734
.pdfThe second part is software — the programs that control and coordinate the activities of the computer hardware and that direct the processing of data.
For the computer system to operate, computer programs are required. A computer program is a set of instructions for the CPU. These instructions tell the CPU where to find the input data in the system. The CPU is also instructed how to process the data and where to put the results. Programs are not hardware, as they have no electrical or mechanical components. They can be easily changed according to the needs of the user.
Computer software can be divided into two very broad categories — system software and application software.
Unit 5
Read the text:
Computer Security
Computer security is an application of information security to both theoretical and actual computer systems. For sake of simplicity, issues regarding privacy should be handled under the subject of information privacy rights.computer security is a branch of computer science that addresses enforcement of “secure” behavior on the operation of computers.
The term “computer security” is used very frequently, but the content of a computer is vulnerable to several risks unless the computer is connected to other computers to form a network. As the use of computer networks, especially the Internet, has become widely spread, the concept of computer security has expanded to signify issues relating to the networked use of computers and their resources.
The major technical areas of computer security are usually rep storage devices presented by the initials CIA: Confidentiality, Integrity and Availability. Confidentiality means that information cannot be accessed by unauthorized parties; secrecy or privacy; breaches of confidentiality range from the embarrassing to the disastrous. Integrity means that information is protected against unauthorized changes that are not detectable to authorized users; many incidents of hacking compromise the integrity of database and other resources. Availability means that resources are accessible by authorized parties.
Privacy is perhaps the most important aspect of computer security for everyday Internet users. Although these people may feel that they have nothing to hide when they are registering with an Internet site or service, privacy on the Internet is about protecting one’s personal information, even if the information does not seem sensitive.
The traditional approach is to create a trusted security kernel that exploits special-purpose hardware mechanisms in the microprocessor to constrain the operating system and the application programs to conform to the security policy. These systems can isolate processes and data to specific domains and restrict access and privileges of users. This approach avoids trusting most of the operating system and applications.
In addition to restricting actions to a secure subset, a secure system should still permit authorized users to carry out legitimate and useful tasks. It might be possible to secure a computer against misuse using extreme measures:
90
“The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards — and even then I have my doubts. ” (Eugene H. Spafford, director of the Purdue Center for Education and Research in Information Assurance and Security)
Assignments:
I.General understanding. Answer the questions:
1.What is the term of computer security?
2.What do confidentiality, integrity, and availability mean in terms of PC security?
3.What is the most important aspect of computer security nowadays?
4.What is the gist of the traditional approach security?
5.Comment upon Eugene H. Spafford’s words.
II. Translate these phrases from Russian into English:
Вычислительная, компьютерная сеть; подчиняться политике безопасности; неавторизованные абоненты; у меня нет сомнений; традиционный подход; право на неприкосновенность личной жизни; крайние меры; запоминающее устройство; сдерживать операционную систему; сетевое использование.
III.Put the words in the correct order to make up sentences. Then translate them:
1.that, authorized, accessible, resources, parties, means, are, availability, by.
2.has, Internet, the, become, widely, networks, computer, especially, of, the, use, spread.
3.secure, is, the, truly, is, one, that, off, system, powered, only.
4.specific, users, these, can, processes, restrict, data, to, and, access, and, isolate, privileges, of, systems, domains, and.
IV. 1) Some technical words in English begin or end with common affixes. Knowing the meaning of the affix can help you work out the meaning of the whole world. Study the examples from this table:
Affix |
Meaning |
Example |
bio |
life |
biotechnology |
ex |
out of |
external |
inter |
between |
Internet |
intra |
inside, within |
intranet |
-less |
without |
wireless |
micro |
very small |
microwave |
mini |
small |
minidisc |
poly |
many |
polyester |
pre |
before, earlier |
prefabricated |
super |
above, much greater |
supermarket |
tele |
far, distant |
telecommunications |
2) Using the table, work out the words which have the following meanings:
1.a phone without a cord;
2.a very small processor;
3.concrete which has been stressed earlier;
4.medicine at a distance;
5.a very small electronic chip;
6.a computer much more powerful than ordinary computers;
7.a plastic containing many molecules of carbon.
