Министерство образования и науки Российской Федерации Государственное образовательное учреждение высшего профессионального образования «Северо-Кавказский государственный технический университет» Г. Э. Маркосян, Л. М. Митрофаненко АВТОМАТИЗИРОВАННЫЕ СИСТЕМЫ ОБРАБОТКИ ИНФОРМАЦИИ И УПРАВЛЕНИЯ Учебное пособие Ставрополь Издательство СевКавГТУ 2011 УДК ББК М Рецензенты: Кандидат филологич. наук, доцент, Северо-Кавказского государственного технологического университета Мартьянова Е. О. Кандидат философ. наук, доцент, Северо-Кавказского государственного технологического университета Коломак А. И. М Маркосян, Г. Э. Автоматизированные системы обработки информации и управления: учебное пособие на английском языке / Г. Э. Маркосян, Л. М. Митрофаненко, – Ставрополь : СевКавГТУ, 2011. – 276 с. Предлагаемое вашему вниманию учебное пособие составлено в соответствии с государственным образовательным стандартом высшего профессионального образования, рабочим учебным планом и программой дисциплины «Английский язык для студентов специальности 230102 «Автоматизированные системы обработки информации и управления». Учебное пособие (практикум) на английском языке включает в себя тексты по специальности «Автоматизированные системы обработки информации и управления», вопросы к текстам, проверочные упражнения для закрепления данного материала, краткий словарь. Целью пособия является совершенствование навыков чтения специальных текстов, грамматических умений и навыков, а также накопление словарного запаса по данной теме. Учебное пособие может быть использовано во время аудиторных занятий по английскому языку и для самостоятельной работы студентов. УДК ББК © Маркосян Г. Э., 2011 © Митрофаненко Л. М., 2011 © ГОУВПО «Северо-Кавказский государственный технический университет», 2011 2 ВВЕДЕНИЕ (INTRODUCTION) На современном этапе технологического процесса, в эпоху компьютеризации, актуальным является изучение информационных систем и технологий на многих специальностях. Владение необходимым компьютерными для каждого технологиями грамотного является человека. абсолютно Неотъемлемым компонентом компьютерной грамотности следует признать должный уровень владения определенным набором понятий и терминов языка компьютерных технологий. Такого плана языковые знания полезны для уверенной ориентации пользователя в мире информации и повышения его технологических возможностей при работе с компьютером в дальнейшем. Цель данного учебного пособия обучить студента языковым средствам для эффективного общения с компьютером, пониманию специальных научно-технических текстов в области компьютерных технологий, умению использовать информацию при подготовке рефератов и аннотаций на английском языке. Учебное пособие содержит тексты из оригинальной литературы, посвященные теме «Компьютерные и информационные системы»; учебные задания, способствующие усвоению и запоминанию специальных терминов по компьютерным технологиям; задания для развития навыков чтения; упражнения по усвоению грамматических явлений, а также упражнения, которые позволят правильно строить высказывания на иностранном языке и научиться грамотно излагать содержание специального текста. 3 CONTENTS INTRODUCTION……………………………………………………………. FROM THE HISTORY OF THE COMPUTERS …………………………… WHAT IS A COMPUTER .......................................................................... COMPUTERS MASHINE .......................................................................... ANALOFUE AND DIGITAL COMPUTERS .............................................. THE INTERNET ........................................................................................ GOVERMENT TO RESCUE IT .................................................................. MODERN COMPUTER USAGE FOR KEEPING THE COMPUTER TECHNOLOGY HISTORY ........................................................................ THE DEVELOPMENT OF COMPUTERS IN THE USA ............................ THE COMPARISON OF THE COMPUTER DEVELOPMENT IN THE USA AND THE UKRAINE ........................................................................ THE HOMECITY OF MESM ..................................................................... THE MAIN FAULT OF THE 70-s OR THE YEARS OF “MIGHT HAVE BEEN HOPES” ........................................................................................... PROTECTION OF INFORMATION ........................................................... COMPUTER CRIMES ................................................................................ FROM THE HISTORY OF COMPUTER VIRUSES ................................... WHAT IS A COMPUTER VIRUS? ............................................................ SYNOPSIS ................................................................................................. COMPUTER VERSUS HIMAN BRAIN ..................................................... POPULAR INFECTION METHODS USED BY COMPUTER VIRUSES THE TERM “COMPUTER SECURITY” .................................................... IS YOUR HOME COMPUTER A TARGET? ............................................. THINKING ABOUT YOUR HOME COMPUTER ...................................... GETTING INSIDE A COMPUTER SYSTEM ............................................. SHADOW DATA (PART 1) ....................................................................... SHADOW DATA (PART 2) ....................................................................... 3 7 10 12 15 20 23 HOW TO PROTECT AGAINST SHADOW DATA SECURITY RISKS ...... CRYTOGRAPHY ....................................................................................... RISK ASSESSMENT .................................................................................. MICROCOMPUTER AND MICROPROCESSOR DESIGH ......................... KINDS OF PROGRAMMS ......................................................................... COBOL ...................................................................................................... TECHNOLOGY OF AUTOMATE – BASED PROGRAMMING INTRODUCTION ....................................................................................... PROGRAMMING LANGUAGES .............................................................. MEMORY OR STORAGE UNIT ................................................................ MONITORS ................................................................................................ THE MOUSE ............................................................................................. INFORMATION, MASHINE WORDS, INSTRUCTIONS, ADDRESSES AND REASONABLE OPERATIONS ………………………………………. 108 110 114 118 122 125 29 36 41 46 49 52 56 58 65 73 78 81 83 89 93 96 99 128 135 139 142 147 150 4 FROM CALCULI TO MODERN COMPUTER ……………………………. MINITURIZATION …………………………………………………………. ARTIFICIAL INTELLIGENCE ……………………………………………... NEWS IN THE COMPUTER FIELD ……………………………………….. SOME FACTS ABOUT ROBOTS ………………………………………….. ROBOTICS AND ROBOT GENERATIONS ……………………………….. AMD COMPANY …………………………………………………………… DVD TECHNOLOGY ………………………………………………………. DVD VIDEO. DVD DISCS …………………………………………………. PENTIUM I, PENTIUM II, PENTIUM III ………………………………….. PENTIUM IV ………………………………………………………………… CELERON …………………………………………………………………… ATHLON 64. OPTERON ……………………………………………………. SMART STUFF ……………………………………………………………… VOCABULARY ……………………………………………………………... BIBLIOGRAPHY ……………………………………………………………. 154 158 161 164 167 171 174 177 179 184 188 192 195 199 203 277 5 LESSON 1 FROM THE HISTORY OF THE COMPUTER [2] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: The introduction of agriculture revolutionized ancient man's social, economic, and cultural potential. This was the first great step in the evolution of civilization. The more recent Industrial Revolution, vastly increasing man's productive capabilities, was the next great step and brought forth our present highly mechanized economic and interdependent social civilization. Nowadays we have another new kind of revolution, based on machines that greatly increase man's thinking capabilities of planning, analysing, computing, and controlling. Hundreds of millions of computers are already in daily use penetrating almost all spheres of our modern society, from nuclear energy production and missile design to the processing of bank checks and medical diagnoses. The development of mechanical calculating machines made the digital computers necessary. An ordinary arithmometer and a desk key calculator have given rise to electronic digital computers. Digital computers came into being in the first half of the 17th century. Many outstanding Russian and foreign mathematicians of the time created mechanical calculating devices. The famous Russian scientist M.V. Lomonosov compiled a lot of calculating tables and several computing devices concerning different fields of science and engineering. In 1874 the Russian engineer V.T. Ordner invented a special counter wheel named after him the Ordner's wheel which is used in modern arithmometers and calculators. P.L. Chebyshev, academician, made a valuable contribution to the field of computing machine. He is known to have many good ideas in mathematics, some of which have been named after him. For example, the Chebyshev's polynomials play a unique role in the field of orthogonal functions. In 1878 he constructed the 6 original computing machine which was exhibited in Paris. In 1882 P.L. Chebyshev invented an arithmometer performing automatically multiplication and division. The principle of automatization put into tins computing machine is still widely used all over the world when developing the most modern computers. In 1884 Russia began to manufacture computing machines. In the period of World War I the output of computing machines ceased and was resumed later. At the end of the 1930s computing engineering began the new era. Electronic computers operating at high speed appeared, with electronic devices and units being applied. The rapid advance of computers followed the success achieved by electronics. There appeared a possibility to solve complex mathematical problems within an unusually short time. The modern computing engineering enables to do the amount of calculations and researches within a week's time which would have required years of laborious work of large groups of people before. Invention of electronic computers is one of the greatest achievements of mankind. The significance of it can be compared with the invention of the steamengine at the end of the 18th century and the utilization of atomic energy. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What was the first step in the evolution of civilization? 2. What is already in daily use penetrating all spheres of modern society? 3. What made the digital computers necessary? 4. Who invented a special counter wheel? 5. Who made a great contribution to the field of computing machine? 6. What did he construct? 7. When did Russia begin to manufacture computing machines? Task 3.Translate the following words and word — combinations into Russian: 7 Задание 3. Прочтите следующие слова и словосочетания и переведите их на русский язык: Introduction, social, recent, increase, capability, penetrate, digital, concern, valuable, contribution, exhibit, division, appear, rapid, enable. Task 4. Make the sentences interrogative: Задание 4. Поставьте следующие предложения в вопросительную форму: 1. The rapid advance of computers followed the success achieved by electronics. 2. In 1884 Russia began to manufacture computing machines. 3. The development of mechanical calculating machines made the digital computers necessary. 4. Invention of electronic computers is one of the greatest achievements of mankind. 5. Hundreds of millions of computers are already in daily use penetrating almost all spheres of our modern society. Task 5. Fill in the blanks with the following words given below: Задание 5. Вместо пропусков вставьте соответствующие слова из текста: Devices, machine, evolution, contribution, came, solve 1. Digital computers ………….. into being in the first half of the 17th century. 2. There appeared a possibility to ………… complex mathematical problems within an unusually short time. 3. Many outstanding Russian and foreign mathematicians of the time created mechanical calculating …………………. . 4. This was the first great step in the …………… of civilization. 8 5. P.L. Chebyshev, academician, made a valuable ………… to the field of computing ………………….. . LESSON 2 WHAT IS A COMPUTER? [2] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: 1. Suppose you sit down with а pencil and paper and center your attention on adding а set of figures. You add first all the digits in the right - hand column, then all the digits in the next column, and so on - until you finally arrive at the answer. When you do this, you are computing. 2. When you stop at а street corner, looking first to the left for any coming car, then to the right, to cross the street or to wait on the sidewalk - you are computing. 3. When you are walking along а poorly marked path in the woods, thinking if you are really on the path or have lost it - you are computing. 4. When you are taking in information or data, performing reasonable operations (mathematical or logical operations) on the data, and are producing one or more answers - you are computing. 5. А machine can also do this. It can take in information or data perform а sequence of reasonable operations оn the information which it has received, and put out answers. When it does this, it is computing. 6. А very simple example of а computer is the ordinary business adding machine which prints on paper tape the number entered into its keyboard, and also prints а total when you press the total key. А complex example of а computer is а modern automatic digital computer which in each second can perform more than 100,000,000 additions, subtractions, multiplications, or divisions. 7. А computing machine can take in and store information because the hardware inside the machine expresses arithmetical and logical relations, such as 9 adding or subtracting, comparing or selecting. А computer can also put out information, display the answers when it receives them. Hardware is useless without software which is computer instructions and programs. 8. The modern computers are of three kinds called analog, digital, and hybrid. An analog computer computers by using physical analogs of numerical measurements. А digital computer computes by using the numbers (digits) and yeses and noes expressed usually in l's and 0’s. A hybrid computer is а machine which combines some of the properties of digital and analog computers. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. How many operations does а modern computer perform? 2. What kinds of operations does an automatic digital computer perform? З. What is а computer? 4. What is а very simple example of а computer? 5. Why does а computer take in and store information or data? 6. What kinds of modern computers do you know? 7. How does an analog computer compute? 8. How does а digital computer compute? 9. What is а hybrid computer? 10. What is hardware? 11. What is software? Task 3.Translate the following words and word — combinations into Russian: Задание 3. Прочтите следующие слова и словосочетания и переведите их на русский язык: to centre attention on; to the right; to the left; а set of figures; and so on; а sequence of reasonable operations; to put out answers; to take in information; to 10 store information; such as; to express mathematical and logical relations; hardware is useless without software; by using physical analogs; numerical measurements. Task 4.Find the English equivalents for the words and word — combinations given below: Задание 4. Найдите в тексте английские эквиваленты следующих слов и словосочетаний: налево; направо; выдавать информацию или данные; последовательность разумных операций; правый столбик; ряд цифр; и так далее; сосредоточивать внимание. LESSON 3 COMPUTERS MACHINE [1] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: All of us think about a computer. That's why we ask: "What is a computer?" A computer is one of the modern technologies using everywhere. It is a complex instrument made up of hundreds of electronic devices, miles of electronic wire. Its complex electronic brains produce information. This information is stored on magnetic tapes or punched cards. Who feeds the computer information? An operator can feed figures and symbols into the machine. When an operator wants to receive answers, he asks the machine in a special language to process the information taken from storage. The electronic machine can give any answer or a combination of possible answers. At a panel desk connected to the instrument, the machine can flash its answers on a screen, can print them on paper, and store them away on magnet tapes or cards. Of cause, more than 100.000 pieces of information can be stored in one machine. The computer can do a lot of operations. For example, the computer can 11 multiply large numbers. How long does it take the computer to multiply large numbers? In one third of a second a computer can multiply two 127-digit numbers. In one whole second, it can add 4.000 five-digit numbers. In two seconds it can complete 320 long-division problems. The same machine does the work of thousands of trained mathematicians in any given time period and without the mistakes. But ... human beings do thinking, feed information to the machines. The computer only helps us to find answers and produce facts faster and more accurately. Machines work for us, but they do not think for us. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What is a computer? 2. What functions has a computer? 3. Why do people extremely need a computer nowadays? 4. What is the connection between computer brains and man's mind? 5. Is the electronic system of a computer very complex or simple? 6. Do electronic brains of a computer produce information? 7. How many pieces of information can be stored in one machine? 8. What does the computer machine flash? Task 3. Match the words given below with the definitions: Задание 3. Соотнесите следующие ключевые слова с соответствующим определением: Computer …………………. ……………………………… Fax (machine) …………….. ……………………………… E-mail ….….………………. ……………………………… Telephone …………………. ……………………………… 12 The Internet .………………. a ……………………………… The machine which is used for sending or receiving copies of primed material, letters, pictures, etc. along a telephone line. b An international network of computers. It has electronic mail and provides a large amount of information. c An electronic machine that can store and recall information, do many processes on it. d An electronic system which joins a group of computers. People can send messages to each other on their computers. e A system for sending or receiving speech over long distances. Task 4. Find the words and word — combinations given below in the text: Задание 4. Найдите в тексте предложения, содержащие нижеследующие слова и выражения: • an electronic system of a computer • to take from storage • to feed the information to the machine • a punched card • to complete long-division problems • to flash answers on a screen • to store on magnet tapes Task 5. Complete the following sentences corresponding to the contents of the text: 13 Задание 5. Закончите предложения: 1. The electronic ... is very complex. 2. More than 100.000 pieces of ...... and when the operator wants answers, he asks ... and for solving the problem. 3. In one third of ... two 127 - digit ... 4. The same machine does ... in any given time period, and ... 5. The machine can flash ... 6. ... can give any answer or ... 7. But it is ..., who do the thinking, who ... to find answer and .... . 8. Machines ... for us, but they do not ... for us. 9. ... of electronic devices, miles of electronic wire. 10. ... an operator feeds facts, figures and symbols into the machine, to be .. . Task 6. Say whether the statements given below are true or false: Задание. 6 Определите истинность или ложность следующих предложений: 1. The electronic system of a computer is very simple. 2. More than 50 pieces of information can be stored in one machine. 3. In second a computer can multiply two 970 - digit numbers. 4. Machines think for us, but they do not work for us. 5. The computer can not do a lot of operations. LESSON 4 ANALOGUE AND DIGITAL COMPUTERS [1] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: 14 An analog computer is a device that simulates the behavior of another (system, person) usually a physical system. A very simple and widely used analogue (computer, car) is the slide-rule on which distances are equivalent to logarithms of numbers. The (devices, pictures) known as analogue computers are assemblies of electronic or electrical circuits the behavior of which is analogous to another (mechanical) system's (behavior, progress). The evolution of the adding (machine, glass) has culminated in electronic digital computers in which electronic (signals, system) are used as the operative discrete signals. The simplest (digital, electronic) computer is the human hand, from which the decimal (system, pictures) is derived. The first man-made digital computer was probably the abacus, which is still used in many (countries, signals). The basic sections of digital computers are therefore: Input: receives the "raw data" and (instructions, person) from external sources and converts them into a suitable form for a computer to work on. Store: memorizes (numbers, countries) and instructions. Calculator: does mathematical operations. Control: initiates and follows the (operations, countries). Output: presents the result of the calculations in an acceptable form. When an ordinary (desk, pictures) calculating machine is used, the operator controls the sequence of (operations, signals). He supplies the input data and records the results. Also he may have to provide additional (information, numbers) from tables and other sources during the calculation. In the case of electronic (computers, glass) working at extremely high speeds, the human operators are replaced by automatic devices. It is necessary to provide a store to hold both the numbers that are fed into the (compeer, countries) and the operating instruction. The digital computer differs from the analogue computer in that it deals with numbers and not physical quantities. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 15 1. How many types of computers do you know? What are they? 2. What are their advantages and disadvantages, comparing one to another? 3. What are the basic sections of digital computers? 4. What is a device that simulates the behavior of another system in all its states? 5. What differs the analogue computer? 6. What computer is still used in many countries? 7. Has the evolution of the adding machine culminated in electronic digital computers? 8. When does the operator control the sequence of operations? 9. What does the operator supply? 10. What are the basic sections of digital computers? Task 3. Match the English words given below with their Russian equivalents: Задание 2. Соотнесите следующие ключевые слова с соответствующим переводом: • to simulate • цифровой • circuits • превращение • a quantity • последовательность операций • to derive • обеспечивать • an instruction • калькулятор • to provide • величина • input data • устанавливать • raw data • команда • to supply • снабжать • a sequence of operations • входные данные • to convert • необработанные данные 16 • digital • цепи • a calculator • моделировать Task 4. Find these words and word — combinations in the text: Задание 4. Найдите в тексте предложения, содержащие нижеследующие слова и выражения: • a decimal system • operative discrete signals • a calculating machine • automatic devices • a sequence of operations • electronic signals • external sources Task 5. Complete the following sentences corresponding to the contents of the text: Задание 5. Закончите предложения: 1. An analogue computer is ... . 2. The devices known as analogue computers are ... . 3. The digital computer differs from the .... . 4. The simplest digital computer is .... . 5. The evolution of the adding machine has .... . 6. He supplies the ... . 7. The first man-made digital computer was …. . 8. A very simple and widely used ... of numbers. 9. ... the operator controls the sequence of operations. 10. ... is used ... the sequence of operations. 17 Task 6. Say whether the statements given below are true or false: Задание 6. Определите истинность или ложность следующих предложений: 1. A digital computer is a device that simulates the behavior of another system, often a physical system, in all its states. 2. A very complex widely used analogue computer is the slide-rule on which distances are equivalent to logarithms of numbers. 3. The digital computer doesn't differ from the analogue computer. 4. The second man-made digital computer was probably the abacus, which is still used in many regions. 5. A very simple and widely used analogue computer isn't the slide-rule on which distances are equivalent to logarithms of number. 6. The simplest digital computer isn't the human hand. 7. The evolution of the adding machine has culminated in electronic digital computers in which electronic signals are not used as the operative discrete signals. 8. When an ordinary desk calculating machine is used, the operator can't controls the sequence of operations. 9.The human operators are replaced by automatic devices. Task 7. Translate the sentences from Russian into English: Задание 7. Переведите с русского языка на английский: 1. Цифровой компьютер отличается от аналогового компьютера тем, что он работает только с числами. 2. Оператор управляет последовательностью действий, выполняемых компьютером; он вносит данные в компьютер и делает запись полученных результатов. 3. Аналоговый компьютер — устройство, которое моделирует поведение другой системы. 18 4. Первый искусственный цифровой компьютер был, вероятно, «абака», который все еще используется во многих странах. 5. Развитие счетной машины завершилось развитием электронных цифровых компьютеров. 6. Память: запоминает числа и инструкции. 7. Вывод: предоставляет результат вычислений в приемлемой форме. 8. Калькулятор выполняет математические действия. Task 8. Make the sentences negative and interrogative: Задание 8. Преобразуйте следующие предложения в вопросительную и отрицательную форму: 1. An analog computer is a device. 2. The digital computer differs from the analogue computer. 3. The first man -made digital computer was probably the abacus. 4. The human operators are replaced by automatic devices. 