Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Шумихина Пособие по переводу.doc
Скачиваний:
5
Добавлен:
14.11.2018
Размер:
218.62 Кб
Скачать

Практическое занятие 2.

Задание 1. Ответьте на вопросы

1. Что такое интернациональные слова?

2. Какие слова называют «ложными друзьями» переводчика?

3. На какие группы подразделяются «ложные друзья» переводчика?

4. Что нужно иметь в виду переводчику при работе с такими словами?

Задание 2. Переведите следующие словосочетания и предложения на русский язык, в которых используются «ложные друзья» переводчика:

  1. Banking officers

  2. Public debt

  3. Interest rate

  4. Convention of the Entrepreneurs Union

  5. Personnel department

  6. Champion of peace

  7. Ammunition storage

  8. Null document

  9. Legal matters

  10. Accurate data

  11. Title and position

  12. Human values

1. The robot could boost the capabilities of troops and special forces engaged in urban warfare, say researchers.

2. The digital conference grew out of the original music and film festivals.

3. Microsoft published the first Service Pack for Windows Vista in March 2008.

4. From a security perspective, computer systems have three general goals: data confidentiality, data integrity and system availability.

5. Another aspect of the security problem is privacy: protecting individuals from misuse of information about them.

6. All computer applications need to store and retrieve information.

7. Many operating systems support several types of files: UNIX and Windows, for example, have regular files and directories.

8. Binary file is an archive, which consists of a collection of library procedures (modules) compiled but not linked.

9. I/O devices can be roughly divided into two categories: block devices and character devices.

10. Most computers have a memory hierarchy, with a small amount of very fast, expensive, volatile cache memory, tens of megabytes of medium-speed, medium-price, volatile main memory (RAM), and tens or hundreds of gigabytes of slow, cheap, nonvolatile disk storage.

Задание 3. Переведите следующий текст, обращая внимание на перевод интернациональной и псевдоинтернациональной лексики.

Intruders

Most people are pretty nice and obey the law, so why worry about security? Because there are unfortunately a few people around who are not so nice and want to cause trouble. In the security literature, people who are nosing around places where they have no business being are called intruders. Intruders act in two different ways. Passive intruders just want to read files they are not authorized to read. Active intruders are more malicious; they want to make unauthorized changes to data. When designing a system to be secure against intruders, it is important to keep in mind the kind of intruder one is trying to protect against. Some common categories are:

  1. Casual prying by nontechnical users. Many people have personal computers on their desks that are connected to a shared file server, and human nature being what it is, some of them will read other people’s electronic mail and other files if no barriers are placed in the way. Most UNIX systems, for example, have the default that all newly created files are publicly readable.

  2. Snooping by insiders. Students, system programmers, operators, and other technical personnel often consider it to be a personal challenge to break the security of the local computer system. They often are highly skilled and are willing to devote a substantial amount of time to the effort.

  3.  Determined attempts to make money. Some bank programmers have attempted to steal from the bank they were working for. Schemes have varied from changing the software to truncate rather than round interest, keeping the fraction of a cent for themselves, to siphoning off accounts not used in years, to blackmail (“Pay me or I will destroy all the bank’s records.”).

  4. Commercial or military espionage. Espionage refers to a serious and well-funded attempt by a competitor or a foreign country to steal programs, trade secrets, patentable ideas, technology, circuit designs, business plans, and so forth. Often this attempt will involve wiretapping or even erecting antennas directed at the computer to pick up its electromagnetic radiation.

Another category of security pest that has manifested itself in recent years is a virus. Basically a virus is a piece of code that replicates itself and (usually) does some damage. In a virus is also an intruder, often with high technical skills. The difference between a conventional intruder and a virus is that the former refers to a person who is personally trying to break into a system to cause damage whereas the latter is a program written by such a person and then released into the world hoping it causes damage.