering only a basic set of commands, and it is still the most wide-
ly used protocol. Similar to POP is IMAP (Internet Message Access
Protocol), which is also a protocol for retrieving e-mail messages,
but supports some features not found in POP. For example IMAP
allows you to search e-mail messages for keywords while the mes-
sages still reside on the server. You can also store messages on the
e-mail server, and better manage multiple accounts and set message
flags. IMAP was developed at Stanford University in 1986.
99
15. For questions 1–6, choose the answer (A, B, C or D)
which you think fits best according to the text.
1. An e-mail client is …
A) any online e-mail service. B) a software.
C) an e-mail provided by ISPs. D) a person who uses e-mail.
2. With an e-mail client you can send a message to another per-
son …
A) only if you know the address.
B) only if you know their ISP.
C) only if you know your ISP.
D) only if you know their address and ISP.
3. Which protocol doesn’t filter down the messages to the us-
er’s boxes?
A) SMTP. B) POP. C) IMAP. D) none of the above.
4. IMAP has …
A) less options than POP. B) more options than POP.
C) another name – POP2. D) another name – POP3.
Text B
E-Mail Working
E-mail System
E-mail system comprises of the following three components:
100
Mailer
Mail Server
Mailbox
Mailer
It is also called mail program, mail application or mail client. It
allows us to manage, read and compose e-mail.
Mail Server
An email server, or simply mail server, is an application or
computer in a network whose sole purpose is to act as a virtual post
office. The server stores incoming mail for distribution to local us-
ers and sends out outgoing messages. This uses a client-server ap-
plication model to send and receive messages using Simple Mail
Transfer Protocol (SMTP).
An email server is a computer with mail transfer agent (MTA)
functions. Mail is exchanged between email servers running special
software, which is built around standardized protocols for handling
messages and their varied (multimedia) content.
An email server receives mail from another MTA, a mail user
agent (MUA) or a mail submission agent (MSA) with the details of
the transmission being defined by SMTP. When an MTA receives a
mail and the recipient of the mail is not hosted locally, the mail is
forwarded to another MTA. Every time this happens the MTA adds
a "received" trace header on the top header of the message. This
shows all the MTAs that have handled the message before it arrived
in the recipient’s inbox. This useful feature allows administrators to
see whether an optimal path was taken.
Mailboxes
Mailbox is generally a folder that contains emails and infor-
mation about them.
Working of E-mail
Email working follows the client server approach. In this client
is the mailer i.e. the mail application or mail program and server is
a device that manages emails.
101
Following example will take you through the basic steps in-
volved in sending and receiving emails and will give you a better
understanding of working of email system:
Suppose person A wants to send an email message to person B.
Person A composes the messages using a mailer program i.e.
mail client and then select Send option.
The message is routed to Simple Mail Transfer Protocol to per-
son B’s mail server.
The mail server stores the email message on disk in an area
designated for person B.
The disk space area on mail server is called mail spool.
Now, suppose person B is running a POP client and knows
how to communicate with B’s mail server.
It will periodically poll the POP server to check if any new
email has arrived for B. As in this case, person B has sent an email
for person B, so email is forwarded over the network to B’s PC.
This is message is now stored on person B’s PC.
The following diagram gives pictorial representation of the
steps discussed above:
102
18. Translate word combinations and learn them:
Text C
E-Mail Protocols
E-mail Protocols are set of rules that help the client to properly
transmit the information to or from the mail server. We will discuss
various protocols such as SMTP, POP, and IMAP.
SMPTP
SMTP stands for Simple Mail Transfer Protocol. It was first
proposed in 1982. It is a standard protocol used for sending e-mail
efficiently and reliably over the internet.
Key Points:
SMTP is application level protocol.
SMTP is connection oriented protocol.
SMTP is text based protocol.
It handles exchange of messages between e-mail servers over
TCP/IP network.
103
Apart from transferring e-mail, SMPT also provides notifica-
tion regarding incoming mail.
When you send e-mail, your e-mail client sends it to your e-
mail server which further contacts the recipient mail server using
SMTP client.
These SMTP commands specify the sender’s and receiver’s
e-mail address, along with the message to be send.
The exchange of commands between servers is carried out
without intervention of any user.
In case, message cannot be delivered, an error report is sent to
the sender which makes SMTP a reliable protocol.
IMAP
IMAP stands for Internet Message Access Protocol. It was first
proposed in 1986.
Key Points:
IMAP allows the client program to manipulate the e-mail
message on the server without downloading them on the local com-
puter.
The e-mail is hold and maintained by the remote server.
It enables us to take any action such as downloading, delete
the mail without reading the mail. It enables us to create, manipu-
late and delete remote message folders called mail boxes.
IMAP enables the users to search the e-mails.
It allows concurrent access to multiple mailboxes on multiple
mail servers.
POP
POP stands for Post Office Protocol. It is generally used to
support a single client. There are several versions of POP but the
POP 3 is the current standard.
Key Points
POP is an application layer internet standard protocol.
104
Since POP supports offline access to the messages, thus re-
quires less internet usage time.
POP does not allow search facility.
In order to access the messages, it is necessary to download
them.
It allows only one mailbox to be created on server.
It is not suitable for accessing non mail data.
POP commands are generally abbreviated into codes of three
or four letters. Eg. STAT.
Dear Jenny
As requested, I’m attaching the a/w files again.
The technical problems you’ve been experiencing may be
due to your email provider. I have to say, I’ve never heard of
Whoopydudu.com. You might be better off switching to one of
the big names, such as Gmail or Yahoo.
Regarding file formats, TIFFs should be OK. If necessary,
your designer will be able to reformat them very easily, but in my
experience most designers have no problem working with TIFFs.