5. Store memorizes numbers and instructions. Task 9. Write the plural form of the following nouns: Задание 9. Образуйте множественное число следующих существительных: a computer, a system, a state, a distance, a number, a device, a circuit, a quantity, a hand, a country, a signal, an operator, an instruction, a source, an operation, a result, a table, speed. LESSON 5 THE INTERNET [3] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: 19 The Internet, a global computer network which embraces millions of users all over the world, began in the United States of America in 1969 as a military experiment. It was designed to survive a nuclear war. Information sent over the Internet takes the shortest path available from one computer to another. Because of this, any two computers on the Internet will be able to stay in touch with each other as long as there is a single route between them. This technology is called packet switching. Owing to this technology, if some computers on the network are knocked out (by a nuclear explosion, for example), information will just route around them. One such packet-switching network already survived a war. It was the Iraqi computer network which was not knocked out during-the Gulf War. Most of the Internet host computers (more than 50%) are in the United States, while the rest are located in more than 100 other countries. Although the number of host computers can be counted fairly accurately, nobody knows exactly how many people use the, Internet, there are millions, and their number is growing by thousands each month worldwide. The most popular Internet service is e-mail. Most of the people, who have access to the Internet, use the network only for sending and receiving e-mail messages. However, other popular services are available on the Internet: reading USENET News, using the World-Wide Web, telnet, FTP, and Gopher. In many developing countries the Internet may provide businessmen with reliable alternative to the expensive and unreliable telecommunications systems of these countries. Commercial users can communicate over the Internet with the rest of the world and can do it very cheaply. When they send e-mail messages, they only have to pay for phone calls to their local service providers, not for calls across their countries or around the world. But who actually pays for sending e-mail messages over the Internet long distances, around the world? The answer is very simple: a user pays his service provider a monthly or hourly fee. Part of this fee goes towards its costs to connect to a larger service provider. And part of the fee 20 got by the larger provider goes to cover its cost of running a worldwide network of wires and wireless stations. But saving the money is only the first step. If people see that they can make money from the Internet, commercial use of this network will drastically increase. For example, some western architecture companies and garment centers already transmit their basic designs and concepts over the Internet into China, where they are reworked and refined by skilled - but expensive - Chinese computer – aided design specialists. However some problems remain. The most important is security. When you send an e-mail message to somebody, this message can travel through many different networks and computers. The data is constantly being directed towards its destination by special computers along the route, intercept and even change the data being sent over the Internet. In spite of the fact that there are many strong encoding programs available, nearly all the information being sent over the Internet is transmitted without any form of encoding, i.e. "in the clear'". But when it becomes necessary to send important information over the network, these encoding programs may be useful. Some American banks and companies even conduct transactions over the Internet. However, there are still both commercial and technical problems which will take time to be resolved. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What is the Internet? 2. What is the most popular Internet service? 3. What are the main problems of this network? 4. What transactions can we do over the Internet? 5. What are the advantages of this network? Task 3.Use the right prepositions and fill in the blanks: 21 Задание 3. Заполните пропуски предлогами: 1. Some companies even conduct transactions ………. the Internet. 2. Millions of people all …… the world use this network. 3. When people send e-mail messages they have to play ….. phone calls. 4. In spite …….this fact, there are a lot of strong encoding programs available. 5. The Internet host computers are located ……. more than 100 countries and their number is growing ……. thousands each month worldwide. Task 4. Make 5 different questions: Задание 4. Задайте все типы вопросов к следующим предложениям: 1. The Internet embraces millions of users all over the world. 2. Such network already survived a war. 3. Commercial users can communicate over the Internet with the rest of the world. 4. Nobody knows how many people use the Internet. 5. This network was designed to survive a nuclear war. LESSON 6 GOVERNMENT TO RESCUE IT? [1] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: The Internet and computer growth in Russia has been the envy or every European and North American country during the past few years. But growth in all IT areas is expected to slow by a considerable amount. Cell-phone growth in Moscow and St. Petersburg is limited to subscribers exchanging models, while subscriber growth is limited to the regions. Mobile communication companies had 22 hoped that 3G technology would prove to be a boom, but the lack of equipment capable of handing such a technology is holding back development. "Informatization" of the country means simply buying more computers and increasing. The Internet usage has nearly reached the limit that current technological equipment can provide. There is not enough money to increase capacity. The largest computer and Internet service providers in Russia will reach yearly turnover of $500 million, which is far too small of a sum to begin improving communication structures on their own. Moreover, Russian IT faces another problem: Most of the people who need computers live in cities of one million or more, and those people have already bought them. The majority who live outside of "wired" urban areas have absolutely no reason to buy a computer. The government did launch the Electronic Russian program, which was designed to create an electronic government that would increase interaction between citizens find their elected leaders. Different ministries and political organs could not agree on how to implement the program, and it came to nothing. The government has developed a new plan. This time a single ministry will be responsible for "informatization," and its decisions will be carried out by all government organs. The IT created office will have to have not only the necessary resources but also a fair share of political leverage. If this is not done, then Russia will have to wait many years for IT businesses to become large enough to put pressure on the government to "informatize." The most popular Internet service is e-mail. Most of the people, who have access to the Internet, use the network only for sending and receiving e-mail messages. However, other popular services are available on the Internet: reading USENET News, using the World-Wide Web, telnet, FTP, and Gopher. In many developing countries the Internet may provide businessmen with a reliable alternative to the expensive and unreliable telecommunications systems of these countries. Commercial users can communicate over the Internet with the rest of the world and can do it very cheaply. When they send e-mail messages, they only have 23 to pay for phone calls to their local service providers, not for calls across their countries or around the world. But who accually pays for sending e-mail messages over the Internet long distances, around the world? The answer is very simple: user pays his/her service provider a monthly or hourly fee. Part of this fee goes towards its costs to connect to a larger service provider. Part of the fee got by the larger provider goes to cover its cost of running a worldwide network of wires and wireless stations. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. How can you describe the present day situation on the communication structures market? 2. What are the main challenges while spreading Internet? 3. What are the advantages and disadvantages of spreading computers and Internet access to more people? 4. How can the government use Internet? 5. Can you imagine and describe as much ways of using Internet as possible? 6. Has Internet and computer growth in Russia been the envy of every European and North American country during the past few years? 7. But growth in all IT areas is expected to slow by a considerable amount, isn't it? 8. Did the government launch the Electronic Russian program? 9. What does the government do for a new plan? 10. What is the most popular Internet service? 11. Who can communicate over the Internet with the rest of the world? 12. What must the government realize? 13. The largest computer and Internet service providers in Russia will reach yearly turnover of $500 million, won't it? 24 Task 3. Match the English words given below with their Russian equivalents: Задание 3. Соотнесите следующие ключевые слова с соответствующим переводом: • Internet growth • компьютерный рост • a considerable amount • электронная программа • a current technological equipment • компании мобильных структур • Increasing Internet usage • распространение компьютеров • mobile communication companies • структуры связи • communication structures • доступ в Интернет • spreading computers • увеличение Интернет обращения • Internet access •поток • a computer growth оборудования • an electronic program • значительное количество технологического • расширение Интернета Task 4. Find these words and word — combinations in the text: Задание 4. Найдите в тексте предложения, содержащие нижеследующие слова и выражения: • a mobile communication • e-mail messages • a service provider • a worldwide network • the World-Wide Web • a local service provider • a wireless station Task 5. Complete the following sentences corresponding to the contents of the text: 25 Задание 5. Закончите предложения: 1. Cell phone growth in ... 2. Mobile communication companies had .... . 3. The largest computer .... . 4. The majority who .... . 5. The government, however, did not .... . 6. Let us hope that the .... . 7. The most popular Internet .... . 8. The answer is .... . 9. Commercial users can .... . 10. The IT office eventually to be .... . Task 6. Say whether the statements given below are true or false: Задание 6. Определите истинность или ложность следующих предложений: 1. The Internet growth in European country has been the envy of every North American country. 2. But growth in all IT system is expected to slow by a considerable amount. 3. Most of the people who need computers live outside of "wired" urban areas. 4. A smallest computer and Internet service providers in the USA will reach yearly turnover of $100 million. 5. The most popular computer service is e-mail. 6. The government, however, do launch the Electronic the USA program. 7. Part of this fee goes towards its costs to connect to a larger service providers. 8. The Internet is a local program. 9. Russian IT hasn't got any problem. 26 10. The government did not give up and is developing a new plan. Task 7. Translate the sentences from Russian into English: Задание 7. Переведите с русского языка на английский: 1. Правительство запустило электронную программу России, целью которой явилось создание с помощью электроники расширенного взаимодействия между гражданами страны и их избранными лидерами. 2. Большинство людей, особенно нуждающихся в компьютерах — это те, которые живут в городах свыше 1 млн жителей. 3. Выгодное распространение компьютеров и доступ к Интернету большого количества людей покрывают все затраты производителя электронных машин. 4. Наиболее популярная услуга Интернета — это электронная почта. 5. Большинство людей, имеющих доступ к Интернету, используют его в основном с целью отправки и получения сообщений по электронной почте. Task 8. Fill in the blanks the preposition “in”: Задание 8. Вставьте предлог “in” там, где это необходимо: 1.About ten years ago telephone was the only means ... communication which people could use ... their home. 2 .... present computers make our life much more comfortable. 3. Now we can send messages ... each other ... fax, e-mail or communicate ... the Internet. 4. Those who have the Internet can communicate not only … people. 5. They can get ... information ... any library all over the world. Task 9. Make the sentences negative and interrogative: Задание 9. Преобразуйте следующие предложения в вопросительную и отрицательную форму: 27 1. The Internet and computer growth in Russia has been the enwy European and North American country during the past few years. 2. Mobile communication companies had hoped that 3G technology would prove to be a boom. 3. The Internet usage has nearly reached the limit. 4. The largest computer and Internet service providers in Russia will reach yearly turnover of $500 million. 5. Most of the people who need computer live in cities of one million or more. 6. The government did launch the Electronic Russia program. 7. Different ministries and political organs could not agree on how to implement the program. 8. The government is developing a new plan. 9. This time a single ministry will be responsible for "Informatization". 10. In many developing countries the Internet may provide businessman with a reliable alternative to the expensive and unreliable telecommunications systems of these countries. LESSON 7 MODERN COMPUTER USAGE FOR KEEPING THE COMPUTER TECHNOLOGY HISTORY [1] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: Unfortunately, to restore the first electronic digital machines for the demonstration of their work is practically impossible. However with the aid of modern computers it is possible to show the operation of the separate devices. One of such demonstration complexes was created on the base of plotter “EC-7051M” 28 and the personal computer, which works in the medium DOS. In the 1980 years this plotter was the device for input-output information in the computers of United System and worked under control of the special block. In the computer collection of Polytechnic Museum we have this block. In the correspondence with the comprised technical task the student of Moscow Institute Electronics and Mathematics had developed the schematic of joining this plotter with the personal computer, and then he assembled a new control unit on the basis of contemporary technological base. He wrote programs of control in the algorithmic language C ++ and demonstration programs, which made it possible to derive the images selected by user from the library. The first algorithmic language was FORTRAN (1955 year), and it's graphic application was language GRAFOR, created for fulfilling the graphic works at the end of 1960 years in the Institute of Applied Mathematics named after M. V. Keldysh. In the exposition of the Electronic Digital Machines hall for the visitors of any categories can see the input-output of information from the computer and its fixation in the form of the drawings, different diagrams, graphs and tables on the paper with the aid of the plotter ES-7051. In the 70 years in Central Research Institute of Experimental Dwelling Projects the graphic mapping program ALGRAF was created. It made possible to automate designing of architectural and town-building objects. This program made it possible to present the work of an achitecter during the presence of the planning solutions of rooms and the work of an artist-designer during the search for the versions of complex forms and curved surfaces. Any visitor can perceive itself a little in their role. Also in the exposition the dynamic stand of logic elements "Logical functions on the semiconductors" works under the control of the personal computer. Executed at the factory of museum in 1960 years, it was no longer subject to restoration. Now it is easy to explain during the excursions with its aid, as can be realized the basic logical functions on the basis of the use of semiconductors in the second generation computers. Now for any categories of visitors it is possible to demonstrate with PC the following slide-shows. Also with 29 the aid of the contemporary multimedia computer it is possible to hear out the computer music. The work accordinc to digitization of video films was done. The first 5 films are already enumerated: "Academician Lebedev", "Machine geometry and graphics" "Carved surfaces in automatization system" and others. This work is planned to be continued. It is wonderfully to demonstrate the connection of nature, mathematics, computer technology and arts with the aid of the fraktal drawing. Fantastic patterns, FRAKTALS, carried out not possessing imagination computer, following the mathematical and artistic intention of the doctor of technical sciences, the chief researcher of Institute Information Transfer of Russian Sciency Academy Peter Nikolayev. The Computer seemingly sends point into the journey through the complex plane in accordance with some specific roles of the fulfillment of the operations on the complex numbers and obtains the whimsical band of ornament, which exits to the infinite depth. Among the variety of locks, spirals and eddies every time before us it is opened the picture of amazing beauty and appear many times the reduced copies of primordial Mandelbrot set. In XXI century artistic software finds ever wider acceptance. During May 2002 year in Moscow the festival of media-art is passed "Software as the kind of art or artistic games with software". It was oriented to the skill, adequate to information society, to the activity, artistically and theoretically interpreting new reality, which can be enumerated. With the aid of modern multimedia PC it is possible to look over the work of participants in this festival, which demonstrated deep properties and qualities of programming. These works are executed with the use of contemporary, but most usual, i.e., widespread software. The Programmerartist, who creates or who uses software "differently", is capable, at least to the period, to conquer commerce and to introduce skill into the spheres, in which its presence is not primordial provided. This usage of a computer with its multimedia possibilities makes it possible substantially to supplement and to expand the set of 30 the themes, connected with the computer technology history without any limitations. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What were the first electronic digital machines like? 2. What was the first graphic program? 3. What are the most interesting items of the electronic digital machines exposition? (Describe them in great details). 4. What is fractal? 5. How can you describe the present day significance of software? Task 3. Match the following Russian sentences given below with their English equivalents: Задание 3. Соотнесите следующие предложения с соответствующим переводом: 1. В прошлом году мы проводили 1. Also with the aid of the contemporary работу, согласно цифровым multimedia computer ... . видеофильмам … . 2. In XXI century artistic software ..... 2. Сейчас тоже некоторые категории посетителей имеют возможность … 3. К сожалению, 3. During May 2002 year in Moscow восстановление the festival of media-art ... . первой электронной вычислительной 4. Too now for any category of visitors машины …. . it is possible to ... . 4. Теперь, с помощью современных 5. In last year we began to conduct work мультимедийных компьютеров … . according to digitization of video films 5. Первый язык алгоритма …. . ... . 6. The first 5 films are already 31 6. В течение мая 2002 года в Москве enumerated .... . на фестивале медиа-искусства … . 7.С помощью современных 7. The first algorithmic language ... . мультимедийных компьютеров … . 8. В XXI веке компьютерное 8. Unfortunately, to restore the first искусство … . electronic digital machine ... . 9. All works are executed with the use 9. Первые 5 фильмов уже записаны of contemporary ... . Task 4. Find these words and word — combinations in the text: Задание 4. Найдите в тексте предложения, содержащие нижеследующие слова и выражения: • electronic digital machines • separate devices • input-output of information • a personal computer • logic elements • a contemporary multimedia computer • to expand the set of the themes Task 5. Complete the following sentences corresponding to the contents of the text: Задание 5. Закончите предложения: 1. It was oriented to the skill, adequate to information society ….. . 2. ... is capable, at least to the period ... . 3. He had written programs of control in the ... . 4. ... and the personal computer, which works in the medium DOS. 5. ... and it's graphic application was language GRAFOR ... . 32 6. ... a new control unit on the basis of contemporary technological base. 7. Now it is easy to explain during the excursions ... . 8. ... of functioning of the rape perforator "ПЛ-150" ….. . 9. In the beginning 70 years in Central Research ... . 10. Among the variety of locks, spirals ..... . Task 6. Say whether the statements given below are true or false: Задание 6. Определите истинность или ложность следующих предложений: 1. It is wonderfully to demonstrate the connection of nature, music, history, mathematics, computer technology and arts with the aid of the fractal drawing. 2. The 6 films are already enumerated, for example, "Academician Stepanov". 3. In XXI century mathematical software finds ever wider acceptance. 4. During May 2003 year in Moscow the festival of media - art is passed "Software as the kind of art or artistic games with software". 5. In the 1955 years this plotter was me device for input-output information in the computers. 6. The second algorithmic language was FORTRAN. 7. It is not important to note mat in the created demonstration complex in the base of plotter ES 7051. 8. Of course, in the exposition of the Electronic Digital Machines hall for the visitors of any categories we show the input-output of information from the computer. 9. Any visitor can perceive itself in their role. 10. Fantastic Patterns ПЛ - 150, carried out not possessing imagination computer. Task 7. Make up the sentences: Задание 7. Составьте предложения: 33 1. Polytechnic Museum, in, 1980, this, collection, we, the, of, haven't, block. 2. Electronic, in, we, Machines, for, visitors, of, the, show, of, any, Digital, the, categories, information, hall, the, input-output, of. 3. created, in, 1970, Central, of, the, graphic, the, beginning, Research, Projects, mapping, was, Institute, program, of, ALGRAF, Experimental, Dwelling. 4. the, self-producing, but, a, infinitely, beauty, whole, the, appears. 5. language, FORTRAN, the, was, year, first, 1955,algorithmic. Task 8. Make the sentences negative and interrogative: Задание 8. Преобразуйте следующие предложения в вопросительную и отрицательную форму: 1. Any visitor can perceive itself a little in their role. 2. In 1960 it was no longer subject to restoration. 3. In last year we began to conduct work according to digitization of video films. 4. The 5 films are already enumerated. 5. In XXI century artistic software fills ever wider acceptance. 6. It is wonderfully to demonstrate the connection of nature, mathematics, computer technology and arts with the aid of the fraktal drawing. 7.To restore the first electronic digital machines for the demonstration of their work is practically impossible. 7. In the computer collection of Polytechnic Museum we haven't this block. 8. Also in the exposition the dynamic stand of logic elements "Logical functions on the semiconductors" works under control of the personal computer. Task 9. Translate the sentences from Russian into English: Задание 9. Переведите с русского языка на английский: 34 1. В зале экспозиции электронных вычислительных машин мы демонстрируем посетителям информацию о вводе-выводе компьютерной системы. 2. С помощью современного мультимедийного компьютера возможно прослушать компьютерную музыку. 3. С помощью современных компьютеров стало возможным продемонстрировать действие отдельных механизмов. 4. Первый язык алгоритма был «фортран». LESSON 8 THE DEVELOPMENT OF COMPUTERS IN THE USA [1] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: In the early 1960s, when computers were hulking mainframes that took up entire rooms, engineers were already toying with the then — extravagant notion of building a computer intended for the sole use of one person, by the early 1970s, researches at Xerox's Polo Alto Research Center (Xerox PARC) had realized that the pace of improvement in the technology of semiconductors — the chips of silicon that are the building blocks of present — day electronics — meant that sooner or later the PC would be extravagant no longer. They foresaw that computing power would someday be so cheap that engineers would be able to afford to devote a great deal of it simply to making non-technical people more comfortable with these new information-handling tools, in their labs, they developed or refined much of what constitutes PCs today, from "mouse" pointing devices to software "windows". Although the work at Xerox PARC was crucial, it was not the spark that took PCs out of the hands of experts and into the popular imagination. That happened in January 1975, when the magazine Popular Electronics put a new kit for hobbyists, called the Altair, on its cover, for the first time, anybody with $400 35 and a soldering iron could buy and assemble his own computer. The Altair inspired Steve Wosniak and Steve Jobs to build the first Apple computer, and a young college dropout named Bill Gates to write software for it. Meanwhile, the person who deserves the credit for inventing the Altair, an engineer named Ed Roberts, left the industry he had spawned to go to medical school. Now he is a doctor in a small town in central Georgia. To this day, researchers at Xerox and elsewhere pooh- pooh the Altair as too primitive to have made use of the technology they felt was needed to bring PCs to the masses. In a sense, they are right. The Altair incorporated one of the first single-chip microprocessor — a semiconductor chip, that contained all the basic circuits needed to do calculations — called the Intel 8080. Although the 8080 was advanced for its time, it was far too slow to support the mouse, windows, and elaborate software Xerox had developed. Indeed, it wasn't until 1984, when Apple Computer's Macintosh burst onto the scene, that PCs were powerful enough to fulfill the original vision of researchers. Researchers today are proceeding in the same spirit that motivated Kay and his Xerox PARC colleagues in the 1970s: to make information more accessible to ordinary people. But a look into today's research labs reveals very little that resembles what we think of now as a PC. For one thing, researchers seem eager to abandon the keyboard and the monitor that are the PC's trademarks. Instead they are trying to devise PCs with interpretive powers that are more humanlike — PCs that can hear you and see you, can tell when you're in a bad mood and know to ask questions when they don't understand anything. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. Who foresaw that computing power would someday be so cheap that engineers would be able to afford to devote a great deal of it simply to making non- technical people? 