
- •Unit I Programming languages Words and expressions to be remembered:
- •Exercise 1
- •Read and translate the text
- •History of programming languages
- •Text II Words and word combinations to be learnt:
- •Programming languages
- •Glossary
- •Computer programming
- •Programming languages
- •Fortran IV
- •2. Pascal
- •3. Rpg II Programming language
- •1. Running the computer program
- •2. The conversion of symbolic languages
- •3. Testing the computer program
- •Unit II Operational systems
- •Unit III Radio waves
- •Radio waves
- •In the picture you can see the way that original sound passes before it becomes reproduced sound. Describe this way in your own words.
- •Brief history of the radio
- •Uses of radio
- •Unit IV Frequency converters
- •Frequency converters
- •Am broadcast radio and fm broadcast radio
- •Unit V Amplifiers
- •Amplifiers
- •Unit VI Feeders
- •Altitudinal Meteorological Mast (amm)
- •Unit VII Computer crimes
- •Computer crimes
- •Computer crimes – cyberterrorism, hacking
- •What is “Firewall?”
- •Text 3 Are Wireless Networks Secure?
- •Unit VIII
- •Viruses
- •Text 1 Computer viruses
- •Text 2 Anti-virus software and other preventative countermeasures
- •Unit IX Mobile phones and sms
- •What is sms?
- •How do you send and receive messages?
- •The future of mobile phones
- •Why people use mobile phones
- •Help always at hand: a mobile is a girl’s best friend
- •Unit X smart stuff
- •Smart stuff
- •Insert the missing information into the sentences
- •Is technology always best?
- •Unit 11
- •Internet
- •What exactly is the Internet?
- •What is cyberspace?
- •How did it begin?
- •The Internet can be divided into five broad areas:
- •Electronic mail
- •Information sites
- •The World Wide Web
- •4. Usenet
- •5. Telnet
- •Supplementary reading
- •Bluetooth
- •What is in a name? (the history of Bluetooth)
- •Sic (Special Interest Croup)
- •Used frequencies
- •Bluetooth ability
- •How is connection established?
- •Discoverable mode
- •Limited discoverable mode
- •Protection technology
- •Digital house
- •Text 5 the language of e-mail
- •1. Basic protocols in Internet and search in them
- •Tools of search in www
- •2. Tools of search
- •2.1 Thematic catalogues
- •Magellan
- •Virtual Library
- •Russia-On-Line Subject Guide
- •2.2. Automatic indexes
- •Alta Vista
- •Info seek
- •WebCrawler
- •Glossary
Computer crimes
Like most other technological advances, the computer is a tool which can be used for good or ill. You can save time with computers, write better spelled and better typed papers. You can balance budgets, from the personal to the professional; input and store and process and output all kinds of information; and send it around the world as fast as telephone lines and satellites.
But, at the same time, our computers can be misused. For example, someone with a distinctly different sense of humour infects software with a virus that causes fish to swim across the spreadsheet. Another someone changes all information in the financial aid office, and yet another uses the company computer to do a little freelance. We can use our computers to spy, to lie and cheat. To steal. To do harm. These are no jokes. These are crimes.
Electronic trespass is illegal. Peekers who gain access to a co-worker’s personal file or to a checking account records are trespassing, just as if they were physically in the bank. Business and industry have much to lose through electronic trespass. Information about new products, stock transfers, plans to acquire another company are worth millions of dollars to the company or its competitors. Electronic funds transfers take money from one account and move it to another. Banks are authorized to do so by legitimate customers. But bank employees can do it without authorization. The transfer of a million dollars will be quickly noted, but the transfer of one tenth of a cent from every customer’s monthly interest will not – and those fractional cents can quickly add up to many dollars.
Data encryption – using a code - is one way to stop electronic thieves. Encryption is the transformation of data into a form that is as close to impossible as possible to read without the appropriate knowledge. Its purpose is to ensure privacy by keeping information hidden from anyone for whom it is not intended, even those who have access to the encrypted data. Decryption is the reverse to encryption; it is the transformation of encrypted data back into an intelligible form. More recent advances offer codes based on the product of two large prime numbers and on the use of quantum theory. They are still considered unbreakable.
EXERCISE EXERCISE 2
Answer questions about the text:
Which operations can you do on your computer?
What harm can one get from the computer?
Can you explain in your own words what is electronic trespass?
How can companies lose millions dollars through electronic trespass?
How are illegal electronic funds transfers run?
What do we call a computer crime?
Are there any ways to stop unauthorized actions?
What is data encryption/ description?
Which codes are considered unbreakable nowadays?
Do you know any other protective devices or programmes?
Do you think Internet is a positive thing?
EXERCISE EXERCISE 3
The following sentences will sound more naturally if they begin with “It”. Transform each according to the model:
EXAMPLE:
Even to establish in which country he was sitting was impossible.
It was impossible even to establish in which country he was sitting.
1) How easy it is to hack into government computers is unbelievable.
It …
2) To try and find out where he was based was futile.
It …
3) That an outside person knows the password to our system seems likely.
It …
4) For us to find out who it was is absolutely vital.
It …
5) When you give me back that flash card doesn’t really matter.
It …
6) That the new encryption code has been developed was reported in Internet news.
It …
EXERCISE EXERCISE 4
Work in pairs. Make up sentences beginning with the expressions below. Ask questions to get more information. Speak about computers.
EXAMPLE:
A: It is vital that young people have the opportunity to learn to use computers at school.
B: Why do you feel that?
A: Because computers are essential in every area of work.
It’s vital that …
It’s surprising how few/many …
It’s exciting when …
It’s definitely worth …
It’s often said that …
I find it quite difficult to …
I find it very interesting to …
I find it embarrassing to…
EXERCISE EXERCISE 5
Read and translate the text with the dictionary