.


:




:

































 

 

 

 


IV. Match (21-30) with their definitions (A-L). There are two definitions that you do not need to use.




21. recent A. further along in space or time or degree
22. to evolve B. to perform an act, usually with a negative connotation
23. a guideline C. programming software designed to disrupt or deny operation
24. a range D. the act of getting something back to a satisfactory state
25. to identify E. a rule or principle that provides guidance to appropriate behaviour
26. evidence F. of the immediate past or just previous to the present time
27. to commit G. all the means by which any alleged matter of fact whose truth is investigated at judicial trial is established or disproved
28. via H. to undergo an evolution
29. a restoration I. to recognize as being
30. malware J. a variety of different things or activities
    K. to keep in perfect or unaltered condition
    L. by the way of

Supplementary Tasks:

I. For statements (1-10) choose the best alternative (A, B or C) to replace the expressions in italics:

1. forensic techniques are increasingly being applied to a broad range (line 3)

A. judicial B. illegal C. courteous

2. thus posing many challenges for experts(line 5)

A. telling B. offering C. questioning

3. identify, collect, examine, and preserve evidence (line 7)

A. store B. save C. hold

4. Because of the particular care that must be taken(line 11)

A. universal B. particle C. special

5. making mirror copies of digital information(line 13)

A. looking-glass B. point-in-time C. reflective

6. maintaining any data that resides in "free space"(line 14)

A. keeping B. restoring C. considering

7. beyond the contents of the data itself(line 17)

A. behind B. with C. outside

8. include alterations to the digital media (line 19)

A. alternatives B. changes C. challenges

9. Trojan horse or time-bomb malware (line 21)

A. virus B. hardware C. shareware

10. packages that provide turnkey assistance (line 25)

A. turned B. completed C. key

 

II. Determine the key message of the text. Choose the best alternative (A, B, C, D or E):

A. Forensic computing involves different techniques to analyse digital devices.

B. Forensics is used in many ranks of digital media and equipment.

C. The authorities in forensic investigation analyse and investigate digital media.

D. Forensic computing investigates computer-based devices involved in a crime or dispute.

E. Digital media is analysed applying different techniques to present the evidence.

TEXT 9

INFORMATION TECHNOLOGY

                          (1) Information technology is the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware; the capability to electronically input, process, store, output, transmit, and receive data and information as well as the ability to control machines of all kinds electronically. (2)The term information technology evolved in the 1970s. Its basic concept, however, can be traced to the World War II alliance of the military and industry in the development of electronics, computers, and information theory. After the 1940s, the military remained the major source of research and development funding for the expansion of automation to replace manpower with machine power. (3)Since the 1950s, four generations of computers have evolved. Each generation reflected a change to hardware of decreased size but increased capabilities to control computer operations. The first generation used vacuum tubes, the second used transistors, the third used integrated circuits, and the fourth used integrated circuits on a single computer chip. Advances in artificial intelligence that will minimize the need for complex programming characterize the fifth generation of computers. (4)The first commercial computer was the UNIVAC I developed in 1951. For the next twenty-five years mainframe computers were used in large corporations to do calculations and manipulate large amounts of information stored in databases. Supercomputers were used in science and engineering, for designing aircraft and nuclear reactors, and for predicting worldwide weather patterns. Minicomputers came onto the scene in the early 1980s in small businesses, manufacturing plants, and factories. The Apple microcomputer was introduced in 1977. The market for microcomputers increased dramatically when IBM introduced the first personal computer in the autumn of 1981. Because of dramatic improvements in computer components and manufacturing, personal computers today do more than the largest computers of the mid-1960s at about a thousandth of the cost. (5)Computers today are divided into four categories by size, cost, and processing ability. They are supercomputer, mainframe, minicomputer, and microcomputer, more commonly known as a personal computer. Personal computer categories include desktop, network, laptop, and handheld.

 





:


: 2017-03-18; !; : 344 |


:

:

- , .
==> ...

1929 - | 1725 -


© 2015-2024 lektsii.org - -

: 0.011 .