36 2. What are researches at Xerox's Polo Alto improvement in the technology of semiconductors? Task 3. Match the English words given below with their Russian equivalents: Задание 3. Соотнесите следующие ключевые слова с соответствующим переводом: • a microprocessor • ручное управление • to do calculations • эксперт • to motivate • электроника • an invention • технология полупроводимости • electronics • клавиатура • a technology of semiconductors • компьютерная мощь • a keyboard • изобретение • an expert • побуждать • handling tool • микропроцессор • computing power • делать вычисления Task 4. Find these words and word — combinations in the text: Задание 4. Найдите в тексте предложения, содержащие нижеследующие слова и выражения: • hulking mainframes • a pace of improvement in the technology • computing power • non-technical people • researchers of Xerox • the first single-chip microprocessor • to do calculations 37 Task 5. Complete the following sentences corresponding to the contents of the text: Задание 5. Закончите предложения: 1. To this day, researchers at Xerox and elsewhere pooh-pooh the Altair as ..... . 2 .... power that are more humanlike — PCs that can hear you and see you, can tell when you're in a bad mood and know to ask questions when they don't understand something. 3. The kind of computing that people ... in the early 1970s. 4. They foresaw that computing power would someday be ... in their labs, they developed or refined much of what constitutes PCs today, from "mouse" pointing devices to software "windows". 5. Although the work at Xerox PAPC was crucial ... . 6. Wosniak and Steve Jobs to build ... to write software for it. 7 ... an engineer named ED Roberts, left the industry he had spawned to go to medical school. 8 … that contained all the basic circuits needed to do calculations-called the Intel 8080. 9. Now he is a... 10. ... burst onto the scene, that PCs were powerful enough to fulfill the original vision of researchers. Task 6. Say whether the statements given below are true or false: Задание 6. Определите истинность или ложность следующих предложений: 1. It is impossible to predict the invention, that the Altair, crystallized new approaches in a way that captures people's imagination. 38 2. The Altair incorporated one of the first single-chip microprocessor — a semiconductor chip, that contained all the basic circuits needed to do calculations — called the Intel 8080. 3. Although the work at Xerox PARC was crucial, it was the spark that took PCs out of the hands of experts and into the popular imagination. 4. In their labs, they developed or refined much of what constitutes PCs today, from "mouse" point devices to software "windows". 5. The Altair inspired Steve Wosniak and Steve Jobs to build the first Apple computer, and a young college dropout named Bill Gates to write software for it. Task 7. Use “was” or “were”: Задание 7. Вставьте “was” или “were”: 1. Computer ... hulking mainframes. 2. Engineer ... already toying with the then -extravagant notion of building a computer intended for the sole use of one person. 3. The work at Xerox PARC ... crucial. 4. It ... not the spark that took PCs out of the hands of expert and into the popular imagination. 5. Although the 8080 ... advanced for its time. 6. It ... far too slow to support the mouse, windows and elaborate software Xerox had developed. 7. It ... not until 1984. 8. PCs ... powerful enough to fulfill the original vision of researchers. Task 8. Make the sentences negative and interrogative: Задание 8. Преобразуйте следующие предложения в вопросительную и отрицательную форму: 1. Computer power would someday be so cheap. 39 2. Engineers would be able to afford to devote a great deal of it simply to making nontechnical people more comfortable with some information. 3. That happened in January 1975. 4. The magazine "Popular Electronics" put a new kit for hobbyists. 5. He is a doctor in a small town in central Georgia. 6. Researches at Xerox needed to bring PCs to the masses. 7. The Altair incorporated one of the first single-chip microprocessor. 8. PCs were powerful enough to fulfill the original vision of researches. 9. We made at PARC in the early 1970s. 10. It is impossible to predict the invention. LESSON 9 THE COMPARISON OF THE COMPUTER DEVELOPMENT IN THE USA AND THE UKRAIN [1] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: At the time when the computer science was just uprising these two countries were one of the most noticeably influential. There were a lot of talented scientists and inventors in both of them. But the situation in the Ukraine (which at that time was one of 15 Republics of the former USSR) was complicated, on the one hand with the consequences of the Second World War and. On the other hand, at a certain period cybernetics and Computer Science were not acknowledged. Of cause, later it went to the past, but nevertheless it played a negative role on the Ukrainian computer development. It also should be noticed that in America they paid more attention to the development of computers for civil and later personal use. But in the Ukraine the attention was mainly focused on the military and industrial needs. Another interesting aspect of the Ukrainian computer development was the process of the 70s when "sovietizing" of the IBM-360 system became the first step 40 on the way of weakening of positions achieved by the Soviet machinery construction the first two decades of its development. The next step that led to the further lag was the mindless copying by the SU Ministry of Electronic Industry and putting into the production the next American elaborations in the field of microprocessor equipment. The natural final stage was buying in enormous quantities of foreign computers last years and pressing to the deep background our domestic researches and developments and the computer-building industry on the whole. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. Where was the attention mainly focused on the military or industrial needs? 2. Where did they pay more attention to the development of computers for civil and later personal use? 3. What was a final stage? 4. Why was the situation in Ukraine complicated? Task 3. Match the English words given below with their Russian equivalents: Задание 3. Соотнесите следующие ключевые слова с соответствующим переводом: • a computer science • Министр Электронной Индустрии • a computer development • разработка • personal use • информатика • a Ministry of Electronic Industry • компьютерное развитие • an elaboration • персональное использование • microprocessor equipment • микропроцессорное оборудование 41 Task 4. Find the sentences with the words and word — combinations given below in the text: Задание 4. Найдите в тексте предложения, содержащие нижеследующие слова и выражения: 1. the Ukrainian computer development; 2. a development of computers for civil use; 3. to put into production; 4. a field of microprocessor equipment; 5. cybernetic; 6. a computer - building industry; Task 5. Complete the following sentences corresponding to the contents of the text: Задание 2. Закончите предложения: 1 .... of talented scientists and inventors in both of them. 2. It also should be noticed in America they paid more attention to the development of .... . 3. The next step that led to the further lag was ... and putting into production the next .... . 4. American elaborations in the field of .... . 5. Another interesting aspect of the Ukrainian computer development was .. . 6. At the time when the computer science was ... . Task 6. Say whether the statements given below are true or false: 42 Задание 6. Определите истинность или ложность следующих предложений: 1. At the time when the computer science is just uprising this two countries, where one of the most noticeably influential. 2. It also should be noticed that in America they paid more attention to the development of computers for civil and later personal use. 3. But in the Ukraine the attention was mainly focuses on the military and industrial need. 4. Of cause, later it went to the future, but nevertheless it played a negative role on the Ukrainian computer development. 5. But the situation in the Ukraine was complicated. Task 7. Translate these sentences from Russian into English: Задание 7. Переведите с русского языка на английский: 1. Информатика была введена в США и Украине, где была более влиятельной в различных сферах. 2. Много талантливых ученых и изобретателей создавали программное обеспечение. 3. Но ситуация на Украине была усложнена, с одной стороны, последствиями двух мировых воин и, с другой стороны, определенный период времени Кибернетика и Информатика не были признаны вообще. 4. Также было замечено, что в Америке уделяли больше внимания развитию компьютеров для гражданского и персонального пользования. 5. А на Украине внимание, главным образом, было сфокусировано на компьютеризации индустриальной сферы. 6. В США и Украине было и есть много талантливых ученых и изобретателей. 7. Покупка иностранных компьютерово — дин из последних шагов развития компьютеризации в Украине. 43 Task 8. Use “was” or “were”: Задание 8. Вставьте “was” или “were”: 1. At the time when the computer science ... just uprising this two countries ... one of the most noticeably influential. 2. There ... a lot of talented scientists and inventors in both of them. 3. But the situation in the Ukraine ... complicated. 4. Cybernetics and Computer Science ... not acknowledged. 5. But in the Ukraine the attention ... mainly focused on the military and industrial needs. 6. Another interesting aspect of the Ukrainian computer development ... the process of the 70s when "sovietizing" of the IBM-360 system became the first step on the way of weakening of positions achieved by the Soviet machinery construction the first two decades of its development. 7. The next step that led to the further lag ... the mindless copying by the SU Ministry of Electronic Industry and putting into production the next American elaboration in the field of microprocessor equipment. 8. The natural final stage ... buying in enormous quantities of foreign computers last years and pressing to the deep background our domestic researches, and developments, and the computer-building industry on the whole. 9. Another interesting aspect of the Ukrainian computer development .... the process of the 70s. Task 9. Make the sentences negative and interrogative: Задание 9. Преобразуйте следующие предложения в вопросительную и отрицательную форму: 1. It played a negative role on the Ukrainian computer development. 2. In America they paid more attention to the development of computers for civil and late personal use. 44 3. There were a lot of talented scientists and inventors. 4. The "sovietising" of the IBM-360 system was achieved by the Soviet machinery construction. 5. Last years the natural final stage was buying in enormous quantities of foreign computers. LESSON 10 THE HOMECITY OF MESM [1] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: At first it was a model of a Big Electronic Computing Machine (BECM). Later there appeared the evident expediency of transforming BESM in a small computer. In the process of a creation it was a Model of a Small Big Electronic Computing Machine (MECM). For that reason there were added: input-output devices, magnetic drum storage, register capacity. The author of a creation was S.A. Lebedev, who was proposed to head the Institute of Energetics in Kiev. Later the Institute wild divided into two departments: the electronical one and the department of heat-and-power engineering. Lebedev became the director of the first one. He also added his laboratory of analogue computerization to the already existing ones of the electronical type. At once he began to work on computer science instead of the usual, routine researches in the field of engineering means of stabilization and structures of automated devices. Since autumn 1948 he had been directing his laboratory towards creating MESM. The most difficult part of the work was the practical creation of MESM. It might be a lot of experiences of the researches that allowed the scientist to fulfill the task perfectly. In autumn 1951 the machine executed a complex program rather stabile. S.A. Lebedev was awarded the State Prize of the USSR. 45 Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. Who was proposed to head the Institute of Energetics in Kiev? 2. When did Lebedev direct his laboratory towards creating of MESM? 3. Was MESM created by S.A. Lebedev? 4. What machine did in autumn 1951 execute? 5. What is BESM? 6. When did Lebedev become the director of one of the departments? 7. What prize was Lebedev awarded? 8. What is the most difficult part of the work? 9. How many departments was the Institute of Energetics divided? Task 3. Find the sentences with the words and word - combinations given below in the text: Задание 3. Найдите в тексте предложения, содержащие нижеследующие слова и выражения: • a model • a Big Electronic Computing Machine • a small computer • input-output devices • an electronic type • a computer science • a practical creation Task 5. Complete the following sentences corresponding to the contents of the text: Задание 6. Закончите предложения: 1. ... in the process of a creation ... . 46 2. He also added his ... to the already existing ones of the electronical type. 3. Since autumn 1948 Lebedev ... . 4. ... of the work was the practical creation of MESM. 5. ... the machine executed a complex program rather stabile. Task 6. Say whether the statements given below are true or false: Задание 6. Определите истинность или ложность следующих предложений: 1. S.A. Lebedev was proposed to head the Institute of Energetics in Novgorod. 2. At first it was call the Model of the BECM, but, later in the process of its creation there appeared the evident expediency of transforming it in a big computer. 3. Since autumn 1948 Lebedev had been directing his laboratory towards creation of MESM. 4. In autumn 1951 the machine executed a complex program rather stabile. 5. For that reason there were added: the imput — output devices, magnetic register storage, and the drum capacity. Task 7.Translate from Russian into English: Задание 7. Переведите с русского языка на английский: 1. МЭВМ была задумана С. А. Лебедевым и являлась моделью Большой Электронной Вычислительной Машины. 2. В процессе ее создания была проявлена очевидная целесообразность преобразования ее в маленький компьютер. 3. С. А. Лебедеву было предложено стать директором Института Энергетики в Киеве. 47 4. С осени 1948 Лебедев руководил своей лабораторией по направлению создания МЭВМ. 5. С осени 1951 машина выполняла комплекс программ. Task 8. Make up your own sentences: Задание 8. Составьте свои предложения со следующими словосочетаниями: • a small computer • a model of a Big Electronic Computing Machine • a department of heat-and-power engineering • a computer science. • automated devices • a practical creation • a complex program LESSON 11 THE MAIN FAULT OF THE 70-S OR THE YEARS OF “MIGHT HAVE BEEN HOPES” [1] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: The great accumulated experience in creating computers, the profound comparison of our domestic achievements with new examples of a foreign computer technique prompted the scientists that it is possible to create computing. It means a new generation meeting the world standards. Many outstanding Ukrainian scientists of that time — Lebedev, Dorodnitsin, Glushkov and others had the same opinion. They proceeded from quite a favorable situation in the country. The computerization of national economy was considered as one of the 48 most essential tasks. It was the decision to create the United system of computers — the machines of a new generation on integrals. The USA was the first to create the families of computers. In 1963-64 the IBM Company worked out the IBM-360 system. It comprised the models with different capacities for which a wide range of software was created. A decision concerning the third generation of computers (their structure and architecture) was to be made in the USSR in the late 60s. But instead of making the decision based on the scientific grounds concerning the future of the united system of computers the Ministry of Electronic Industry issued the administrative order to copy the IBM-360 system. The leaders of the Ministry did not take into consideration the opinion of the leading scientists of the country. Despite the fact that there were enough grounds for thinking the 70s would bring new big progresses, those years were the step back due to the fault way dictated by the highest authorities from above. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. Who proceeded from quite a favorable situation in the country? 2. What is a decision to create the united system of computers? 3. Who was the first to create the families of computers? Task 3. Match the English words given below with their Russian equivalents: Задание 2. Соотнесите следующие ключевые слова с соответствующим переводом: • domestic achievements • машины нового поколения • the united system of computers • иностранный компьютер • the machines of a new generation • внутренние достижения • a foreign computer • объединенная система компьютеров 49 • a computerization of national economy • компьютеризация национальной экономики Task 4. Complete the following sentences corresponding to the contents of the text: Задание 4. Закончите предложения: 1. Many outstanding Ukrainian scientists of that time …. . 2. Despite the fact that there were enough grounds for thinking the 70s would bring new big progresses, ..... . 3 .... was considered as one of the most essential tasks. 4 .... the machines of new generation on integrals. 5 .... the Ministry of Electronic Industry issued. Task 5. Say whether the statements given below are true or false: Задание 5. Определите истинность или ложность следующих предложений: 1. Of that opinion was many outstanding Ukrainian scientists of that time — Lebedev, Dorodnitsin, Glushkov and others. 2. The leaders of the Ministry did not take into consideration the opinion of the leading scientists of the country. 3. A decision concern the third generation of computers was to be made in the USSR in the late 60s. 4. The USA was the first to create families of computers. 5. The leaders of the Ministry did not take into consideration the opinion of the leading scientists of the country. Task 6. Use “was” or “were”: 50 Задание 6. Вставьте “was” или “were”: 1. Computerization of national economy ... considered as one of the most essential tasks. 2. The USA …. the first to create the families of computers. 3. It comprised the models with different capacities for which a wide range of software ... created. 4. A decision concerning the third generation of computer ... to be made in the USSR in the late 60s. 5. Despite the fact that there ... enough grounds for thinking the 70s would bring new big progresses, those years ... the step back due to the fault way dictated by the highest authorities from above. Task 7. Make the sentences negative and interrogative: Задание 7. Преобразуйте следующие предложения в вопросительную и отрицательную форму: 1. It was a great accumulated experience in creating computers. 2. They proceeded from quite a favorable situation in the country. 3. It was the decision to create the United system of computers — the machines of new generation on integrals. 4. The leaders of the Ministry did not take into consideration the opinion of the leading scientists of the country. 5. The computerization of national economy was considered as one of the most essential tasks. Task 8. Write the plural form of the following nouns: Задание 8. Образуйте множественное число следующих существительных: 51 an experience, a computer, an achievement, an example, a scientist, a standard, a situation, a country, a task, a decision, a generation, a machine, a system, a model, a capacity, a ground, an order, a leader, an opinion, a consideration, a fact, a step, a way. LESSON 12 PROTECTION OF INFORMATION [2] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: Rapid development of automation processes and penetration of the computers in all fields of life have led to appearance of a range of peculiar problems. One of these problems is the necessity of providing effective protection to information and means of its processing. A lot of ways to access information, considerable quantity of qualified specialists, and vast use of special technical equipment in social production make it possible for violators practically at any moment and in any place to carry out the actions, which represent a threat to information safety. Particular role in this process has been played by appearance of personal computer (PC), which has made computers, software and other informational technologies available to general public. Wide distribution of PC and impossibility of conducting effective control of their use have resulted in the decreasing security level of information systems. In the current situation, data processing has moved the problems of information security forward to the rank of most important problems of national economy. Solving the problem of poor information security presupposes a complex of measures. First of all, such actions of government as development of classification system, documentation of information and protection methods, data access regulations and punishing measures against information security violators. 52 a. State informational sources. Formation of state informational sources is carried out by citizens, state authorities, organizations and social unions. Documents, which belong to a person, can be included in the state structure of informational sources, of course, if the person wishes. State informational sources are open and generally available. Documented information with limited access is divided into state secret and confidential information. b. Citizen information (personal information). Personal data refers to confidential information. The collection, storage, use and distribution of private information are not allowed. The information, which breaks personal and family secret, secret of correspondence, telephone, postal, telegraph talks and other messages of a person without his/her permission, is also confidential. Personal data may not be used with purpose of causing damage to person's property and reputation, difficulties of realization its right. Collected data must be limited to necessary information. The information, which carries strong probability of causing damage to a citizen's interests shouldn't be collected. There are some categories of personal information: secret documents; information, which is not to be made public in accordance with legislative acts; confidential business information; information, which touches private life of a person; information of financial institutions. с. Development and production of informational systems. All types of informational systems and networks, technologies and means of their providing compose a special branch of economic activity, whose development is defined by the state scientific, technological and industrial policy of informatization. State and non-state organizations and, of course, the citizens have equal rights in terms of access to the development and producing of informational systems, technologies. d. Owner of informational systems. The informational systems, technologies and means of their providing can be the property objects of juridical person, non-juridical person and state. The owner of informational 53 system is a person, who purchased these objects or got as a gift, heredity or by any other legal way. The informational systems, technologies and means of their providing can be considered as a good (product), if the producer rights are not broken. The owner of informational system determines the using conditions of this product. e. Copyrights and property rights. Copyrights and property rights on informational systems, technologies and means of their providing can be belong to different persons. The owner of informational systems has to protect copyrights in accordance with legislation. Informational systems and databases, intended for citizens' and organizations' informational service, are subjected to certification according to the established rules. The organizations, which work in the field of making design, producing the means of information protection and personal data treatment, must obtain licensees to conduct such activity. The steps for obtaining license are defined by the legislation. f. Problem of information protection. The problem of information security is relatively new. Not all problems, connected with it have been figured out and solved up to now. The fact of great number of computer systems users means the definite risk to security because not all clients will carry out the requirements of its providing. The main purpose of information protection is preventing from the leak, theft, distortion, counterfeit of information; preventing the threat to person's life and social safety, protection of the constitution and so on. The information is subjected to protection, when it may cause the harm for its owner, user or other person. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 54 1. What is the main purpose of information protection? 2. Why is it very difficult to solve the problems connected with information security? 3. Who and how represents a threat to information safety? 4. What caused decreasing of security level of information systems? 5. What measures are taken by the government in solving the problem of poor information security? Task 3. Find the Russian equivalents for the following words and word — combinations: Задание 3. Дайте русские эквиваленты следующим словосочетаниям: information safety, decreasing security level, data processing, data access regulations, punishing measures, information security violators, established rules, personal data treatment, counterfeit of information, to obtain licenses, legislative acts. Task 4. Complete the sentences according to the text: Задание 4. Закончите следующие предложения и переведите их на русский язык: 1. Wide distribution of PCs has resulted in … . 2. Solving the problem of poor information security presupposes …. . 3. There are some categories of personal information … . 4. The owner of the informational system is … . 5. The main purpose of information protection is … . Task 5. Find the Russian equivalents for the words given below: Задание 2. Дайте определения следующим словам на английском языке: information, computer, protection, violator, software. 55 Task 6. Retell the text according to the sentences given below: Задание 2. Составьте план и перескажите текст. Постарайтесь осветить следующие пункты: 1. Wide distribution of PCs. 2. Decreasing security level of informational systems. 3. Types of information. 4. Development of informational systems. 