close

Вход

Забыли?

вход по аккаунту

?

2310.Simple English for Security Specialists. Information Security of Automated Systems Учебное-методическое пособие. Комплект контрольны

код для вставкиСкачать
Министерство образования и науки Российской Федерации
Федеральное государственное бюджетное образовательное учреждение
высшего профессионального образования
«Томский государственный университет систем управления
и радиоэлектроники»
КАФЕДРА ИНОСТРАННЫХ ЯЗЫКОВ
SIMPLE ENGLISH
FOR SECURITY SPECIALISTS
INFORMATION SECURITY
OF AUTOMATED SYSTEMS
Учебно-методическое пособие.
Комплект контрольных измерительных материалов для самостоятельной
работы
Томск
ТУСУР
2016
Ёлкина Д.М., Потапова Т.Н.
Simple English for Security Specialists. Information Security of Automated Systems:
КИМ для самостоятельной работы. учеб.-метод. пособие / Д.М. Ёлкина, Т.Н.
Потапова
Министерство образования и науки Российской Федерации, Федеральное
государственное
бюджетное
образовательное
учреждение
высшего
профессионального образования «Томский государственный университет
систем управления и радиоэлектроники», Кафедра Иностранных языков.
Томск: ТУСУР, 2016. 53 с.
Настоящее учебно-методическое пособие может быть использовано для
самостоятельной работы студентов 1 и 2 курса ТУСУР, обучающихся по
учебному пособию «Simple English for Security Specialists. Information Security
of Automated Systems» (авторы Ёлкина Д.М., Потапова Т.Н.). Пособие содержит
контрольно-измерительные материалы для самостоятельной работы, а именно
тренировочные тесты с ключами для текущего и итогового контроля, а также
темы и критерии оценки устной части экзамена. В пособии приведена
рейтинговая система оценки успеваемости, что позволяет студенту
самостоятельно оценить свою успеваемость по дисциплине.
Учебно-методическое пособие «Simple English for Security Specialists.
Information Security of Automated Systems» КИМ для самостоятельной работы
размещено в электронном виде на образовательном портале ТУСУР.
Contents
Контрольная работа 1 к Разделу 1 «Безопасность и информация (Security and
Information; 1-й семестр)»........................................................................................... 5
Контрольная работа 2 к Разделу 2 Безопасность информационных технологий
(IT Security; 1-й семестр) ............................................................................................ 7
Зачетная контрольная работа по разделам 1-4 1 семестр........................................ 9
Контрольная работа 1 к Разделу 5 «Угрозы (Threats; 2-й семестр)» ................... 11
Контрольная работа 2 к Разделу 6 «Защита (Defences; 2-й семестр)» ................. 13
Экзаменационная контрольная работа к Разделам 5 и 6 ....................................... 15
Темы устного собеседования или презентации для устной части экзамена. ...... 17
Контрольная работа 1 к Разделу 9 «Нелегальные виды деятельности (Illegal
activities; 3-й семестр)», по темам 9.1 – 9.4............................................................. 18
Контрольная работа 1 к Разделу 9 «Нелегальные виды деятельности (Illegal
activities; 3-й семестр)», по темам 9.5 – 9.6 и Разделу 10 «Иностранный язык для
специальных целей (3-й семестр)» .......................................................................... 20
Зачетная контрольная работа 1 к Разделу 9 «Нелегальные виды деятельности
(Illegal activities; 3-й семестр)» и Разделу 10 «Иностранный язык для
специальных целей (3-й семестр)» .......................................................................... 22
Контрольная работа 1 к Разделу 12 «Различные темы по безопасности (Security
Topics; 4-й семестр)», по темам 12.1 – 12.4 ............................................................ 24
Контрольная работа 1 к Разделу 12 “Различные темы по безопасности (Security
Topics; 4-й семестр), по темам 12.5 – 12.6 и Разделу 13 “Иностранный язык для
специальных целей (4-й семестр)” .......................................................................... 26
Экзаменационная контрольная работа к Разделам 12-14...................................... 29
Темы устного собеседования или презентации для устной части экзамена. ...... 31
Ключи к тестам .......................................................................................................... 32
Контрольная работа 1 к Разделу 1 «Безопасность и информация (Security and
Information; 1-й семестр)» ..................................................................................... 32
Контрольная работа 2 к Разделу 2 Безопасность информационных технологий
(IT Security; 1-й семестр) ....................................................................................... 33
Зачетная контрольная работа по разделам 1-4 1 семестр. ................................. 35
Контрольная работа 1 к Разделу 5 «Угрозы (Threats; 2-й семестр)» ................ 37
Контрольная работа 2 к Разделу 6 «Защита (Defences; 2-й семестр)».............. 38
Экзаменационная контрольная работа к Разделам 5 и 6 .................................... 40
Контрольная работа 1 к Разделу 9 «Нелегальные виды деятельности (Illegal
activities; 3-й семестр)»? темам 9.1 – 9.4 .............................................................. 41
Контрольная работа 1 к Разделу 9 «Нелегальные виды деятельности (Illegal
activities; 3-й семестр)», по темам 9.5 – 9.6 и Разделу 10 «Иностранный язык
для специальных целей (3-й семестр)» ................................................................ 43
Зачетная контрольная работа 1 к Разделу 9 «Нелегальные виды деятельности
(Illegal activities; 3-й семестр)» и Разделу 10 «Иностранный язык для
специальных целей (3-й семестр)» ....................................................................... 44
Контрольная работа 1 к Разделу 12 «Различные темы по безопасности
(Security Topics; 4-й семестр)», по темам 12.1 – 12.4 ......................................... 45
Контрольная работа 1 к Разделу 12 “Различные темы по безопасности
(Security Topics; 4-й семестр), по темам 12.5 – 12.6 и Разделу 13
“Иностранный язык для специальных целей (4-й семестр)” ............................. 46
Экзаменационная контрольная работа к Разделам 12-14 .................................. 47
Критерии оценивания устной части экзамена (монологическое высказывание)
.................................................................................................................................. 48
Требования к оформлению презентаций ............................................................. 49
Критерии оценивания устной части экзамена (презентация) ............................ 51
Рейтинговая система для оценки успеваемости студентов ............................... 51
Контрольная работа 1 к Разделу 1 «Безопасность и информация (Security
and Information; 1-й семестр)»
1 Translate the words and phrases from Russian into English. (0,5 балла за
правильный ответ)
1 террористическая атака
6 последовательность
2 шпионаж и воровство
7 уникальность
3 специалист по обеспечению
8 своевременность
безопасности
9 несанкционированный доступ
4 точность
10 интеллектуальная
5 законченность
собственность
2 Match the words to make 10 phrases. (0,5 балла за правильный ответ)
a
a
a
algorithm
a
analytical
an
breach
a business
and
and an
individual
a column
and
firewall
of
avoid
point
information
of
hold
scheme
loss
on
informational and
sensitive
of
on
keep
the
rules
row
lead
the
security
system
observe
to
security
view
3 Choose the correct word or phrase to complete the sentence. (0,5 балла за
правильный ответ)
data
reliable
trade secret data masking
market analytics
security confidential data erasure
disk
information security
encryption
1 __________ is safety and protection from attack, harm, or damage.
2 In people’s life a lot of valuable and important things need protection: their lives
and health, property and money, different kinds of __________ and information.
3 Computer security, internet security, __________, and mobile security make up IT
(Information Technology) security.
4 According to its purpose, information can be mass (public), specific, __________
(secret), and personal (private).
5 High quality information is true, accurate, __________, complete, consistent,
unique, and timely.
6 Typically, businesses hold sensitive information on their employees, salary
information, financial results, business plans, and possibly __________ and
research.
7 This is a lot of information, from personal files and intellectual property to
__________ and top-secret details.
8 __________ is a security mechanism that uses mathematical schemes and
algorithms to scramble data into unreadable text.
9 __________ is the process of masking specific data to protect sensitive
information from unauthorized access.
10 __________ is a method of software-based overwriting that completely destroys
all electronic data on a hard disk drive or other digital media.
4 Present Simple or Present Continuous. Choose the correct variant. (0,5 балла
за правильный ответ)
1 Look at the hat that woman wears / is wearing .
2 Sam looks frightened. What is he watching / does he watch ?
3 I usually drive but today my car doesn’t work / isn’t working .
4 Do you listen / Are you listening to the radio when you get up?
5 She is playing / plays tennis twice a week.
6 I’m sorry. I don’t understand what you say / you’re saying.
7 Jane runs / is running because she’s late.
8 No thanks. I don’t like / ‘m not liking coffee very much.
9 It’s late. I ‘m wanting / want to go home now.
10 Where are you going / do you go tomorrow?
5 Present Simple or Present Continuous. Open the brackets. (0,5 балла за
правильный ответ)
1 We __________ (have) an English test now.
2 The bus __________ (leave) at 8.30 a.m.
3 My parents usually __________ (phone) me twice a week.
4 John __________ (live) in Scotland.
5 __________ (you have) a smartphone?
6 Mary __________ (not browse) the Internet at the moment.
7 I __________ (not understand) this programme.
8 I __________ (take part) in a computing conference on Thursday.
9 ‘What __________ (your brother do)?’ ‘He’s an IT engineer.’
10 The company __________ (start) to produce a new line of robots this month.
6 Translate from Russian into English. (0,5 балла за правильный ответ)
can
should
should
must
must
need
not
not
not
1 Я умею читать по-английски.
2 Нам не обязательно уходить сейчас.
3 Можно воспользоваться калькулятором?
4 Я не должен (должна) опаздывать на занятия.
5 Сейчас только 8 утра. Нам не нужно спешить.
6 Вам следует сменить номер сотового телефона.
7 Ей не следует так много работать на (on) компьютере.
