Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Скачиваний:
48
Добавлен:
19.04.2015
Размер:
33.79 Кб
Скачать

VIII. Form nouns by adding the suffix -er (-or) to the following Verbs:

to conduct, to transform, to design, to regulate, to invent, to compute, to record, to cut, to operate, to process, to programme, to manipulate, to research, to compress, to resist, to transmit, to receive, to build, to trans­late.

Додаткові тексти

Text B

Computer trespassing

Breaking into a computer system (using it when you don't have permis­sion) is a crime. It is called computer trespassing.

People break into computer sys­tems for many reasons. They might do it to find out private records, to change or destroy information, to steal money or goods, or simply to show they know how to do it.

Computer trespassing is a serious problem. Important information ranging

from medical records to top secret military information is often stored in computer systems. If someone changes, destroys, or steals the information, he or she might cause great damage. For example, a trespasser in a hospital computer system might endanger a patient's health by changing his or her medical records. In the case of a government computer system, a computer trespasser might threaten national security by stealing military information. A trespasser in a bank's computer system might steal millions of dollars.

How can we prevent computer trespassing? One way to protect informa­tion stored in computer systems is to use passwords or number codes. The words or codes are programmed into the computer system. The system will admit only those people who enter the correct code. An alarm alerts a secu­rity guard if someone enters an incorrect code more than once.

Some computer systems use cryptography (secret writing) to protect information. Such systems store information in the computer in coded or scrambled form. If you don't know how to unscramble the information, it is meaningless.

Federal and state laws also protect information stored in computer sys­tems. One federal law prohibits people from using a computer system without permission. It also prohibits the use of a computer system: (1) to steal money or goods worth $5,000 or more: (2) to use, change, destroy, or reveal restricted information in government files; (3) to obtain financial information and credit records that are protected by other federal laws.

Text С

Production and the american standard of living

Most of us are living better today than our parents and grandparents did when they were our age. And few countries in the world can boast a higher living standard. A nation's standard of living is measured by the amount of goods and services available to its citizens. One way to calculate living standard is to divide total production (the gross national product) by the population (Production: Population = per capita GNP). When production is increasing faster than the population, more goods and services are available per person, and living standards are likely to improve. If the population were to grow at a faster rate than production, average living standards would fall.

Nations wanting to increase production must ask themselves two ques­tions:

Are our resources fully employed? In other words, are our factories and machines being used to the-fullest,.andcan,everyonewho is looking for work find a job?

What can be done to increase production with the resources that we have? If the answer to the first question is "no,

" steps to restore full employ­ment will increase production.

The second question has to do with productivity. When you study the time and resources that go into production, you're analyzing productivity. When you produce more or better products with the same time and resources, you have achieved a productivity increase.

Соседние файлы в папке Версия три в одном инглыш и готовые тоже инглыш