5. The problem of information protection. LESSON 13 COMPUTER CRIMES [2] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: The development of computer technology and its wide use have lead to appearance and spread of computer crimes. Such situation causes alarm among those organizations and legislative institutions that use computer technologies and, of course, people, who use new informational services at homes. The term "computer crime" was first used in the early 70s. However, the discussions concerning it are still actual. The top question of these discussions is "What unlawful actions are implied by computer crime". A rank of definitions of the computer crime has been composed. It often refers to crimes directly or indirectly connected to electronic computing machines and which includes a number of illegal acts, committed by means of electronic data processing system or against it. Others consider that computer crime is any action, which goes together with interfering with property rights and fulfilled by means of computers. The thirds think that computer crime can be defined as all intentional and unlawful actions, which lead to causing harm to possessions, with help of computers too. 56 The most dangerous individuals of computer swindle are so called "hackers", "crackers" and representatives of other groups, working in the sphere of industrial espionage. So, many security specialists advise employers to pay special attention to engaged workers-specialists in computer technologies, programming and information protection spheres. There are many causes, when "hackers" get a job with a goal of personal enrichment. But the most danger can represent such specialists, who are in collusion with managers of commercial structures and organized criminal groups; in these situations causing damage and weight of consequences considerably increases. There are two types of unsanctioned access: internal «breaking open» — the criminal has access to the terminal, with information he interested in and can work with it for some time without somebody's control; and external «breaking open» — the criminal doesn't have indirect access to the computer system, but has an opportunity of penetration to the protected system by means of remote access. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What is a computer crime? 2. What types of unsanctioned access do you know? 3. Who are the so called «crackers» and «hackers»? 4. What is the difference between a «cracker» and a «hacker»? 5. Why can some specialists represent a danger? Task 3. Find the English equivalents for the words given below: Задание 2. Найдите эквиваленты следующих слов в тексте: 57 включать, работодатель, советовать, обращать внимание, программирование, увеличивать, последствия, удаленный доступ, возможность, проникновение. Task 4. Complete the sentences according to the text: Задание 2. Дополните следующие предложения: 1. The term “computer crime” often refers to … . 2. Computer crime cause alarm among … . 3. Many computer specialists advise employers … . 4. The two types of unsanctioned access are … . 5. A computer crime can be defined as … . LESSON 14 FROM THE HISTORY OF COMPUTER VIRUSES [1] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: A bit of history 2 November 1988 Robert Morris younger (Robert Morris), a graduate student of an informatics faculty of Cornwall University (USA) infected a great amount of computers, connected to Internet network. This network unites machines of university centres, private companies and governmental agents, including National Aeronautics Space Administration, as well as some military scientific centres and labs. 4 November the author of the virus — Morris — come to FBI headquarters in Washington on his own. FBI has imposed a prohibition on all materials relating to the Morris virus. 22 January 1989 a court of jurors has acknowledged Morris guilty. If denunciatory verdict had been approved without modification, Morris would have been sentenced to 5 years of a prison and 250.000 dollars of fine. However, Morris' 58 attorney Thomas Guidoboni immediately has lodged a protest and directed all papers to the Circuit Court with the petition to decline the decision of the court... Finally Morris was sentenced to 3 months of a prison and fine of 270 thousand dollars. Cornwall University carried a heavy loss, having excluded Morris from its members. The author had to take part in the liquidation of its own creation. It is necessary to differentiate between reproducing programs and Trojan horses. Reproducing programs will not necessarily harm your system because they are aimed at producing as many copies (or somewhat-copies) of their own as possible by means of so-called agent programs or without their help. In the later case they are referred to as "worms". Meanwhile Trojan programs aimed at causing harm or a damage to PC's. Certainly it's a usual practice, when they are a part of "tech-organism", but they have completely different functions. A network worm has struck 6.200 machines that formed 7.3% computers to network. Among damaged things were NASA, LosAlamos National Lab, exploratory center VMS USA, California Technology Institute, and Wisconsin University (200 from 300 systems). According to "Wall Street Journal", a virus has infiltrated networks in Europe and Australia, where there were also registered events of blocking the computers. Here are some recalls of the event participants: Symptom: hundreds or thousands of jobs start running on a UNIX system bringing response to zero. Systems attacked: UNIX systems, 4.3BSD UNIX and variants send mail compiled with debug. This virus is spreading very quickly over the Milnet. Within the past 4 hours, it has hit > 10 sites across the country. Well over 50 sites have been hit. Most of these are "major" sites and gateways. Method: Someone has written a program that uses a hole in SMTP Send mail utility. This utility can send a message into another program. Apparently what the attacker did was this: he or she connected to send mail, issued the appropriate debug command and had a small C program compiled. This program took as an argument a host number and copied two programs — one 59 ending in VAX. OS and the other ending in SunOS — and tried to load and execute them. In those cases where the load and execution succeeded, the worm did two things: spawn a lot of shells that did nothing but clog the process table and burn CPU cycles. It used both individual host files and any other remote hosts it could locate which it had a chance of connecting to. It may have done more: one of our machines changed super user password, but because of other factors we're not sure this worm did it. As you see, there are different types of viruses, and they have already been separated into classes and categories. For instance: dangerous, harmless, and very dangerous. No destruction means a harmless one, tricks with system halts means a dangerous one, and finally with a devastating destruction means a very dangerous virus. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What was the attacker? 2. Who infected a great amount of computers, connected to Internet network? 3. Who has imposed a prohibition on all material relating to the Morris virus? 4. When did Robert Morris infect a great amount of computers? 5. When did the author come to FBI headquarters in Washington on his own? 6. How many dollars would have been Morris sentenced? 7. Why do not Reproducing programs harm your system? 8. Why do the viruses evolve as if they were alive? Task 3. Choose the right variant: Задание 3. Выберите правильный вариант: 60 1. This …. unites machines of university centers, private companies and governmental agents. a) engineer b) network c) man 2. Network worm has struck … machines. a) 6500 b) 6200 c) 6300 3. ... 1988 Robert Morris in feted a great amount of computers, connected to Internet network. a) 1 January b) 8 March c) 2 November 4. ... the author of the virus-Morris-come to FBI headquarters in Washington on his own a) 22 June b) 17 September c) 4 November Task 4. Find the sentences with the words and word — combinations given below in the text: Задание 4. Найдите в тексте предложения, содержащие нижеследующие слова и выражения: • blocking the computers • to send mail • Morris virus • computer environment 61 • an integral part of the virus • a network worm • to decline the decision of court • reproducing programs Task 5. Complete the following sentences corresponding to the contents of the text: Задание 5. Закончите предложения: 1. .... infected a great amount of computers, connected to Internet network. 2. According ... were also registered events of blocking the computers. 3. It is necessary to differentiate between ... . 4. ... they are a part of "tech-organism", but they have completely different functions. 5. ... tricks with system halts means a dangerous one, and finally with a devastating destruction means a very dangerous virus. 6. This virus is spreading very quickly ... . 7. Apparently what the attacker did was this ... . 8. If denunciatory verdict had been approved without modification ... . 9. It may have done more ... . Task 6. Say whether the statements given below are true or false: Задание 6. Определите истинность или ложность следующих предложений: 1. 2 November 1888 Robert Morris older, graduate student of information faculty of Cornwall University infected a small amount of computers, connected to Internet work. 2. Network worm had struck 3200 machine that formed 7,9% computers to network, and has show, that UNIX okay too. 62 3. Symptom: hundreds or thousands of jobs start running on a UNIX system bring response to two. 4. This virus is not spreading very quickly over the Milnet. 5. Within the past 10 hours, it have hit > 10 sites across the country, both Arpaned and Milnet sites. 6. Apparently what the attacker do this: he or she connected to send mail, issue the appropriate debug command, and had a big C program compiled. 7. 22 January the author of the virus came to FBI headquarters in Washington on his own. 8. 22 January 1989 a court of jurors has acknowledged Morris guilty. 9. It was necessary to differentiate between reproduce program and Trojan horses. Task 7. Make up the sentences: Задание 7. Сопоставьте левую и правую колонки так, чтобы получились предложения: • This network unites • because they are aimed at producing as many copies of their own as possible. • Viruses are an area of • 6200 machines that formed 7.3% computers to network. • Viruses seem to be the only alive • organisms pure programming, and carry intellectual functions on protection from being found. • Reproducing programs will not harm • machines of university centers, private your own system companies and governmental agents. • Network worm has struck • in the computer environment. Task 8. Make the sentences negative and interrogative: 63 Задание 8. Преобразуйте следующие предложения в вопросительную и отрицательную форму: 1. Network worm has struck 6.200 machines that formed 7.3% computers to network. 2. This virus is spreading very quickly over the Milnet. 3. Well over 50 sites have been hit. 4. Most of these are "major" sites and gateways. 5. This utility can send a message into another program. 6. FBI has imposed a prohibition on all materials relating to the Morris virus. 7. Morris would have been sentences to 5 years of prison and 250.000 $ of fine. 8. The author had to take part in the liquidation of its own creation. 9. They have to fight for survival in complex conditions of conflicting computer systems. 10. Destructive actions are not an integral part of the virus by default. Task 9. Translate from Russian into English: Задание 9. Переведите с русского языка на английский: 1. 2 ноября 1988 Роберт Моррис младший, выпускник факультета информатики, разработал огромное число компьютеров, подключенных к сети Интернет. 2. Эта сеть объединяет машины учебных центров, частных компаний, государственных служащих. 3. Сетевой червь поразил 6200 машин, что составляет 7,3% всех компьютеров сети. 4. 4 ноября автор вируса Моррис приехал в Вашингтон лично. 5. 22 Января 1989 года суд присяжных признал вину Морриса. 64 6. Компьютерный вирус это исполнительный код, способный самовоспроизводиться. 7. Вирусы кажутся очень живучими организмами в компьютерной среде. 8. Существуют различные виды вирусов, которые делятся на классы и категории. LESSON 15 WHAT IS A COMPUTER VIRUS? [1] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: A virus is a piece of software designed and written to adversely affect your computer by altering the way. It works without your knowledge or permission. In more technical terms, a virus is a segment of program code that implants itself to one of your executable files and spreads systematically from one file to another. Computer viruses do not spontaneously generate. They must be written and have a specific purpose. Usually a virus has two distinct functions: • Spreads itself from one file to another without your input or knowledge. Technically, this is known as self-replication and propagation. • Implements the symptom or damage planned by the perpetrator. This could include erasing a disk, corrupting your programs or just creating havoc on your computer. Technically, this is known as the virus payload, which can be benign or malignant at the whim of the virus creator. A benign virus is one that is designed to do no real damage to your computer. For example, a virus that conceals itself until some predetermined date or time and then does nothing more than display some sort of message is considered benign. A malignant virus is one that attempts to inflict malicious damage to your computer, although the damage may not be intentional. There is a significant number of viruses that cause damage due to poor programming and outright bugs 65 in the he viral code a high percentage of them are very malignant. Some of the more malignant viruses will erase your entire hard disk, or delete files. A malicious virus might alter one or more of your programs so that it does not work, as it should. The infected program might terminate abnormally, write incorrect information into your documents. Or, the virus might after the directory information on one of your system areas. This might prevent the partition from mounting, or you might not be able to launch one or more programs, or programs might not be able to locate the documents you want to open. What Viruses Do? Some viruses are programmed specifically to damage the data on your computer by corrupting programs, deleting files, or erasing your entire hard disk. Many of the currently known Macintosh viruses are not designed to do any damage. However, because of bugs (programming errors) within the virus, an infected system may behave erratically. What Viruses Don't Do? Computer viruses don't infect files on write-protected disks and don't infect documents, except in the case of Word macro viruses, which infect only documents and templates written in Word 6.0 or higher. They don't infect compressed files either. However, applications within a compressed file could have been infected before they were compressed. Viruses also don't infect computer hardware, such as monitors or computer chips. They only infect software. In addition, Macintosh viruses don't infect DOS-based computer software and vice versa. For example, the infamous Michelangelo virus does not infect Macintosh applications. Exceptions to this rule are the Word and Excel macro viruses, which infect spreadsheets, documents and templates, which can be opened by either Windows or Macintosh computers. Finally, viruses don't necessarily let you know that they are there - even after they do something destructive. 66 Types of Computer Viruses. Nowadays number of viruses is about 55.000. It increases constantly. New unknown types of viruses appear. To classify them becomes more and more difficult. In common they can be divided by three basic signs: a place of situating, used operation system and work algorithms. For example, according to these three classifications virus Chernobyl can be classified as a file infector and resident Windows virus. Further it will be explained what it means. File Infectors These are viruses that attach themselves to (or replace) COM and EXE files, although in some cases they can infect files with extensions SYS, DRV, BIN, OVL and OVY With this type of a virus, uninfected programs usually become infected when they are executed with the virus in memory. In other cases they are infected when they are opened (such as using the DOS DIR command) or the virus simply infects all of the files in the directory is run from (a direct infector). There are three groups of file infectors. Viruses of the first group are called overwriting viruses because they overwrite their code into an infected file erasing contents. But these viruses are primitive and they can be found very quickly. Oilier group is called parasitic or cavity viruses. The infected file is capable of work fully or partly. Viruses can copy itself into begin, middle or end of a file. They record their code in data known not to be used. The third group is called companion viruses. They don't change files. They make double of infected file so when an infected file is being started a double file becomes managing, it means a virus. For example, companion viruses working with DOS use that DOS firstly runs COM. file. Viruses make double file with the same name and with extension COM and copies itself in this file. During start of an infected file DOS run a COM. file with a virus firstly and then a virus starts an EXE file. 67 Sometimes companion viruses rename file will be infected and record their code in a double file with old name. For example, the file XCOPY.EX is renamed into XCOPY.EXD and a virus record itself in file XCOPY.EXE. When this file is started computer runs a virus code firstly and after the virus starts original XCOPY, saved as XCOPY.EXD. Viruses like these ones were found not only in DOS. They were found in Windows and OS / 2. It is not only one way to make double files. For example there is a subgroup of companion viruses called path-companion viruses. They use special feature of DOS-PATH: hierarchical record of file location. The virus copies itself in a file with the same name but situated one level higher. In this case DOS will find a file with a virus. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What is a computer virus? 2. How many types of viruses are there? What are they? 3. How many groups of file-Infector do you know? 4. What do companion viruses do? 5. What don't viruses do? 6. What do special feature of POS path-companion viruses use? 7. Computer viruses do spontaneously generate, don't they? 8. What viruses will erase your entire hard disk? 9. How are viruses divided? 10.Viruses don't necessarily let you know that they are there-even after they do something destructive, do they? Task 3. Match the English words given below with their Russian equivalents: Задание 3. Соотнесите следующие слова с соответствующим переводом: 68 • a symptom • файл-инфектор • a viral code • повреждать • software • жесткий диск • direct infector • злостный вирус • a bug • монитор • an infected program • компьютерный вирус • a self-replication • программная ошибка • a hard disk • неопасный вирус • destructive • симптом • a file infector • программное обеспечение • a damage • макровирус • executable files • вирусный код • a malignant virus • место расположения • a monitor • главный заразитель • a computer chip • сжатые файлы • a computer virus • зараженная программа • compressed files • резидентный вирус • a benign virus • самоответ • macro virus • исполнительные файлы • erasing contents • разрушение • a work algorithm • стирающий содержание • an application • алгоритм работы • a resident virus • компьютерные чипы • a place of situating • приложение Task 4. Find the sentences with the words and word — combinations given below in the text: 69 Задание 4. Найдите в тексте предложения, содержащие нижеследующие слова и выражения: • a segment of program code • executable files • a virus payload • a viral code • a partition from mounting • DOS — based computer software • Word and Excel macro viruses • to make double of infected file Task 5. Complete the following sentences corresponding to the contents of the text: Задание 5. Закончите предложения: 1. Other group is called ... 2. The third group is called ... . 3. Usually a virus has two distinct functions ... . 4. Computer viruses do not ... . 5. Sometime companion viruses rename file will be. 6. Virus copies itself in ... . 7. Chernobyl can be ... . 8. Viruses also don't .... . 9. They must be ….. . 10. Viruses of the first group are called ... . 11. A virus is a piece of ... . 12. This could include erasing a disk ... on your computer. 13. Some viruses programmed ... your entire hard disk. 14. ... on write-protected disks and ... in the case of .... . 15. These are viruses that ... . 70 Task 6. Say whether the statements given below are true or false: Задание 6. Определите истинность или ложность следующих предложений: 1. Some of the more malignant viruses will erase your entire hard disk, or delete files. 2. Computer viruses do infect files on write-protected disks and do infect documents, except in the case of Word macro viruses, which infect only documents and templates written in Word 6.0 or higher. 3. Usually a virus has six distinct functions. 4. There are many groups of file infectors. 5. Nowadays number of viruses is about 55.000. 6. Other group is called parasitic or overwriting viruses. 7. Viruses also don't infect computer hardware such as monitors or computer chips; they only infect software. 8. Virus is a software designed and written to adversely affect your computer. 9. Viruses didn't spontaneously generate. 10. A malignant virus is one that is designed to do no real damage to your computer. 11. A benign virus might alter one or two of your programs so that it doesn't work, as it should. 12. The infected programs second of you system area. 13. In addition, Macintosh virus doesn't infect DOS - based computer software and vice versa. 14. Finally, viruses don't necessarily let you know that they are there - even after do something destructive. 15. In this case DOS wasn't find file with virus. Task 7. Translate from Russian into Englis: 71 Задание 7. Переведите с русского языка на английский: 1. Что такое компьютерный вирус? 2. Вирус — это часть программного обеспечения, написанного для того, чтобы неблагоприятно влиять на ваш компьютер, изменяя его работу без вашего ведома и согласия. 3. Вирус имеет две отличительные функции: нанесение запланированного ущерба и самораспространение. 4. Существуют безвредные вирусы и вирусы, наносящие большой ущерб компьютеру. 5. Вирусы могут повредить данные, изменить программы, удалить файлы, стереть жесткий диск. 6. Вирусы не инфицируют файлы на пишущихся защищенных дисках. 7. В настоящее время вирусов около 55.000. 8. Появляются новые, неизвестные типы вирусов, которые становятся все сложнее классифицировать. 9. Есть 3 группы вирусов: 1) всепишущие, 2) вирусы-паразиты, 3) вирусы-компаньоны. 10. Установка антивирусных программ позволяет находить и удалять вирусы. Task 8. Make the sentences negative and interrogative: Задание 8. Преобразуйте следующие предложения в вопросительную и отрицательную форму: 1. A virus is a piece of software. 2. This is a significant number of viruses. 3. A malicious virus might alter one or more of your program. 4. Some viruses are programmed specifically to damage the data on your computer programs. 5. Computer viruses infect files on write-protected disks. 72 6. Number of viruses is about 55.000. 7. These are three groups of file infectors. 8. Viruses can copy itself into begin, middle or end of a file. 9. This is a subgroup of companion viruses path — companion viruses. 10. Virus copies itself in a file. LESSON 16 SYNOPSIS [1] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: The history of computer viruses has begun recently, but it has already become legendary. Almost everyone knows a few fables about these creatures, but hardy anyone understands what a computer virus is. A computer virus is an executable code able to reproduce itself. Viruses are an area of pure programming, and, unlike other computer programs, carry intellectual functions on protection from being found and destroyed. They have to fight for survival in complex conditions of conflicting computer systems. Viruses seem to be the only alive organisms in the computer environment, and yet another their main goal is survival. That is why they may have complex crypting/decrypting engines, which is indeed a sort of a standard for computer viruses nowadays, in order to carry out processes of duplicating, adaptation and disguise. Viruses are written by lone wolves or programmers groups. Using special programs called "Virus creators" even beginners in a computer world can build their own viruses. The aim of creation of viruses in such a way is pretty obvious: the author wants to become well-known all over the world and to show his powers. The results of the attempt can be very sad, only real professionals can go famous and stay uncaught. To write something really new and remarkable programmer should have some extra knowledge and skills. 73 A computer virus group is an informal non-profit organization, uniting programmers-authors of viruses regardless of their qualifications. Everyone can become a member of the club, if he creates viruses, studies them for the reason of creation and spreading. You don't have to know any computer language or write any program code to become a member or a friend of the group. Programming in Assembler is preferred, Pascal, C++ and other high level languages are considered to be humiliating. There are computer virus groups all over the world, few being more successful than others. It may be pretty hard to get in contact with them since they are quite typical representatives of a computer underground world as well as (free) wares groups. Sometimes, however, creating viruses can become a respectable occupation, bringing constant income. After all, no one but the author of the virus can bring valuable information on the way it should be treated and cured. Developers of antiviral software gain money from selling their remedy to a new widely hyped by the mass media virus. Agitation can grow so strong that all and everyone dashes to buy an antiviral protection against even a most harmless virus. The ordinal behavior of share indexes in stock exchanges while a computer virus epidemic is to fall. Somehow, the shares of high-tech companies producing antiviral software will soar up to the sky. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What is a computer virus? 2. Can you describe those who create viruses? 3. How can a person protect his PC from viruses? 4. What is this information about a computer virus group? 5. Who has written about viruses? 6. What is the aim of creation of viruses? 7. Why may viruses have complex engines? 74 8. How many viruses do you know? 9. Where is programming considered to be humiliating? 10. What can become a respectable occupation? 11. What is a harmful program for PC? Task 3. Match the English words given below with their Russian equivalents: Задание 3. Соотнесите следующие слова с соответствующим переводом: • a history of • чистая программа • a computer virus • компьютерная программа • an executable code • компьютерный язык • a pure program • создание вируса • computer environment • создатель вируса • a standard for computer • история компьютера • programmer group • код выполнения • a special program • цель вируса • a "Virus creator" • компьютерный вирус • an aim of a virus • группа компьютерных вирусов • a computer virus group • компьютерная среда • a programmer-author of a virus • стандарты для компьютера • a computer language • группа программистов • a computer program • специальная программа • a creation of a virus • создатели программных вирусов • a program code • вредящая программа • a computer underground world • вирус средств СМИ • an antiviral protection • программная версия • a harmless virus • вскрытая версия программы • a computer virus epidemic • безобидный вирус • a version of program • компьютерный подпольный мир • a cracked version of program • компьютерная вирусная эпидемия 75 • a harmful program • антивирусная защита • a mass media virus • программный код Task 4. Find the sentences with the words and word combinations given below in the text: Задание 4. Найдите в тексте предложения, содержащие нижеследующие слова и выражения: • an area of pure programming • to carry out processes of duplicating, adaptation and disguise • a computer virus group • a computer underground world • antiviral software • a sphere of artificial intellect development • using cracked versions of programs Task 5. Complete the following sentences: Задание 5. Закончите предложения: 1. The history of computer viruses has begun ... . 