8 Вы должны соблюдать правила информационной безопасности.
9 Вы можете воспользоваться новой версией (version) программы.
10 Ты должен познакомиться с (meet) Мэри. Она – отличный специалист.
1
1
2
3
4
5
Контрольная работа 2 к Разделу 2 Безопасность информационных
технологий (IT Security; 1-й семестр)
Translate the words and phrases from Russian into English. (0,5 балла за
правильный ответ)
удостоверять
6 уведомлять
ставить под угрозу
7 проверить рейтинг
злоумышленник
8 нажать на кнопку «отправить»
поддерживать, сохранять
9 уменьшить риск
злой умысел
10 ограничивать доступ к
2 Match the terms and their definitions. (0,5 балла за правильный ответ)
confidentiality
integrity
availability
privacy policy permission
WWW
HTML
DoS
IPS
VPN
1 When you allow someone to do something.
2 People cannot modify information in an unauthorized or undetected manner.
3 It is the standard markup language for creating webpages and web applications.
4 It is an attempt to make a machine or network resource unavailable to its users.
5 It is the property that information is not available to unauthorized individuals or
processes.
6 It is a device or software application that monitors a network or systems for
malicious activity.
7 It is an information space where documents and other web resources can be
accessed via the internet.
8 It is a statement or a legal document that discloses some or all of the ways a party
gathers, uses, discloses, and manages a customer or client’s data.
9 The information must be available when an individual needs it. The computer
systems store and process the information, the security controls protect it.
10 It is used by some workers to connect using a computer to do work – they can
check their email and see work websites which cannot be seen on the normal
internet.
3 Fill in the gaps with the correct words. (1 балл за правильный ответ)
1 Computer security __________ and __________ unauthorized use of your
computer.
2 CIA are at the heart of the security. Other security goals include __________,
__________, __________, and __________.
3 The main types of computer networks are the following: __________,
__________, and __________.
4 Communications security involves some electronic communications such as
__________, __________, posts on __________, and __________.
5 People store and transmit information from __________, __________,
__________, __________, and other mobile devices.
4 Choose the corrective alternative. (0,5 балла за правильный ответ)
 My sister (1) was / has been interested in security ever since she (2) was /
has been a child.
 Where (3) did you first meet / have you first met your boyfriend?
 We (4) wanted / have wanted to go to the cinema last night, but there (5)
weren’t / haven’t been any seats.
 What can we do? I’m sure something (6) happened / has happened to Alex.
We’ve been waiting over an hour and he (7) didn’t phoned / hasn’t phoned
yet.
 Is this the first time you (8) cooked / have cooked pasta?
 I (9) posted / have posted that CD to you three weeks ago. If you still (10)
didn’t receive / haven’t received
it, email me immediately.
5 Put the verb into the correct form: past simple or present perfect. (0,5 балла
за правильный ответ)
1 I __________ (not eat) a burger since last month.
2 Yesterday I __________ (ride) my bicycle to the shops.
3 In the past six months I ___________ (do) the washing up every day.
4 Since my last birthday I __________ (not eat) any birthday cake.
5 I ___________ (not drive) a car recently.
6 Last year I ___________ (break) my leg.
7 Six months ago I __________ (pass) an important exam.
8 I sucked my thumb when I __________ (be) a child.
9 I ___________ (not play) tennis yesterday evening.
10 This week I ___________ (watch) television every morning.
6 Complete the sentences with the verbs from the box in the correct form: past
simple or present perfect. (0,5 балла за правильный ответ)
be
break earn
forget give
go
have
open
speak tell
1 Glenda ___________ to the cinema every weekend when she was a student.
2 Pippa __________ very quiet recently. Is she OK?
3 __________ Tina __________ to her parents since she left home?
4 Eric __________ the door before I rang the bell.
5 Ow, that hurt! I think I __________ my toe.
6 How long __________ Neil __________ his present job?
7 Jock __________ me about his problems last night.
8 I ___________ Sue’s mobile number. Do you have it?
9 __________ Brian __________ you his new address before he moved
house?
10 Jane __________ more money in her last job, but she enjoys this one more.
Зачетная контрольная работа по разделам 1-4 1 семестр.
1 Translate the words and phrases from Russian into English. (0,5 балла за
правильный ответ)
1 голос
2 осматривать
3 уязвимость нулевого дня
4 подлинность
5 уничтожение
6 перезаписывать
7 стирание данных
8 принимать меры
9 толковать, интерпретировать
10 вторжение и мошенничество
2 Match the words and definitions. (0,5 балла за правильный ответ)
automated system
terrorist
describe
theft
review
point of view
necessary
numerous
unintended
goal
1 a particular attitude or way of considering a matter
2 a person who uses terrorism in the pursuit of political aims
3 a report in the media in which someone gives their opinion of something
4 great in number; many
5 If you ... a person, object, event, or situation, you say what they are like or what
happened.
6 needed to be done, achieved, or present; essential
7 not planned or meant
8 the action or crime of stealing
9 the object of a person's ambition or effort; an aim or desired result
10 the set of software and hardware that allows computer systems, network devices
or machines to function without any manual intervention.
3 Fill in the gaps with the correct words. (1 балл за правильный ответ)
- Different threats can 1)_____ _____
______, gather sensitive information,
or gain access to private computer systems.
- Many network security threats today are spread over the internet: spyware and
adware, worms and viruses, Trojan horses and 2) _____of_____, hacker and zeroday attacks, 3) _____ _____and______.
- People store and 4) _____ it from smartphones, tablets, netbooks, laptops, and
other mobile devices.
- Try to 5) _____ ______ a reason why the app or game need each permission,
and if you cannot, do not install.
4 Present Simple or Present Continuous. Choose the correct variant. (0,5 балла
за правильный ответ)
1 It often rains / is raining in autumn.
2 Do not go out, it rains / is raining heavily.
3
4
They still discuss / are still discussing where to go now.
My elder sister has / is having a music lesson. She always has / is having a music
lesson on Friday.
5 Father reads / is reading a newspaper. He usually reads / is reading something
6 I often meet / am meeting you at the corner of this street. Do you wait / Are you
waiting for anybody?
7 Do you understand / Are you understanding the use of the Present Simple?
8 Do you hear / Are you hearing anything? – Yes, somebody knocks / is knocking at
the door.
9 Why do you smile / are you smiling, Kitty?
10 What do you write / are you writing? Do you make / Are you making notes about
the two present tenses?
5 Complete the sentences with a word or phrase from the box. (0,5 балла за
правильный ответ)
ago
just
ever
for
never already
yet
since
1. Have you … worked with a supercomputer?
2. I don’t want to go to the cafeteria now. I’ve … had lunch.
3. I haven’t seen Ruslan … Monday.
4. My family has lived in Tomsk … ages.
5. Sonia has … swam in the river. She hates cold water.
6. The teacher hasn’t come … , so we are not late.
7. We left the school a year … .
8. We’ve … booked our tickets. We’re going to Sochi.
9. I have … eaten my cake.
10.I have studied here … September.
6 Complete the dialogue using Present Perfect or Past Simple form of the verbs
in brackets. (0,5 балла за правильный ответ)
Sam: How long 1) … ( you/ to know) each other?
Max: We 2) … (to meet) two years ago.
Sam: And when 3) … (you/to decide) to play together?
Max: We 4) … (begin) playing together seven months ago.
Tony: When we 5) … (to start), we 6) … (to learn) some songs but we 7) … (not to
play) in tune.
Max: It 8) … (be) terrible.
Tony: We 9) … (have) to practice a lot and of course we 10) … (not finish) it yet.
Контрольная работа 1 к Разделу 5 «Угрозы (Threats; 2-й семестр)»
1 Translate the words and phrases from Russian into English. (0,5 балла за
правильный ответ)
1 перехватывать почту
2 объединять силы
3 соучастник
4 улучшать, усиливать
5 взаимозаменяемый
6 разрушительный
7 воспроизводить
8 считать, полагать
9 напоминать
10 зависеть от
2 Match the words and definitions. (0,5 балла за правильный ответ)
respond
damaging
exact
note
interchangeable
devastating
single
attach sth to sth
replicate
capability
1 accurate or correct in all details
2 causing physical damage
3 highly destructive or damaging
4 join or fasten (something) to something else
5 make an exact copy of; reproduce
6 notice or pay particular attention to (something)
7 only one; not one of several
8 power or ability to do something
9 say something in reply
10 that can be exchanged with each other without it making any difference.
3 Fill in the gaps with the correct words. (1 балл за правильный ответ)
1 Most cyber crimes are ______by individuals or small groups.
2 The computer as a______– committing ‘traditional’ crimes that can be committed
offline too, such as theft or illegal gambling.
3 A Trojan horse is full of as much trickery as the mythological Trojan Horse it was
______.
4 _____ is any software that gathers user information through the user’s internet
connection without his or her knowledge, for advertising purposes.
5 The British Parliament consists of two______: the House of Lords and the House
of Commons.
4 Choose the correct variant:
1. A letter to uncle Sam … a few hours ago.
a. sent
b. is sent
2. Grandpa … by his grandson.
a. is often helped
b. is often helping
c. was sent
c. often is helped
3. The car … last afternoon.
a. be washed
b. is washed
4. I … to school by car every day by my father.
a. was driven
b. am driven
5. Homework … by the students yesterday.
a. wasn’t done
b. wasn’t did
6. Chicken soup … on Sundays.
a. are cooked
b. is cook
7. … the phone … by you when I called?
a. Was … answered
c. Does
b. Is … answered
answered
8. Cartoons … by the kids every evening.
a. is watched
b. is watch
9. Baseball … in my school.
a. aren’t practiced
b. isn’t practice
10.More
and
more
trees
…
a. are cut
b. are cutted
5
1
2
3
4
5
c. was washed
c. are driven
c. isn't done
c. is cooked
…
c. are watched
c. isn’t practiced
down
every
year.
c. were cut
Rewrite the sentences in passive voice. (1 балл за правильный ответ)
I can answer the question.
