.


:




:

































 

 

 

 


Language skills development




Exercise 1. Translate the sentences paying attention to Complex Object construction.

1. The transmission mode enables the receiving computer to know where one byte ends and next byte begins on the transmission medium. 2. A remote terminal enables the user to operate the distant computer, just as is that person were sitting in front of the distant computer and using its keyboard. 3. A good communication program directs the modem to dial the telephone number needed. 4. Electronic mail (e-mail) enables you to send messages from your computer for access at someone elses computer. 5. Compared to the postal service, electronic mail has many advantages. Many systems let you check to see whether the recipient has accessed your message. 6. International electronic mail systems enable you to find pen pals all over the world. 7. Some e-mail systems require you to be part of the same system to receive your message. 8. Facsimile transmission enables you to send an image of a document over the telephone lines to anyone who has a fax machine. 9. Electronic mail, or e-mail, allows messages sent from your computer to be accessed by the recipient at his or her computer, as long as you both have access to the same e-mail system.10. Bulletin board systems (BBSs) enable independent computer users, using telecommunications, to interact with each other through a central contact. 11. Computer networks enable us to conquer another dimension space. 12. The file allocation table enables the computer to locate data easily. 13. CD-erasable enables users to store, access, and reuse discs in the same way that floppy discs can be used. 14. Computer keyboards include keys that are designed to perform specific tasks. These keys enable the user to perform complex tasks easily when using the application. 15. Optical recognition systems enable the computer to read data by scanning printed text for recognizable patterns. 16. A debugger is system software that helps programmers identify errors. 17. Programming languages require certain formalities, and advanced text editors help programmers stick to the proper forms. 18. The event is a message that causes a procedure (subprogram) attached to the object to respond. 19. Fortran enables programmers to describe and solve mathematical calculations readily. 20. System software programs help the hardware components work together and provide support for application programs. 21. Engineers consider computing equipment to make production processes more effective.

Exercise 2. Translate the sentences paying attention to Complex Subject construction.

omplex Subject Computing equipment is known to make production process more effective. - ³, ' . (' , , .) The chip appeared to be a crucial development in the accelerating pace of computer technology. - ' . He is certain to know the password. - , .

1. The programmer is free to concentrate on the desired result what the program is supposed to accomplish rather than worry about the details of how the computer operates. 2. Each new communications technology or application seems to require its own standards. 3. Internet-2 is expected to be deployed around this year. 4. Each new communications technology or application seems to require its own standards. 5. Capturing data at the source minimizes errors because the people who key the data are doing a variety of tasks and are therefore less likely to make errors due to boredom. 6. Processor is known to refer to the processing circuits: central processing unit, memory, interrupt unit, clock, and timing. 7. Many so-called general-purpose computers are known to have features which restrict their use to certain general problem areas. 8. The desk computer is expected to function as your personal librarian, carry out simple optimization computations, control your budget or diet, play several hundred games, etc. 9. Further development of the computer is believed to lead to a situation in which most of the knowledge accepted by mankind will be stored in computers and made accessible to anyone with a home computer. 10. The development of the project appears to be improving. 11. He proved to be an excellent programmer. 12. At present the most important examples of semiconductors seem to be silicon and germanium. 13. The importance of mathematics for all sciences is known to be growing rapidly. 14. The creation of complex modern machines is considered to require a thoroughly developed industry and a high technical level in all branches of industry. 15. The program proved to be a great success.

Exercise 3. Translate the sentences paying attention to the for-phrase construction.

"for + () + " (for-phrase) - : , ( ) . , , , , , , , - . The only conclusion for him to make was the following. , , . : It was important for us to solve this problem as soon as possible. .

1. It is important for the researchers to fulfill their work in time. 2. It takes more time for the reaction to complete at low t. 3. It is impossible for the driver to stop the car at such a high speed quickly. 4. The problem I spoke to you about is too difficult for the designers to be solved in a year or so. 5. Here is one more important point for the speaker to explain. 6. These stars are too remote for the astronomer to answer these questions. 7. He proved that it was possible for the angle to be altered. 8. It is possible for computers to handle all types of information. 9. For a computer to be programmed each problem must be reduced to a series of very simple steps. 10. Two hours were sufficient for the reaction to occur. 11. The language of specialists is often difficult for the layman to read. 12. There is a tendency for the method to be used in all the experiments. 13. It took a long time for mathematicians to realize that not all continuous functions have a derivative. 14. A computer is a suitable machine for them to use in their research work. 15. All the instruments for that computer to work properly have been given.