2. A computer virus is an ... . 3. Viruses are written by ... . 4. The results of the attempt can be …. . 5. A computer virus group is … . 6. Everyone can become ..... . 7. Developers of antiviral soft ware gain money from … . Task 6. Say whether the statements given below are true or false: Задание 6. Определите истинность или ложность следующих предложений: 76 1. A computer virus is an executable code. 2. They have to fight for survival in a real life. 3. Viruses are written by writers. 4. To write something really new and remarkable programmer shouldn't have some extra knowledge and skills. 5. You didn't have to know any language and write some programs code to become a member or a friend of the group. 6. Computer viruses didn't come for a long time. 7. Developers of antiviral software gain money from selling their remedy to a new widely hyped by the mass medina virus. Task 7. Translate from Russian into English: Задание 7. Переведите с русского языка на английский: 1. История компьютерных вирусов началась недавно, но они уже стали легендарными. 2. Вирусы должны бороться за выживание в сложных условиях противоречивых компьютерных систем. 3. Вирусы написаны "одинокими волками" или группами программистов. 4. Компьютерная вирусная группа — неофициальная некоммерческая организация, объединяющая программистов — авторов вирусов независимо от их квалификации. 5. Каждый может стать членом клуба, если он создает вирусы, изучает их по причине создания и распространения. 6. Однако иногда создание вирусов может стать представительным занятием, приносящим постоянный доход. 7. Но не забудьте, что создание, использование и распространение вредных программ для ПК — преступное нарушение, также как и использование версий программ-взломщиков. 77 Task 8. Find the sentences in Passive Voice in the text: Задание 8. Найдите предложения с пассивным залогом: LESSON 17 COMPUTER VERSUS HUMAN BRAIN [2] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: The computer was developed around 1950 with the first commercial model being introduced in 1951. It came as a tool that had the effect of multiplying the power of man's mind. The computer proved as significant for the mental activity as the Lever and the Wheel have been for the physical activity. The computer as already stated is a tool for extending the power of man's mind but with some limitations. Till today, the computer has not extended all aspects of power of man's mind but only some aspects. The areas where the computer finds itself helpless are the ones involving creative thoughts and the development of original ideas. These areas, which at present do not lie within the purview of the computer use, do lie within the domain of human brain. Not only this, the mode in which the computer has to perform and the sequence in which the data is to be processed to solve a particular problem are the things that are decided by human brain. A computer is always fed with a set of instructions (called a program) for every problem solved on the computer. In simple words, the computer does what it is asked to do. It will be possible to solve a very difficult problem on a computer in a split second only if we have a suitable program available to do that and, of course, provided the execution of program, instructions lies within the capability of the computer. Another obvious difference between human and machine intelligence is that human intelligence is very flexible but not tireless. Human brain gets tired very soon and makes mistakes. Also, the I.Q. (Intelligence Quotient) differs from person 78 to person and deteriorates with ageing. Computers act relatively whereas human mind acts absolutely; while human mind adjudges, computer compares. In addition, human mind (and to some extent animal's mind) is able to respond to a variety of situations and entities. Let us take an example of a postman engaged in sorting out the mail. An average postman with a very poor I.Q. will be able to read the postal code, detect the postal mistake of incorrect stamping, and decide whether the address is correct or incorrect, whether post card is oversized and whether address is written at correct place and in correct style or not etc. without much efforts. If the same job is done with the present day computer designed for mail sorting, it will not be able to handle all these variations with a simple program. A program that would take into account all the reasonable variations instantly recognizable by the average human being would be long and complicated. With time these aspects — the ones which are not within the purview of the computer use — too may come within the computer domain. A group of people thinks that when the science is perfected, the computers will be able to develop artificial intelligence of that level as to replace human brain but most of the current scientists believe that it is a fantasy of science-fiction only. However let me hope that humanity is able, to achieve this target which seems at present as impossible as to achieve immortality. Nevertheless, computers have greatly relieved the burden over individual’s memory and are a versatile gadget, which alone will be credited to bring out at least half the sophistication in human civilization. The computers combined with laser technology are bound to bring thousands of miracles which will convert most of the fictions and fantasies of sciences into reality. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What are the main differences between human brain and the computer? 79 2. Why does the computer work faster than human brain? 3. Why is it very difficult to make the computer respond to a variety of situations? 4. How greatly in your opinion will computers change in the next 15-20 years? Task 3. Find the English equivalents for the words and word - combinations given below: Задание 3. Найдите эквиваленты следующих слов в тексте: обрабатывать данные, решать задачи, обеспечивать, делать ошибки, гибкий, выполнение программы, принимать во внимание, достигать цель. Task 4. Use the right prepositions and fill in the blanks: Задание 4. Заполните пропуски предлогами: 1. The areas … creative thoughts and the development … original ideas do not lie … the purview of the computer use; they do lie within the domain … human brain. 2. The computers will be able to convert most … the fictions and fantasies of sciences … reality. 3. The I.Q. differs … person … person and deteriorates … ageing. 4. A computer is always fed … a set of instructions (called a program) for every problem solved … the computer. 5. Human mind is able to respond … to a variety … situations. Task 4. Translate the following sentences into English: Задание 4. Переведите на английский язык следующие предложения: 1. Компьютер способен запоминать, обрабатывать и хранить 80 информацию. 2. При наличии подходящей программы компьютер может решить самую сложную задачу в доли секунд. 3. Компьютер – это мощное устройство, способное превратить наши мечты в реальность. 4. Компьютер – это искусственный разум, способный заменить человека в скучных, рутинных делах. 5. Все достижения компьютера ограничены разумом человека. LESSON 18 POPULAR INFECTION METHODS USED BY COMPUTER VIRUSES [2] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: To say that computer viruses infect your computers is not enough; every computer virus has its own special way of wrenching control from normal files. Viruses can append themselves onto, insert themselves into, or wrap themselves around normal executable program files. Some viruses combine techniques in order to achieve a higher level of adaptability. Viruses can remain resident in memory and can intercept user commands and DOS system calls. They can redirect system I/O through themselves or go for the jugular and simply replace good files with viral impersonators. Like movies, songs, and television shows, computer programs have a beginning, middle, and an end. Usually, when a computer program is first loaded into memory, an opening title screen is displayed. That's the beginning, or top, of the program. The various functions you call up as you use the program constitute its middle, and when exiting you're at the program's end. What most users don't know is that the binary representations of computer program commands that actually 81 make computer programs run are not necessarily stored on disks in the same order as that in which they will be used. In computer programming jargon, a program's lines of text are called strings of text, or just plain strings. While the first thing users see when they load and run a particular computer program might be a string of text saying "Welcome to FOOBAR version 9.7," the actual characters of text are usually stored either at the very beginning or at the end of the program's on-disk binary code. Therefore, were you to view a .COM or .EXE file with binary file viewer, you would most likely find a bucketful of text strings stored at the beginning and end of the program file, regardless of where or how they are actually displayed during program usage. Computer program compilers (other programs that convert lists of computer commands into executable program files) store text displays and other computer commands in whatever manner is most efficient for computers to use. When programs are run, compiled executables tell computers where in memory or where on disk they can find required text strings, commands, functions, and more. Computer virus programmers, knowing intimately how their target files operate, ingeniously exploit computers' handling of binary program file executions. There are six popular methods employed by most computer viruses to steal control from normal executable files: appending, insertion, interception, redirection, replacement, the viral shell. While other forms of system corruption surely exist, these are by far the dominant techniques preferred by rogue program authors. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What does every computer virus have? 2. What are strings of text? 3. What do computer program compilers store? 82 4. What do computer virus programmers exploit? 5. What are six popular methods used by computer viruses? Task 3. Find the Russian equivalents for the words and word – combinations given below: Задание 3. Дайте русские эквиваленты следующим словосочетаниям: Executable program files, viral impersonators, binary representation of computer program, program’s on-disk binary code, binary file viewer, bucketful of text strings, computer program compiler, binary program file execution. Task 4. Complete the sentences according to the text: Задание 4. Дополните предложения: 1. Some viruses combine techniques in order to … . 2. Like movies, computer programs have … . 3. Computer program compilers store … . 4. When programs are run, compiled executables tell computers … . 5. There are six methods used by computer viruses to steal control from normal executable files … . Task 5. Retell the text: Задание 5. Перескажите текст, используя новые слова и словосочетания: LESSON 19 THE TERM “COMPUTER SECURITY” [1] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: 83 The term "computer security" is used very frequently, but the content of a computer is vulnerable to several risks unless the computer is connected to other computers to form a network. As the use of computer networks, especially the Internet, has become widely spread, the concept of computer security has expanded to signify issues relating to the networked use of computers and their resources. The major technical areas of computer security are usually rep storage devices resented by the initials CIA: Confidentiality, Integrity, and Authentication or Availability. Confidentiality means that information cannot be accessed by unauthorized parties. Confidentiality is also known as secrecy or privacy; breaches of confidentiality range from the embarrassing to the disastrous. Integrity means that information is protected against unauthorized changes that are not detectable to authorized users; many incidents of hacking compromise the integrity of databases and other resources. Authentication means that the users are those persons who they claim to be. Availability means that resources are accessible by authorized parties; "denial of service" attacks, which are sometimes the topic of national news, are attacks against availability. Other important factors of computer security professionals call the access control and nonrepudiation. Maintaining access control means not only that users can access only those resources and services to which they are entitled, but also that they are not denied resources that they legitimately can expect to access. Nonrepudiation implies that a person who sends a message cannot deny that he sent it and, on the contrary, that a person who has received a message cannot deny that he received it. In addition to these technical aspects, the conceptual reach of computer security is broad and multisided. Computer security touches draws from disciplines as ethics and risk analysis, and is concerned with topics such as computer crime; the prevention, detection, and remediation of attacks; and identity and anonymity in cyberspace. While confidentiality, integrity, and authenticity are the most important concerns of a computer security manager, privacy is perhaps the most important aspect of computer security for everyday Internet users. Although these people may feel that they have nothing to hide when they are registering with an Internet 84 site or service, privacy on the Internet is about protecting one's personal information, even the information does not seem sensitive. Because of the ease with which information in electronic format can be shared among companies, and because small pieces of related information from different sources can be easily linked together to form a composite of, for example, a person's information seeking habits, it is now very important that individuals are able to maintain control over what information is collected about them, how it is used, who may use it, and what purpose it is used for. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What is the term of computer security? 2. Which are the major technical areas of compute security? 3. What do confidentiality, integrity, and authentication mean in terms of PC security? 4. What is nonrepudiation? 5. What disciplines does the term concern? 6. What is the most important aspect of computer security nowadays? 7. What is protected while surfing the Internet? Task 3. Match the English words given below with their Russian equivalents: Задание 3. Соотнесите следующие ключевые слова с соответствующим переводом: • Vulnerable • секретность, конфиденциальность • Authentication • строгое выполнение обязательств • Integrity • уязвимый, ранимый • Nonrepudiation • доступность, наличие • Confidentiality • целостность данных, 85 • Availability неприкосновенность • Access control • установление соответствия оригиналу • контроль доступа Task 4. Find the English equivalents in the text: Задание 2. Просматривая текст, найдите эквиваленты выражений: часто используется; также известна как; защищена от; может быть разделена среди; могут быть легко свяаны с в единое целое; с какой целью используется. Task 5. Say whether the statements given below are true or false: Задание 5. Определите истинность или ложность следующих предложений: 1. The major technical areas of computer security are usually rep storage devices. 2. Authentication means that the users are those persons who they claim to be. 3. Availability means that resources are accessible by any authorized or unauthorized parties. 4. Other important factors of computer security professionals call the access control and nonrepudiation. 5. The conceptual reach of computer security is not broad and multisided. 6. Privacy is perhaps the most important aspect of computer security for everyday Internet users. 7. Computer security doesn’t touch such disciplines as ethic and risk analysis. 86 Task 6. Complete the sentences according to the text: Задание 2. Закончите предложения: 1. The term "computer security" is used very frequently, but the content ... . 2. The major technical areas of computer security are usually ... . 3. ... means that information cannot be accessed by unauthorized parties. 4. Integrity means that information is protected against ... . 5. Other important factors of computer security ... . 6. Maintaining access control means not only that users can ... . 7. Nonrepudiation implies that a person who sends a message cannot ... . 8. Computer security touches draws from disciplines as ... . 9. ... privacy is perhaps the most important aspect ... . 10. It is now very important that individuals are able to .... . Task 7. Translate from Russian into English: Задание 7. Переведите с русского языка на английский: 1. Термин «компьютерная безопасность» используется довольно часто. 2. Основные технические сферы компьютерной безопасности можно представить аббревиатурой CIA. 3. Конфиденциальность подразумевает, что информация не может быть доступна неизвестным сторонам. 4. Целостность значит, что информация защищена от изменения неопознанными лицами. 5. Доступность значит, что ресурсами могут пользоваться любые лица. 6. В целом, термин «компьютерная безопасность» довольно широк и многосторонен. 7. Отдельным пользователям очень важно поддерживать контроль над их личной информацией. 8. Важно знать, кто, с какой целью и как использует информацию о личностях пользователей. 87 Task 8. Make the sentences negative and interrogative: Задание 8. Преобразуйте следующие предложения в вопросительную и отрицательную форму: 1. The term "computer security" is used very frequently. 2. The content of a computer is vulnerable to several risks unless the computer is connected to other computers to form a network. 3. The use of computer networks, especially the Internet, has become widely spread. 4. Confidentiality means that information cannot be accessed by unauthorized parties. 5. Integrity means that information is protected against unauthorized changes that are not detectable to authorized users. 6. Authentication means that the users are those persons who they claim to be. 7. Availability means that resources are accessible by authorized parties. 8. Other important factors of computer security professionals call the access control and nonrepudiation. 9. Privacy is perhaps the most important aspect of computer security for everyday Internet users. 10. It is now very important that individuals are able to maintain control over what information is collected about them, how it is used, who may use it, and what purpose it is used for. Task 9. Make up the sentences using the words given below: Задание 9. Составьте предложения из следующих слов: 88 1. cannot, that, by, information, parties, means, be, confidentiality, unauthorized, unauthorized. 2. of, networks, the, especially, computer, has, use, become, the, spread, Internet, widely. 3. important, other, of, factors, computer, professionals, th, security, access, call, and, control, nonrepudiation. 4. is, perhaps, users, the, aspect, of, computer, for, important, everyday, privacy, Internet, most, security. LESSON 20 IS YOUR HOME COMPUTER A TARGET? [1] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: Is your home computer a popular target for computer robbers? Why? It is so, because intruders want what you've stored there. They look for the numbers of your credit cards, bank account information, and anything else they can find. By stealing that information, all thefts can use your money buying themselves goods and services. But they need not only the money-related information. These thefts also want your computer, it means your hard disk space, your fast processor, and your Internet connection. They use resources to attack other computers on the Internet. In fact, the more computers an intruder uses, the harder it is for law enforcement to find out where the attack is really coming from. If they can't be found, they can't be stopped, and they can't be prosecuted and imprisoned. Why do criminals pay attention to home computers? Home computers are typically not very secure and are easy to break into. When combined with highspeed Internet connections that are always turned on, they can quickly find and then attack home computers. While thefts also attack home computers connected to 89 the Internet through dial-in connections, high-speed connections (cable modems and DSL modems) are a favorite target. No matter how a home computer is connected to the Internet, attacks of such people are often successful. Many home computer owners don't realize that they need to pay attention to computer security. In the same way that you are responsible for having insurance when you drive a car, you also need to be responsible for your home computer's security. The purpose is to keep computer robbers and their programs off your computer. How do they break into your computer? In some cases, they send you an e-mail with a virus. When you read such e-mail you activate the virus, creating an opening that use to enter or access your computer. In other cases, they take advantage of a defect or weakness in one of your computer's programs — a vulnerability — to gain access. Once they're on your computer, they often install new programs that let them continue using your computer-even after you closed all the holes they used to get onto your computer in the first place. These backdoors are usually cleverly disguised so that they blend in with the other programs running on your computer. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. Why are computer robbers paying attention to home computers? 2. What are they looking for? 3. Is it difficult to find a thief? 4. Why are the attacks of such people often successful? 5. How do intruders break into your computer? Task 3. Find the English equivalents in the text and make up sentences: Задание 2. Просматривая текст, найдите эквиваленты выражений и составьте с ними предложения: 90 Использовать ресурсы, место на жестком диске, высокоскоростное подключение к интернету, обращать внимание на безопасность, иметь при себе страховку, быть ответственным за что-либо, посылать электронное сообщение, активировать вирус, изъяны компьютерных программ. Task 4. Say whether the statements given below are true or false: Задание 4. Определите истинность или ложность следующих предложений: 1. All thefts can use your money buying themselves goods and services. 2. These thefts also want your computer. 3. They use resources to attack other computers son the Internet. 4. The more computers an intruder uses the easier for law enforcement to find him out. 5. Home computers are typically very secure. Task 5. Complete the sentences: Задание 5. Закончите предложения: 1. They look for ... they can find. 2. These thefts also want your computer, it means ... . 3. In fact, the more computers an intruder uses, the harder it is ... . 4. When ... intruders can quickly find and then attack home computers. 5. Many home computer owners ... . 6. ... you also need to be responsible for your computer's security. 7. The purpose is to ... . Task 6. Translate from English into Russian: Задание 6. Переведите с русского языка на английский: 91 1. Вне зависимости от того, как ваш компьютер подсоединен к Интернету, атаки таких людей часто очень успешны. 2. Многие владельцы домашних персональных компьютеров не осознают необходимости заботы о компьютерной безопасности. 3. Так же, как вы должны иметь при себе страховку при вождении автомобиля, вы должны позаботиться о безопасности вашего компьютера. Task 7. Make the sentences negative and interrogative: Задание 7. Преобразуйте следующие предложения в вопросительную и отрицательную форму: 1. But they need not the only money-related information. 2. They use resources to attack other computers on the Internet. 3. If intruders can't be found, they can't be stopped, and they can't be prosecuted and imprisoned. 4. No matter how a home computer is connected to the Internet, attacks of such people are of ten 'successful. 5. The purpose is to keep computer robbers and their programs off your computer. 6. When you read such e-mail you activate the virus, creating an opening that intruders use to enter or access your computer. 7. They take advantage of a defect or weakness in one of your computer's programs to gain access. Task 8. Write the plural form of the following nouns: Задание 8. Образуйте множественное число следующих существительных: Target, intruder, bank account, space, Internet connection, modem, purpose, e-mail, weakness, virus, program. 92 LESSON 21 THINKING ABOUT YOUR HOME COMPUTER [1] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст E-mail, instant messaging, and most web traffic go across the Internet in the clear; it means that anyone who can capture that information can read it. This is the most necessary information you ought to know. You should always select and use strong passwords and apply due care when reading all e-mail, especially its uninvited variety. These are things you ought to do. Finally, you can use a firewall, an anti-virus program, patches, and file encryption to improve the level of security on your home computer, and we'll call these things you ought to install. What You Ought To Know. Knowledge is power — Nam et ipsa scientia potestas est — Francis Bacon (1561-1626). For solving home computer security problems the starting point is your awareness of how the Internet and some of its technologies work. If you know how they work, you can evaluate solutions to the coming problems. You can also use the Internet more safely and responsibly. Here, we'll mention about trust. Human beings are trusting by nature. We trust very much in what we hear on the radio, see on television, and read in the newspaper. We trust in the information on the labels on packages. We trust the mail we receive. We trust our parents, our partner or spouse, and our children. We trust our co-workers. In fact, those who don't trust much are thought to be cynical. Their opinions may be all too quickly ignored or dismissed. The Internet was built on trust. Back in the mid 1960s, computers were very expensive and slow by today's standards, but still quite useful. To share the expensive and sparse computers installed around the country, the U.S. government 93 funded a research project to connect these computers together so that other researchers could use them remotely. This project was called the ARPAnet, named after the government research agency — ARPA, the Advanced Research Projects Agency — that funded managed the project. What You Ought To Do. Though you are trustful, you ought to be careful. Install a firewall program, virus-checking programs and an anti-virus program. Check your home for viruses regularly and cure the infected files. Don’t forget to update your anti-virus program or change it for the most modern and effective one if necessary. Trust, but be careful. Now, when you are warned you are armed. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What is the safety of a home computer? 2. Why is it necessary to know how to secure a home computer? 3. What should be done, if the computer is infected by the Virus? 4. Why is it necessary to pay attention to it? 5. What is the Anti- virus program? 6. How does it work? 7. How do you know that the label information is valid? 8. What should I do to secure my home computer? 9. Why do you store the important items in a locked container? 10. What year was an Internet built? Task 3. Find the English equivalents in the text and make up sentences: Задание 2. Просматривая текст, найдите эквиваленты выражений и составьте с ними предложения: 94 Электронная почта, завладеть информацией, использовать пароль, необходимая осторожность, оценивать решения, доверчивый по природе, установить защиту, зараженные файлы, обновлять программы, предупрежден — значит вооружен. Task 4. Say whether the statements given below are true or false. Задание 4. Определите истинность или ложность следующих предложений: 1. You should always select and use strong passwords. 2. Apply due care when reading all e-mail, especially its uninvited variety. 3. You can use a firewall, an anti-virus program, patches, and file encryption to improve the level of security on your home computer. 4. Human beings are unbelieving by nature. 5. We don't trust very much in what we hear on the radio, see on television, and read in the newspaper. 6. We never trust in the information on the labels on packages. 7. Check your home for viruses from time to time and cut out the infected files. Task 5. Complete the sentences: Задание 5. Закончите предложения: 1. You should always select and use ... . 2. ... to improve the level of security on your home computer. 3. For solving home computer security problems the starting point is ... . 4. If ... you can evaluate solutions to the coming: problems. 5. We trust very much in what we ... . 6. Those who don't trust much ... . 7. Don't forget to ... if necessary. 95 Task 6. Translate from Russian into English: Задание 6. Переведите с русского языка на английский: 1. Хотя вы и доверчивы, необходимо быть осторожным. 2. Установите программу Брандмауэра, программы, проверяющие вирусы, и антивирусные программы. 3. Регулярно проверяйте ваш компьютер и «лечите» зараженные файлы. 4. Не забывайте обновлять антивирусную защиту или заменять ее на более современную и эффективную, если это необходимо. 5. Доверяйте, но будьте осторожны. 6. Теперь, когда вы предупреждены, вы вооружены. Task 7. Make the sentences negative and interrogative: Задание 7. Преобразуйте следующие предложения в вопросительную и отрицательную форму: 1. This is the most necessary information you ought to know. 2. You should always apply due care when reading all e-mail, especially its uninvited variety. 3. If you know how they work, you can evaluate solutions to the coming problems. 4. Human beings are trusting by nature. 5. In fact, those who don't trust much are thought to be cynical. 6. Don't forget to update your anti-virus program or change it for the most modern and effective one if necessary. LESSON 22 “GETTING INSIDE” A COMPUTER SYSTEM [2] Task 1. Read and translate the text: 96 Задание 1. Прочитайте и переведите текст: Essentially, hackers get inside a computer system by taking advantage of software or hardware weaknesses that exist in every system. Before explaining how they do this, a few definitions are in order. The term “hacker” is fairly controversial: some use this word to describe those whose intrusions into computer systems push the boundaries of knowledge without causing intentional harm, whereas “crackers” want to wreak havoc. So, the term “unauthorized user” (UU) seems more preferable for anyone who engages in unsanctioned computer access. “Getting inside” can mean one of three things: accessing the information stored on a computer, surreptitiously using a machine’s processing capabilities (to send spam, for instance) or capturing information being sent between systems. So how does a UU get inside a computer? The easiest weakness to exploit is a poorly conceived password. Password cracking programs can identify dictionary words, names and even common phrases within a matter of minutes. Many of these programs perform a “dictionary attack”: they take the encryption code used by the password system and encrypt every word in the dictionary. Then the UU plugs in the encrypted words until the password match is found. If a system has complex password, the UU could try a “technical exploit”, which means using technical knowledge to break into computer system (as opposed to nontechnical options such as stealing documentation about a system). This is more challenging, because the UU must learn what kind of system the target is and what the system can do. A proficient UU can do this remotely by utilizing a hypertext transfer protocol (http) that gains World Wide Web access. Web pages usually record the browser being used. The UU could write a program that takes advantage of this procedure, making the Web page ask for even more information. With this knowledge in hand, the UU then writes a program that circumvents the protections in place in the system. Although you cannot eliminate all possible weakness, you can take steps to protect against unauthorized access. Make sure you have the latest patches for your 97 operating system and applications. Create a complex password with letters, numbers and symbolic characters. Consider installing a firewall program, which blocks unwanted Internet traffic. Make sure your antivirus software is up-to-date and check frequently for new virus definitions. Finally, back up your data, so you can recover important material if anything does happen. Task 2. Answer the following questions. Задание 2. Ответьте на следующие вопросы: 1. What does the term “UU” mean? 2. How can UU get inside a computer? 3. What steps can you take to protect against unauthorized access? 4. What does “getting inside” mean? Task 3. Find the Russian equivalents for the words and word — combinations given below: Задание 3. Дайте русские эквиваленты следующим словосочетаниям: processing capabilities, poorly conceived password, password cracking programs, within a matter of minutes, dictionary attack, encrypted words, hypertext transfer protocol, firewall program, unwanted Internet traffic, to up-to-date software. Task 4. Translate the words given below into Russian: Задание 4. Переведите слова на английский язык: A hacker, a cracker, a password, software, hardware, unauthorized user, World Wide Web. Task 5. Fill in the blanks, using word — combinations from task 2: 98 Задание 5. Заполните пропуски, используя словосочетания из упражнения 2: 1. The easiest weakness to exploit is …. . 2. Programs can identify dictionary words, names and phrases within … . 3. Consider installing a … program, which blocks … . 4. Although you cannot eliminate all possible weaknesses, you can take steps to protect against …. . 5. Make sure your antivirus software is … . Task 6. Translate the sentences into English: Задание 6. Переведите следующие предложения на русский язык: 1. В основном хакеры проникают в компьютер, пользуясь слабостями программ и аппаратного обеспечения, которые существуют в любой системе. 2. Неавторизованный пользователь может получить доступ к хранящейся в компьютере информации, воспользоваться программными способностями машины и перехватить информацию. 3. Специальные программы могут взломать пароль за несколько секунд. 4. Хотя устранить все слабости нельзя, вы можете защитить свой компьютер от несанкционированного доступа. LESSON 23 SHADOW DATA (PART 1) [1] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: 99 Have you ever thought about why some government agencies require computer data to be erased by overwriting it at least seven times or even more? Have you ever thought why classified (or secret) government agencies prefer to destroy computer hard disk drives rather than surplus them? The reasons for these levels of paranoia are valid and they are connected with the potentials of security breaches tied to shadow data. When computer data is written to a floppy disk, zip disk, hard disk or tape, a mechanical device called a head is used to write the data. The information is stored electronically in magnetic patterns of binary ones and zeros. The patterns are in the form of sectors which are written consistently in concentric rings called tracks. The process is fast and efficient. However, it also involves the use of a mechanical device which operates with less than exact tolerance levels. Horizontal head straightening and vertical head placement is just a bit different every time the information is written and rewritten to the same track. This situation limits the effectiveness of software data scrubbers and it creates the potential for government security breaches on well used storage devices. Thus, government agencies require multiple writes when data is destroyed with data scrubbers. However, even multiple writes can not guarantee complete removal of legacy data. The last data that remains on the track is called shadow data. However, NTI’s M-Sweep Pro Software removes almost all potentials for the forensic recovery of shadow data. Shadow data contains the leftovers of computer data that was written previously to a track and it is located slightly outside the track's last recording path. It gets a bit more complicated though. There are actually two reasons which cause shadow data to come about: mechanical issues and magnetic issues. To illustrate the mechanical issues, imagine a long, straight road of a consistent width. A car traveling along that road has a paint sprayer attached to its bumper, and paints a line as it goes. Mechanical shadow data manifests itself due to imperfections in the drive's servomechanism which causes the write arm, which holds the write head over the drive's surface, to shake horizontally to the left and right to a certain extent. This would be analogous to our vehicle weaving back and front on the road 100 as the paint sprayer continues doing its job. The resulting painted line would not be in a straight line, but something like elongated "s" pattern. Each pass of the write head varies slightly creating new elongated "s" patterns within the bounds of the storage space assigned to the track. The source of magnetic shadow data is analogous to the paint sprayer's nozzle being moved up and down vertically as the line is painted. If it is high, the paint spray pattern will be wide. If it is low, the paint pattern will be narrow and the painted line will be thin. With this analogy the paint over spray would be shadow data which would not be completely covered if a new line were to be painted on the road. This splatter effect is actually caused by variances in signal strength as the head moves up and down vertically as the data is written to the track. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. Why do secret agencies need to erase by overwriting data many times? 2. What device is used to write data on floppy, zip or hard disks? 3. How hard disk is arranged? 4. What is the shadow data? 5. What are the phenomena of shadow data to come about? 6. How you can illustrate the mechanical issues of shadow data? 7. What is the source of magnetic shadow data? Task 3. Find the English equivalents of the words given below in the text and make sentences with them: Задание 2. Напишите определения следующих терминов и составьте с ними предложения: hard disk drive, floppy diskette, zip disk, hard disk, software data, storage space. 101 Task 4. Match the words: Задание 4. Соедините слова из левой и правой колонок таким образом, чтобы получить терминологические сочетания: data placement device horizontal alignment storage head electronic Task 5. Say whether the statements given below are true or false: Задание 5. Определите истинность или ложность следующих предложений: 1. When computer data is written to a floppy disk, zip disk, hard disk or tape, a mechanical device called a head is used to write the data. 2. The information is stored electronically in magnetic patterns of binary ones and zeros. 3. Horizontal head straightening and vertical head placement is just the same every time the information is written. 4. Multiple writes can guarantee complete removal of legacy data. 5. There is only one reason which causes shadow data to come about. Task 6. Complete the sentences according to the text: Задание 6. Закончите предложения: 1. The reasons for these levels of paranoia are ... . 2. The information is stored electronically in ... . 3. However, it also involves the use of a mechanical device which ... . 4. Thus, government agencies require ... . 102 5. The last data that remains on the track is ... . 6 .... can not guarantee complete removal of legacy data. 7. ... removes almost all potentials for the forensic recovery of shadow data. 8. ..... that was written previously to a track and it is located slightly outside the track's last recording path. Task 7. Translate the sentences from Russian into English: Задание 7. Переведите с русского языка на английский: 1. В результате, линия будет не прямой, а похожей на удлиненную букву «s». 2. Каждое движение пишущей головки немного разнится, создавая новый образец этой удлиненной «s» в границах памяти, выделенной на дорожку. LESSON 24 SHADOW DATA (PART 2) [1] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: Finally, vertical ... (computer data, shadow data, electronic data) may also exist in the material used to store the magnetic imprint. On some storage devices the material consists of iron oxide layers which have been sprayed on the platter of a ... (hard disk drive, floppy disk, zip disk) or on plastic Mylar sheets used in the manufacture of floppy diskettes. In staying with the spray paint analogy, imagine that our road in the previous examples is porous. When the paint is sprayed onto the road, some of it may seep downward into the pours asphalt that makes up the surface of the road. Later, when another line of a different color is painted onto the road, the horizontal imperfections will also be manifested as differences in depth and the new paint will also seep into the porous layers of asphalt. If we were to 103 slice off layers of the asphalt, the original painted line, in some places, will be overlapped with the new color. But remnants of the original paint will also exist. When this analogy is compared to writes made to a hard disk drive, the layering occurs due to physical flaws in the ... (news media, storage media, hard disc media) and variances in the ability of the platters coating to hold a magnetic charge. Since the write heads path will always vary slightly, within allowable tolerances, it is theoretically impossible to guarantee the secure wipe of a floppy diskette, hard disk drive or tape using a software solution. However, multiple overwrites can increase the effectiveness of a ... (security scrub, removing program, write head). But strictly speaking, some data may still remain behind after a data scrub for discovery. You should be aware, however, that the recovery of shadow data is no easy task. Specialized and very expensive equipment is required to reliably recover shadow data. The costs of the necessary equipment and the expert staff required to perform the ... (input process, data extraction process, printing process) puts the process beyond the reach of most private sector corporations. From a computer forensics standpoint, shadow data has yet to become a source of reliable computer evidence. This is, in part, because of the costs involved. Another factor pertains to the potentials of data bleed from one layer of shadow data to another. This problem taints the computer evidence and makes it difficult to differentiate one level of ... (computer data, legacy data, shadow data) from another. If you have an interest in researching and experimenting with shadow data, basic tools are available for free download over the Internet. However, we must stress that the reliability of these methods and techniques does not produce evidence grade results from a computer forensics standpoint. Software solutions provide ... (strong results, limited success, viruses) because they rely upon the same mechanical flaws discussed above. But, such software solutions in the wrong hands could still create a security risk. We should also point out that the use of basic data recovery tools and techniques do not compare with the tools and techniques used by US government agencies in the identification and extraction of shadow data. They are the true experts in this area. 104 As an additional note, older encoding methods, e.g., MFM and RLL, make the recovery of shadow data a bit less difficulty. Newer hard disk drive technologies, however, make recovery of shadow data a bit less fruitful, because the drive densities require higher frequencies to write data to narrower tracks. This limits ... (access, writing, erasion) to the shadow data, because the signal strength and write frequencies are not as strong as with older technologies. Furthermore, some of the "splatter" effect is reduced with the newer ... (hard disk drive, floppy disk, zip disk) technologies because of tighter manufacturing tolerances. Finally, higher hard disk drive RPM's make the mechanical "wobble" much less pronounced than with older technologies. This does not Eliminate the threat shadow data poses; enough shadow data, still exists to provide some insight into the data on a given hard drive. Today's hard disk drive technology does, however, limit the potentials of security risks tied to shadow data somewhat. ... (floppy diskettes, zip disk, mass storage devices) pose a higher level of threat, as it relates to shadow data, than computer hard disk drives. Since floppy diskettes are encoded using older encoding formats, they are more "porous" (less dense), and floppy disk heads write much less efficiently than hard disk write heads. If you want to experiment with shadow data, floppy diskettes might be a good place to start. Modern computer forensic search tools used in computer related investigations and in computer security risk reviews will not find search terms which may exist in the form of shadow data. This is because the controllers on the drive either incapable or not set to find shadow data. This should (bring a certain level of comfort to most private sector computer users. However you should still be aware that the risk exists and that someone may be willing to pay the price to "steal" corporate and government secrets stored in the form of ... (computer data, shadow data, electronic data). Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 105 1. Where else can shadow data exist? 2. What layers have been sprayed on the platter of a hard disk drive? 3. Which is the preferable variant to experiment with shadow data? 4. Why is it theoretically impossible to guarantee the secure wipe of a floppy diskette, hard disk drive or tape using a software solution. 5. What equipment is required to reliably recover shadow data? 6. What should bring a certain level of comfort to most private sector computer users? Task 3. Are the sentences given below true or false: Задание 2. Определите истинность или ложность следующих предложений: 1. It is theoretically impossible to guarantee the secure wipe of a floppy diskette, hard disk drive or tape using a software solution. 2. Some data may still remain behind after a data scrub for discovery. 3. Specialized and very expensive equipment is not required to reliably recover shadow data. 4. Reliability of some methods and techniques produce evidence grade results from a computer forensics standpoint. 5. The use of basic data recovery tools and techniques can be compared with the tools and techniques used by US government agencies in the identification and extraction of shadow data. 6. Newer hard disk drive technologies, however, make recovery of shadow data a bit less fruitful. 7. When the paint is sprayed onto the road, some of it may seep downward into the pours asphalt that makes up the surface of the road. 106 Task 4. Find the English equivalents of the words given below in the text and make up sentences with them: Задание 4. Напишите определения следующих терминов и составьте с ними предложения: extraction, encoding, shadow data, storage devices, write heads, recovery tools. Task 5. Complete the sentences: Задание 5. Закончите предложения: 1. When the paint is sprayed onto the road, some of it may ... . 2. When another line of a different color is painted onto the road, the horizontal imperfections will also be ... . 3. When this analogy is compared to writes made to a hard disk drive ... . 4. However, multiple overwrites can increase the effectiveness of ... . 5. .... is required to reliably recover shadow data. 6. Another factor pertains to the potentials of data ... . 7. .... a bit less fruitful, because the drive densities require higher frequencies to write data to narrower tracks. 8. .. and floppy disk heads write much less efficiently than hard disk write heads. Task 6. Make the sentences negative and interrogative: Задание 6. Преобразуйте следующие предложения в вопросительную и отрицательную форму: 1. When the paint is sprayed onto the road, some of it may seep downward into the pours asphalt that makes up the surface of the road. 107 2. If we were to slice off layers of the asphalt, the original painted line, in some places, will be overlapped with the new color. 3. It is theoretically impossible to guarantee the secure wipe of a floppy diskette, hard disk drive or tape using a software solution. 4. You should be aware, however, that the recovery of shadow data is no easy task. 5. From a computer forensics standpoint, shadow data has yet to become a source of reliable computer evidence. 6. As an additional note, older encoding methods, e.g., MFM and RLL, make the recovery of shadow data a bit less difficulty. LESSON 25 HOW TO PROTECT AGAINST SHADOW DATA SECURITY RISKS [1] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: Probably the first ... (наиболее эффективный), step in reducing your vulnerability to shadow data leakage is knowledge that is exists (on your storage device). Knowing that shadow data potentially exists will ensure that you ... (по крайней мере) weigh the risks and make informed decisions concerning the scrubbing of data, degaussing storage devices and in managing the risks. U. S. government classified data handling instructions call for a certain specifications concerning the disposal of computer ... (накопительные устройства). Data scrubbing through the use of multiple overwrites is on potential solution. While this procedure is not 100% fool-proof; it does ... (значительно снижает) the likelihood of shadow data becoming a threat in your organization. Using old RLL-encoded drives, Peter Gutman of the University of Auckland speculated, in his document "Secure Deletion of Data from Magnetic Memory 108 Devices", that overwriting a drive 35 times with varying hexadecimal values may force the write head to vary magnetic effect on the iron oxide particles to such an extent as to remove the shadow data. Still, there is ... (нет гарантий) that software solutions will effectively wipe out all this information because the process relies on the drive's controller, which is not suited for this purpose. High-intensity degaussing of a hard drive platter, floppy diskette, zip disks and tape is probably the ... (лучший способ) to ensure the elimination of threats associated with shadow data. This is an effective process to use when storage devices are being retired from service. Be mindful that the degaussing of a hard disk drive must be performed after the platters have been removed. Otherwise, the hard disk drive will act as a protective shield and some shadow data may survive. The complete incineration of floppy diskettes, zip disks and tapes also ... (может быть использовано) to remove any security threats associated with shadow data. Corporate and government policies concerning the disposal of computer storage devices should always ... (принимать во внимание) the potentials of shadow data as a potential data security risk. With knowledge and proper controls in place, shadow data should not become a security problem for most government agencies and corporations. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What is the most effective step in reducing your vulnerability to shadow data? 2. What are the other steps to protect from shadow data? Task 3. Find the words given below in the text: Задание 3. Найдите в тексте следующие выражения: 109 уменьшение уязвимости, чистка данных, накопительные устройства, пишущая машинка, размагничивание жесткого диска, устранение угрозы. Task 4. Are these statements true or false? : Задание 4. Определите истинность или ложность следующих предложений: 1. Knowing that shadow data potentially exists will ensure that you at least weigh the risks. 2. Data scrubbing through the use of multiple overwrites is on potential solution. 3. Overwriting a drive 35 times with varying hexadecimal values may force the write head to vary magnetic effect on the iron oxide particles to such an extent as to remove the shadow data. 4. The degaussing of a hard disk drive can't be performed after the platters have been removed. 5. Without knowledge and proper controls in place, shadow data have become a security problem for most government agencies and corporations. Task 5. Complete the sentences: Задание 5. Закончите предложения: 1. Knowing that shadow data potentially exists will ensure: that you ... . 2. Data scrubbing through the use of multiple overwrites ... . 3. While data scrubbing is not 100% fool-proof; it ... . 4. Still, there is no guarantee that software solutions will effectively wipe out all this information because ... . 5. High-intensity degaussing of a hard drive platter, floppy diskette, zip disks and tape is probably the ... . 110 6. Be mindful that the degaussing of a hard disk drive must be performed after ….. . 