She would carry the box.
You should open the window.
We might play cards.
You ought to wash the car.
6 Choose the correct answer. (1 балл за правильный ответ)
1. I can’t use my office at the moment. It ...
a) is painted
b) is being painted
c) has been painted
2. Hundreds of people .. by the new factory this year.
a) are employed
b) is employed
c) have been employed
3. - ... the computer ... at the moment? - Yes, Jim is using it.
a) is … used
b) is … being used
c) has … been used
4. Some trees ... down in the storm already.
a) are blown
b) was being blown
c) have been blown
5. The bridge was broken last week and it ... yet.
a) wasn’t repaired
b) isn’t repaired
c) hasn’t been repaired
Контрольная работа 2 к Разделу 6 «Защита (Defences; 2-й семестр)»
1 Translate the words and phrases from Russian into English. (0,5 балла за
правильный ответ)
1 криптография
2 изменение
3 включать в расписание, планировать
4 защитник
5 постоянно
6 сигнализация
7 отпечаток глаза
8 принять решение
9 умный
10 решать проблему
2 Match the words and definitions. (0,5 балла за правильный ответ)
eavesdrop
decrypt
scam
barrier
personnel
intelligent
wire
confusing
feature
rootkit
1 a dishonest scheme; a fraud
2 a length or quantity of metal used to carry an electric current, for fencing, etc.
3 a part of the face, such as the mouth or eyes, making a significant contribution to
its overall appearance
4 A person or animal that is _____has the ability to think, understand, and learn
things quickly and well.
5 a set of software tools that enable an unauthorized user to gain control of a
computer system without being detected
6 listen secretly to what other people are saying.
7 make (a coded or unclear message) intelligible
8 people who work for an organisation
9 something such as a fence or wall that is put in place to prevent people from
moving easily from one area to another.
10 Something that is _______ makes it difficult for people to know exactly what is
happening or what to do.
3 Fill in the gaps with the correct words. (1 балл за правильный ответ)
1 Nowadays the methods used to _______cryptology are increasingly complex and
its application is more widespread.
2 ______ ______ is a program or set of programs that are intended to prevent,
search for, detect, and remove software viruses
3 All of these programs are access control mechanisms that ______users from
intruders.
4 Even though they have a common base, they fit into the network in different
places, have different functions, and ______ different _____.
13
5 Some universities _____ a vocational foundation degree.
4 Complete the sentences with a comparative or superlative. . (0,5 балла за
правильный ответ)
1 Money is important but it isn’t ___________ (important) thing in life.
2 Excuse me, where’s ___________ (near) computer shop?
3 Mark is a ___________ (good) programmer than Peter.
4 Don’t write an email. It’s ___________ (easy) to phone.
5 This smartphone is OK but I think that one is ___________ (nice).
6 I think it’s ___________ (happy) day in my life.
7 Russia is ___________ (big) than the USA.
8 What is ___________ (expensive) laptop?
9 England is ___________ (large) country in the United Kingdom.
10 Stephen is ___________ (intelligent) than Thomas.
5 Complete the sentences using one of the forms: “will” or “going to”. (0,5
балла за правильный ответ)
1. - Are you going to the supermarket? - Yes, I ... (to buy) some food.
2. - Where are you going? - I ... (to buy) an ice cream.
3. ... (you/ to read) this detective story? Can I take it?
4. Can I use your toothpaste? I ... (to brush) my teeth.
5. I can’t see you in the evening. I ... (to visit) my parents.
6. I promise I ... (to visit) you as soon as I can.
7. I’m not sure but it’s possible that they ... (to ask) to do a test project.
8. It is her birthday tomorrow. She ... (to be) 19.
9. Of course I ... (to take) you to the station.
10.Oh, I’m sorry. I completely forgot. I ... (to do) it in a minute.
6 Put the verb in brackets in Present Simple or Future Simple. (0,5 балла за
правильный ответ)
1 If she _____ (invite) me, I _____ (go)
2 If it _____ (rain), we _____ (cancel) the match.
3 If I _____ (get) a promotion, I _____ (buy) a car.
4 If she _____ (be late), we _____ (go) without her.
5 If you _____ (ask) more politely, I _____ (buy) you a drink.
6 If you _____ (not behave), I _____ (throw) you out.
7 If he _____ (win) the first prize, his mother _____ (be) happy.
8 If he _____ (get) proper medical care, he _____ (survive)
9 If the drought _____ (continue), plants and animals _____ (perish).
10 If she _____ (work) hard, she _____ (pass)
14
Экзаменационная контрольная работа к Разделам 5 и 6
1 Translate the words and phrases from Russian into English. (0,5 балла за
правильный ответ)
1 добавлять
6 шпионское ПО
2 нарушать политику
7 получатель
3 раздражающий
8 шифр
4 сложный
9 с опозданием
5 всплывающее окно
10 единый указатель ресурса
2 Match the words to make phrases. (0,25 балла за правильный ответ)
1 advanced
a coordinated attack
2 access
a cyber crime
3 make a
a personal grant
4 digital
action
5 intrusion
after
6 from the
an application
7 solve a
control
8 academic
costs
9 living
decision
10 obtain
degree
11 steal
number
12 commit
people’s identities
13 launch
persistent threat
14 trace
prevention system
15 tough
problem
16 under
punishment
17 be named
security point of view
18 growing
signature
19 purchase
the law
20 particular
the source of sth
3 Rewrite the sentences into Passive. (0,5 балла за правильный ответ)
1 Bad weather has delayed the trains.
2 Charles Dickens wrote Bleak House.
3 Someone has stolen my watch.
4 He broke his leg in a skiing accident.
5 Jack is taking Sandra out for a ride in his new car.
6 While we are away, the neighbours will water our plants.
7 People play football in most countries of the world.
8 Someone has given him a lot of money.
9 We should invite the guests this week.
10 You can’t wash this dress.
15
4 Choose the correct answer. (0,5 балла за правильный ответ)
1 Enough! I ... with your behaviour any longer.
a. won't put up
b. am not going to put up
c. am not putting up
2 Have you heard that Tom ... abroad next month?
a. will go
b. going to
c. is going
3 We ... to London tomorrow. We have the tickets.
a. will fly
b. are flying
c. are going to fly
4 - Sarah: I ... today. - Sam: I ... you.
a. will clean ... will help
b. am cleaning ... am going to help
c. am going to clean ... will help
5 Don't be afraid, I ... you.
a. won't hurt
b. am not going to hurt
c. am not hurting
6 Have you heard the news? The government ...
a. is going to demit
b. will demit
c. is demitting
7 The sky is dark. It ... a storm.
a. will be
b. is going to be
c. is being
8 I expect you ... a good decision.
a. will make
b. are making
c. are going to make
9 I'm sure I ... to this job.
a. will be up
b. am going to be up
c. will being up
10 Manager: Today we have a special offer. This PC costs only 1000$. Client: Well, I
... it.
a. will buy
b. am going to buy
c. am buying
16
Темы устного собеседования или презентации для устной части экзамена.
1
2
3
4
5
6
7
Cyber Criminals
Cyber Crimes and Punishment
Computer Viruses, Worms, and Trojan Horses
Types of Software
Cryptography
Antivirus software
Computer access control (Access Control Systems, Identification, Authorization,
Authentication)
8 Firewall, Intrusion Detection System & Intrusion Prevention System
9 Тематика по выбору студента при согласовании с преподавателем.
17
Контрольная работа 1 к Разделу 9 «Нелегальные виды деятельности
(Illegal activities; 3-й семестр)», по темам 9.1 – 9.4
1 Translate the words and phrases from Russian into English. (0,5 балла за
правильный ответ)
1 перебирание
2 исследовать
3 запускать
4 регистрационный (серийный) номер
5 патч, «заплата»
6 трейнер
7 законный
8 привлекать
9 власть
10 творческий
2 Put the words from the box into the correct sentences. (0,5 балла за
правильный ответ)
popular
experimented
positive
meaning
frequency
gleaned
term
cheats
thieves
launch
1 Myocardial infarction is the medical ______ for a heart attack.
2 NASA plans to ______ a satellite to study cosmic rays.
3 She was one of the most _____ girls in the school.
4 She always ______ at cards.
5 The _____ of this word is ‘breakthrough, release’.
6 The company received a _____ response from investors. They signed a
contract.
7 The designers _____ with new ideas in lighting.
8 The ______ of Kara's phone calls increased rapidly.
9 The ______ snatched the camera.
10 The information is _____ from press cuttings.
Translate the sentences. . (1 балл за правильный ответ)
Hacking is a systematic and tiresome process of a lot of complex activities.
Crackers remove or disable features that they think undesirable.
Social engineers are a modern day form of fraudsters or con artists.
Social engineers have been known to appeal to vanity, authority, greed, or other
information gleaned from social media.
5 Phreaking is the art and science of cracking the telephone network.
3
1
2
3
4
4 Choose the correct adjective. (0,5 балла за правильный ответ)
1 My nephew was (amusing / amused) by the clown.
18
2 It’s so (frustrating / frustrated)! No matter how much I study I can’t seem to
remember this vocabulary.
3 This lesson is so (boring / bored)!
4 I’m feeling (depressed / depressing), so I’m going to go home, eat some chocolate,
and go to bed early with a good book.