91
3) Fill in the sentences (column A) with the prefixes (column B):
|
A |
B |
|
1. |
…byte means one million bytes. |
multi- |
|
2. |
…plexing is when many electrical signals are combined and carried on only one optical link. |
||
semi- |
|||
3. |
Blocks are separated from each other by marks called … block gaps. |
||
mini- |
|||
4. |
The number system we use in everyday life is the …mal system, which has a base of 10. |
||
mono- |
|||
5. Some screens are …chromatic whereas others produce multicolor pictorial graphics. |
|||
de- |
|||
6. The complete description of the logical structure of data is called the schema and the description of |
|||
the parts, the …schema. |
sub- |
||
mega- |
|||
7. |
The main storage locations of a computer are called its …ary storage. |
||
auto- |
|||
8. |
The small ferrite rings called cores have two states: they can be either magnetized or …magnetized. |
||
prime- |
|||
9. The introduction of chips or …conductor memories made it possible to reduce the size of the com- |
|||
|
|||
puter. |
|
V. Webquest. 1) Find out about the five fastest supercomputers in the world and complete the table.compare your answers with other students:
Order |
Type or name |
Speed |
Maker |
Location |
1st |
|
|
|
|
2nd |
|
|
|
|
3rd |
|
|
|
|
4th |
|
|
|
|
5th |
|
|
|
|
2) This site may help: http://www.top500.org/
VI. Render this text in English:
Компьютерный интерфейс
Ответьте себе на вопрос: каким образом происходит ваше взаимодействие с компьютером? Вы думаете над тем, что хотите сделать. Затем, используя мышь и клавиатуру (реже — джойстик), выполняете необходимые действия мускульным движением рук. Но не кажется ли вам, что было бы проще дать команду компьютеру голосом или, того лучше, мозговым импульсом. И это не фантастика — компьютеры научатся адекватно распознавать голоса в ближайшие 5 лет (проблема лишь в отсутствии оптимального алгоритма распознавания голоса и недостаточной вычислительной мощности), а воспринимать импульсы мозга — через 10 лет. Уже сегодня в продаже можно найти экзотический прибор OCZ NIA, который является прообразом интерфейса будущего. С помощью NIA можно управлять движением курсора мыши при помощи импульсов головного мозга. Однако конструкция настолько несовершенна, что на ее усвоение у вас может уйти едва ли не больше времени, чем на полное изучение Большой Советской энциклопедии. В будущем планируется сделать более точный прибор, способный лучше улавливать электрические импульсы, направляемые головным мозгом человека и адекватнее их распознавать.
“S7”
Use the words and phrases given below:
Техника — hardware; взаимодействие — interaction; джойстик — joystick; мускульное движение рук — muscular manipulation; дать команду компьютеру голосом — give the order to the computer by the voice; мозговой импульс — brain impulse; распознавать голоса — identify voices; прообраз интерфейса — interface prototype; курсор мыши — mouse pointer; несовершенныйimperfect; улавливать (понимать) — catch.
VII.1) Discuss in groups or prepare individual comments on these predictions about technology. Give reasons to support your ideas.
92
2) Decide together which predictions you accept.
1.Tiny robots will be injected into our bodies to deliver medicine and to perform surgery from the inside.
2.Planes will be controlled by computers which think like humans and are therefore afraid to crash.
3.Cars will automatically drive at safe speeds and safe distances from each other.
4.You will be able to download your brain to a computer before you die.
5.Business will be carried out in 3-D virtual space, not in offices.
6.Jobs like teaching children or nursing will continue to be done by people, but most other jobs will be done by robots and computers.
