Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

734

.pdf
Скачиваний:
2
Добавлен:
06.12.2022
Размер:
7.52 Mб
Скачать

The second part is software — the programs that control and coordinate the activities of the computer hardware and that direct the processing of data.

For the computer system to operate, computer programs are required. A computer program is a set of instructions for the CPU. These instructions tell the CPU where to find the input data in the system. The CPU is also instructed how to process the data and where to put the results. Programs are not hardware, as they have no electrical or mechanical components. They can be easily changed according to the needs of the user.

Computer software can be divided into two very broad categories — system software and application software.

Unit 5

Read the text:

Computer Security

Computer security is an application of information security to both theoretical and actual computer systems. For sake of simplicity, issues regarding privacy should be handled under the subject of information privacy rights.computer security is a branch of computer science that addresses enforcement of “secure” behavior on the operation of computers.

The term “computer security” is used very frequently, but the content of a computer is vulnerable to several risks unless the computer is connected to other computers to form a network. As the use of computer networks, especially the Internet, has become widely spread, the concept of computer security has expanded to signify issues relating to the networked use of computers and their resources.

The major technical areas of computer security are usually rep storage devices presented by the initials CIA: Confidentiality, Integrity and Availability. Confidentiality means that information cannot be accessed by unauthorized parties; secrecy or privacy; breaches of confidentiality range from the embarrassing to the disastrous. Integrity means that information is protected against unauthorized changes that are not detectable to authorized users; many incidents of hacking compromise the integrity of database and other resources. Availability means that resources are accessible by authorized parties.

Privacy is perhaps the most important aspect of computer security for everyday Internet users. Although these people may feel that they have nothing to hide when they are registering with an Internet site or service, privacy on the Internet is about protecting one’s personal information, even if the information does not seem sensitive.

The traditional approach is to create a trusted security kernel that exploits special-purpose hardware mechanisms in the microprocessor to constrain the operating system and the application programs to conform to the security policy. These systems can isolate processes and data to specific domains and restrict access and privileges of users. This approach avoids trusting most of the operating system and applications.

In addition to restricting actions to a secure subset, a secure system should still permit authorized users to carry out legitimate and useful tasks. It might be possible to secure a computer against misuse using extreme measures:

90

“The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards — and even then I have my doubts. ” (Eugene H. Spafford, director of the Purdue Center for Education and Research in Information Assurance and Security)

Assignments:

I.General understanding. Answer the questions:

1.What is the term of computer security?

2.What do confidentiality, integrity, and availability mean in terms of PC security?

3.What is the most important aspect of computer security nowadays?

4.What is the gist of the traditional approach security?

5.Comment upon Eugene H. Spafford’s words.

II. Translate these phrases from Russian into English:

Вычислительная, компьютерная сеть; подчиняться политике безопасности; неавторизованные абоненты; у меня нет сомнений; традиционный подход; право на неприкосновенность личной жизни; крайние меры; запоминающее устройство; сдерживать операционную систему; сетевое использование.

III.Put the words in the correct order to make up sentences. Then translate them:

1.that, authorized, accessible, resources, parties, means, are, availability, by.

2.has, Internet, the, become, widely, networks, computer, especially, of, the, use, spread.

3.secure, is, the, truly, is, one, that, off, system, powered, only.

4.specific, users, these, can, processes, restrict, data, to, and, access, and, isolate, privileges, of, systems, domains, and.

IV. 1) Some technical words in English begin or end with common affixes. Knowing the meaning of the affix can help you work out the meaning of the whole world. Study the examples from this table:

Affix

Meaning

Example

bio

life

biotechnology

ex

out of

external

inter

between

Internet

intra

inside, within

intranet

-less

without

wireless

micro

very small

microwave

mini

small

minidisc

poly

many

polyester

pre

before, earlier

prefabricated

super

above, much greater

supermarket

tele

far, distant

telecommunications

2) Using the table, work out the words which have the following meanings:

1.a phone without a cord;

2.a very small processor;

3.concrete which has been stressed earlier;

4.medicine at a distance;

5.a very small electronic chip;

6.a computer much more powerful than ordinary computers;

7.a plastic containing many molecules of carbon.