5 I thought her new idea was absolutely (fascinated / fascinating).
6 This maths problem is so (confusing / confused). Can you help me?
7 The teacher was really (amusing / amused) so the lesson passed quickly.
8 The journey was (exhausting / exhausted)! Twelve hours by bus.
9 The plane began to move in a rather (alarming / alarmed) way.
10 He was (frightening / frightened) when he saw the spider.
5 Put the verbs in brackets into the correct form, Gerund or Infinitive. (0,5
балла за правильный ответ)
A: Let's 1) … (to go) to the stadium at the weekend.
B: No, I hate 2) … (to run).
A: We won’t 3) … (to run). Anyway, you love 4) … (to walk). The weather will be
warm.
B: That's different.
A: Sam told me that you want 5) … (to have) guitar lessons. Will you let me 6) …
(to listen) you playing?
B: Do you really want 7) … (to listen)? I can 8) … (to play) only one song.
A: Yes, I'd 9) … (love) to.
B: Well, come to my room tomorrow. I promise 10) … (to play) my best.
6 Put the particle “to” into the sentences if necessary. (0,5 балла за
правильный ответ)
1. I’m sorry I forgot ... send you my notes yesterday.
2. Don’t worry. The exam may not ... be very difficult.
3. You won’t ... like it. It’s not a very tasty fruit.
4. Mike couldn’t ... answer to this question.
5. The teacher makes us ... do a lot of tasks.
6. Our teacher sometimes lets us ... leave early.
7. The view at the see makes me ... feel good.
8. They can ... receive the message next week.
9. When do you want ... go home?
10.You can't … run here.
19
Контрольная работа 1 к Разделу 9 «Нелегальные виды деятельности
(Illegal activities; 3-й семестр)», по темам 9.5 – 9.6 и Разделу 10
«Иностранный язык для специальных целей (3-й семестр)»
1 Translate the words and phrases from Russian into English. (0,5 балла за
правильный ответ)
1 другие
2 ведущий, основной
3 кукуруза и пшеница
4 судебная власть
5 исполнительная власть
6 законодательная власть
7 высший, верховный закон
8 ценность
9 особенно
10 просто
Translate the sentences. . (1 балл за правильный ответ)
A computer student experiments with cracker techniques.
A thief steals credit card numbers or other valuable data.
People use it to modify memory of a computer game. It can manipulate the data to
cheat in the game.
4 For instance, an attacker requests login credentials in exchange for a free gift.
5 Phreaks use weaknesses in the phone system.
2
1
2
3
3 Fill in the blanks with the correct prepositions. (0,5 балла за правильный
ответ)
1 She lives _____ London.
2 I was born _____ 1979.
3 He prefers to work _____ a farm.
4 Mr. David and his wife stay _____ the seaside for a month each May.
5 They will return _____ sunset.
6 He is the son _____ an Engineer.
7 His mother died _____ cholera.
8 Would you prefer to work _____ a factory or on a farm.
9 The Prime Minister lives _____ Smith’s street.
10 He went to school _____ foot.
11 These stories are interesting _____ children.
12 I write _____ a pen.
13 The mouse ran _____ to the hole.
14 Rosy reaches school _____ 8 o’clock.
15 It is good _____ health.
16 John was looking _____ his friend.
17 She will come _____ Christmas.
20
18 She will come _____ Christmas day.
19 She will come _____ summer.
20 She is _____ home.
4 Read the text and define if the sentences are true or false(1 балл за
правильный ответ)
A computer worm is a kind of malware that is able to copy itself, and spread.
Unlike a computer virus, this is done without changing files on a computer, and
without affecting the boot sector of media. Worms spread over networks, or on
removable media like USB flash drives. They almost always need a helper program
that is able to access the network, or that executes when a new medium is inserted. In
that way, a worm could start a program to send electronic mail, and send itself on to
all the addresses in the address book of the email application. A very famous worm
that appeared in 2000 was called ILOVEYOU (or Love Letter), it sent a simple mail
with the subject ILOVEYOU, and an attachment of a document that contained the
worm code.
A trojan horse (Sometimes called a trojan) is a kind of malware. It is special
computer program that pretends to do a certain thing, but in reality it does something
else, such as allow a stranger to access the computer and change it and read its
information. In some cases the user notices, in other cases they do not. Spyware
programs are current examples of programs that work as trojans.
It is rare to get a trojan on your computer by merely visiting a website, though it
can happen. Usually, though, a trojan is attached to something you download.
Usually they attach themselves to music, wallpapers, backgrounds, games, and
especially executable files (.exe) and so on. It was named after the Trojan Horse in
Greek mythology.
1 A very famous worm sent an e-mail with the body “ILOVEYOU”
2 Computer worm can copy your information.
3 Computer worm doesn’t change user’s information.
4 Spyware programs are trojans.
5 Trojan can allow stranger to use your computer and read your information.
6 Trojans attach themselves to e-mails.
7 User always notices that somebody reads his data.
8 Worm needs access the network to work.
9 Worm sends electronic mails and its copies to other users.
10 You usually cannot catch a Trojan when visiting websites.
21
Зачетная контрольная работа 1 к Разделу 9 «Нелегальные виды
деятельности (Illegal activities; 3-й семестр)» и Разделу 10 «Иностранный
язык для специальных целей (3-й семестр)»
1 Translate the words and phrases from Russian into English. (0,5 балла за
правильный ответ)
1. удовольствие и развлечение
2. перебирание
3. проникновение
4. определять
5. дорогой и неэтичный
6. жульничать в игре
7. мошенник
8. привлекать
9. смягчать, уменьшать
10.любопытный по отношению к
2 Match the words to make phrases. (0,5 балла за правильный ответ)
1. federal
activity
2. have a
advances
3. make a
and amusement
4. take
and tiresome process
5. masquerade
as sb/sth
6. social
cracking
7. software
engineering
8. remove or disable
features
9. generate
free call
10.expert on
large influence on
11.systematic
legitimate licenses
12.complex
number
13.pleasure
part in
14.result in
programming languages
15.covering
republic
16.serial
tracks
3
1
2
3
4
5
6
7
8
Choose the correct adjective. (0,5 балла за правильный ответ)
This wet weather is so ...... . depressed / depressing
I will be very ..... if she does well in her test. surprised / surprising
My new job is extremely ...... .
tired / tiring
I come home extremely ..... at the end of each day. tired/ tiring
He's such a ..... person. He never wants to go out. bored / boring
I'm ...... I have no idea what to do. confused / confusing
Did you hear the ..... news about the accident? shocked / shocking
I'm not very ..... in sport. interested /
interesting
22
9 I didn't find his joke very ...... .
amused / amusing
10 I am ..... of spiders. frightened / frightening
11 I am ..... with my grade in the grammar test. disappointed / disappointing
12 The film is very ...... excited / exciting
13 I am ..... about my test grades. They are all quite bad. depressed / depressing
14 It was not ..... she failed her tests. She never studied. surprised / surprising
4 Read the text and define if they are true or false. (1 балл за правильный
ответ)
Telephone
A telephone is an electric tool. Using a telephone, two people who are in
different places can talk to each other. Early telephones needed to be connected with
wires. Now telephone calls can be sent with radio. This is called wireless or cordless.
Alexander Graham Bell was the first person to patent the telephone, in 1876.
Early telephones were wired directly to each other and could only talk to the phone
that they were connected to. Later, telephone exchanges allowed connecting to other
telephones. During the 20th century the machines that made the connections were
automated.
There are many different types of telephone. A telephone that can be carried
around is called a mobile phone or cell phone. These became popular in the late
1980s. These days’ people carry mobile phones and in some cities or countries it is
unusual to not have one. Some mobile phones are able to make telephone calls using
communications satellites instead of masts on the ground, which means people can
make calls from anywhere in the world.
Computers can use a machine called a modem to talk to other computers over a
telephone line. This allows a computer to connect to other computer networks
including the Internet.
In most countries there are public telephones. To use one people have to pay
with coins, a credit card or a prepaid card.
Most countries have a telephone network. In less developed countries cell
phones are used as a cheaper and faster way to bring modern communications to the
countryside.
1
2
3
4
5
All telephones needed to be connected with wires in the past.
Now telephone calls can be sent with radio.
Mobile phones became popular in the late 1980s.
There are many different types of telephone.
Some mobile phones are not able to make telephone calls using communications
satellites.
6 Computers can use a modem to connect to other computers over a telephone line.
7 People can make calls from anywhere in the world.
8 A computer can connect to other computer networks including the Internet.
9 In most countries there are public telephones.
10 Few countries have a telephone network.
23
Контрольная работа 1 к Разделу 12 «Различные темы по безопасности
(Security Topics; 4-й семестр)», по темам 12.1 – 12.4
1 Translate the words and phrases from Russian into English. (0,5 балла за
правильный ответ)
1 огромное количество
6 признавать
2 изменяемый
7 уязвимый
3 постоянный
8 подчинять(ся)
4 военный
9 усилие, борьба
5 случай
10 завоеватель
2 Put the words from the box into the correct sentences. (0,5 балла за
правильный ответ)
illegal
citizens
incomes
cash-flow
entity
mention
freedom
surveillance
recognized
opportunity
1. A business is treated as a separate economic or accounting _______.
2. A French-based pharmaceuticals company ran into _______ problems and faced
liquidation.
3. He found himself put under ______ by British military intelligence.
4. His work was _______ by an honorary degree from Glasgow University
5. I had an _______ to go to New York and study.
6. It is ______ to intercept radio messages.
7. Many families on low ______ will be unable to afford to buy their own home.
8. She made no ______ of her disastrous trip to Paris.
9. The life of ordinary ______ began to change.
10.Today we have the _______ to decide our own futures.
3 Translate the sentences. . (1 балл за правильный ответ)
1. If you’re looking to learn how to code, the sheer number of programming
languages may be overwhelming.