Exercise 4. Fill in the gaps in these sentences with a suitable verb in the correct form.

Store / hold / input / control / convert / process / provide (x2)/ speed up

1. A mainframe computer is used for (1) large amount of data such as a major companys accounts and client database.

2. The processor is used to (2) all the operations in a computer.

3. RAM (3) data read or written to it by the processor.

4. The keyboard is used to (4) data through keys like a typewriter.

5. Cache (5) extremely fast access for sections of a program and its data.

6. A PDA is used to (6) information such as appointments.

7. RAID (7) the system and (8) a way of recovering data if the system crashes.

8. Modem is used for (9) digital signals to analogue signals and vice versa to allow a computer to be connected to the ordinary telephone line.

Exercise 5. Describe the function of an item emphasizing its function.

Example: ROM / hold instructions which are necessary to start up the computer.

The function of ROM is to hold instructions which are needed to start up the computer.

 

1. hard disk drive / store programs and data

2. memory / hold the instructions and data used by the processor

3. RAM / hold data read or written to it by the processor

4. clock / control the timing of signals in the computer

5. monitor / display the output from a computer on a screen

6. DVD-ROM drive / read DVD-ROMs

Exercise 6. Use the correct tense-forms of the verbs in brackets.

1. Computers (to use) to provide cash to users and to process bank cards such as Visa cards using an automatic teller machine.

2. A microprocessor (to calculate) the speed of the car from the changes in the radio waves.

3. When the smart card (to take back) to the police station, the drivers details (to obtain) from the DVLC (Driver and Vehicle Licensing Centre).

4. New systems (to prevent) surfing i.e. where the driver only (to slow) down as they (to pass) through the speed trap.

5. The registration numbers of vehicles exceeding the speed limit immediately

6. (to download) to the computer at police headquarters.

7. At police headquarters each vehicle (to match) with the Driver and Vehicle Licensing Centre database.

8. Standard letters then (to print off) addressed to the vehicle owners.

Exercise 7. Put the words in the right order to make correct sentences.

 

1. his / into / puts / the / enters / PIN / customer / the / card / machine / and / his /number

2. magnetic / on / is / the / strip / the / on / information / read / by / ATM / the / card / the

3. contains / the / name / strip / the / holder / the / account / of / number / his /

4. account / the / and / network

5. computer / a / holds / central / on / accounts / many / information

6. are / account / the / customers / number / in / his / amount / money / of / PIN /and/checked / the

7. the / instructed / cash / to / requested / the / is / dispense / ATM

 

 

Giving advice

Study these examples of advice from the texts you read in Task 4.     You can use the modal verb should: 1. Your navigation system should be based on text links.   You can use an imperative: 2. Avoid frames wherever possible. 3. Dont change the location of your navigation elements.   Note that avoid is followed by the -ing form. For example: 4. Avoid using frames.   Had better is for advice which is close to a warning. It indicates something unpleasant will happen if the advice is not taken:   5. If you're committed to using frames on your site, you'd better commit yourself to some extra work too.   Other ways to give advice are: 6. I recommend Jennifer Fleming's Web Navigation. 7. It's a good idea to visit a few larger sites.   To make advice more persuasive, you can add the reason for your advice. For example:   It's a good idea to visit a few larger sites [advice] to get some ideas on designing an effective site map [reason].  

 

 

Exercise 8. Put the words in the correct order to make sentences.

1. to create/ remember / on a background color / to your web page background color /is / that / your transparent GIFs / the same or close

2. are / ready / not / to / pages / link / that / not / do

3. you want indexed / that / make sure / can / all / with / documents / normal links / the index / from / (no image maps) / documents / be reached

4. site / choose / the / to put / appropriate / with the intended audience / your banner ad / most / to maximise / its potential

5. are / image / should / "natural" / be / not / they / avoided / maps/ when

6. every / languages available / to / should / document / multilingual hierarchy / in / include / a / links / the other

7. way / make / document(s) / sure / a / index / to / is / to / the / or / overview / always / there / navigate

 

 

Exercise 9. Match the two parts.

