p. 156
Exercise 1
b. worrying
c. to open
d. pick up
e. banging
f. appearing
g. to stand up
h. cleaning
i. wondering
j. to think
Exercise 2
b. mind
c. deny
d. avoid
e. risk
f. imagine
g. stop
h. regret
i. consider
j. bear
Exercise 3
b. take
c. considered
d. had
e. encouraged
f. helped
g. seemed
h. allowed
i. allowed
j. attempted
k. gone
p. 157
Exercise 4
b. The burglars avoided being caught by jumping out the window.
c. Joyce's best work is considered to be Ulysses.
d. They are planning to reach the mountains ...
e. I don't prefer wasting time watching television.
f. Do you fancy going skating on Friday?
g. We can't go on ignoring this problem.
h. My parents didn't let me stay out late.
Exercise 5
b. stopped
c. decided to
d. involved
e. expected
f. seemed to
g. persuade
h. warned
i. urged
j. forced
k. regretted
l. demand
p. 160
Exercise 1
b. What
c. who(m)
d. which
e. who
f. I asked for
g. what
h. which
i. which
j. who
Exercise 2
b. whose
c. who
d. which
e. believe
f. whom
g. that
h. that
i. which
j. where
Exercise 3
b. -
c. which
d. who
e. which
f. What
g. -
h. which
i. that
j. that
k. which
l. that
m. who
n. where
o. they
p. which
p. 161
Exercise 4
b. up late, which wasn't unusual.
c. many people, some of whom gave us good description of the robber.
d. where my aunt and uncle live.
e. who meets Angela likes her.
f. of whom were one hour late.
g. found a shepherd's hut where we sheltered from the rain.
h. , which was extremely crowded, stopped at every station.
i. isn't the building, where the bus stopped.
Exercise 5
b. who
c. whose
d. which
e. whom
f. which
g. what
h. which
i. ---
j. ---
k. who
l. which
m. what
n. what
o. ---
p. ---
q. who
r. whose
28 Aralık 2014 Pazar
23 Aralık 2014 Salı
Reflection 3
I hereby nominate Mr.
Kemalettin Uçucu for the person of the year. Uçucu was born in Sivas, on a
snowy day of November, in 1965. His mother and father were poor. This motivated him
to work harder in order to become rich in the future. He graduated from a
public primary school in Sivas, after which he was admitted to Galatasaray High
School in Istanbul. In Galatasaray, he learnt how to speak French and English
as fluently as a native speaker, and he also studied classical Latin and Greek
works of Renaissance. While studying Da Vinci, he fell in love with anatomy and
human medicine, which led him to study at Johns Hopkins School of Medicine in
the United States. During his studies at Johns Hopkins School of Medicine, he
was at the top of his class. Amazingly, he started to perform operations when
he was in his second year at Johns Hopkins School of Medicine. He chose
neurology as his field of study due to his intense fascination with the
workings of the human brain. After graduation, he completed his Philosophy
Doctorate in 1992. His cumulative grade point average was 4.00, one of the best
in his department. After completing his Philosophy Doctorate, he completed many
internships, and became a professor of neurology in 1994. In 1995, he returned
to Turkey to work in his home town. It is amazing that he chose to work in a
public hospital instead of constructing his own office. Since 1997, he has
worked in Sivas Public Hospital. Uçucu often goes out of his way to help his
patients. At least two weeks a year, he travels around Turkey to perform free
operations to people who need them. Though, he increases this sometimes. Due to
his selfless devotion to his job, I nominate him for the person of the year.
(Revised to correct spelling mistakes)
(Revised to correct spelling mistakes)
Reflection 2b
During this semester, I did a pair-shadowing activity during my Listening and Pronunciation class. The monologue, which I acted out, was from the movie A Few Good Men. I chose this scene, which I have shared with you below, because the rhetoric of Colonel Jessup was quite appealing to me. He can speak very influentially.
The scene opens in a court-martial. Lieutenant Weinberg asks Colonel Jessup if he ordered the code red for Private Santiago. A code red is a violent extrajudicial punishment. Lieutenant Weinberg goes on to state that he is entitled to answers. Moreover, he wants the truth. Afterwards, Colonel Jessup says that Lieutenant Weinberg cannot handle the truth. He starts his monologue, which is full of such traditional motifs as militarism, martyrdom, patriotism, discipline etc. In the monologue, Colonel Jessup justifies his decision to order the code red. Shortly after the monologue, he admits that he gave the code red order for Private Santiago. The monologue is indeed filled with anger.
This scene is significant in that a lieutenant felt like inquiring about the death of Private Santiago, who was significantly lower-ranked than he was. It is also of high importance due to the fact that the one who is being questioned by a lieutenant is a colonel, who is of superior rank. This situation is completely in opposition to the principles of the military.