93
Words and word combinations to the part V |
|
|
Robots And Computers |
1. access |
доступ |
2. availability n |
доступность, возможность использования |
3. axle n |
мост |
4. breach n |
повреждение (в системе безопасности) |
5. bumper n |
бампер; буфер |
6. camshaft n |
распределительный вал |
7. capacity |
вместимость, объем |
8. cart n |
телега |
9. caterpillar track |
гусеничный ход |
10. central processing unit (cpu) |
центральный процессор |
11. circuit n |
схема, цепь |
12. cliff sensor |
датчик уклона |
13. compliant adj |
податливый |
14. computer security |
компьютерная безопасность |
15. confidentiality n |
конфиденциальность, секретность |
16. contamination n |
загрязнение |
17. conveyor belt |
конвейерная лента |
18. data n |
данные |
19. deploying n |
инсталяция распределенной программной си- |
|
стемы |
20. detect v |
обнаруживать, выявлять |
21. digital |
цифровой |
22. disastrous adj |
гибельный |
23. embarrass v |
затруднять, препятствовать |
24. enforcement n |
требование о соблюдении |
25. error n |
ошибка |
26. exert v |
приводить в действие |
27. feedback n |
обратная связь |
28. fit n |
устанавливать |
29. flex v |
деформироваться; изгибаться |
30. go through the roof |
неожиданно резко увеличиваться |
31. hacking n |
хакерство |
32. handling n |
обработка, оперирование |
33. hardware n |
механические устройства |
34. inanimate adj |
неживой |
35. incredibly adv |
невероятно |
36. infrared receiver |
приемник ИК-диапазона |
37. infrared signal |
инфракрасный (ИК) сигнал |
38. innovative adj |
инновационный |
39. input data |
входные данные |
40. integrated circuit |
интегральная схема |
41. integrity n |
целостность, сохранность |
42. keyboard n |
клавиатура |
43. legitimate adj |
легальный, законный |
44. magnetic tape |
магнитная лента |
45. mechatronics n |
мехатроника (соединение оборудования с мини- |
|
компьютерами) |
94
46. obstacle n |
преграда, препятствие |
47. output data |
выходные данные |
48. partly adv |
частично |
49. peg n |
штифт; штырь |
50. pincers n, pl |
клещи |
51. pitch n |
шаг |
52. plane n |
плоскость |
53. playback n |
воспроизведение |
54. processing n |
обработка данных |
55. reflect v |
отражать |
56. remotely adv |
дистанционно |
57. roll n |
вращение |
58. security kernel |
ядро безопасности |
59. selective compliance assembly ro- |
сборочный робот селективного выборочного |
bot arm (scara) |
применения |
60. semiconductor n |
полупроводник |
61. sequence n |
последовательность |
62. set the machine |
наладить машину |
63. strict definition |
точное определение |
64. software n |
программное обеспечение |
65. subset n |
подмножество |
66. tape drive (disc drive) |
накопитель на магнитной ленте |
67. typing n |
печатание |
68. unauthorized adj |
несанкционированный; неавторизованный |
69. vision n |
зрение |
70. visual display unit (vdu) |
монитор |
71. vulnerable adj |
уязвимый; ранимый |
72. yaw n |
поворот вокруг вертикальной оси |
95
PART VI. GRAPHS
Unit 1
Describing Graphs (Part I)
I. In engineering, graphs and charts are a common way of giving information. They allow a great deal of data to be presented easily in visual form.
Match the following graphic displays with the correct term from the list:
graph |
pie chart |
||||||||||
bar chart |
bar chart (column chart) |
||||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Fig. 1.1 |
Fig. 1.2 |
Repairs in the first four years (per 100 machines)
Fig. 1.3 |
Fig. 1.4 |
II. 1) Study the graph below (Fig. 1.5) which shows typical daily load curves for a power station.
2) Describe changes in load for these time periods:
1.Between 6 and 10;
2.Between 18 and 22;
3.Between 2 and 6.
Per cent of system peak load
Weekday
100
90
80
70
60 kilowatts 50 40
30
20
10
0
0 |
2 |
4 |
6 |
8 |
10 |
12 |
14 |
16 |
18 |
20 |
22 |
Time, h
Fig. 1.5. Typical daily load curves for a power station
96
Describing Graphs
Look at the time period from 6 to 10 (Fig. 1.5). We can describe the change in load in two ways:
1.The load rises.
2.There is a rise in load.
We can make our description more accurate like this:
3.The road rises sharply.
4.There is a sharp rise in load.
