Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Экзамен.тексты ДФО.doc
Скачиваний:
13
Добавлен:
17.04.2019
Размер:
197.12 Кб
Скачать
  1. Analyze grammar in the underlined words and word combinations (in writing).

  1. Make up 5 questions of different types to the text (in writing). Text 7

1. Read and translate the text in writing.

Wide Area Networks

Wide area networks (WANs) are countrywide and worldwide networks. Among other kinds of channels, they use microwave relays and satellites to reach users over long distances—for example, from Los Angeles to Paris. One of the most widely used WANs is the Internet, which allows users to connect to other users and facilities worldwide.

The primary difference between a IAN, MAN, and WAN is the geographical range. Each may have various combinations of hardware, such as microcomputers, mini­computers, mainframes, and various peripheral devices.

A Look at the Future

Intranets aid enterprise computing; ISD and ATM support faster data transfer. New trends: fewer "standalone computers," the era of the portable office, and downsized applications.

The next decade will see phenomenal changes in the area of communica­tions. Three important developments are intranets, Integrated Services Dig­ital Network (ISDN), and Asynchronous Transfer Mode (ATM). Intranets are private networks within organizations that use Internet software technologies. These networks promise to greatly aid enterprise computing by providing easy access to data located throughout the organization at a relatively low cost. Most major cor­porations are actively exploring the use of intranets. ISDN utilizes a set of tech­nologies that will completely digitize today's telephone system. ATM extends ISDN's capability by providing even faster data transfer using public telephone lines. Recently, long distance telephone providers U.S. West and Sprint agreed to supply ATM services countrywide. These developments promise to support data, voice, and video transmission across the country.

  1. Analyze grammar in the underlined words and word combinations (in writing).

  1. Make up 5 questions of different types to the text (in writing). Text 8

1. Read and translate the text in writing.

Computer criminals

A computer crime is an illegal action in which the perpe­trator uses special knowledge of computer technology. Computer criminals are of four types:

■ Employees: The largest category of computer criminals consists of those with the easiest access to computers—namely, employees. Sometimes the employee is simply trying to steal something from the employer—equip­ment, software, electronic funds, proprietary information, or computer time. Sometimes the employee may be acting out of resentment and is trying to "get back" at the company.

■ Outside users: Not only employees but also some suppliers or clients may have access to a company's computer system. Examples are bank customers who use an automatic teller machine. Like employees, these authorized users may obtain confidential passwords or find other ways of committing computer crimes.

■ "Hackers" and "crackers": Some people think of these two groups as being the same, but they are not. Hackers are people who gain unauthorized access to a com­puter system for the fun and challenge of it. Crackers do the same thing but for malicious purposes. They may intend to steal technical information or to introduce what they call a "bomb"—a destructive computer program—into the system.

■ Organized crime: Organized crime has discovered that computers can be used just like legitimate business people use them, but for illegal purposes. For example, they are useful for keeping track of stolen goods or illegal gambling debts. In addition, counterfeiters and forgers use microcomputers and printers to produce sophisticated-looking documents, such as checks and driver's licenses.