91

3) Fill in the sentences (column A) with the prefixes (column B):

 

A

B

1.

…byte means one million bytes.

multi-

2.

…plexing is when many electrical signals are combined and carried on only one optical link.

semi-

3.

Blocks are separated from each other by marks called … block gaps.

mini-

4.

The number system we use in everyday life is the …mal system, which has a base of 10.

mono-

5. Some screens are …chromatic whereas others produce multicolor pictorial graphics.

de-

6. The complete description of the logical structure of data is called the schema and the description of

the parts, the …schema.

sub-

mega-

7.

The main storage locations of a computer are called its …ary storage.

auto-

8.

The small ferrite rings called cores have two states: they can be either magnetized or …magnetized.

prime-

9. The introduction of chips or …conductor memories made it possible to reduce the size of the com-

 

puter.

 

V. Webquest. 1) Find out about the five fastest supercomputers in the world and complete the table.compare your answers with other students:

Order

Type or name

Speed

Maker

Location

1st

 

 

 

 

2nd

 

 

 

 

3rd

 

 

 

 

4th

 

 

 

 

5th

 

 

 

 

2) This site may help: http://www.top500.org/

VI. Render this text in English:

Компьютерный интерфейс

Ответьте себе на вопрос: каким образом происходит ваше взаимодействие с компьютером? Вы думаете над тем, что хотите сделать. Затем, используя мышь и клавиатуру (реже — джойстик), выполняете необходимые действия мускульным движением рук. Но не кажется ли вам, что было бы проще дать команду компьютеру голосом или, того лучше, мозговым импульсом. И это не фантастика — компьютеры научатся адекватно распознавать голоса в ближайшие 5 лет (проблема лишь в отсутствии оптимального алгоритма распознавания голоса и недостаточной вычислительной мощности), а воспринимать импульсы мозга — через 10 лет. Уже сегодня в продаже можно найти экзотический прибор OCZ NIA, который является прообразом интерфейса будущего. С помощью NIA можно управлять движением курсора мыши при помощи импульсов головного мозга. Однако конструкция настолько несовершенна, что на ее усвоение у вас может уйти едва ли не больше времени, чем на полное изучение Большой Советской энциклопедии. В будущем планируется сделать более точный прибор, способный лучше улавливать электрические импульсы, направляемые головным мозгом человека и адекватнее их распознавать.

“S7”

Use the words and phrases given below:

Техника — hardware; взаимодействие — interaction; джойстик — joystick; мускульное движение рук — muscular manipulation; дать команду компьютеру голосом — give the order to the computer by the voice; мозговой импульс — brain impulse; распознавать голоса — identify voices; прообраз интерфейса — interface prototype; курсор мыши — mouse pointer; несовершенныйimperfect; улавливать (понимать) — catch.

VII.1) Discuss in groups or prepare individual comments on these predictions about technology. Give reasons to support your ideas.

92

2) Decide together which predictions you accept.

1.Tiny robots will be injected into our bodies to deliver medicine and to perform surgery from the inside.

2.Planes will be controlled by computers which think like humans and are therefore afraid to crash.

3.Cars will automatically drive at safe speeds and safe distances from each other.

4.You will be able to download your brain to a computer before you die.

5.Business will be carried out in 3-D virtual space, not in offices.

6.Jobs like teaching children or nursing will continue to be done by people, but most other jobs will be done by robots and computers.