As the file sizes are quite large, and I understand that Angela
only has a dial-up connection, I’ve sent her low-res versions to
look at. I hope that will be OK. They should be clear enough.
I’m just about to go on holiday, so if you need me to send
these files on disk, please let me know by Friday afternoon. I
probably won’t get the opportunity to check my email while I’m
away, but if anything arises that won’t keep, my assistant Trevor
may be able to deal with it.
Best regards
Tony
105
A. Are these statements true or false?
21. Make eight your own sentences using the words and
expressions from exercise 19 B.
1) connection oriented
2) application level
3) text based
4) Apart from
106
5) provide notification regarding incoming mail
6) specify the sender’s and receiver’s e-mail address
7) an error report
8) Key Points
9) first proposed in
10) concurrent access
11) offline access
12) search facility
13) efficiently and reliably
14) without intervention of any user
15) current standard
107
ЗАКЛЮЧЕНИЕ
108
СПИСОК ЛИТЕРАТУРЫ
109
https://www.techopedia.com/definition/351/electronic-commerce-e-
commerce
14. Email Server [Электронный ресурс]. – Режим доступа:
https://www.techopedia.com/definition/1660/email-server-email
15. E-mail Working [Электронный ресурс]. – Режим
доступа:
https://www.tutorialspoint.com/internet_technologies/e_mail_worki
ng.htm
16. E-MONEY [Электронный ресурс]. – Режим доступа:
http://projects.exeter.ac.uk
17. History of the Internet [Электронный ресурс]. – Режим
доступа: https://www.techopedia.com/6/27861/internet/history-of-
the-internet
18. How Anonymizers Work [Электронный ресурс]. –
Режим доступа:
https://www.livinginternet.com/internet/i/is_anon_work.htm
19. Internet [Электронный ресурс]. – Режим доступа:
https://searchwindevelopment.techtarget.com/definition/Internet
20. Internet Privacy [Электронный ресурс]. – Режим
доступа: https://www.techopedia.com/definition/24954/internet-
privacy (date of access: 08.01.21)
21. Internet Services [Электронный ресурс]. – Режим
доступа:
https://www.tutorialspoint.com/internet_technologies/internet_servi
ces.htm
22. Internet Services [Электронный ресурс]. – Режим
доступа: https://intl.siyavula.com/read/cat/grade-12-
cat/networks/04-networks?id=sec4-2
23. IP Addresses [Электронный ресурс]. – Режим доступа:
https://www.livinginternet.com/internet/i/iw_ip.htm
24. Shocking Facts About Blogging You Need To Know
[Электронный ресурс]. – Режим доступа:
https://robpowellbizblog.com/9-shocking-facts-about-blogging/
110
25. THREE WAYS TO MAKE SURE YOUR ONLINE
CREDIT CARD TRANSACTION IS SAFE [Электронный
ресурс]. – Режим доступа: www.internet-security-abc.com
26. What is Ecommerce? [Электронный ресурс]. – Режим
доступа: https://ecommerceguide.com/guides/what-is-ecommerce/
27. What is the Difference between the Internet and the World
Wide Web [Электронный ресурс]. – Режим доступа:
https://www.techopedia.com/2/27886/internet/what-is-the-
difference-between-the-internet-and-the-world-wide-web
28. Вичугов В. Н., Краснова Т. И. Английский язык для
специалистов в области интернет-технологий: учеб. пособие. –
Томск: Изд-во Томского политехнического университета, 2012.
– 116 с.
111
ОГЛАВЛЕНИЕ
ВВЕДЕНИЕ……………………………………….………… 3
UNIT 1. HISTORY OF THE INTERNET …………… 4
Grammar: Question Forms ………...……………………….. 4
Text A. History of the Internet ………………...…………… 14
Text B. What is the Difference Between the Internet and the
World Wide Web? …………………………………………… 17
Text C. Internet FAQs: Part 1 ……………………………….. 21
Internet FAQs: Part 2………………………………... 23
UNIT 2. INTERNET PRIVACY……………………............. 26
Grammar: Indirect Speech (1) Reporting statements.………... 26
Text A. What does Internet Privacy mean?………………...… 35
Text B. IP Addresses and Anonymizers …….…...................... 38
Text C. Website Privacy Policy & Cookies ………..………... 43
UNIT 3. INTERNET SERVICES…………..………………... 46
Grammar: Indirect speech (2) Reporting questions. Reported
requests, orders and advice …………………………………... 46
Text A. Structure of the Internet ……………………………... 54
Text B. Internet Services….………..………………………… 57
Text C. 9 Shocking Facts about Blogging You Need to Know. 65
UNIT 4. ONLINE PAYMENT SYSTEMS……………......... 68
Grammar: Zero Conditional. First Conditional…………......... 68
Text A. Electronic Commerce (E-Commerce) ………………. 74
Text B. Three Ways to Make Sure Your Online Credit Card
Transaction is Safe.................................................................... 79
Text C. Public Key Cryptography ……………........................ 82
UNIT 5. E-MAIL SERVICE………………............................. 86
Grammar: Second Conditional. Third Conditional………….. 86
Text A. Deciphering Internet E-Mail ………………………... 96
Text B. E-Mail Working …..….….…………………………... 98
101
112
Text C. E-Mail Protocols……………………………………... 106
ЗАКЛЮЧЕНИЕ…...………………..…….…………………. 107
СПИСОК ЛИТЕРАТУРЫ…………………………………...
113
Учебное издание
АНГЛИЙСКИЙ ЯЗЫК
Учебное пособие
В авторской редакции
Макет обложки – Н. П. Лиханская