VII. Make the following sentences passive. 


Мы поможем в написании ваших работ!



ЗНАЕТЕ ЛИ ВЫ?

VII. Make the following sentences passive.



1. Seymour Papert and the MIT Logo Group developed C in the late 1960s.

 2. The user can easily command the turtle to draw straight lines, squares, and other objects.

 3.Logo helps an inexperienced user learn logic and programming.

4. Denis Ritchie at Bell Laboratories designed C.

 

VIII. Agree or disagree with the statements:

1. Logo is a procedure-oriented language, which was originally designed as programming tool.

2. Logo attracts children only, because they use it to draw images, animate and color them.

3. One of the advantages of Logo is its ability to help the inexperienced user learn logic and programming.

4. Using Pascal and BASIC only helps the user to communicate with the com­puter.

5. C is a general-purpose language. That is why it is becoming increasingly popular.

 

IX. Answer the following questions:

1. What is Logo? Who invented it and when?

2. Does it have anything in common with Pascal and BASIC?

3. What makes Logo attractive both for children and adults?

4. How can a user handle Logo? What assistance does Logo provide the user with?

5. Why is C so popular? What are the reasons of its popularity?

6. What is C and who was it designed by?

 

X. Compare the two programming languages - LOGO and C.

 

Lesson 4

COMPUTER CRIME AND SECURITY.

Text.

There is no doubt that computers have had a very significant impact on our lives and our society. By the same token, extensive use of computers has created new problems that must be dealt with. Computer crime is a greater problem than most people realize. Americans are losing billions of dollars to high-technology criminals whose crimes go undetected and unpunished; estimates of losses range from at least $2 billion to more than $40 billion a year. The earliest known instance of electronic embezzlement occurred in 1958, just a few years after IBM began marketing its first line of business computers. By the mid-1970s, scores of such crime were being reported every year, and yearly losses were estimated to be as high as $300 million. Many more problems appear to be ahead. Home computers and electronic funds transfer (EFT) systems pose a new threat to the billions of dollars in data banks accessible through telephone lines. Computer crime consists of two kinds of activity: the use of a computer to perpetrate acts of deceit, theft, or concealment that are intended to provide financial or business-related profits, such as theft of hardware or software, sabotage, and demands for ransom. Because com­puter crimes seldom involve acts of physical violence, they are generally classified as white-collar crimes.

 

ACTIVE WORDS AND WORD COMBINATIONS:

computer crime- компьютерное преступление          
computer security – защита компьютерной системы от несанкционированного доступа; безопасность вычислительной системы                             
 undetected – нераскрытый, необнаруженный                                                          

 electronic embezzlement – электронная растрата, хищение;

to estimate - оценивать; подсчитывать приблизительно

data bank – банк данных

EFT – безошибочная передача данных; электронная пересылка фондов

deceit – обман, хитрость, лживость

concealment – маскирование

theft – воровство, кража

 demands for ransom -требования выкупа

 

ASSIGNMENTS:

I. Pronounce the words correctly:

Security, doubt, significant, society, technology, criminal, whose, embezzle­ment, to occur, ahead, threat, accessible, perpetrate, deceit, concealment, through, financial, violence, sabotage.

 

II. Translate into Russian:

There is no doubt that; by the same token; problems that must be dealt with; a greater problem than most people realize; estimates of losses range from at least $2 billion to more than $40 billion a year; the earliest known instance of electronic embezzlement occurred in 1958; that are intended to provide; acts of physical vio­lence; high-technology criminals; white-collar crimes.

 

 

III. Find in the text the English equivalents for the following word combinations:

Компьютеры произвели очень значительное воздействие на нашу жизнь и общество; широкое применение компьютеров; чьи преступления остаются нераскрытыми и ненаказанными; лишь несколько лет спустя после того, как; доступные по средствам телефонной линии; кража технического и программного обеспечения; требования выкупа.

