Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

angl_yaz / Lesson 7

.doc
Скачиваний:
8
Добавлен:
10.02.2016
Размер:
39.42 Кб
Скачать

Lesson 7

THE READING MODULE

Read the text: The role of software expertise of bank automated systems.

The recommends withdrawing or seizure all means of computer engineering revealed at realization of the examination, search, reconstruction of conditions and circumstances of events. But it is impossible to agree with this idea completely.

Programs play a significant role in the computer, and document just a part of it. Besides technical difficulties there also economic ones: in case of failure of the COMPUTER the bank may "hold on" no more than two days, a wholesale firm- 3-5, the insurance company - 5-6 days. In this situation claims are possible on the part of the organization that suffered losses [3, 14].

Duly withdrawal and seizure of the computer information and computer equipment and their correct withdrawal contribute to the efficiency of the subsequent computer - technical expert examination which is appointed with the purpose of reception of the information which is stored on magnetic carriers, and identifying traces of criminal activity.

Special knowledge in the sphere of information science and computer engineering (computer technologies and software) are the basis of the expertise.

The subject of the computer-technical expertise is tendency of forming and research of computer systems and computer information circulation, facts research and circumstances on manifestation of the tendency on the orders of investigatory and judicial bodies.

Computer-technical expertise solves both identification and diagnostic (nonidentification) problems. According to the research goal within the computer-technical expertise the following expertise are defined: technical expertise of computers and their components and software expertise. The first one studies constructive features and computer condition, its peripheral equipment, magnetic information carriers etc., computer network, and the reasons of deviations in the computer operation.

Software expertise is appointed to study information, which is stored in the computer, on magnetic carriers.

Other kinds of expertise can be appointed on these cases: trasological - – for breaking in traces research, dactyloscopic - traces of hands on external in internal surfaces of computers and their components; judicial - economic: financial and economic, accounting, economic - statistical and so forth, when a crime in sphere of the computer information movement connected to crimes in financial sphere; technical-criminalistic - examination of documents - when the computer is used as means for counterfeit documents, false money and so forth; phonoscopic - diskettes contain recordings of the person's language which needs to be identified with the suspected which concerns the committed crime.

It is necessary to involve experts from computer safety and network technologies. As it is understood it is necessary to involve those persons who are professional in the computer technologies operation.

I. Reading Exercises:

Exercise 1. Read and memorize using a dictionary:

Contribute, technical expert, purpose of reception, tendency, circumstances, internal surfaces, trasological, dactyloscopic, false money, phonoscopic, accounting, judicial–economic.

Exercise 2. Answer the questions:

1. Is it necessary to involve experts?

2. What role do the programs play in the computer?

3. What are the basis of the expertise?

4. What king of problems do the computer-technical expertise solve?

Exercise 3. Match the left part with right:

1. Software expertise is appointed to study information

a) to involve those persons who are professional.

2. Special knowledge in the sphere of information science and computer engineering

b) is tendency of forming and research of computer systems.

3. The subject of the computer-technical expertise

c) are the basis of the expertise.

4. As it is understood it is necessary

d) which is stored in the computer, on magnetic carriers.

Exercise 4. Open brackets choosing the right words:

It is necessary (to involve/to put) experts from computer safety and (network/Internet) technologies. As it is understood it is necessary to involve (those/these) persons who (are/aren’t) professional in the (computer/machine) technologies operation.

THE SPEAKING MODULE

II. Speaking Exercises:

Exercise 1. Explain:

1) the role of programs in the computer;

2) the need of special knowledge in the sphere of information science and computer engineering;

3) the need of software expertise;

4) the necessity to involve experts from computer safety and network technologies.

Exercise 2. Ask questions to the given answers:

1)Question: _______________________________________________________?

Answer: But it is impossible to agree with this idea completely.

2)Question: _______________________________________________________?

Answer: Programs play a significant role in the computer, and documents just a part of it.

3)Question: _______________________________________________________?

Answer: The first one studies constructive features and computer condition, its peripheral equipment, magnetic information carriers etc.

4)Question: _______________________________________________________?

Answer: The computer is used as means for counterfeit documents.

THE WRITING MODULE

III. Writing exercises:

Exercise 1. Complete the sentences with the suggested words of(2), and(2), to.

Duly withdrawal and seizure ______ the computer information______ computer equipment_____ their correct withdrawal contribute______ the efficiency______ the subsequent computer – technical expert examination.

Exercise 2. Make up translation into your own language:

a significant role;___________________________________

the part of the organization;_____________________________________

the subsequent computer;________________________________

magnetic carriers;______________________________________

the cases;__________________________________

the committed crime;_____________________________

constructive features._____________________________

Exercise 3. Compose a story of the topic (up to 100 words):

“Software expertise”.

Соседние файлы в папке angl_yaz