1. Try to keep the length of the title under 64 characters; this prevents it from being cut off in browser windows and bookmark lists. 2. To make the documents render faster, 3. When using the IMG or AREA elements, 4. Authors had better avoid specifying absolute widths larger than a few hundred pixels, 5. If you use browser-specific elements, 6. I recommend to concentrate on the structure of the document rather than its presentation 7. If you want to provide large images, then use small thumbnails A authors should always use the ALT attribute to provide a textual alternative. B its a good idea to fix your document so it still works if the browser-specific material is ignored. C to allow a user to get a preview of the image quickly. D because a document marked up structurally can easily adapt to different browsing environments. E since large widths can cause horizontal scrolling with narrow windows or large fonts. F which prevents it from being cut off in browser windows and bookmark lists. G you should include the WIDTH and HEIGHT attributes on the IMG element.

Exercise 10. Make sentences using the clue given.

1. not give open access to PCs / may get viruses (avoid)

2. not drink coffee in the lab / damage the keyboard (better)

3. rather than image maps or graphical buttons / to base your navigation system on text links (should)

4. use up-to-date anti-virus software / new viruses appear all the time (recommend)

5. hear strange noises emanating from your computer / shut it off immediately before further damage is incurred (better)

6. use the Internet / take precautions not to get virus-infected (good idea)

7. broadband to download audio and video files within seconds / enables you to use the Internet more efficiently (recommend)

Exercise 11. Choose the right variant.

1. Tom, (you, finish) reading the newspaper yet? - No, I still (read) it.

2. At noon yesterday, the staff (have) their monthly meeting.

3. The teacher (give) the students a test when the principle (come) into the classroom.

4. Dad (close) the windows, (set) the alarm, and (leave) the house. The children (sleep) already.

5.... Nelson Column (erect) in 1842 in... Trafalgar Square in commemoration of Admiral Nelson, who (win) a triumphant naval victory, but (kill) in the battle.

6. To commemorate Admiral Nelson's Victory in (a, the, -) great naval battle at Trafalgar, (a, the, -) Trafalgar Square (construct) in London.

7. In 1066 an invading army of the Normans (win) the victory at the battle of Hastings; as a result of that single battle, William, Duke of Normandy, (crown) king of England and (become) known in the popular history as William the Conqueror.

8. My teacher told me I (might, had to, needed) stay after school as (the, a, -) punishment for talking in class.

9. (Need, can, ought) I borrow your pen? (My, mine) doesn't work.

10. I (must, mustn't, may) go to (a, the, -) bank. I haven't got (some, any, little) money.

11. What time (mustn't, will, shall) I pick you up from (a, the, -) work? - (At, in, about) 7 sharp.

12. Have you heard Jane's playing (the, a, -) piano (late, lately)? - Yes, but he (not, seem) to be getting (good).

13. I like living in the country. It's a lot (peaceful) than the city.

14.... Louvre has a large number of famous works, such as... Mona Lisa and... Venus de Milo. (a, the, -)

15. (A, the, -) pyramids in Egypt (build) to be tombs for (a, the, -) pharaohs.

16. In... New York you could visit... Central park,... Empire State Building and... Times Square and see... show on... Broadway, (a, the, -)

17. He's late again. It's typical (of, for, about) him to keep everybody waiting.

18. Be careful, there (be) too (many, much, a lot of) cars in (this, these) cities.

19. (Many, much, a little) students have financial problems,...?

20. (Few, little, a lot of) customers (come) into the shop today. It (be) quite all day long. 21. A young woman (sit) on (a, the, -) park bench while the

21. children (play) nearby.

22. The boy went to (a, the, -) bed early because he (play) football all day.

23. Peter decided that he (not, leave) for work until he (shovel) the snow from the drive.

24. The lawnmower (break down) while my father (mow) the lawn.

25. (A, the, ) new chairman of the company (announce) in a week. The candidates (discuss) now.