 

IV. Define the terms in English:

Computer crime, home computer, business computer, electronic embezzle­ment.

 

V. Make up your-own sentences with the following words and word combina­tions:

To have a significant impact on smth; an extensive use of smth; to pose threat to smth; electronic embezzlement; to estimate losses; a white-collar crime.

 

VI. Answer the following questions:

1. What impact do you think computers have on our lives and society?

2. Can you describe what a computer crime is? Is it a "profitable but risky busi­ness"?

3. What kinds of activity does a computer crime consist of?

4. Why are computer crimes called white-collar crimes?

 

VII. Speak on the following topics:

1) The problem of losing money through computer crimes in the USA/Russia;

2) What should be done to prevent computer crimes.

 

Lesson 5.

TYPES OF COMPUTER CRIMES

Computer crimes can be classified into four broad categories: sabotage, theft of services, property crimes, and financial crimes

SABOTAGE.

 

Sabotage of computers results in destruction or damage of computer hardware. A form of sabotage that has been used on microcomputers is a program that acts as a time bomb; when it goes off it can destroy the contents of either a hard disk or floppy. These programs are called viruses. They are called that because they can infect microcomputer systems by attaching themselves to programs that- reside on floppy disks that are then carried to other microcomputers. Once a virus is in a microcomputer system and has replicated itself a predetermined number of times, it attempts to erase the hard disk or diskette it resides on. These virus programs are very difficult to guard against; however, there are programs available that can detect viruses and counteract them. Another method of virus prevention would be to prevent diskettes from being written to whenever possible. This can be accomplished by using diskettes without a write protect notch.

 

ACTIVE WORDS AND WORD COMBINATIONS:

sabotage – саботаж, диверсия

notch – вырез, паз, метка, зарубка;

protect - предохранять, защищать

infect - заражать

to replicate – повторять, копировать

predetermined –

to erase – стирать, удалять

to accomplish – завершать, заканчивать.

 

ASSIGNMENTS:

    I. Pronouns correctly:

to embrace, nuclear, to knock out, to route, available, reliable, telecommunication, architecture, design, security, through.

 

    II. Give comparative and superlative degrees to the following adjectives and pronouns:

short, cheap, large, important.

 

    III. Give the three forms of the following verbs:

to begin, to take, to know, to grow, to have, to send, to see, to get, to

become.

 

    VI. Read, translate and retell the  following texts.

Computer Crime

Part I.

Criminals in the past used to have guns, masks and escape pars. Now they have a computer. A telephone and a piece of computer equipment called a ‘modem’. They simply dial a telephone number to link their own computer with others, and then, using a password (a secret word or phrase), enter a company’s computer system (in a bank or a government office, for example). Many companies stupidly used to have the word ‘password’ as their password.

In 1990 two American teenagers broke into a computer system and added rude messages to some information and made other information data disappear. The damage cost over two million dollars to correct. A 12-year old boy in Detroit used his own computer to enter the computer system of a large company and caused financial chaos.

Part II.

In Britain, computer crime costs companies about 400 million pounds a year. Often, the computer criminals do not want to make money; they just want show the world how clever they are.

They also like to create computer viruses. They program a computer disc with a special fault in it. When a computer copies the disc, the fault enters the computer’s memory. That the means it gets onto any other disc each time you put a new disc into your computer. Some viruses are just silly messages. For example, one puts the message ‘peace and love’ on your computer screen while you are working. Other viruses use all the ‘memory’ on the computer, and the computer is ‘sick’ and unable to work. One hospital in Britain recently lost all of its records about sick patients because of a computer virus.

 

 

UNIT V.

 

  Internet.

LESSON 1.

 



Поделиться:


Последнее изменение этой страницы: 2021-02-07; просмотров: 92; Нарушение авторского права страницы; Мы поможем в написании вашей работы!

infopedia.su Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Обратная связь - 3.137.218.230 (0.012 с.)