7. The complete incineration of floppy diskettes, zip disks and tapes also ... . Task 6. Find the Russian equivalents: Задание 6. Дайте определения следующим терминам по-английски: Leakage, disposal, data scrubbing, wipe out, degaussing, incineration. LESSON 26 CRYPTOGRAPHY [1] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: Cryptography is ... (более не является) a military thing that should not be messed with. It is time to demystify cryptography and make full use of the advantages it provides for the modern society. In the following, basic terminology and the main methods of cryptography ... (представлены). Any opinions and evaluations presented here are speculative, and the author cannot be held responsible for them. I. Basic Terminology Suppose that someone wants to send a message to a receiver, mid wants ... (быть уверенным) that no-one else can read the message. However, ... (существует вероятность) that someone (vise opens the letter or hears the electronic communication. In cryptographic terminology, the message ... (называется) plaintext or cleartext. Encoding the contents of the message in such a way that hides its contents from outsiders is called encryption. The encrypted message is called the ciphertext. The process of retrieving the plaintext from the ciphertext is called decryption. Encryption and decryption usually make use of a 111 key, and the coding method is such that decryption ... (может быть выполнена) only by knowing the proper key. Cryptography is the art or science of keeping messages secret. Cryptanalysis is the art of breaking ciphers, i.e. retrieving the plaintext ... (без знания) the proper key. People who do cryptography are cryptographers, and practitioners of cryptanalysis are crypt analysts. Cryptography deals with all aspects of secure messaging, authentication, digital signatures, electronic money, and other applications. Cryptology ... (является отраслью) of mathematics that studies the mathematical foundations of cryptographic methods. II. Basic Cryptographic Algorithms A method of encryption and decryption is called a cipher. Some cryptographic methods rely on the secrecy of the algorithms; such algorithms are only of historical interest and are ... (не соответствуют) for real-world needs. All modern algorithms use a key to control encryption and decryption; a message can be decrypted only if the key matches the encryption key. The key used for decryption ... (может отличаться) from the encryption key, but for most algorithms they are the same. There are two classes of key-based algorithms, symmetric (or secret-key) and asymmetric (or public-key) algorithms. The difference is that symmetric algorithms use the same key for encryption and decryption (or the decryption key is easily derived from the encryption key), whereas asymmetric algorithms use a different key for encryption and decryption, and the decryption key cannot be derived from the encryption key. Symmetric algorithms ... (можно разделить) into stream ciphers and block ciphers. Stream ciphers can encrypt a single bit of plaintext at a time, whereas block ciphers take a number of bits (typically 64 bits in modern ciphers), and encrypt them as a single unit. Asymmetric ciphers ... (также называемые) public-key algorithms or generally public-key cryptography) permit the encryption key to be public (it can even be published in a newspaper), allowing anyone to encrypt with the key, 112 whereas only the proper recipient (who knows the decryption key) can decrypt the message. The encryption key is also called the public key and the decryption key the private key or secret key. Modern cryptographic algorithms cannot really be executed by humans. Strong cryptographic algorithms are designed ... (чтобы выполняться) by computers or specialized hardware devices. In most applications, cryptography is done in computer software. Generally, symmetric algorithms are much faster to execute on a computer than asymmetric ones. In practice they are often ... (используются вместе), so that a public-key algorithm is used to encrypt a randomly generated encryption key, and the random key is used to encrypt the actual message using a symmetric algorithm. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What is a cipher? 2. What are two classes of key-based algorithms? 3. What are symmetric algorithms? 4. What are asymmetric algorithms? 5. What are stream ciphers? 6. What are block ciphers? 7. What is the proper recipient? 8. What is the encryption key? 9. What is the decryption key? Task 3. Find the English equivalents in the text: Задание 3 Просматривая текст, найдите эквиваленты следующих выражений: 113 более не является; с чем не следовало бы иметь дела; теперь время (настал момент); извлечь все преимущества; любые мнения и оценки являются теоретическими (умозрительными); автор не может считаться ответственным; сохранение секретным; представляют только исторический интерес; не имеют ничего общего с реальными нуждами; одновременно; целый ряд (битов); не могут выполняться человеком; гораздо быстрее; в больших книжных магазинах, библиотеках, патентных бюро и в Интернете; хорошо известный. Task 4. Say whether the statements given below are true or false: Задание 4. Определите истинность или ложность следующих предложений: 1. Cryptography is still a military term. 2. In cryptographic terminology, the message is called plaintext or cleartext. 3. The process of retrieving the plaintext from the ciphertext is called decryption. 4. Encryption and decryption usually use a key, and decryption can be done only by knowing the proper key. 5. Cryptography deals only with secure messaging. 6. A message can be decrypted only if the key matches the encryption key. 7. Modern cryptographic algorithms can really be executed by humans. Task 5. Complete the sentences: Задание 5. Закончите предложения: 1. In cryptographic terminology, the message …. . 2. Encoding the contents of the message ... . 3. Cryptography is the art or science of ... . 4. Cryptography deals with all aspects of ... . 114 5. All modern algorithms use a key to control …. . 6. There are two classes of key-based algorithms …. . 7. The difference is that symmetric whereas asymmetric algorithms use ... , whereas asymmetric algorithms use … . 8. Modern cryptographic algorithms cannot ... . LESSON 27 RISK ASSESSMENT [1] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: I. Risk assessment should be among the first steps in your design process, and will help you frame your further efforts to design a ... (систему безопасности). Making risk assessment a priority will also help you ... (убедить) your executive officers to be both informed about and integral to the beginnings of your securely designed project. During the risk assessment phase of design, you may find important supporters and champions among the executive officers: you should actively recruit their participation if they're not ... (еще не вовлечены). II. Business majors and MBAs already know about the managerial aspects of risk assessment. This methodology is heavily used in most ... (офис), especially with respect to business planning. Risk assessment is no less important in secure, ... (хорошо разработанном программном обеспечении) or applications development projects. Take advantage of the fact that your managers and executives are probably already familiar with ... (методикой оценки рисков). Armed with a common language and methodology, you can inform your managers of the relative risks to which the application exposes you or your customers, and you can additionally leverage their and buy-in. This will help you in the end: if there should ever be an attack on your application, you will already have a 115 champion to go to bat for the ... (целостность) of your application and the care with which it was designed. III. The basic steps of risk assessment are as follows: 1. Identify protected resources 2. Assign relative value 3. Identify possible attackers 4. Estimate relative frequency of each kind of attacker 5. Carry out attack tree analysis (Identify possible attack routes) 6. Protect all possible attack routes (Protect attack routes) IV. Protected resources include things like your customer database, customer credit card information, or personal information. If you thought about the policies regarding the privacy, disposition and handling of customer information and other social and legal issues you would understand that your risk assessment process ... (зависит в большей степени) on such things. Your executive managers must be involved in deciding these policies. V. For each resource, assign it a relative value (i.e. your customer credit card database will probably be more valuable than your vendor contact list). Next, ... (определите) possible attackers. Frequent examples are the bored teenager, the disgruntled ex-employee, the corporate spy, or the government intelligence agent. VI. Estimation of the skill, frequency and methods of the attacker all belong to a related process to risk assessment which Bruce Schneier calls 'attack tree analysis'. This process helps to formalize what's otherwise a significantly subjective process of analysis and assessment, and can help to prioritize your project's security goals. If you saw chapter 21 of Bruce Schneier's book: Secrets and Lies: Digital Security in a Networked World you could know more about attack trees. A ... (очень рекомендуемый) resource on all of digital security.) VII. Once you knew what routes or attack you should be ... (защищать) (from your attack tree analysis), you would already organize information about the... (вид безопасности) you need to implement in your design. You may also 116 find that this information will be helpful in writing security and privacy policies to accompany your application design efforts. VIII. Please be very careful ... (выполняя) your own research about risk assessment. It is very easy to confuse this process with another process, usually called 'security assessment'. A risk assessment is a process that people undertake (sometimes aided by organization-enhancing software) to determine risks surrounding their specific efforts. On the other hand, there are many software tools available for ... (оценки безопасности) that will analyze your network and servers for known vulnerabilities. IX. Three tips for using these kinds of software tools: 1) if you research the producing company carefully you will be sure you can trust them with the necessary access privileges before (установки программного обеспечения) up mi your network, 2) test the tool in an isolated testing environment ... (до его применения), and 3) strongly consider petitioning your internal Information Technology department or Help Desk for permission to run this kind of tool on your company's internal networks. Security assessment tools can he useful, but cannot be 100% effective, and though they may help you do risk assessment for extant problems with existing software, they will not be able to ... (работать вместо вас) in regard to designing and developing new software and applications. Task 2. Find the Russian equivalents: Задание 2. Дайте определения следующим терминам по-русски: risk, assessment, attack tree analysis, customer database, security assessment, relative value, access privileges. Task 3. Are the statements given below true or false? : Задание 3. Определите истинность или ложность следующих предложений: 117 1. During the risk assessment phase of design, you may not find important supporters and champions among the executive officers. 2. Risk assessment is less important in secure, well designed software or applications development projects. 3. If there should ever be an attack on your application, you will already have a chance to go to bat for the integrity of your application and the care with which it was designed. 4. Protected resources include things like your customer database, customer credit card information, or personal information. 5. Your vendor contact list will probably be more valuable than your customer credit card database. Task 4. Complete the sentences: Задание 4. Закончите предложения: 1. Making risk assessment a priority will also help you ... . 2. If there should ever be an attack on your application, ... . 3. Protected resources include things like ... . 4. .... which Bruce Schneier calls 'attack tree analysis'. 5. .... you would already organize information about the kind of security you need to implement in your design. 6. It is very easy to confuse ... . 7. A risk assessment is a process ... . Task 5. Translate the sentences given below into English: Задание 5. Переведите с русского на английский: 1. Оценка риска — это процесс, который люди затевают (иногда с помощью особого программного обеспечения) с целью определения возможных рисков для их профессиональной деятельности. 118 2. Существуют также специальные компьютерные программы, способные оценить безопасность, проверяя сеть и серверы на возможные поражения. LESSON 28 MICROCOMPUTER AND MICROPROCESSOR [2] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: 1. Since the transistor was invented, no single electronics innovation has had such an impact as microcomputer. Powered by tiny semiconductor chips containing computing elements with the same power and functions previously found only in large scale computers, these microcomputers systems are now being applied to literally thousands of applications. Microcomputers are automating assembly lines, providing the heart of sophisticated electronic games, making "intelligent" computer peripherals even faster. This revolution is occurring because microcomputers are very inexpensive, easy to implement into a system, and significantly reduce the time and cost of product development. 2. The microcomputers were the first computers to use a single microprocessor chip as the processor. Personal computers and small business computers are microcomputers. 8-bit microcomputers usually support only one user terminal and have a maximum of 64 KB of memory. 16-bit microcomputers may support several user terminals and usually have a maximum of 1 million bytes of memory. As the power of microcomputers increases, they can be used in two ways. They can be used either as a central computer (providing processing for several user terminals), or as a more powerful single computer for an individual user (see Fig. 4). 3. A microprocessor is the tiny processor used, as mentioned above, in microcomputers. The microprocessor requires a power supply and memory to be a 119 complete computer. Microprocessors are also used in minicomputers, mainframes and peripheral devices, as well as in all industrial and consumer products which use a computer. 4. As usual processors all microprocessors have the ability to fetch (obtain from memory) and execute a limited set of instructions, to perform addition and subtraction on a binary word, and to input (take in) and output (put out) binary data. After fetching an operational code from the program in memory, while this operation is being executed, the program counter is automatically incremented by one unit. At the completion of the instruction, it is then ready with the address for the following program instruction. In many situations the microprocessors have many more capabilities that application requires. 5. In conclusion7 some words more about single-chip microcomputers. They, where control functions and memory circuits reside on one chip, are beginning to appear in consumer appliances. One of their attractions is the fact that programmable read-only memories (PROMs) that can be included on these chips require no electrical power to retain data. In addition to providing permanent storage, PROMs also allow one type of micro to be stocked as a standard component that can be programmed individually to provide a variety of control functions. 6. Just as computer circuits have grown smaller, so too have memory circuits. Moreover, new technologies such as the bubble memory and Josephsonjunction memory show the ability for providing more compact memories that retain data with little or no applied power. These new memories allow micros to be used where power is not always available and conventional read - only memories do not have enough capacity. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What is the reason for advent of microcomputers? 120 2. What component do the microcomputers use as the processor? 3. What is a microprocessor? 4. Where are microprocessors used? 5. What ability has the microprocessors? 6. What new progressive technologies are used in memory units? 7. What memories are used in microcomputers? Task 3. Find the English equivalents for the following words given below in the text: Задание 3. Найдите эквиваленты следующих слов в тексте: кроме того, периферийные стандартный, устройства, элемент, ограниченный индивидуальный набор пользователь, команд, ни одно новшество, более мощный, буквально тысячи применений, удерживать данные. Task 4. Translate the words given below into Russian: Задание 4. Прочтите следующие слова и словосочетания и переведите их на русский язык: Ability, variety, mainframes, reduce, retain, addition, literally, impact, conclusion, innovation, large-scale, permanent, assembly, consumer, counter. Task 5. Make the sentences interrogative: Задание 5. Поставьте следующие предложения в вопросительную форму: 1. In many situations the microprocessors have many more capabilities that application requires. 2. The microprocessor requires a power supply and memory to be a complete computer. 121 3. Microcomputers are automating assembly lines, providing the heart of sophisticated electronic games, making "intelligent"5 computer peripherals even faster. 4. This revolution is occurring because microcomputers are very inexpensive, easy to implement into a system, and significantly reduce the time and cost of product development. 5. New technologies such as the bubble memory and Josephson-junction memory9 show the ability for providing more compact memories that retain data with little or no applied power. Task 6. Complete the sentences according to the text: Задание 6. Закончите следующие предложения согласно тексту: 1. These new memories allow micros to be used where power is not always available and conventional read-only memories …………………………… . 2. Сontrol functions and memory circuits reside on one chip, are beginning to appear …………………………………. . 3. A microprocessor is the tiny processor used, as mentioned above, in …………………. . 4. The microcomputers were the first computers to use ………………. . 5. Microprocessors are also used in minicomputers, mainframes and peripheral devices, as well as in all ………………. . LESSON 29 KINDS OF PROGRAMS [2] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: 122 There are two main kinds of programs which are subdivided as well. They are control programs and systems service programs. Control Programs, There are some control programs to handle interruptions (прерывание), I / O operations, transition between different jobs (задание) and different phases of the same job, initial program loading (IPL), and symbolic assignment of I / O devices. Actually, the control program consists of three components: 1. IPL Loader. When system operation is initiated, the hardware IPL reads in this program which then clears unused core storage to zeros, generally performs some housekeeping operations, and then reads in the Supervisor. 2. The Supervisor. It is resident in the low order part core storage whenever any job is being run. It can handle execution of any I / O operations and can provide standard processing for all interrupts, it may also queue I / O operations so that the operation will start as soon as the required channel and device are free. 3. Job Control. When the end of a job is sensed, the user normally turns control over to the Supervisor which then reads in the Job Control program. This program senses and processes all cards; after the new job is loaded, it turns control over to the new job. This system of operation eliminates the necessity of operation intervention between jobs, something which is of particular importance on large computers where the average job time may be less than one minute. The control program is a large program occupying thousands of bytes. It is usually stored on a magnetic tape or a magnetic disk. The particular unit on which the program resides is called the System Resident unit. System Service Programs. They are used to maintain the library: to place new programs into the library, to delete, replace, or change existing programs, to read programs from the library into memory, to link segments of programs written at different times into one program, etc. They are called Librarian and Linkage Editor. 123 There are three libraries maintained by the Librarian program: 1) Core Image library, 2) Relocatable library, 3) Source Statement library. The core image programs includes the processors and control programs and as many of the application programs as the user desires. The relocatable library contains modules which are stored in such a way that each module can be arbitrarily relocated and still be executed correctly. A module may be a complete program or it may be a relatively independent part of a larger program. The source statement library contains macro definitions a sort of collection of standard type statement which can be incorporated into a program to provide some special functions. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What are control programs? 2. What does the control program consist of? 3. What does IPL Loader mean? 4. What is the Supervisor? 5. What is Job control? 6. What are System Service Programs used for? Task 3. Translate the words given below into Russian: Задание 2. Прочтите следующие слова и словосочетания и переведите их на русский язык: Arbitrarily, relocatable, execute, statement, delete, exist, maintain, subdivide, interrupt, assignment, resident, provide, queue, sense, load, intervention, occupy. Task 4. Make the sentences interrogative: Задание 4. Поставьте следующие предложения в вопросительную форму: 124 1. The relocatable library contains modules which are stored in such a way that each module can be arbitrarily relocated and still be executed correctly. 2. The control program is a large program occupying thousands of bytes. 3. There are three libraries maintained by the Librarian program. 4. The source statement library contains macro definitions. 5. There are two main kinds of programs which are subdivided as well. Task.5. Fill in the blanks with the following words given below: Задание 5. Вместо пропусков вставьте соответствующие слова из текста. Independent, stored, user, called, the application programs 1. The core image programs include the processors and control programs and as many of …….. as the user desires. 2. A module may be a complete program or it may be a relatively …… part of a larger program. 3. It is usually …….. on a magnetic tape or a magnetic disk. 4. The particular unit on which the program resides is ……… the System Resident unit. 5. When the end of a job is sensed, the ………… normally turns control over to the Supervisor which then reads in the Job Control program. LESSON 30 COBOL [4] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: 125 COBOL is an acronym for Cоmmon Business Oriented Language. It is internationally accepted programming language developed for general commercial use. COBOL is a problem oriented high - level language in which the source program is written using statements in English. A COBOL program is written in four divisions: Identification Division, Environment Division, Data Division, Procedure Division. The Identification Division contains descriptive information that identifies the program being compiled. The Environment Division deals with the specification of the computer to be used for operating the object program, including such information as the size of memory, the number of tape decks, printers and other peripheral devices that will be used; a description of the computer to be used for compiling the source program is also given here. The Data Division is used to allocate labels to all units of data on which operations are to be performed. All input and output files are defined and associated with the peripheral units to be used for input and output.The Procedure Division gives the step-by-step instructions necessary to solve the problem. These steps are specified by means of instructions expressed in English statements which can be recognized by the compiler and translated into a sequence of machine code instructions capable of being used by the computer to solve the problem. The advantages of using COBOL are that it is relatively simple to learn, and programs can be quickly written and tested; programmers can easily understand programs not written by themselves, and thus associated documentation can be simplified; and programs can be used on other machines, within the limitations noted above. The disadvantages are: (1) the relative inefficiency of the resulting object program as compared with a program written in machine code or a machine oriented language and (2) the lack of flexibility (гибкость) imposed by the restrictions (ограничение) on the type of instructions and methods for performing operations in a highly standardized language. 126 Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What is COBOL? 2. How many divisions does a COBOL program have? 3. Can you name them? 4. What does the Procedure Division give? 5. What are the advantages of using COBOL? 6. What are the disadvantages of this program? Task 3. Find the English equivalent for the words given below in the text: Задание 3. Найдите эквиваленты следующих слов в тексте: Распознавать, принимать, использовать, включать, распределять, сравнивать, содержать, относительный, связанный, процедура, изображать, деление, упрощать. Task 4. Translate the following words given below into Russian: Задание 4. Прочтите следующие слова и словосочетания и переведите их на русский язык: Relative, associate, simplify, compare, lack, recognize, capable, thus, impose, contain, descriptive, include, allocate, compile, division. Task 5. Make the sentences interrogative: Задание 5. Поставьте следующие предложения в вопросительную форму: 1. The advantages of using COBOL are that it is relatively simple to learn, and programs can be quickly written and tested. 127 2. The Data Division is used to allocate labels to all units of data on which operations are to be performed. 3. COBOL is an acronym for Cоmmon Business Oriented Language. 4. All input and output files are defined and associated with the peripheral units to be used for input and output. 5. It is internationally accepted programming language developed for general commercial use. Task 6. Fill in the blanks with the following words given below: Задание 6. Вместо пропусков вставьте соответствующие слова из текста. Flexibility, environment, COBOL, necessary, understand 1. Programmers can easily ……. programs not written by themselves. 2. The lack of ……… imposed by the restrictions on the type of instructions and methods for performing operations in a highly standardized language. 3. The Procedure Division gives the step-by-step instructions ……. to solve the problem. 4. The ……… Division deals with the specification of the computer to be used for operating the object program. 