26. She (expect) to arrive (to, in, at) London at 3 o'clock tomorrow afternoon.

27. You just (clean) the stairs? - Yes, so be careful. (It, they) (be) very slippery.

28. You put that shirt in the washing machine. - I know. It... be dry-cleaned, (mustn't, couldn't, have to)

29. A university degree is a useful thing. If I (have) a university degree, I (sit) in a comfortable office now instead of standing at a street corner selling newspapers.

WRITING

Imagine that you are to make a report on the following topics. While preparing it use the main information from the text.

1. How to become a computer graphics developer.

2. Advantages and disadvantages of 3D computer graphics.

3. 3D computer graphics in game industry.


UNIT 19

DATA PROTECTION

Vocabulary Bank Unit 19

Task 1. Read, write the translation and learn the basic vocabulary terms:


1. black-hat hacker

2. breaking open

3. cash-dispensing systems

4. computer extortion

5. console operator

6. cracker

7. dark filters

8. decryption

9. distortion

10. duplicate

11. embedded

12. encryption

1. envisage

13. fingerprints

14. firewall

15. firmware

16. for abusing

17. fraud

18. fraudulent use

19. freeware program

20. harassment

21. ill-intentioned use

22. impose

23. industrial espionage

24. innocent-looking file

25. intruder

26. IP spoofing

27. juristically fixed rules

28. leak

29. malicious software

30. massifs

31. personal enrichment

32. personal privacy

33. positive identification

34. predator

35. public cryptosystem

36. ransom

37. restrictions

38. safeguarding

39. security matrix

40. shareware applications

41. sneakernet crowd

42. sniffer program

43. spyware

44. surge protector

45. theft of data

46. throughput

47. to confine

48. to forge

49. to protect

50. unsanctioned

51. unscrupulous

52. violators

53. voiceprints

54. white-collar crime

55. worms

56. write-protect measures



Text 18A. DATA PROTECTION

 

The computer industry has been extremely vulnerable in the matter of security. Computer security once meant the physical security of the computer itself guarded and locked doors. Computer screens were given dark filters so others could not easily see the data on the screen. But filters and locks by no means prevented access. More sophisticated security means safeguarding the computer system against such threats as burglary, vandalism, fire, natural disasters, theft of data for ransom, industrial espionage, and various forms of white-collar crime.

Rapid development of automation processes and the penetration of the computers in all fields of life have lead to appearance of a range of peculiar problems. One of these problems is the necessity of providing effective protection to information and means of its processing.

A lot of ways to access information, considerable quantity of qualified specialists, vast use of special technical equipment in social production make it possible for violators practically at any moment and in any place carry out the actions, which represent a threat to information safety.

Particular role in this process has been played by appearance of personal computer (PC), which has made computers, software and other informational technologies available to general public. Wide distribution of PC and impossibility of conducting effective control of their use have resulted in the decreasing security level of information systems.

The problem of information security is relatively new. Not all problems, connected with it have been figured out and solved up to now. The fact of great number of computer systems users means the definite risk to security because not all clients will carry out the requirements of its providing.

The order of storage mediums should be clearly defined in legal acts and envisage the complete safety of mediums, control over the work with information, responsibility for unsanctioned access to medium with a purpose of copying, changing or destroying them and so on.

There are some legal aspects of information protection, which can appear due to not carefully thought or ill-intentioned use of computer techniques:

Legal questions of informational massifs form distortions;

Security of stored information from the unsanctioned access;

Setting juristically fixed rules and methods of copyrights protection and priorities of software producers;

Development of measures for providing the juridical power to the documents, which are given to the machines;

Legal protection of the experts interests, who pass their knowledge to the databases;

Setting of legal norms and juridical responsibility for using electronic computer means in personal interests, which hurt other people and social interests and can harm them;

The lack of appropriate registration and control, low level of work and production personnel discipline, the access of an unauthorized persons to the computing sources create conditions for abusing and cause difficulties to their detection. In every computing canter it is usual to set and strictly follow the regulations of the access to different official rooms for employees of any categories.

