вторник, 26 мая 2015 г.

DEAR 1st-year undergrads
look and study the following topic for your exam below

MY DAY OFF

1. Hi, I'm ...
2. I'm a first-year undergraduate doing a Bachelor's degree in Information Technology at Dagestan State University.
3. I've got a lot of studies at the University that's why my schedule is very busy on weekdays.
4. I've only got one day-off on Sunday which I try to enjoy as much as I could.
5. As usual I meet up with my friends at the end of the week.
6. When we have time for leisure we go out for a drink and meal somewhere. 
7. I live in Makhachkala and there are many places to have a snack, rest and chat as well. 
8. They are cinemas, cafes, restaurants and clubs.
9. On Sundays my friends and I prefer going out for a meal to a cafe like "Pascucci", "Z & M" or "7th Continent". 
10. Here we can meet every kind of people: a doctor, a student, a worker or a stateman.
11. Our favourite cafe is ................
12. We like it because it serves different types of lovely food.
13. We generally prefer ordering pizza or Dagestan chudu, some salad, juice or cola.
14. For dessert we usually have coffee or black tea with some pastries.
15. While eating we like talking about different events and things, exchanging the latest news, discussing the plans for the next weekend and of course we tease and play tricks on each other.
16. I love such get-togethers with my friends.
17. And I'm always looking forward to our new hangouts.

понедельник, 11 мая 2015 г.

DEAR FRESHMEN, 
HERE ARE SOME TOPICS FOR YOUR SUMMER EXAM:

1. ABOUT MY FAMILY (используйте текст на стр.68)
2. MY WORKING DAY (используйте текст на стр.81)
3. MY FREE TIME (используйте вопросы на стр.87)
4. MY FAVOURITE ROOM (используйте текст на стр.100)
5. BACHELO'R COURSE (p.135)
6. DOING A SECOND DEGREE AT DAGESTAN STATE UNIVERSITY (p. 154)

среда, 6 мая 2015 г.

Dear, 2nd-year undergrads in Information Technology, 

Here are the topics for the exam:

1. The Internet
2. WWW
3. Hardware/Software of the computer
4. CPU / RAM/ ROM
5. Email, post, phone
6. Internet crimes
7. Peripherals
8. Malware protection