2. They believe that the scope of the data breach is the biggest in US history.
3. People now believe that cyberattacks are one of the top security threats.
4. The earliest mention of the term national security goes back to 1790.
5. Economic security is the condition of having stable income and/or other resources
to support a standard of living now and in the future.
4 Rewrite the sentences using reported speech. (0,5 балла за правильный
ответ)
1 Benjamin: "I often have a big hamburger."
Benjamin says (that) … .
2 Hannah: "They live in Boston."
Hannah said (that) … .
3 Tyler: "Ian doesn't invite girls to his parties."
Tyler told me (that) … .
24
4 Dominic: "She understands Japanese."
Dominic remarks … (that) .
5 Sophia: "Bella doesn't collect stickers."
Sophia explains … (that) .
6 Robert: "Dennis often downloads the latest tunes."
Robert added (that) … .
7 Olivia: "Leroy is out riding his new waveboard today."
Olivia explained (that) … .
8 Luke: "I don't know what to do."
Luke added (that) … .
9 Lily: "Mr Jones is rude to Samantha."
Lily thinks (that) … .
10 James and David: "We have to go now."
James and David tell me (that) … .
5 Complete the sentences with the appropriate relative pronoun. (0,5 балла за
правильный ответ)
1 A mouse is an instrument … is used for navigating on a computer screen.
2 Football is a team game … is played with eleven players on each side.
3 The Prime Minister is the person … is in charge of the government.
4 Scotland is the country … is the most northern of the United Kingdom.
5 A hospital is a place … you go if you are seriously ill or injured.
6 The Pope is the person … is the head of the Roman Catholic Church.
7 Albert Einstein is the scientist … is responsible for the theory of relativity.
8 An oven is a machine … is used to bake in.
9 The Matrix is the film … introduced the principle characters Neo, Trinity and
Morpheus.
10 Manchester is the city … you can find Old Trafford stadium.
6 Put the word in the correct order to make questions. (0,5 балла за
правильный ответ)
1 do from? Where you come
2 football? to wants Who play
3 Why you late? are
4 What you nervous? makes so
5 today? How does he feel
6 live? brother does Where your
7 guitar? to likes Who the play
8 do practise When tennis? you
9 What do to want tonight? you do
10 How their many homework? did students
25
Контрольная работа 1 к Разделу 12 “Различные темы по безопасности
(Security Topics; 4-й семестр), по темам 12.5 – 12.6 и Разделу 13
“Иностранный язык для специальных целей (4-й семестр)”
1 Translate the words and phrases from Russian into English. (0,5 балла за
правильный ответ)
1 частный
2 курс лекций (обучения) по
3 гуманитарные науки
4 общественные и физические науки
5 недорогое образование
6 присуждать учёную степень
7 получить «кредит», зачёт
8 зачётная единица трудоёмкости
9 обучение; плата за обучение
10 заём, ссуда
2 Translate the sentences. . (1 балл за правильный ответ)
1 Liberal arts institutions offer courses in the arts, humanities, languages, and social
and physical sciences.
2 They often get scholarships, student loans, or grants.
3 Students usually earn credits for programmes they take.
4 Financial security more often refers to individual and family savings and money
management.
5 It has replaced other concepts that described the struggle of states to overcome
various external and internal threats.
3 Put a/an or the into the gaps. (0,5 балла за правильный ответ)
1 I want ____ apple from that basket.
2 ____ church on the corner is progressive.
3 Miss Lin speaks ____ Chinese.
4 I borrowed ____ pencil from your pile of pencils and pens.
5 One of the students said, "____ professor is late today."
6 Eli likes to play ____ volleyball.
7 I bought ____ umbrella to go out in the rain.
8 My daughter is learning to play ____ violin at her school.
9 Please give me ____ cake that is on the counter.
10 I lived on ____ Main Street when I first came to town.
11 Albany is the capital of ____ New York State.
12 My husband's family speaks ____ Polish.
13 ____ apple a day keeps the doctor away.
14 ____ ink in my pen is red.
15 Our neighbors have ____ cat and ____ dog.
16 I have just had __________ great idea.
26
17 Columbus was one of __________ first people to cross __________ Atlantic.
18 __________ British drink too much tea.
19 __________ Thames flows into __________ North Sea.
20 Judith earns € 2000 __________ month.
4 Read the text and define if the sentences are true or false(1 балл за
правильный ответ)
The word “hacker” is derived from the verb “to hack through” that means “to
break through”. The word combines two meanings: one is negative – “hacker”, and
the other- positive and is perceived as “master” or “expert”. While speaking about
computers the verb “to hack” stands for two operations – to crack the system or to
repair it. The idea of these both actions is the same – the mode, the computer and its
programs work in.
The first hackers were the students of Massachusetts Institute of Technology
(MIT). They were interested in creating innovative, stylistic and technically clever
circuits. During the spring of 1959 a new course was offered at MIT – a freshman
programming class. Instead of creating a better circuit, hackers began to create a
faster and more efficient program – with the least number of lines of code. Soon they
formed a group and worked out the first set of hacker’s rules, called the Hacker’s
Ethics. The members of this group were engaged in writing and exchanging new
programs and in perfecting the hardware. They worked at MIT’s Artificial
Intelligence laboratory and over the years introduced many innovations: LIFE – a
game about survival; LISP – a new kind of programming language; the first computer
chess game; the CAVE – the first computer adventure and SPACEWAR – the first
video game.
There are four generations of hackers in the history of computer revolution.
Each generation made its contribution to computer technology.
The first generation hackers came into being in the late 1960s – the early
1970s. They were university students of computer science departments. Using the
time-sharing mode these hackers converted general-purpose computers (mainframes)
into virtual personal computers.
The second generation hackers refer to the late 1970s. Their names are
associated with the invention and production of personal computers. Following the
Hacker’s Ethics they opposed the commercialism of the Internet by creating
programs and making them available to everybody, the so-called “freeware” or
“shareware”.
The third generation hackers appeared in the early 1980s. They created a lot
of educational, application and video games and programs for personal computers.
The present generation of hackers is the fourth generation. It is this
generation that transformed the military Arpanet into a total digital world called the
Internet.
But in the late 1990s the word “hacker” began to associate with the word
“cracker”. Today it refers to the people who intentionally crack the access control and
penetrate into other people’s computers in unauthorized ways. Such hackers read
27
private e-mails, steal confidential information, misappropriate the program. They
cause great damage to economics, business, banking and many other aspects of
people’s relations. Moreover, it is unsetting to know that a great deal of computer
crimes go undetected and a lot of computer criminals remain uncaught.
1 Creation, use and spreading harmful programs for PCs is a criminal offence.
2 It was the first-generation hackers who made computer programs available to
everybody.
3 In the early 1990s the word “hacker” began to associate with the word “cracker”.
4 The second-generation hackers came into being in the late 1970s.
5 Modern “hackers” are only interested in creating innovative and technically clever
circuits.
6 The first set of hacker’s rules was worked out by the teachers of MIT.
7 There are three generations of hackers in the history of computer revolution
8 The first hackers stole confidential information and read private E-mails.
9 The present-generation hackers make great contribution to all the aspects of
people’s relations.
10 The word “hacker” only means ‘master” or “expert”.
28
Экзаменационная контрольная работа к Разделам 12-14
1 Translate the following words from Russian into English. (0,5 балла за
правильный ответ)
1
2
3
4
5
рекламное ПО
доступность
конфиденциальность
исследовать
целостность
6 ссылка
7 вредоносное ПО
8 надоедливое ПО
9 одержимость
10 шпионское ПО
2 Complete the following sentences with the correct phrases. (0,5 балла за
правильный ответ)
exchanging information
install programmes
instant messaging
make free calls
malicious intent
prevents and detects serial number
software cracking
the HTML
the World Wide Web
1
2
3
4
5
6
Computer security __________ unauthorized use of your computer.
Intruders can use your computer resources with __________ or for their own gain.
During the covering tracks step hackers __________.
__________ is the modification of software.
Crackers use a stolen __________ or a tool.
Phreaks crack the phone network and gain unauthorized access to
telecommunication systems, especially to __________.
7 Tim Berners-Lee from the UK created __________ in Switzerland in 1989.
8 Most webpages are in __________ format.
9 We use the Internet for electronic mail (email), online chat (__________), file
transfer, working from home, and many other things.
10 The Internet is an insecure channel for __________.
3 Complete the sentences with the correct verb form, to … or -ing. (0,5 балла
за правильный ответ)
1 The Internet helps you ________ (find) information.
2 I think I’ll finish ________ (write) the article at the weekend.
3 Stop ________ (use) that pirate software. It’s illegal.
4 Do you mind ________ (wait) for half an hour?
5 We can’t afford ________ (go) abroad this summer.
6 I think Pauline will fail ________ (enter) the college.
7 Mark doesn’t enjoy ________ (play) computer games.
8 John needs ________ (change) the password.
9 I must remember ________ (send) Christopher an email tonight.
10 I try to avoid ________ (spend) more than two hours a day at the computer.
29
4 Write questions from the words in brackets. Put the words in the right order.
(0,5 балла за правильный ответ)
1 (websites / do / consist of / what?)
2 (does / how much / cost / a tablet computer?)
3 (a programmer / or / you / a web designer / are?)
4 (next / where / we / go / summer / will?)
5 (you / to / abroad / are / move / going?)
5 Make tag questions from these statements. (0,5 балла за правильный
ответ)
1 Your father works as an engineer.
2 Phishing is a common threat on the Internet.
3 Hackers often do phishing by email
4 We usually use antivirus software on home computers.
5 You can find web browsers on all modern computers.
30
Темы устного собеседования или презентации для устной части экзамена.
1 Hacking
2 Software Cracking
3 Social Engineering & Phishing
4 Phreaking
5 Профессиональная тематика по выбору студента и при согласовании с
преподавателем.