The main purpose of information protection is preventing from the leak, theft, distortion, counterfeit of information; preventing the threat to persons life and social safety, protection of the constitution and so on. The information is subjected to protection, when it may cause the harm for its owner, user or other person.

The development of computer technology and its wide use have lead to appearance and spread of computer crimes. Such situation causes alarm among those organizations and legislative institution that use computer technologies and, of course, people, who use new informational services at home.

The term computer crime was first used in the early 70s. However, the discussions concerning it are still actual. The top question of these discussions is What unlawful actions are implied by computer crime.

A rank of definitions of the computer crime has been composed. It often refers to crimes directly or indirectly connected to electronic computing machines and which includes a number of illegal acts, committed by means of electronic data processing system or against it. Others consider that computer crime is any action, which goes together with interfering with property rights and fulfilled by means of computers. The thirds think that computer crime can be defined as all intentional and unlawful actions, which lead to causing harm to possessions, with help of computers too.

There are following forms of computers criminality: computer manipulations, economic espionage, sabotage, computer extortion, hacker activity. The main character of committing computer crimes in the business field becomes highly qualified white collars from the suffered organizations employees.

There are many causes, when hackers get a job with a goal of personal enrichment. But the most danger can represent such specialists, who are in collusion with managers of commercial structures and organized criminal groups; in these situations causing damage and weight of consequences considerably increases.

There are two types of unsanctioned access:

internal breaking open the criminal has access to the terminal, with information he interested in and can work with it for some time without somebodys control;

external breaking open the criminal doesnt have indirect access to the computer system, but has an opportunity of penetration to the protected system by means of remote access;

Analysis of such actions shows that single crimes from own or neighbor work places gradually develop into network computer crimes, which are carried out by means of breaking of organizations protecting systems.

Therefore the importance of information protection cannot be doubted. However, not only companies and state institutions need information protection system but also general home users need information protection system and should maintain the security of their computers.

Emphasis on Access and Throughput. For the last decade or so, computer programmers have concentrated on making it easy for people to use computer systems. Unfortunately, in some situations the systems are all too easy to use; they dont impose nearly enough restrictions to safeguard confidential information or to prevent unauthorized persons from changing the information in a file.

Its as if a bank concentrated all its efforts on handing out money as fast is it could and did very little to see that the persons who requested the money were entitled to it. Of course, a real bank works just the opposite way, checking very carefully before handing out any money. Computer systems that handle sensitive personal and financial data should be designed with the same philosophy in mind.

Positive Identification of Users. A computer system needs a sure way of identifying the people who are authorized to use it.

The identification procedure has to be quick, simple, and convenient. It should be so thorough that there is little chance of the computer being fooled by a clever imposter. At the same time, the computer must not reject legitimate users. Unfortunately, no identification system currently in use meets all these requirements.

At present, signatures are widely used to identify credit-card holders, but it takes an expert to detect a good forgery. Sometimes even a human expert is fooled, and there is no reason to believe that a computer could do any better.

A variation is to have the computer analyze a persons hand movements as he signs his name instead of analyzing the signature itself. Advocates of this method claim that different persons hand movements are sufficiently distinct to identify them. And while a forger might learn to duplicate another persons signature, he probably would not move his hand exactly the way the person whose signature he was forging did.

Photographs are also sometimes used for identification. But, people find it inconvenient to stop by a bank or credit card company and be photographed. Companies might lose business if they made the pictures an absolute requirement. Also, photographs are less useful these days, when people frequently change their appearance by changing the way they wear their hair. Finally, computer programs for analyzing photographs are still highly experimental.

Cash-dispensing systems often use two identification numbers: one is recorded on a magnetic stripe on the identification card, and the other is given to the cardholder. When the user inserts his card into the cash-dispensing terminal, he keys in the identification number he has been given. The computer checks to see that the number recorded on the card and the one keyed in by the user both refer to the same person. Someone who stole the card would not know what number had to be keyed in to use it. This method currently is the one most widely used for identifying computer users.

For a long time, fingerprints have provided a method of positive identification. But they suffer from two problems, one technical and one psychological.