93

Words and word combinations to the part V

 

Robots And Computers

1. access

доступ

2. availability n

доступность, возможность использования

3. axle n

мост

4. breach n

повреждение (в системе безопасности)

5. bumper n

бампер; буфер

6. camshaft n

распределительный вал

7. capacity

вместимость, объем

8. cart n

телега

9. caterpillar track

гусеничный ход

10. central processing unit (cpu)

центральный процессор

11. circuit n

схема, цепь

12. cliff sensor

датчик уклона

13. compliant adj

податливый

14. computer security

компьютерная безопасность

15. confidentiality n

конфиденциальность, секретность

16. contamination n

загрязнение

17. conveyor belt

конвейерная лента

18. data n

данные

19. deploying n

инсталяция распределенной программной си-

 

стемы

20. detect v

обнаруживать, выявлять

21. digital

цифровой

22. disastrous adj

гибельный

23. embarrass v

затруднять, препятствовать

24. enforcement n

требование о соблюдении

25. error n

ошибка

26. exert v

приводить в действие

27. feedback n

обратная связь

28. fit n

устанавливать

29. flex v

деформироваться; изгибаться

30. go through the roof

неожиданно резко увеличиваться

31. hacking n

хакерство

32. handling n

обработка, оперирование

33. hardware n

механические устройства

34. inanimate adj

неживой

35. incredibly adv

невероятно

36. infrared receiver

приемник ИК-диапазона

37. infrared signal

инфракрасный (ИК) сигнал

38. innovative adj

инновационный

39. input data

входные данные

40. integrated circuit

интегральная схема

41. integrity n

целостность, сохранность

42. keyboard n

клавиатура

43. legitimate adj

легальный, законный

44. magnetic tape

магнитная лента

45. mechatronics n

мехатроника (соединение оборудования с мини-

 

компьютерами)

94

46. obstacle n

преграда, препятствие

47. output data

выходные данные

48. partly adv

частично

49. peg n

штифт; штырь

50. pincers n, pl

клещи

51. pitch n

шаг

52. plane n

плоскость

53. playback n

воспроизведение

54. processing n

обработка данных

55. reflect v

отражать

56. remotely adv

дистанционно

57. roll n

вращение

58. security kernel

ядро безопасности

59. selective compliance assembly ro-

сборочный робот селективного выборочного

bot arm (scara)

применения

60. semiconductor n

полупроводник

61. sequence n

последовательность

62. set the machine

наладить машину

63. strict definition

точное определение

64. software n

программное обеспечение

65. subset n

подмножество

66. tape drive (disc drive)

накопитель на магнитной ленте

67. typing n

печатание

68. unauthorized adj

несанкционированный; неавторизованный

69. vision n

зрение

70. visual display unit (vdu)

монитор

71. vulnerable adj

уязвимый; ранимый

72. yaw n

поворот вокруг вертикальной оси

95

PART VI. GRAPHS

Unit 1

Describing Graphs (Part I)

I. In engineering, graphs and charts are a common way of giving information. They allow a great deal of data to be presented easily in visual form.

Match the following graphic displays with the correct term from the list:

graph

pie chart

bar chart

bar chart (column chart)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Fig. 1.1

Fig. 1.2

Repairs in the first four years (per 100 machines)

Fig. 1.3

Fig. 1.4

II. 1) Study the graph below (Fig. 1.5) which shows typical daily load curves for a power station.

2) Describe changes in load for these time periods:

1.Between 6 and 10;

2.Between 18 and 22;

3.Between 2 and 6.

Per cent of system peak load

Weekday

100

90

80

70

60 kilowatts 50 40

30

20

10

0

0

2

4

6

8

10

12

14

16

18

20

22

Time, h

Fig. 1.5. Typical daily load curves for a power station

96

Describing Graphs

Look at the time period from 6 to 10 (Fig. 1.5). We can describe the change in load in two ways:

1.The load rises.

2.There is a rise in load.

We can make our description more accurate like this:

3.The road rises sharply.

4.There is a sharp rise in load.

