Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Английский Язык БиТ 4 курс.doc
Скачиваний:
59
Добавлен:
04.02.2016
Размер:
560.64 Кб
Скачать

II Retell the text “Computer security”.

III Rendering

1. Read the text and translate it into Ukrainian using a dictionary. The first hackers

Most of us have read about teenage hackers who created programs like viruses that cause havoc when run on computers. Society calls them hackers.

The first hackers were students at the Massachusetts Institute of Technology (MIT) who belonged to the TMRC (Tech Model Railroad Club). Some of the members really built model train, but many were more interested in the wires and circuits underneath the track platform. Spending hours at TMRC creating better circuitry was called “a mere hack”, and technically clever circuits. Those members who were interested in creating innovative, stylistic technically clever circuits called themselves (with pride) hackers.

During the spring of 1959, a new course was offered at MIT, a freshman programming class. Soon the hackers of the railroad club were spending days, hours, and nights hacking away at their computer, an IBM 704. Instead of creating a better circuit, their hack became creating a faster, more efficient program – with the least number of lines of code. Eventually they formed a group and created the first set of hacker’s rules, called the Hacker’s Ethic.

Rule 1. Access to computers – and anything which might teach you something about the way the world works – should be unlimited and total.

Rule 2. All information should be free.

Rule 3. Mistrust authority – promote decentralization.

Rule 4. Hackers should be judged by their hackers, not bogus criteria such as degrees, race, or position.

Rule 5. You can create art and beauty on a computer.

Rule 6. Computers can change your life for the better.

These rules made programming at MIT’s Artificial Intelligent Laboratory a challenging, all-encompassing, endeavour. Just for the exhilaration of programming students in the AI Lab would write a new program to perform even the smallest tasks. The program would be made available to other who would try to perform the same task with fewer instructions. The act of making the computer work more elegantly was, to a bonafide hacker, awe-inspiring.

Hackers were given free reign on the computer by two AI Lab professors, who realized that hacking created new insights. Over the years, the AI lab created many innovations: Life, a game about survival; LISP, a new kind of programming languages; the first computer chess game; The Cave, the first computer adventure; and Spacewar, the first video game.

Originally, hacker was a term used to describe self-taught, enthusiastic computer user, but the word has become a term of derision. Now, it usually describes a person who gains access to computer systems illegally. Hackers are a real annoyance, but the most serious losses are caused by electronic pickpockets who are a good deal older and not half so harmless.

2. Make up a plan in the form of questions.

3. Give the summary of the text according to your plan in a written form.

IV Comprehensive skills

1. Read and remember

measure

критерій виміру

blood vessels

кров’яні сосуди

unwieldy

дуже великий

pattern

зразок, малюнок

recognition

ідентифікація, розпізнавання

cold sore

лихоманка, герпес

2. Listen to the text “Biometrical and High-tech crime” and try to understand it.

3. True or false statements.

  1. US business and government agencies lose more than $1 million a year to hackers and high-tech criminals.

  2. Even your kisser has unique lip patterns.

  3. The computer doesn’t recognize your voice from a phone.

  4. Each method of recognitions has advantages and disadvantages.

4. Listen to the text once again and answer the following questions.

  1. What is biometrics?

  2. Which means of identification has worked for police for years?

V Communicative skills

Ex.1 Read the dialogue between Steve, a computer technician and Richard, the office manage at a language institute, talking about computer security.

Richard:

Hi Steve? Are you busy?

Steve:

No, not really.

Richard:

Good if you’ve got a minute. I’d like to talk to you about computer security. I saw a program on TV the other evening about computer hackers. It made me realize that our network system isn’t very secure. We have a lot of sensitive information in our data bank, and I think perhaps we should install some kind of system to protect it.

Steve:

That’s a good point. Theoretically, anyone could call in and connect their personal computers at home to the office network. All they’d need is a modem.

Richard:

Exactly. There’s nothing to stop students calling in and changing their grades, for example. They could even change their records to show that they’d paid for a course when they hadn’t.

Steve:

Hmm. What we need is a password.

Richard:

Yes, but the problem with password is what people do with them. Some put them on scraps of paper on their computer terminals. Others use their own names, or a partner’s name. That just makes life easily for a hacker.

Steve:

True. But it’s not just what people do with them. The whole idea of using real words is risky. There are programs now that will try every word in the dictionary. If you want to make life difficult for the hackers, it’s much safe to use a random mixture of numbers and letter.

Richard:

Suppose so. But isn’t it possible to buy a security system?

Steve:

Of course. It depends how much you want to spend. You can even buy a system that changes the password every single minute

Richard:

Every minute? Then how do the authorized users know what the password is?

Steve:

They carry a smart card that shows a constantly changing number. The number is the password

Richard:

Very clever!

Steve:

Yes, as long as you don’t leave your card lying around.

Ex.2 Answer the following questions.

1. What is the problem with the computer system at the language institute?

2. What would someone need to connect his/her PC to the office network?

3. What are the disadvantages of security passwords, according to Steve and Richard?

4. How does the ‘smart’ card work? Is it safe?

5. How much do you think Steve and Richard know about security system?

Ex. 3 Learn this dialogue by heart.