I really enjoyed acting out this scene, which was full of emotions. Furthermore, Colonel Jessup was easy for me to portray.
(Revised to correct spelling mistakes)
Answers to Macmillan
p. 165
Exercise 4
b. The way you should do it should be different.
c. He looked to be carrying something.
d. As you suggested, I took up jogging.
e. He behaved as though he owned the place.
f. The meat tasted as if it hadn't been cooked properly.
g. Peter didn't do the experiment in the way he was instructed to do it.
Exercise 5
b. C
c. C
d. A
e. C
f. B
g. A
h. C
i. C
j. B
p. 168
Exercise 1
c. Since I had lost my money, the conductor ...
d. Just as I was falling asleep, there was ...
e. Correct
f. Correct
g. When I opened the box, it turned out ...
h. Correct
i. After being asked my name, I was taken ...
j. When I arrived at the station, the train ...
Exercise 2
b. Being
c. While
d. Though
e. While
f. Abandoned
g. Though
h. Without
i. If
j. By
Exercise 3
b. Discovered
c. included
d. becoming
e.
f. caught
g. coming
h. Revealed
i. being
j. Claiming
k. left
p. 169
Exercise 4
b. On opening the letter, ...
c. Though the palace was destroyed by fire during the war, ...
d. Tears streaming from her eyes, Carol walked ...
e. In trying to remove the memory card, I broke ...
f. ... since I've been using Glosso shampoo.
g. Being knocked down by a car, Jan was ...
h. Having being shown his room, ...
Exercise 5
b. A
c. B
d. A
e. C
f. B
g. A
h. C
i. B
Exercise 4
b. The way you should do it should be different.
c. He looked to be carrying something.
d. As you suggested, I took up jogging.
e. He behaved as though he owned the place.
f. The meat tasted as if it hadn't been cooked properly.
g. Peter didn't do the experiment in the way he was instructed to do it.
Exercise 5
b. C
c. C
d. A
e. C
f. B
g. A
h. C
i. C
j. B
p. 168
Exercise 1
c. Since I had lost my money, the conductor ...
d. Just as I was falling asleep, there was ...
e. Correct
f. Correct
g. When I opened the box, it turned out ...
h. Correct
i. After being asked my name, I was taken ...
j. When I arrived at the station, the train ...
Exercise 2
b. Being
c. While
d. Though
e. While
f. Abandoned
g. Though
h. Without
i. If
j. By
Exercise 3
b. Discovered
c. included
d. becoming
e.
f. caught
g. coming
h. Revealed
i. being
j. Claiming
k. left
p. 169
Exercise 4
b. On opening the letter, ...
c. Though the palace was destroyed by fire during the war, ...
d. Tears streaming from her eyes, Carol walked ...
e. In trying to remove the memory card, I broke ...
f. ... since I've been using Glosso shampoo.
g. Being knocked down by a car, Jan was ...
h. Having being shown his room, ...
Exercise 5
b. A
c. B
d. A
e. C
f. B
g. A
h. C
i. B
15 Aralık 2014 Pazartesi
Reflection 2a
Hello, I am Enes Sarıbaş.
Today I am going to be discussing preventative computer security
measures that can be taken to protect computers and computer networks.
Preventative computer security measures are necessary in order to protect user’s
privacy. However, in order to implement these security measures, one needs to
be aware of the different sources of possible attacks. The most important ones
are malware attacks, hack attacks and port scans on open ports and exploits
that take advantage of vulnerabilities in unpatched software. First of all, malware attacks are the most
common form of attack today. These attacks can occur in many ways such as
infected removable devices, hacked websites that try to install malware, spam
e-mails that contain infected attachments and fake antivirus websites. The
second most significant form of attacks are hack attacks and port scans on
unprotected networks. A port is like a door between your computer and the Internet. When ports are open and visible on port
scans, hackers can gain access to the computer and install malware using the
open ports. The other most significant attack vectors are exploits that take
advantage of vulnerabilities in unpatched software. Hackers are constantly
searching for vulnerabilities and bugs in software that if successfully exploited,
can allow hackers to take complete control of a user’s system. Specially crafted
files that are designed specifically to exploit these vulnerabilities are called
exploits. All these attacks can be prevented with safe computing practices. Malware
attacks can be blocked by using common sense and an antivirus program. Users
should not open suspicious e-mail attachments and should stay away from
suspicious sights. Hack attacks and port scans can be blocked by closing all
ports. This can be accomplished either with
a software or hardware firewall. Exploits can be stopped by always keeping all
software up-to-date. Users should always
install security patches for all software installed on their personal
computers.
Kaydol:
Kayıtlar (Atom)