Лекции.Орг


Поиск:




Категории:

Астрономия
Биология
География
Другие языки
Интернет
Информатика
История
Культура
Литература
Логика
Математика
Медицина
Механика
Охрана труда
Педагогика
Политика
Право
Психология
Религия
Риторика
Социология
Спорт
Строительство
Технология
Транспорт
Физика
Философия
Финансы
Химия
Экология
Экономика
Электроника

 

 

 

 


Officer and NCO career paths and my military career




F-35

The F-35 includes the latest technological advancements. Its solid aerodynamic design is constantly improved. The F-35 is a highly adaptable platform. It is ready to accommodate rapidly changing technologies. The F-35 is a smart fighter. It is extremely lethal. It has an advanced avionics. The F-35 is designed to defeat the most advanced threat systems in the air and on the ground. The 5th Generation technology provides greater survivability, situational awareness, and effectiveness for pilots. As a true 5th Generation fighter, the F-35 also has multi-spectral sensors and modernized avionics.

SPIRIT

The B-2 Spirit is a multi-role bomber. It is capable of delivering both conventional and nuclear munitions. The B-2 provides the penetrating flexibility and effectiveness inherent in manned bombers. Its «stealth» characteristics give it the ability to penetrate an enemy’s most sophisticated defenses.

The revolutionary blending of low-observable technologies with high aerodynamic efficiency and large payload gives the B-2 important advantages over existing bombers. Its low-observability provides it greater freedom of action at high altitudes. Its «stealth» characteristics are derived from a combination of reduced infrared, acoustic, electromagnetic, visual and radar signatures. These signatures make it difficult for the sophisticated defensive systems to detect, track and engage the B-2. B-2’s composite materials, special coatings and flying-wing design all contribute to its «stealthiness».

 

CBU-87/103 COMBINED EFFECTS MUNITION (CEM)

The Cluster Bomb Unit (CBU)-87 is a multi-purpose cluster weapon. It has penetration, fragmentation and incendiary effects. It can hit dispersed light armor and personnel targets. After release from the aircraft, and at pre-determined flight parameters, the CBU-87 dispenses 202 BLU-97 bomblets over the target area in a circular pattern. Pattern characteristics are determined by dispense conditions and winds. The CBU-87 improves combat efficiency. Using the CBU-87 decreases the time required to destroy necessary targets in a campaign. It also decreases the number of sorties required and keeps aircrews out of harm’s way.

AGM-88 HIGH SPEED ANTI-RADIATION MISSILE (HARM)

The mission of the AGM-88 is to target, suppress and destroy enemy radar and surface-to-air missile sites at standoff range.

Currently, HARM is the Air Force’s and Navy’s primary reactive anti-radiation weapon. It is capable of destroying or suppressing enemy radars. The missile uses anti-radiation homing to attack Surface-to-Air Missile (SAM) sites. HARM has a radar-sensing seeker, control section, warhead, and rocket motor. It is highly accurate and is an all-weather weapon. The latest upgrade adds limited geo-specificity and provides a significant step in countering rapidly improving threats and limiting collateral damage.

GLOBAL HAWK

The Global Hawk is an unmanned aerial weapon system. It provides persistent, near-real-time intelligence from high altitude. The system consists of an aircraft, sensors, ground station, data links and trained personnel. The Global Hawk was deployed after the September 11/ 2001 when the terrorist attacks happened. The Global Hawk provides critical information to the US and allied decision makers. It is important for situation awareness and intelligence. The Global Hawk is used to support forces in worldwide military operations.

The Global Hawk is an unmanned, single engine aircraft. Crews fly the aircraft and control missions from the ground stations. The Global Hawk has a wingspan of 116 feet. Its height is 15 feet. Its takeoff weight is about 30,000 pounds. Its tail and wings are constructed primarily of graphite composite materials. While the center fuselage is constructed of conventional aluminum.

DAILY ROUTINE OF A CADET

A cadet’s typical day starts at 0600. Then we do morning exercise or go running. At 0700 we go to the academy by bus. We have breakfast at 0730. Our classes start at 0900 and finish at 1430. Usually we have 3 double periods (lessons). My favorite lesson is..., because ….

After lessons at 1440 we go to the mess to have lunch. At 1540 some cadets have different extra classes; some go to the gym and do physical training, for example we do weight lifting, sit ups and pushups. As for me I usually ….

At 1900 we have dinner. After dinner at 1930 we go to the barracks by bus. At 2000 we have some free time. We have a shower, read books or prepare the uniform. Lights out is at 2200.

OFFICER AND NCO CAREER PATHS AND MY MILITARY CAREER

There are two main types of leadership position in the armed forces: officers and NCOs (non-commissioned officers). Officers are in charge of organization and strategy. NCOs are responsible for the realization of that organization and strategy. The classic career path for officers begins with training at one of the military academies.

During the Commissioning Course, cadets are taught the same basic military skills learned by enlisted members in basic training, as well as military tactics, organisation, communication, military law and administration skills. Leadership qualities are emphasised above all, especially the officer’s responsibilities towards the troops and equipment under his or her command. Cadets put their training into practice on exercises both at home and abroad. After graduation an officer may be responsible for the welfare and discipline of thirty or more people, including seasoned NCOs who might be ten to fifteen years older than him or her.