III. 1) Study this table of verbs and related nouns of change. The past form of irregular verbs is given in brackets:
Direction |
Verb |
Noun |
up |
climb |
|
|
go up (went up) |
|
|
increase |
increase |
|
rise (rose) |
rise |
down |
decline |
decline |
|
decrease |
decrease |
|
dip |
dip |
|
drop |
drop |
|
fall (fell) |
fall |
|
go down (went down) |
|
level |
not change |
not change |
|
remain constant |
|
2) These adjectives and adverbs are used to describe the rate of change:
Adjective |
Adverb |
slight |
slightly |
gradual |
gradually |
steady |
steadily |
steep |
steeply |
considerable |
considerably |
sharp |
sharply |
sudden |
suddenly |
fast |
fast |
IV. Looking at the graphs complete the tables with the words given:
considerably |
increased |
decreased |
moderately |
dropped |
sharp |
gradually |
slowly |
growth |
steep |
increase |
went up |
|
|
rose |
slightly. |
The temperature
Fig. 1.6
97
Fig. 1.7
Fig. 1.8
dramatic rise
in solar There was energy
production.
fell |
significantly. |
Rice production
V. 1) Study the diagram below (Fig. 1.9) which shows how tensile strength, hardness, and ductility vary with the percentage of carbon in carbon steels.
2) Answer these questions:
1.What is a high carbon steel?
2.How much carbon does tool steels contain?
3.Compare the properties of mild steel and hard steel.
4.What kind of steel is tin plate made from?
5.What kind of steel are car springs made from?
Low car- |
|
Medium carbon |
High carbon steel |
|
|||
bon steel |
Mild steel |
|
Spring |
|
|||
steel |
Hard steel |
Tool steel |
|||||
|
|||||||
|
|
grades |
|||||
|
|
|
|
|
|||
|
|
|
|
|
|
|
|
Tin plate, |
Ship and boiler |
Railway rails, |
Locomotive tyres, |
Car, |
Metal cutting |
||
wire, |
plates, structural |
crank pins, con- |
woodcutting tools, |
springs, tap |
and forming |
||
rivets, |
sections, turbine, |
necting rods, ax- |
crusher rolls, ham- |
drills, ball |
tools, drills, |
||
pipes |
rotors, marine |
les, gears, gun |
mers, hand chisels |
races |
wire dies |
||
|
shafts |
barrels |
|
|
|
|
|
|
|
|
|
|
|
|
Tensile strength
|
|
|
|
Hardness |
|
|
|
|
|
|
|
Ductility |
|
0.08 |
0.15 |
0.35 |
0.55 |
0.85 |
1.05 |
1.20 |
% Carbon |
|
|
|
|
|
|
Fig. 1.9. Properties and applications of carbon steels
98
Unit 2
Describing Graphs (Part II)
I.Look at the graph in Fig. 2.1. Answer the following questions:
1.What is the topic of the graph?
2.What does the horizontal (X) axis represent?
3.What are the figures on the vertical (Y) axis?
4.What were the most important sources of energy?
5.Why are 1978 and 1983 significant?
6.What do you notice about alternative sources of energy?
7.Which source of energy grew significantly after 1970?
Fig. 2.1. World Energy Consumption
II.1) Read the description of the graph in Fig. 2.1.
2)After reading answer the questions:
1.What is the purpose of the first sentence?
2.What is the purpose of the second sentence?
3.Which words have a meaning similar to approximately?
The graph in Fig. 2.1 shows how much energy from different sources was used between 1950 and 2005. We can see that over this period the amount of energy used increased sharply and the largest amount of energy came from petroleum. In 1950 just over 13,000 million billion Joules was used but this figure rose sharply to reach a peak of roughly 40,000 million billion Joules in 1978. There was a dramatic fall to just over 30,000 million billion in the following five years before rising rapidly to reach 42. 000 million billion Joules by 2005. The second and third largest sources of energy were natural gas and coal, which each accounted for about 25,000 million billion Joules in 2005. The graph shows that insignificant amounts of energy came from renewable sources during this time, but there was a growth in the amount of nuclear electric power after 1970, reaching approximately 8,000 million billion Joules in 2005. The fall in energy consumption in the years around 1980 was probably due to the world oil crisis.
III. Use expressions given below to write a description of the graph in Fig. 2.2. In your first sentence describe what the graph is about by using the title, X, and Y axis. In the second sentence give an overview of the trends shown in the graph. Then describe the graph in more detail. Write 80–100 words.
99