The technical problem is that there is no simple system for comparing fingerprints electronically. Also, most methods of taking fingerprints are messy. The psychological problem is that fingerprints are strongly associated in the public mind with police procedures. Because most people associate being fingerprinted with being arrested, they almost surely would resist being fingerprinted for routine identification.

Voiceprints may be more promising. With these, the user has only to speak a few words into a microphone for the computer to analyze his voice. There are no psychological problems here. And technically its easier to take and analyze voiceprints than fingerprints. Also, for remote computer users, the identifying words could be transmitted over the telephone.

However, voiceprints still require more research. It has yet to be proved that the computer cannot be fooled by mimics. Also, technical difficulties arise when the voice is subjected to the noise and distortion of a telephone line.

Even lip prints have been suggested. But its doubtful that kissing computers will ever catch on.

To date, the most reliable method of positive identification is the card with the magnetic stripe. If the technical problems can be worked out, however, voiceprints may prove to be even better.

Data Encryption. When sensitive data is transmitted to and from remote terminals, it must be encrypted (translated into a secret code) at one end and decrypted (translated back into plain text) at the other. Files also can be protected by encrypting the data before storing it and decrypting it after it has been retrieved.

Since it is impractical to keep secret the algorithms that are used to encrypt and decrypt data, these algorithms are designed so that their operation depends on a certain data item called the key. It is the key that is kept secret.

Even if you know all the details of the encrypting and decrypting algorithms, you cannot decrypt any messages unless you know the key that was used when they were encrypted.

For instance, the National Bureau of Standards has adopted an algorithm for encrypting and decrypting the data processed by federal agencies. The details of the algorithm have been published in the Federal Register. Plans are under way to incorporate the algorithm in special purpose microprocessors, which anyone can purchase and install in his computer.

So the algorithm is available to anyone who bothers to look it up or buy one of the special purpose microprocessors. But the operation of the algorithm is governed by a sixty-four-bit key. Since there are about 1022 possible sixty-four-bit keys, no one is likely to discover the correct one by chance. And, without the correct key, knowing the algorithm is useless.

A recent important development involves what are called public- key cryptosystems.

In a public-key cryptosystem, each person using the system has two keys, a public key and a private key. Each persons public key is published in a directory for all to see; each persons private key is kept secret. Messages encrypted with a persons public key can be decrypted with that persons (but no one elses) private key. Messages encrypted with a persons private key can be decrypted with that persons (but no one elses) public key.

Protection through Software. The software of a computer system, particularly the operating system, can be designed to prevent unauthorized access to the files stored on the system. The protection scheme uses a special table called a security matrix.

Each row of the security matrix corresponds to a data item stored in the system. Each entry in the table lies at the intersection of a particular row and a particular column. The entry tells what kind of access the person corresponding to the row in which the entry lies has to the data item corresponding to the column in which the entry lies.

Usually, there are several kinds of access that can be specified. For instance, a person may be able to read a data item but not change it. Or he may be able to both read and modify it. If the data is a program, a person may be able to have the computer execute the program without being able either to read or modify it. Thus, people can be allowed to use programs without being able to change them or find out how they work.

Needless to say, access to the security matrix itself must be restricted to one authorized person.

Also, the software has to be reliable. Even the software issued by reputable vendors may be full of bugs. One or more bugs may make it possible for a person to circumvent the security system. The security provisions of more than one computer system have been evaded by high school and college students.

Restricting the Console Operator. Most computer systems are extremely vulnerable to the console operator. Thats because the operator can use the switches on the computers control panel to insert programs of his own devising, to read in unauthorized programs, or to examine and modify confidential information, including the security matrix. In the face of these capabilities, any software security system is helpless. Computer systems for handling sensitive information must be designed so that the console operator, like other users, works through the software security system and cannot override it. One solution is to incorporate the security system in firmware instead of software, so that unauthorized changes to it cannot be made easily.