31
Ключи к тестам
Контрольная работа 1 к Разделу 1 «Безопасность и информация (Security
and Information; 1-й семестр)»
6 Translate the words and phrases from Russian into English. (0,5 балла за
правильный ответ)
1 terrorist attack
2 espionage and theft
3 security specialist
4 accuracy
5 completeness
6 consistency
7 uniqueness
8 timeliness
9 unauthorized access
10 intellectual property
7 Match the words to make 10 phrases. (0,5 балла за правильный ответ)
11 a business and an individual
12 a column and a row
13 avoid a security breach
14 hold sensitive information on
15 informational and analytical security system
16 keep the firewall on
17 lead to loss of
18 observe the rules of
19 point of view
20 a scheme and an algorithm
8 Choose the correct word or phrase to complete the sentence. (0,5 балла за
правильный ответ)
1 security
2 data
3 information security
4 confidential
5 reliable
6 trade secret
7 market analytics
8 disk encryption
9 data masking
10 data erasure
9 Present Simple or Present Continuous. Choose the correct variant. (0,5 балла
за правильный ответ)
32
1 is wearing
2 is he watching
3 isn’t working
4 Do you listen
5 plays
6 you’re saying
7 is running
8 don’t like
9 want
10 are you going
10 Present Simple or Present Continuous. Open the brackets. (0,5 балла за
правильный ответ)
1 are having
2 leaves
3 phone
4 lives
5 Do you have
6 is not browsing
7 don’t understand
8 am taking part
9 does your brother do
10 is starting
11 Translate from Russian into English. (0,5 балла за правильный ответ)
1 I can read English
2 We don’t have to leave now.
3 Can I use your calculator?
4 I must not be late for lessons.
5 It’s just 8 o’clock. We don’t have to hurry.
6 You should change your phone number.
7 She shouldn’t work on computer so much.
8 You must follow the rules of information security.
9 You can use a new version of the programme.
10 You should meet Mary. She is a great specialist.
1
1
2
3
Контрольная работа 2 к Разделу 2 Безопасность информационных
технологий (IT Security; 1-й семестр)
Translate the words and phrases from Russian into English. (0,5 балла за
правильный ответ)
authenticate
compromise
intruder
33
4 maintain
5 malicious intent
6 notify
7 check the ratings
8 hit a send button
9 reduce a risk
10 restrict access to
2 Match the terms and their definitions. (0,5 балла за правильный ответ)
1 permission
2 integrity
3 HTML
4 DoS
5 confidentiality
6 IPS
7 WWW
8 privacy policy
9 availability
10 VPN
3
1
2
3
4
5
Fill in the gaps with the correct words. (1 балл за правильный ответ)
prevents / detects
authentication, non-repudiation, accountability, and reliability.
LAN, WAN, CAN
email, text messages, posts on social media websites and using smartphones.
smartphones, tablets, netbooks, laptops,
4 Choose the corrective alternative. (0,5 балла за правильный ответ)
1 has been
2 was
3 did you first meet
4 wanted
5 weren’t
6 happened
7 hasn’t phoned
8 cooked
9 posted
10 haven’t received
5 Put the verb into the correct form: past simple or present perfect. (0,5 балла
за правильный ответ)
1 haven’t eaten
2 rode
3 did
34
4 haven’t eaten
5 haven’t driven
6 broke
7 passed
8 was
9 didn’t play
10 watched
6 Complete the sentences with the verbs from the box in the correct form: past
simple or present perfect. (0,5 балла за правильный ответ)
1 went
2 has been
3 has Tina spoken
4 opened
5 have broken
6 has Neil had
7 told
8 have forgotten
9 Did Brian give
10 earned
Зачетная контрольная работа по разделам 1-4 1 семестр.
1 Translate the words and phrases from Russian into English. (0,5 балла за
правильный ответ)
1 voice
2 view
3 zero-day attack
4 authentication
5 destruction
6 overwrite
7 data erasure
8 take steps
9 interpret
10 intrusion and fraud
2
1
2
3
4
5
6
7
Match the words and definitions. (0,5 балла за правильный ответ)
point of view
terrorist
review
numerous
describe
necessary
unintended
35
8 theft
9 goal
10 automated system
3
1
2
3
4
5
Fill in the gaps with the correct words. (1 балл за правильный ответ)
disrupt computer operation
denial of service
data interception and theft
transmit
figure out
4 Present Simple or Present Continuous. Choose the correct variant. (0,5 балла
за правильный ответ)
1 rains
2 is raining
3 are still discussing
4 is having/has
5 is reading/reads
6 meet / do you wait
7 do you understand
8 Are you hearing/ is knocking
9 are you smiling
10 are you writing/ are you making
5 Complete the sentences with a word or phrase from the box.
1 ever
2 already
3 since
4 for
5 never
6 yet
7 ago
8 just
9 already
10 since
6 Complete the dialogue using Present Perfect or Past Simple form of the verbs
in brackets. (0,5 балла за правильный ответ)
1 have you known
2 met
3 did you decide
4 began
5 started
6 learned
36
7 didn’t
8 was
9 had
10 haven’t finished
Контрольная работа 1 к Разделу 5 «Угрозы (Threats; 2-й семестр)»
1 Translate the words and phrases from Russian into English. (0,5 балла за
правильный ответ)
1 intercept mail
2 combine forces
3 accessory
4 enhance
5 interchangeable
6 devastating
7 reproduce
8 consider
9 remind
10 depend on
2 Match the words and definitions. (0,5 балла за правильный ответ)
1 exact
2 damaging
3 devastating
4 attach sth to sth
5 replicate
6 note
7 single
8 capability
9 respond
10 interchangeable
3
1
2
3
4
5
Fill in the gaps with the correct words. (1 балл за правильный ответ)
committed
weapon
named after
Spyware
chambers
4
1
2
3
4
Choose the correct variant:
c
a
c
b
37
5 a
6 c
7 a
8 c
9 c
10 a
5
1
2
3
4
5
Rewrite the sentences in passive voice. (1 балл за правильный ответ)
The question can be answered by me.
The box would be carried by her.
The window should be opened by you.
Cards might be played by us.
The car ought to be washed by you.
6
1
2
3
4
5
Choose the correct answer. (1 балл за правильный ответ)
b
c
b
c
c
Контрольная работа 2 к Разделу 6 «Защита (Defences; 2-й семестр)»
1 Translate the words and phrases from Russian into English. (0,5 балла за
правильный ответ)
1 cryptography
2 conversion
3 schedule
4 defender
5 permanently
6 alarm
7 fingerprint
8 make a decision
9 intelligent
10 solve a problem
2
1
2
3
4
5
6
7
8
Match the words and definitions. (0,5 балла за правильный ответ)
scam
wire
feature
intelligent
rootkit
eavesdrop
decrypt
personnel
38
9 barrier
10 confusing
3
1
2
3
4
5
Fill in the gaps with the correct words. (1 балл за правильный ответ)
carry out
Antivirus software
guard
solve problems
offer
4 Complete the sentences with a comparative or superlative. . (0,5 балла за
правильный ответ)
1 the most important
2 the nearest
3 better
4 easier
5 nicer
6 the happiest
7 bigger
8 the most expensive
9 the largest
10 more intelligent
5 Complete the sentences using one of the forms: “will” or “going to”. (0,5
балла за правильный ответ)
11 will buy
12 am going to
13 Are you going to read
14 am going to brush
15 am going to
16 will visit
17 will ask
18 will be
19 will take
20 will do
6 Put the verb in brackets in Present Simple or Future Simple. (0,5 балла за
правильный ответ)
1 If she invites me, I will go.
2 If it rains, we will cancel the match.
3 If I get a promotion, I will buy a car.
4 If she is late, we will go without her.
5 If you ask more politely, I will buy you a drink.
6 If you don’t behave, I will throw you out.
39
7 If he wins the first prize, his mother will be happy.
8 If he gets proper medical care, he will survive.
9 If the drought continues, plants and animals will perish.
10 If she works hard, she will pass.
Экзаменационная контрольная работа к Разделам 5 и 6
1 Translate the words and phrases from Russian into English. (0,5 балла за
правильный ответ)
1 add
2 violate a policy
3 annoying
4 sophisticated
5 pop-up window
6 spyware
7 recipient
8 cipher
9 behindhand
10 uniform resource locator
2 Match the words to make phrases. (0,5 балла за правильный ответ)
1 advanced
persistent threat
2 access control
3 make a decision
4 digital signature
5 intrusion
prevention system
6 from the security point of view
7 solve a problem
8 academic
degree
9 living costs
10 obtain a personal grant
11 steal
people’s identities
12 commit a cyber crime
13 launch a coordinated attack
14 trace
the source of sth
15 tough punishment
16 under the law
17 be named
after
18 growing number
19 purchase
an application
20 particular
action
3 Rewrite the sentences into Passive. (0,5 балла за правильный ответ)
1 The trains have been delayed…
40
2 Bleak House was written by Charles Dickens.
3 My watch has been stolen.
4 His leg was broken….
5 Sandra is being taken by Jack …
6 Our plants will be watered by …
7 Football is played …
8 He has been given a lot of money
9 The guests should be invited this week.
10 This dress can’t be washed.
4 Choose the correct answer. (0,5 балла за правильный ответ)
1. a
2. c
3. b
4. c
5. a
6. c
7. a
8. a
9. a
10.a
Контрольная работа 1 к Разделу 9 «Нелегальные виды деятельности
(Illegal activities; 3-й семестр)»? темам 9.1 – 9.4
1 Translate the words and phrases from Russian into English. (0,5 балла за
правильный ответ)
1 enumeration
2 explore
3 launch
4 serial number
5 patch
6 trainer
7 legitimate
8 appeal
9 authority
10 creative
2 Put the words from the box into the correct sentences. (0,5 балла за
правильный ответ)
1 term
2 launch
3 popular
4 cheats
41
5 meaning
6 positive
7 experimented
8 frequency
9 thieves
10 gleaned
3 Translate the sentences. . (0,5 балла за правильный ответ)
Student’s own answers.