III. 1) Study this table of verbs and related nouns of change. The past form of irregular verbs is given in brackets:

Direction

Verb

Noun

up

climb

 

 

go up (went up)

 

 

increase

increase

 

rise (rose)

rise

down

decline

decline

 

decrease

decrease

 

dip

dip

 

drop

drop

 

fall (fell)

fall

 

go down (went down)

 

level

not change

not change

 

remain constant

 

2) These adjectives and adverbs are used to describe the rate of change:

Adjective

Adverb

slight

slightly

gradual

gradually

steady

steadily

steep

steeply

considerable

considerably

sharp

sharply

sudden

suddenly

fast

fast

IV. Looking at the graphs complete the tables with the words given:

considerably

increased

decreased

moderately

dropped

sharp

gradually

slowly

growth

steep

increase

went up

 

 

rose

slightly.

The temperature

Fig. 1.6

97

Fig. 1.7

Fig. 1.8

dramatic rise

in solar There was energy

production.

fell

significantly.

Rice production

V. 1) Study the diagram below (Fig. 1.9) which shows how tensile strength, hardness, and ductility vary with the percentage of carbon in carbon steels.

2) Answer these questions:

1.What is a high carbon steel?

2.How much carbon does tool steels contain?

3.Compare the properties of mild steel and hard steel.

4.What kind of steel is tin plate made from?

5.What kind of steel are car springs made from?

Low car-

 

Medium carbon

High carbon steel

 

bon steel

Mild steel

 

Spring

 

steel

Hard steel

Tool steel

 

 

 

grades

 

 

 

 

 

 

 

 

 

 

 

 

Tin plate,

Ship and boiler

Railway rails,

Locomotive tyres,

Car,

Metal cutting

wire,

plates, structural

crank pins, con-

woodcutting tools,

springs, tap

and forming

rivets,

sections, turbine,

necting rods, ax-

crusher rolls, ham-

drills, ball

tools, drills,

pipes

rotors, marine

les, gears, gun

mers, hand chisels

races

wire dies

 

shafts

barrels

 

 

 

 

 

 

 

 

 

 

 

Tensile strength

 

 

 

 

Hardness

 

 

 

 

 

 

 

Ductility

 

0.08

0.15

0.35

0.55

0.85

1.05

1.20

% Carbon

 

 

 

 

 

 

Fig. 1.9. Properties and applications of carbon steels

98

Unit 2

Describing Graphs (Part II)

I.Look at the graph in Fig. 2.1. Answer the following questions:

1.What is the topic of the graph?

2.What does the horizontal (X) axis represent?

3.What are the figures on the vertical (Y) axis?

4.What were the most important sources of energy?

5.Why are 1978 and 1983 significant?

6.What do you notice about alternative sources of energy?

7.Which source of energy grew significantly after 1970?

Fig. 2.1. World Energy Consumption

II.1) Read the description of the graph in Fig. 2.1.

2)After reading answer the questions:

1.What is the purpose of the first sentence?

2.What is the purpose of the second sentence?

3.Which words have a meaning similar to approximately?

The graph in Fig. 2.1 shows how much energy from different sources was used between 1950 and 2005. We can see that over this period the amount of energy used increased sharply and the largest amount of energy came from petroleum. In 1950 just over 13,000 million billion Joules was used but this figure rose sharply to reach a peak of roughly 40,000 million billion Joules in 1978. There was a dramatic fall to just over 30,000 million billion in the following five years before rising rapidly to reach 42. 000 million billion Joules by 2005. The second and third largest sources of energy were natural gas and coal, which each accounted for about 25,000 million billion Joules in 2005. The graph shows that insignificant amounts of energy came from renewable sources during this time, but there was a growth in the amount of nuclear electric power after 1970, reaching approximately 8,000 million billion Joules in 2005. The fall in energy consumption in the years around 1980 was probably due to the world oil crisis.

III. Use expressions given below to write a description of the graph in Fig. 2.2. In your first sentence describe what the graph is about by using the title, X, and Y axis. In the second sentence give an overview of the trends shown in the graph. Then describe the graph in more detail. Write 80–100 words.

99

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]