 

 

Task 2. Discuss the following questions:

1. What is computer security?

2. What is the most serious problem: the loss of hardware, software, or the loss of data?

3. How does a computer system detect whether you are the person who should be granted access to it?

4. What are the shortcomings of each biometric means?

5. What is to prevent any user from copying PC software onto diskettes?

6. What steps can be taken to prevent theft or alteration of data?

7. What is the weakest link in any computer system?

8. Should a programmer also be a computer operator?

9. What is a security matrix?

10. Can the computer industry risk being without safeguards for security and privacy?

 

 

Task 3. Find English equivalents to the following words:

, , , , , , , .

 

 

Task 4. Complete the sentences as in the text:

1. One of the most important problem for computer science is the providing ------

2. There are some legal ----- of computer protection.

3. Security of stored information from any unsanctioned ---

4. The main purpose of information protection is ----- from leak, theft, distortion of information.

5. Sometimes ----- get a job with a goal of personal enrichment.

 

 

Task 5. Give synonyms to:

To encrypt, to secure, confidential, biometric, recognition, imposter, to meet requirements, to detect, to lose business, appearance, to incorporate, unless, to circumvent.

Give antonyms to:

Convenient, advocate, to reject, to encrypt, legitimate, messy, authorized, white-collar crime, to safeguard info, sensitive, to retrieve data, practical, by chance, private.

Task 6. Put the proper words into sentences:

 

foolproof, complicated, virus, unauthorized, crime, fingerprint, altering, messages.

1. Computer security is more... today than it was in the past.

2. International literature tells lurid stories about computer viruses... about bank swindles, espionage, sent from one computer to destroy the contents of others.

3. Movies like War Games have dramatized the dangers from... entry to the computer systems that control nuclear weapons.

4. Methods used in computer-based criminal activity range from switching or... data as they enter the computer, to pulling self-concealing instruction into the software.

5. The person who develops a... lock for the computer data will make a fortune.

6.... is the name generally given to software that causes... of computer files.

7. People must be taught that some kinds of help, such as assisting... users with passwords are inappropriate.

8. According to a published article, the Mafia has kidnapped an IBM executive and cut off his finger because it needed his... to breach a computer security system.

9. Data sent over communication lines can be protected by encryption, the process of scrambling...

10. Firewall is security measures taken to block... access to an Internet site.

 

 

Task 7. Mark the true sentences (T) and the false ones (F), according to the text.

 

1. The importance of information protection can be doubted.

2. Hackers are not so dangerous as crackers.

3. Poverty of hackers is the main reason of their computer crimes.

4. The problem of information security is not so old.

5. Every organization should set protection system.

Task 8. Define the function of that (those) in the following sentences and translate them.

1. This system of information security is more efficient than that described in that journal. 2. Computers are devices that are capable of very rapid and accurate calculation. 3. We know that the term computer crime was first used in the early 70-s. 4. On that day the main character of committing computer crimes was found. 5. Some think that computer crimes can be defined as unlawful actions. 6. The information protection system was similar to that described previously. 7. There are computers that can do many jobs. 8. That Ch. Babbage invented the first computer is well known. 9. Since that time it represents a threat to information safety. 10. Different forms of computer criminality were found in their company similar to those used in Vidtec.

 

 

Task 9. Discuss the following questions:

1. What is the main problem of information protection?

2. When was the term computer crime used?

3. What is security concerned with?

4. Why have computer crimes spread so quickly?

5. What is the difference between hackers and crackers?

6. How can the main purpose of information protection be achieved?

7. What unlawful actions are implied by computer crimes?

8. What does statistics say about computer crimes?

9. Why are so many computer crimes committed?

10. Can you suggest the appropriate solution of the information protection?

Task 10. Translate the sentences into Ukrainian.

1. Web browsers warn you if the connection is not secure; they display a message when you try to send personal information to a server.

2. Private networks use a software and hardware mechanism, called a 'firewall', to block unauthorized traffic from the Internet.

3. You have to type your user name and password to access a locked computer system or network.

4. An open padlock in Netscape Communicator indicates the page is not secure; a closed padlock indicates the page is encrypted (secure).

 

 

Task 11. Read the text and do the exercises below.

 





:


: 2018-11-10; !; : 635 |


:

:

,
==> ...

1915 - | 1825 -


© 2015-2024 lektsii.org - -

: 0.304 .