4 Choose the correct adjective. (0,5 балла за правильный ответ)
1. My nephew was amused by the clown.
2. It’s so frustrating! No matter how much I study I can’t seem to remember this
vocabulary.
3. This lesson is so boring!
4. I’m feeling depressed, so I’m going to go home, eat some chocolate, and go to bed
early with a good book.
5. I thought her new idea was absolutely fascinating.
6. This maths problem is so confusing. Can you help me?
7. The teacher was really amusing so the lesson passed quickly.
8. The journey was exhausting! Twelve hours by bus.
9. The plane began to move in a rather alarming way.
10. He was frightened when he saw the spider.
5 Put the verbs in brackets into the correct form, Gerund or Infinitive. (0,5
балла за правильный ответ)
1 go
2 running
3 run
4 walking
5 to have
6 listen
7 to listen
8 play
9 love
10 to play
6 Put the particle “to” into the sentences if necessary. (0,5 балла за
правильный ответ)
1 to
2 –
3 –
4 –
5 –
42
6 –
7 –
8 –
9 to
10 –
Контрольная работа 1 к Разделу 9 «Нелегальные виды деятельности
(Illegal activities; 3-й семестр)», по темам 9.5 – 9.6 и Разделу 10
«Иностранный язык для специальных целей (3-й семестр)»
1 Translate the words and phrases from Russian into English. (0,5 балла за
правильный ответ)
1 others
2 top
3 corn and wheat
4 judicial branch
5 executive branch
6 legislative branch
7 the highest law
8 value
9 especially
10 simply
Translate the sentences. . (1 балл за правильный ответ)
A computer student experiments with cracker techniques.
A thief steals credit card numbers or other valuable data.
People use it to modify memory of a computer game. It can manipulate the data to
cheat in the game.
4 For instance, an attacker requests login credentials in exchange for a free gift.
5 Phreaks use weaknesses in the phone system.
2
1
2
3
3 Fill in the blanks with the correct prepositions. (0,5 балла за правильный
ответ)
1 in
11 for
2 in
12 with
3 in
13 in
4 at
14 at
5 at
15 for
6 of
16 for
7 of
17 at
8 at
18 on
9 in
19 in
10 on
20 at
43
4 Read the text and define if the sentences are true or false(1 балл за
правильный ответ)
1 false
6 true
2 true
7 false
3 true
8 true
4 true
9 true
5 true
10 false
Зачетная контрольная работа 1 к Разделу 9 «Нелегальные виды
деятельности (Illegal activities; 3-й семестр)» и Разделу 10 «Иностранный
язык для специальных целей (3-й семестр)»
1 Translate the words and phrases from Russian into English. (0,5 балла за
правильный ответ)
1. pleasure and amusement
6. cheat in a game
2. enumeration
7. fraudster
3. penetration
8. appeal
4. identify
9. mitigate
5. costly and unethical
10.curious about
2 Match the words to make phrases. (0,5 балла за правильный ответ)
1 federal republic
2 have a large influence on
3 make a free call
4 take part in
5 masquerade as sb/sth
6 social engineering
7 software cracking
8 remove or disable features
9 generate legitimate licenses
10 expert on programming languages
11 systematic and tiresome process
12 complex activity
13 pleasure and amusement
14 result in advances
15 covering tracks
3
1
2
3
4
5
6
Choose the correct adjective. (0,5 балла за правильный ответ)
depressing
7 shocking
surprised
8 interested
tiring
9 amusing
tired
10 frightened
boring
11 disappointed
confused
12 exciting
44
13 depressed
14 surprising
4 Read the text and define if they are true or false. (1 балл за правильный
ответ)
1 true
6 true
2 true
7 true
3 true
8 true
4 true
9 true
5 false
10 false
Контрольная работа 1 к Разделу 12 «Различные темы по безопасности
(Security Topics; 4-й семестр)», по темам 12.1 – 12.4
1 Translate the words and phrases from Russian into English. (0,5 балла за
правильный ответ)
1 sheer number
6 recognize
2 scalable
7 vulnerable
3 stable
8 subordinate
4 military
9 struggle
5 incident
10 conqueror
2 Put the words from the box into the correct sentences. (0,5 балла за
правильный ответ)
1. entity
6. illegal
2. cash-flow
7. incomes
3. surveillance
8. mention
4. recognized
9. citizens
5. opportunity
10.freedom
3 Translate the sentences. . (0,5 балла за правильный ответ)
Student’s own answers.
4 Rewrite the sentences using reported speech. (0,5 балла за правильный
ответ)
1. He often has a big hamburger
2. We lived in Boston.
3. Ian didn’t invite …
4. She understands Japanese.
5. Bella doesn’t collect stickers.
6. Dennis often downloaded …
7. Leroy was out riding his new waveboard that day.
8. He didn’t know what to do.
9. Mr Jones is rude to Samantha.
45
10.They have to go now.
5 Complete the sentences with the appropriate relative pronoun. (0,5 балла за
правильный ответ)
1 that
6 who
2 that
7 who
3 who
8 that
4 that
9 that
5 where
10 where
6 Put the word in the correct order to make questions. (0,5 балла за
правильный ответ)
1. Where do you come from?
2. Who wants to play football?
3. Why are you late?
4. What makes you so nervous?
5. How does he feel today?
6. Where does your brother live?
7. Who likes to play the guitar?
8. When do you practise tennis?
9. What do you want to do tonight?
10.How many students did their homework?
Контрольная работа 1 к Разделу 12 “Различные темы по безопасности
(Security Topics; 4-й семестр), по темам 12.5 – 12.6 и Разделу 13
“Иностранный язык для специальных целей (4-й семестр)”
1 Translate the words and phrases from Russian into English. (0,5 балла за
правильный ответ)
1 private
6 grant a degree
2 course in
7 earn a credit
3 humanities
8 unit of study
4 social and physical sciences
9 tuition
5 low-cost education
10 loan
2 Translate the sentences. . (1 балл за правильный ответ)
Student’s own answers.
3
1
2
3
4
5
6
Put a/an or the into the gaps. (0,5 балла за правильный ответ)
I want an apple from that basket.
The church on the corner is progressive.
Miss Lin speaks Chinese. (no article needed)
I borrowed a pencil from your pile of pencils and pens.
One of the students said, "The professor is late today."
Eli likes to play volleyball. (no article needed)
46
7 I bought an umbrella to go out in the rain.
8 My daughter is learning to play the violin at her school.
9 Please give me the cake that is on the counter.
10 I lived on Main Street when I first came to town. (no article needed)
11 Albany is the capital of New York State. (no article needed)
12 My husband's family speaks Polish. (no article needed)
13 An apple a day keeps the doctor away.
14 The ink in my pen is red.
15 Our neighbors have a cat and a dog.
16 I have just had a great idea.
17 Columbus was one of the first people to cross the Atlantic.
18 The British drink too much tea.
19 The Thames flows into the North Sea.
20 Judith earns € 2000 a month.
4 Read the text and define if the sentences are true or false(1 балл за
правильный ответ)
1 T
6 F
2 F
7 F
3 F
8 F
4 T
9 F
5 F
10 F
Экзаменационная контрольная работа к Разделам 12-14
1 Translate the following words from Russian into English. (0,5 балла за
правильный ответ)
1 adware
6 link (= hypertext link)
2 availability
7 malware (= malicious software)
3 confidentiality
8 nagware
4 explore
9 obsession
5 integrity
10 spyware
2
1
2
3
4
5
Complete the following sentences with the correct phrases.
prevents and detects
6 make free calls
malicious intent
7 the World Wide Web
install programmes
8 the HTML
software cracking
9 instant messaging
serial number
10 exchanging information
3 Complete the sentences with the correct verb form, to … or -ing. (0,5 балла
за правильный ответ)
1 to find
3 using
2 writing
4 waiting
47
5 to go
6 to enter
7 playing
8 to change
9 to send
10 spending
4 Write questions from the words in brackets. Put the words in the right order.
(0,5 балла за правильный ответ)
1 What do websites consist of?
2 How much does a tablet computer cost?
3 Are you a programmer or a web designer? (= Are you a web designer or a
programmer?)