Advancing in rank as an NCO is largely a matter of proving abilities and showing continued aptitude during time in service.

I joined the army in 2014, when I was 17 (years old). I graduated from basic training in August in 2013. The course was one month. I entered Aerospace Defense Academy in 2013. I was posted to the group number 111. I serve in Tver, Russia. I’m currently posted to a private.

MILITARY ORGANISATION

The three main services of the British armed forces are the British Army, the Royal Navy (RN) and the Royal Air Force (RAF). The British Army is the largest service of the British Defence Force and the major land component of NATO’s rapid reaction forces.

The Army is responsible for combat operations on land. It can be divided into Combat Arms (Infantry; Royal Armoured Corps and the Household Cavalry and Army Air Corps) Combat Arms Support (Royal Artillery, Royal Engineers, Royal Signals, Royal Intelligence Corps Combat Service Support (Royal Logistics Corps Royal Army Medical Corps, Royal Electrical and Mechanical Engineers).

The Royal Navy is responsible for combat operations at sea. The Royal Navy (RN) is in charge of security of the United Kingdom and its overseas territories. The RN fleet includes: frigates (medium-sized warships), destroyers (small, fast warships, usually with anti-aircraft or anti-submarine armaments), nuclear submarines and aircraft carriers).

The Royal Air Force is responsible for combat operations in the air. The Royal Air Force (RAF) is divided into two commands: the Personnel and Training Command (responsible for recruitment, training and job-related issues), and the Strike Command (which contains the operational units).

 

SPORTS AND FITNESS

The army places a high emphasis on physical training (PT), for obvious reasons. A soldier must be in top physical condition before he or she goes into battle.

The PT in the British Army is recognized as among the most demanding in the world. During the 44-week programme at the Royal Military Academy at Sandhurst, training is progressively more difficult with each passing week. Before their graduation, recruits will have to complete a fast march in full gear, followed by the assault course.

However, PT is not only important for physical conditioning – it also helps to develop character and team spirit. Many of the athletic activities are designed to teach soldiers to work closely together under pressure as a unit. Because of this, physical training goes well beyond running, press ups and sit ups.

The army promotes a wide range of sporting and adventure activities, such as fencing, karate, football, climbing, parachuting, and many others. Some of these activities, such as climbing and skiing, may be incorporated as part of adventure training.

COMPUTER

A computer is an electronic machine which can accept data in a certain form, process the data, and give the results of the processing in a specified format as information.

First, data is fed into the computer's memory. Then, when the program is run, the computers perform a set of instructions and process the data. Finally, we can see the results on the screen or in a printed form.

A computer system consists of two parts: hardware and software. Hardware is any electronic or mechanical part you can see or touch. Software is a set of instructions, called a program, which tells the computer what to do. There are three basic hardware sections: the central processing unit (CPU), main memory and peripherals.

Perhaps the most influential component is the central processing unit. It's function is to execute program instructions and coordinate the activities of all the other units. In a way, it is the brain of the computer.

Storage devices (hard drives, DVD drives or flash drives) provide a permanent storage of both data and programs. Disk drives are used to read and write data on disks.

THE INTERNET

The Internet is a global network of computers. Public Internet began in the late 70's. This network allows users to share all kinds of information. Some computers (like servers) share data, others just surf the web as clients download the data.

To connect to the Internet you need a computer and a modem that connects your PC to the telephone line. You need an account with an Internet Service Provider. An Internet Service Provider is a company that offers connection for a monthly fee. If you want to connect lots of computers without using cables, you can use a wireless router. Wi-Fi uses radio waves to send data over medium-range distance.

The Internet is very helpful, because it's a huge database of knowledge. There are two ways how to go on the Internet and search for information needed. The first is when you know an internet address of data you need. The second one is when you try to find information you need by using a search program. Besides data, one can get from the Internet; we can also send and receive e-mail or electronic mail. This Internet service is cheaper than ordinary mail and much quicker.

 

 

INTERNET SECURITY

The Internet provides us with a reliable and fast system of communications. However, there are some problems. The most important problem is security. When you send an e-mail, your message can travel through many different networks and computers. The data is constantly being directed towards its destination by special computers called routers. Because of this, it is possible to get into any of the computers along the route, intercept and even change the data being sent over the Internet. But there are many encoding programs available. Unfortunately, these programs are not perfect and can easily be cracked.

Security threats to IT systems include different types of malware. For example, adware is a program that automatically downloads and/or displays ads on the computer. Spyware is software that can send information about the use of a computer system. Worms are programs that spread to other computers without the user taking action. Trojans are programs that pretend to be useful but in fact damage the system. Viruses copy themselves into other programs and cause system problems. A browser hijacker is software that replaces the user’s search engine with its own.

Possible solutions to secure an IT system include biometric scanning (for example, using thumb prints to identify people) and antivirus software, which is designed to protect computers from cyber attack.

 





Поделиться с друзьями:


Дата добавления: 2016-07-29; Мы поможем в написании ваших работ!; просмотров: 1243 | Нарушение авторских прав


Поиск на сайте:

Лучшие изречения:

Надо любить жизнь больше, чем смысл жизни. © Федор Достоевский
==> читать все изречения...

2298 - | 1984 -


© 2015-2024 lektsii.org - Контакты - Последнее добавление

Ген: 0.009 с.