4 Where will we go next summer?
5 Are you going to move abroad?
5 Make tag questions from these statements. (0,5 балла за правильный
ответ)
1 Your father works as an engineer, doesn’t he?
2 Phishing is a common threat on the Internet, isn’t it?
3 Hackers often do phishing by email, don’t they?
4 We usually use antivirus software on home computers, don’t we?
5 You can find web browsers on all modern computers, can’t you?
Критерии оценивания устной части экзамена (монологическое
высказывание)
Баллы
Решение
коммуникативной
задачи (содержание)*
9-10
Коммуникативная
задача выполнена
полностью:
содержание полно,
точно и развёрнуто
отражает все аспекты,
указанные в задании
(12-15 фраз)
7-8
Коммуникативная
задача выполнена
частично: один аспект
не раскрыт (остальные
раскрыты полно),
ИЛИ один-два
раскрыты неполно
(9-11 фраз)
Организация
высказывания
Языковое оформление
высказывания
Высказывание
логично и имеет
завершённый
характер; имеются
вступительная и
заключительная
фразы,
соответствующие
теме. Средства
логической связи
Используемый словарный
запас, грамматические
структуры, фонетическое
оформление высказывания
соответствуют
поставленной задаче
(допускается не более двух
негрубых лексикограмматических
ошибок И/ИЛИ не более
48
используются
правильно
двух негрубых
фонетических ошибок)
5-6
Коммуникативная
задача выполнена не
полностью: два
аспекта не раскрыты
(остальные раскрыты
полно), ИЛИ все
аспекты раскрыты
неполно (6-8 фраз)
Высказывание в
основном логично
и имеет достаточно
завершённый
характер, НО
отсутствует
вступительная И/ИЛИ
заключительная
фраза, И/ИЛИ
средства логической
связи используются
недостаточно
Используемый словарный
запас, грамматические
структуры, фонетическое
оформление высказывания в
основном соответствуют
поставленной задаче
(допускается не более
четырёх лексикограмматических ошибок (из
них не более двух грубых)
ИЛИ/И не более четырёх
фонетических ошибок (из
них не более двух грубых)
4-3
Коммуникативная
задача выполнена
менее чем на 50%: три
и более аспектов
содержания не
раскрыты (5 и менее
фраз)
Высказывание
нелогично И/ИЛИ не
имеет завершенного
характера;
вступительная и
заключительная
фразы отсутствуют;
средства логической
связи практически не
используются
Понимание высказывания
затруднено из-за
многочисленных лексикограмматических и
фонетических ошибок (пять
и более лексикограмматических ошибок
И/ИЛИ пять и более
фонетических ошибок)
ИЛИ более двух грубых
ошибок
0-2
Коммуникативная
задача не выполнена.
2-3 фразы
Допускаются
многочисленные
лексические и
грамматические
ошибки, которые
затрудняют
понимание.
Большое количество
фонематических ошибок.
Требования к оформлению презентаций
Стиль
Фон
Использование
цвета
·
Соблюдайте единый стиль оформления
·
Избегайте стилей, которые будут отвлекать от самой
презентации.
·
Вспомогательная информация (управляющие кнопки) не
должны преобладать над основной информацией (текстом,
иллюстрациями).
Для фона предпочтительны холодные тона
·
На одном слайде рекомендуется использовать не более трех
цветов: один для фона, один для заголовка, один для текста.
·
Для фона и текста используйте контрастные цвета.
49
·
Обратите внимание на цвет гиперссылок (до и после
использования).
Таблица сочетаемости цветов в приложении.
Анимационные ·
Используйте возможности компьютерной анимации для
эффекты
представления информации на слайде.
·
Не стоит злоупотреблять различными анимационными
эффектами, они не должны отвлекать внимание от содержания
информации на слайде.
Представление информации:
Содержание
·
Используйте короткие слова и предложения.
информации
·
Минимизируйте количество предлогов, наречий,
прилагательных.
·
Заголовки должны привлекать внимание аудитории.
Расположение ·
Предпочтительно горизонтальное расположение
информации на информации.
странице
·
Наиболее важная информация должна располагаться в
центре экрана.
·
Если на слайде располагается картинка, надпись должна
располагаться под ней.
Шрифты
·
Для заголовков – не менее 24.
·
Для информации не менее 18.
·
Шрифты без засечек легче читать с большого расстояния.
·
Нельзя смешивать разные типы шрифтов в одной
презентации.
·
Для выделения информации следует использовать жирный
шрифт, курсив или подчеркивание.
·
Нельзя злоупотреблять прописными буквами (они читаются
хуже строчных).
Способы
·
Следует использовать:
выделения
o
рамки; границы, заливку;
информации
o
штриховку, стрелки;
o
рисунки, диаграммы, схемы для иллюстрации наиболее
важных фактов.
Объем
·
Не стоит заполнять один слайд слишком большим объемом
информации
информации: люди могут единовременно запомнить не более трех
фактов, выводов, определений.
·
Наибольшая эффективность достигается тогда, когда
ключевые пункты отображаются по одному на каждом отдельном
слайде.
Виды слайдов
Для обеспечения разнообразия следует использовать разные виды
слайдов:
·
с текстом;
·
с таблицами;
·
с диаграммами.
50
Критерии оценивания устной части экзамена (презентация)
2
балла
Оформлени
е
Оформление
соответвтвуе
т
требованиям
1 балл Недочеты в
оформлении
присутствую
т, но не
мешают
нормальному
восприятию
0
балло
в
Оформление
не
соответствуе
т
требованиям
и затрудняет
восприятие
Структура
Структура
соответствует
требованиям,
присутствуют
титульный
слайд,
содержание,
заключение
Существуют
недочеты,
отсутствует
один из
необходимых
пунктов
структуры
Презентация не
структурирован
а, отсутствуют
необходимые
разделы
Грамматика
Произношен
ие
Используемый Допускается
словарный
не более
запас,
одной-двух
грамматическ фонетических
ие структуры
ошибок
высказывания
соответствуют
поставленной
задаче
(допускается
не более двух
негрубых
грамматическ
их ошибок)
Используемый Допускается
грамматическ не более
ий диапазон в четырёх
основном
фонетических
соответствует ошибок (из
поставленной них не более
задаче
двух грубых)
(допускается
не более
четырёх
грамматическ
их ошибок (из
них не более
двух грубых)
Большое
Большое
количество
количество
грамматическ фонетических
их ошибок
ошибок
затрудняет
затрудняет
восприятие
восприятие
речи
речи
Лексика
Правильное
словоупотрблени
е, стиль лексики
соответствует
теме и ситуации.
Используемый
словарный запас,
высказывания в
основном
соответствуют
поставленной
задаче
(допускается не
более четырёх
лексических
ошибок (из них
не более двух
грубых)
Большое
количество
лексических
ошибок
затрудняет
восприятие речи
Каждый критерий оценивается в отдельности, максимальное количество
баллов: 10.
Рейтинговая система для оценки успеваемости студентов
Методика подсчета промежуточной успеваемости осуществляется в
соответствии с Положением о порядке использования рейтинговой системы для
оценки успеваемости студентов (приказ ректора 25.02.2010 № 1902).
51
KTx x 1,2 
(Сумма _ баллов , _ набранная _ к _ КТx) * 5
.
Требуемая _ сумма _ баллов _ по _ балльной _ раскладке
Таблица 1. Балльные оценки для элементов контроля (зачет 1, 3 семестры).
Элементы
учебной
деятельности
Посещение
занятий
Тестовый
контроль
Самостоятельная
работа
Компонент
своевременности
Итого максимум
за период
Нарастающим
итогом
Максимальн
ый балл за 1
КТ
Максимальны
Зачетная составляющая
й балл за 2 КТ
Всего за
семестр
-
-
-
-
20
20
30
70
10
10
-
20
5
5
-
10
35
35
30
100
35
70
100
100
Примечание 1: на основании методики проведения текущего контроля успеваемости оценка
за зачет формируется по совокупности баллов, набранных студентом в течение семестра
(max 100). Независимо от суммы баллов после 2-х контрольных точек оценка за семестр
формируется по совокупности трех элементов (максимальный балл за 1 КТ (35),
максимальный балл за 2 КТ (35), зачетная составляющая (30)). Студенты, получившие в
течение семестра менее 60 баллов, зачет не получают.
Примечание 2: преподаватель имеет право добавлять от 1 до 5 бонусных баллов к
фактическому результату КТ1, КТ 2 и зачетной составляющей за активную работу студента
по освоению учебного материала, его участие во внеучебных мероприятиях, проводимых
кафедрой иностранных языков ТУСУР, или иные достижения.
Таблица 2. Пересчет баллов в оценки за контрольные точки
Баллы на дату контрольной точки
Оценка
31-35
5
24-30
4
18-23
3
< 17
2
Таблица 3. Пересчет суммы баллов в традиционную и международную оценку
(зачет)
Оценка (ФГОС)
5 (отлично) / зачтено
4 (хорошо) / зачтено
3 (удовлетворительно) /
зачтено
Итоговая сумма баллов, учитывает
успешно сданный экзамен (зачет)
90 - 100
85 – 89
75 – 84
70 - 74
65 – 69
52
Оценка (ECTS)
А (отлично)
В (очень хорошо)
С (хорошо)
D (удовлетворительно)
2 (неудовлетворительно),
(не зачтено)
60 - 64
E (посредственно)
Ниже 60 баллов
F (неудовлетворительно)
Таблица 4. Балльные оценки для элементов контроля (экзамен 2, 4 семестры)
Элементы учебной
деятельности
Посещение занятий
Тестовый контроль
Самостоятельная
работа
Компонент
своевременности
Итого максимум
за период
Нарастающим
итогом
Максимальн
ый балл за 1
КТ
-
Максимальны Экзаменационная
й балл за 2 КТ составляющая
Всего за
семестр
-
письменный
20
тест
устное
собеседование /
10
мультимедийна
я презентация
-
20
20
70
10
10
-
20
5
5
-
10
35
35
30
100
35
70
100
100
Примечание 1: на основании Положения о методике проведения итогового
контроля экзамен является обязательным. При этом семестровая составляющая
(70 баллов) является допуском к экзамену. Порогом допуска к экзамену
является 20 баллов семестровой составляющей. Итоговая оценка формируется
из экзаменационной составляющей (30 баллов).
Примечание 2: экзамен осуществляется с использованием следующих
элементов:
- письменный тест в соответствии с содержанием обучения (max 20 баллов);
- устное собеседование / или мультимедийная презентация в соответствии с
тематикой обучения (max 10 баллов).
Таблица 5. Пересчет баллов в оценки за экзамен
Баллы на дату экзамена
Оценка
27-30
5
22-26
4
16-21
3
< 15
2
53
Документ
Категория
Без категории
Просмотров
35
Размер файла
767 Кб
Теги
комплекс, simple, 2310, security, system, учебно, пособие, English, informatika, методические, контрольная, automaten, specialist
1/--страниц
Пожаловаться на содержимое документа