5. A ……….. program is written in four divisions. LESSON 31 TECHNOLOGY OF AUTOMATA – BASED PROGRAMMING INTRODUCTION [1] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: 128 In recent years a great attention has been paid to the development of the technology of programming for the embedded systems and real-time systems. These systems have special requirements for the quality of software. One of the most well-known approaches for this field of tasks is synchronous programming. Simultaneously with the progress of synchronous programming in Europe, in Russia an approach called "automata-based programming" or "state-based programming" is being created. This method could be considered as a type of synchronous programming. It contains such phases of software developing as designing, implementing, debugging and documenting. Today it has become one of the main terms in software development. After introduction of the term "input action" the term “automaton without outputs" could be brought in. After addition of the term "output action", the term "automaton" could be brought in. It is the finite determined automation. That is why, the sort of programming, which is based on this term was called "automata- based programming" in paper. So the process of software creation could be named "automata software design". The feature of this approach is automata. It is defined with the help of transition graphs. For distinguishing of the codes of these graphs the term "state coding" is to be introduced. When using "multiple state coding" with the help of single variable it is possible to distinguish amount of states which is equal to the amount of variables values. This allows to introduce in programming the term "program observability". Programming is to be performed using the concept of "state", not the concept of "flag variables". It allows to understand and specify the task and its parts (subtasks) better. It is necessary to note that it automata-based programming debug is performed with the help of drawing up the protocols (logging) in the terms of automata. In this approach there is a formal and isomorphic method of transfer from the transition graph to the software source code. So when using programming languages of the high level, the most suitable way is to use construction which is similar to construction "switch" of the programming language "C"'. That is why the 129 technology of "automata-based programming" in paper was called as "Switchtechnology". Nowadays this technology is been developed in several variants, for different types of task to be solved and for various types of computing devices. Slate-Based Programming Henceforth automata approach was spread to the event-based (reactive) systems. In systems of this kind all limitations, mentioned above are taken away. It is obvious from the name of these systems that events are used among the input actions. The Role of output actions could be played by arbitrary functions. Any real-time operating system could be used as an environment. For programming for event-based systems with the help of automata a procedural approach to software developing was used. So this kind of programming was called as "state-based programming". Using this method output actions are assigned to the arcs, loops or nodes of the transition graphs (mixed automata are to be used — Moore-Mealy automats). This allows to present sequences of actions, which are reactions to corresponding input actions, in the compact form. On the features of programming for the reactive systems is that liquidation of logic in the event handlers and forming of a system of interacting automata, which are called from these handlers, causes logic centralization. Automata in such a system can interact by nesting, by calling ability and with the help of state numbers interchange. The system of interconnected automata forms is a system-independent part of software. At the same time system-dependent part is formed by functions of input and output actions, event handlers and so on. Another important feature of this approach is that automata in it is used thrice; for specification, for implementation (they stay in the source code) and for drawing up the protocol, which is performed. Last property allows to verify the propriety of automata system functioning. Logging is performed automatically, it is based on the created program. This mechanism could be also used for large scale tasks and for a task with difficult, smeared software logic. 130 Any drawn up protocol could be considered as the action script. For the large tasks it is impossible to use sequence diagrams, cooperation diagrams, which are parts of UML language. That is because usage of UML language listed diagrams are suggested to be drawn up manually on the phase of developing. In automatabased programming protocols will be build automatically at the run-time. Automata approach is offered to be used not only for controlling system developing, but also for objects of control modeling. This method was approved on the task of developing of controlling system for a ship diesel generator. Mentioned system was specified with help of more than thirteen interacting automata. For describing of a model of the diesel generator automata was also used, while designing each automaton was provided with four following documents: • verbal description ("expectancies declaration"); • bonds scheme, which explains on the human language all symbols which are involved in automatons interface; • state transition graph with symbolic indication of events, input and output actions; • source code of program module, which realizes state transition graph (also without usage of meaningful identifiers and comments). These documents replace self documenting programs, which contains meaningful identifiers and comments. These standard facilities cannot ensure understandability and clearness of the source code for further developing, modifying and enlarging. This problem for difficult logic cannot be solved also with the help of self documenting state transition graphs. Tins project had been implemented for computing system with architecture ix86. Henceforward described approach was evolved by N.I. Tukkel developing systems for micro-controllers. Advantage of automata technology is that all design may be done on personal computer using Switch-technology and only on last phase of developing software could be ported to a microcontroller. 131 Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. Has a great attention been paid in recent years? 2. Have these systems special requirements for the quality of software? 3. Could this method be considered as a type of synchronous programming? 4. The term event in programming has been used wider and wider in programming, hasn't it been? 5. Were formal methods of program developing for such kind of devices offered? 6. Did henceforth automata approach spread to the event based systems? 7. Any real-time operating system used as an environment, didn't it? 8. Did this method approve on the task of developing of controlling system for a generator? 9. Did mentioned system specify with help of more than thirteen interacting automata? Task 3. Make up the sentences: Задание 3. Сопоставьте левую и правую колонки так, чтобы получились предложения: • That is why, the sort of programming • paid to the development of the technology of programming for the embedded • These methods are systems and real-time systems. • could be considered as a type of • In recent years great attention has been synchronous programming. • creation could be named "automata • This method software design". • which is based on this term was called 132 • Automata in such a system "automata-based programming" in paper. • So the process of software • can interact by nesting, by calling ability and with the help of state numbers inter change. • based on the giving specification for the developing project with the help of set of connected transition graphs. Task 4. Find the sentences with the words and word — combinations given below in the text: Задание 4. Найдите в тексте предложения, содержащие нижеследующие слова и выражения: • a technology of programming • synchronous programming • a software development • computing devices • a searing mode • input actions • an automata system • standard facilities • a computing system Task 5. Complete the sentences according to the text: Задание 5. Закончите предложения: 1. These systems have ... . 2. Nowadays a technology is been ... . 3. The term event in the programming has been …. . 4. In work formal methods ... . 133 5. These methods are based ... . 6. ... it is based on the created program. 7. This paper describes ... . 8. ... which contains meaningful identifiers and comments. 9. Any drawn up protocol could be .... . 10. This project had been ... . Task 6. Are the sentences given below true or false? : Задание 6. Определите истинность или ложность следующих предложений: 1. These methods could be considered as a type of synchronous programming. 2. That is why the sort of programming, which is based on this term was called "state-based programming" in paper. 3. That is why the technology of "state-based programming" in paper was called as "switch-technology". 4. So this king of programming was called as "state-based programming". 5. After addition of the term "output action", the term "input action" could be brought in. 6. Using offered approach, programming is to be performed using the concept of "state" and of "flag variables". 7. Henceforward described approach was evolved by N. I. Tukkel developing systems for microcontrollers. 8. In automata-based programming protocols will be build automatically at the real-time. Task 7. Make up the sentences: Задание 7. Составьте предложения: 134 1. Event, the, the, has, term, in, used, been, programming, and, wider, in, programming. 2. The, after, of, term, "automaton", brought, be, addition, "output action", the, term, could, in. 3. This, been, for, project, system, had, with, ix86 architecture, implemented, computing. 4. Of, is, advantage, that, may, all, technology, be, personal, on, automata, design, done, using, computer. Task 8. Make the sentences negative and interrogative: Задание 8. Преобразуйте следующие предложения в вопросительную и отрицательную форму: 1. In recent years a great attention has been paid to the development of the technology of programming for the embedded systems and real - time systems. 2. The process of software creation could be named "automata software design". 3. This allows to introduce in programming the term "program observability". 4. It allows to understand and specify the task and its parts better. 5. The technology of "automata-based programming" in paper was called as "Switch-technology". 6. In 1996 Russian Fund for Fundamental Investigations in the context of publishing project N° 96-01-14066. 7. Henceforth automata approach was spread to the event-based (reactive) systems. 8. Last type of interaction is described in work. 9. Last property allows to verify the propriety of automata system functioning. 10. Logging is performed automatically. 135 11. This mechanism could be also used for large scale tasks. 12. Mentioned system was specified with help of more than thirteen interacting automata. 13. These documents replace self documenting programs. 14. This project had been implemented for computing system with architecture ix86. LESSON 32 PROGRAMMING LANGUAGES [2] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: 1. In order to communicate with each other, men use languages. In the same way, 'languages' of one sort or another are used in order to communicate instructions or commands to a computer. 2. When the user wishes to communicate with the computer, he uses a spectrum of languages. Let us discuss the three lowest members of this spectrum, beginning with the first three from the bottom: machine language, mnemonic machine language, and assembly language. 3. A machine language which is sometimes called as a basic programming language or autocode refers to instructions written in a machine code. This machine code can be immediately obeyed by a computer without translation. The machine code is the coding system adopted in the design of a computer to represent the instruction repertoire of the computer. The actual machine language is generated' by software, not a programmer. The programmer writes in a programming language which is translated into the machine language. 4. A mnemonic machine language uses symbolic names for each, part of instruction that is easier for the programmer to remember than the numeric code 136 for the machine. A mnemonic is an alphanumeric name, usually beginning with a letter rather than a number to refer to fields, files, and subroutines in a program. For example, the operation 'multiplication' might be represented as MULT, the 'load' instruction as L, DISP NAME ADDR in the mnemonic form means 'display name and address', etc. 5. An assembly language is the most machine-dependent language used by programmers today. There are four advantages to using an assembly language rather than machine language. They are the following: 1) it is mnemonic, e.g.,1 we write ST instead of the bit configuration 0101 0000 for the STORE instruction; 2) addresses are symbolic, not absolute as in a machine language; 3) reading is easier; 4) introduction of data to a program is easier. 6. A disadvantage of assembly language is that it requires the use of an assembler to translate a source program into object code (program) in order to be directly understood by the computer. The program written in assembly language is called an assembler. The assembler usually uses such instructions as A (ADD), L (LOAD), ST (STORE), START, TEST, BEGIN, USING, BALR (Branch And Link Register), DC (Define Constant), DS (Define Storage), END, etc. Let us consider some of them. 7. The USING instruction is a pseudo-op. A pseudo-op is an assembly language instruction that specifies an operation of the assembler; it is distinguished from a machine-op which represents to the assembler a machine instruction. So, USING indicates to the assembler which general register to use as a base and what its contents will be. This is necessary because no special registers are set aside for addressing, thus the programmer must inform the assembler which register(s) to use and how to use them. Since addresses are relative, he can indicate to the assembler the address contained to the base register. The assembler is thus able to produce the machine code with the correct base register and offset. 8. BALR is an instruction to the computer to load a register with the next address and branch to the address in the second field. It is important to see the distinction between the BALR which loads the base register, and the USING which 137 informs the assembler what is in the base register. Hence, USING only provides information to the assembler but does not load the register. Therefore, if the register does not contain the address that the USING says it should contain, 'a program error may result. 9. START is a pseudo-op that tells the assembler where the beginning of the program is and allows the user to give a name to the program, e.g., it may be the name TEST. END is a pseudo-op that tells the assembler that the last card of the program has been reached. 10. Note that in the assembler instead of addresses in the operand fields of the instruction there are symbolic names. The main reason for assemblers coming into existence was to shift the burden2 of calculating specific addresses from the programmer to the computer. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. Which languages are the best for machine? 2. Which languages are the best for programmer? 3. What language do you call a machine language? 4. What advantages to using the assembly language do you know? 5. What is a disadvantage of the assembly language? 6. Which program can the computer directly understand? 7. What is a source program? 8. What is an object program? Task.3. Find the English equivalent for the words given below in the text: Задание 3. Найдите эквиваленты следующих слов в тексте: Для того чтобы, перемещать, сборщик, требовать, автокод, нижняя часть, ссылаться на, представлять, причина, ошибка, позволять. 138 Task 4. Translate the following words given below into Russian: Прочтите следующие слова и словосочетания и переведите их на русский язык: obey, assembly, wish, distinction, base register, mnemonic, subroutines, distinguish, multiplication, display name and address, hence, load, operand fields. Task 5. Make the sentences interrogative: Задание 5. Поставьте следующие предложения в вопросительную форму: 1. When the user wishes to communicate with the computer, he uses a spectrum of languages. 2. The main reason for assemblers coming into existence was to shift the burden2 of calculating specific addresses from the programmer to the computer. 3. BALR is an instruction to the computer to load a register with the next address and branch to the address in the second field. 4. The assembler is thus able to produce the machine code with the correct base register and offset. 5. A disadvantage of assembly language is that it requires the use of an assembler to translate a source program into object code (program) in order to be directly understood by the computer. Task 6. Use the right prepositions and fill in the blanks: Задание 6. Вместо пропусков вставьте соответствующие предлоги, слова из текста: In order to, from, with, of, for, by, in 139 1. The actual machine language is generated …… software, not a programmer. 2. The program written …… assembly language is called an assembler. 3. ……. communicate with each other, men use languages. 4. Let us discuss the three lowest members …… this spectrum, beginning …….. the first three …….. the bottom: machine language, mnemonic machine language, and assembly language. 5. This is necessary because no special registers are set aside ….. addressing. LESSON 33 MEMORY OR STORAGE UNIT [2] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: 1. The part of а digital computer which stores information is called storage 0or memory. The computer's memory stories the numbers to be operated on; it stores intermediate results that are generated during the course of а computation; and it stores the final results. The instructions themselves are also stored in the computer's memory. 2. There аге two important factors about the memory unit: an access time and а capacity. The time required to transmit one computer word out of the memory to where it will be used is called the memory access time; it usually amounts to a few millionths of а second or less in modern fast computers. The speed of modern computers is the speed of access to their memories. The capacity of а computer is the quantity of data that its memory unit can hold. 3. There are many ways of memorizing information in memory cells of а digital computer. External memory or storage units may use magnetic tapes, magnetic drums, magnetic disks and floppy disks. The magnetic drum and magnetic disk are called а Direct Access; or Random Access, Storage Device 140 (DASD). 4. The magnetic disk is very similar tо the magnetic drum but is based upon the use of а flat disk with а series of concentric circles of magnetizable material, one read/write head being for each concentric circle, i.e., for each track. Memory units on magnetic disks may store more than 100,000,000 bytes. The magnetic disk is illustrated in Figure 1. 5. Internal or main memory units were constructed of magnetic cores about 8 hundredths of an inch in diameter, each core storing one 'yes' or 'no', that is, each соrе representing one bit of information. 6. Information that is stored inside а computer is stored in registers, electronic units of hardware in which the positioning of physical objects stores information. Each register holds one machine word consisting usually of 32 bits or 4 bytes. Registers hold information temporarily during processing. The slower models of registers use magnetic cores; the faster models use special electronic circuits or film memory devices. 7. Usually the registers are of three types: 7.1. General-Purpose Registers are sixteen registers, each being able to contain one word. These registers are used for storing the integer operands taking part in binary arithmetic operations. 7.2 Floating-Point Registers are four registers, each being able to contain а doubleword. These registers hold the operands taking part in arithmetic operations on floating-point numbers. 7.3. Control Registers form а group of registers differing from one model to another. 8. The development of semiconductor integration technology has led to creation of memories on LSI circuits. For constructing memory units on LSI circuits either dipolar or MOS memory are used. The access time of bipolar memory is about 100 nanoseconds, while the access time of MOS memory is 500 nanoseconds. But on the other hand the density of memorizing elements allocation in the latter is very high and amounts to 4 thousand memorizing elements for one 141 chip. The latest achievements of modern electronics are creation of memories on electronic circuits made by spraying layers of different memorizing materials. 9. Nowadays the main memory RAM which is regularly used in microcomputers can accept new instructions or information from а peripheral device. Terms synonymous with the computer's working memory RAM are: соrе, соrе storage, main memory, main storage, primary storage, read / write memory. Other memories, such as ROM or PROM, which are used in microcomputers as well, store instructions or information permanently. ROM, PROM, EРRОМ, and EEРRОМ are all together called firmware which is 'hard' software. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What is the general purpose of the memory or storage unit? 2. What information is stored in the computer memory? 3. Where is information stored inside the computer? 4. What is the memory access time? 5. What ways of memorizing words in а computer do you know? 6. What has led to creation of memories on LSI circuits? 7. What are the latest achievements of modern electronics? 8. What memories are used in microcomputers? Task 3. Find the Russian equivalents for the words and word-combinations given below in the text: Задание 3. Найдите в тексте эквиваленты следующих слов и выражений: the numbers to be operated on, а magnetic core, an access time, а computer's memory, intermediate results, Large Scale Integration, during processing, by spraying layers, the latest achievements, floating-point numbers. 142 Task 4. Make the sentences interrogative: Задание 4. Поставьте следующие предложения в вопросительную форму: 1. The development of semiconductor integration technology has led to creation of memories on LSI circuits. 2. The latest achievements of modern electronics are creation of memories on electronic circuits made by spraying layers of different memorizing materials. 3. There аге two important factors about the memory unit. 4. Internal or main memory units were constructed of magnetic cores. 5. The magnetic disk is very similar tо the magnetic drum. LESSON 34 MONITORS [2] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: Computer Monitors are similar to televisions because they both display images on a screen. Monitors are used more than any other part of a computer, yet many people treat them as an afterthought when purchasing a computer. Don't! Regardless of what you're doing on your computer, you're staring at the monitor. Therefore, shop for a good monitor that's easy to look at and won't cause eye strain. Monitors come in various sizes usually ranging from 14" to 21" and above and are usually referred to by their size. For example: most people have 15" or 17" SVGA color monitors. The size of a monitor is based on the diagonal distance from one corner of the monitor tube to the other. This doesn't mean the visible part of the monitor tube, but rather the actual corner of the tube. Therefore, you may see a monitor that is labeled as 14", but the visible part of the tube is less than 14". In monitors, this is perfectly normal, and almost every 143 manufacturer labels or sizes them this way regardless of the size. So when you're looking for monitors, don't be too shocked when your monitor turns out to be a little smaller than the name or label implies. If you're curious, most television manufacturers refer to their television by the size of the display (corner to corner) that is actually showing and not by the tube's actual size. The "Dot Pitch" of a monitor is very important because this number indicates how clear the image on your monitor will be. Have you ever adjusted the focus on a camera so it's almost right, but not quite, and the picture doesn't look as good as it could? This is how the dot pitch works. The lower the dot pitch number, the better the image will be. The dot pitch, measured in millimeters, actually indicates how close the dots (that make up the letter or image on the screen) are together. An average dot pitch is 0.28 while and 0.26 or 0.25 is considered great so pay attention to the numbers. Therefore, when you're shopping for monitors (or the monitor that comes with the computer) look at the dot pitch because monitors with a poor or less than average dot pitch will appear out of focus and may cause eye strain. In the last couple of years, monitor manufacturers have begun producing what is called "Flat-Square tube" monitors (also called Flat screen monitors). There are several advantages of flat tube monitors compared to curved tube monitors and they are as follows: 1. Less glare on the front on the monitor 2. More accurate colors along the edges or corners of the monitor front 3. More stable graphics along the edges or corners of the monitor front 4. A more realistic image (especially with highly graphical images) If you can purchase a flat screen monitor for little or no difference in price then do it. Whether you realize it or not, your television actually displays the image by a combination of vertical and horizontal lines. This is called resolution and all televisions and computer monitors use this to display what you see. Your television has one resolution, and it adjusts everything to that resolution so all the 144 images you see fit nicely on your television screen. However, most computer monitors can display or use many resolutions, and are therefore more flexible to display many different types of images. Higher resolutions (more lines on the screen) give you more detailed images while lower resolutions give you less detailed images. When you're looking at resolutions they are usually written as horizontal lines by vertical lines (640 x 480, 800 x 600, and 1024 x 768). When it's time to shop for a monitor (or the monitor that comes with your computer) you'll need to pay attention to what resolution the monitor can handle. When shopping for monitors you're likely to see the letters VGA and SVGA written everywhere. These letters simply indicate the type of monitor it is and what resolutions the monitor is capable of displaying. VGA (Video Graphics Array) is a standard that IBM developed some years ago for displaying information on the monitor in a certain way and resolution. VGA by default uses a resolution of 640 x 480. SVGA (Super Video Graphics Array) is a newer standard based on VGA that gives you a higher resolution of 800 x 600. SVGA is considered absolutely the bare minimum for any monitor buyer these days. Today's monitors can handle resolutions higher than the SVGA resolution (800 x 600), but they're still called SVGA. The Vertical Refresh Rate (also called a vertical scan rate) indicates the number of full screens the monitor can "paint" in one second. The vertical refresh rate is often written in terms of Hz such as 72Hz. Since most humans can perceive a "flicker" effect when the vertical refresh rate drops to or below 60Hz, you should buy a monitor that can display a minimum of 72Hz in every resolution (at least the standard three resolutions mentioned above).The more resolutions your monitor can handle, the more flexible it will be to do the things your want. Most monitors today will do this, but not all, so be careful. The net effect of using a monitor with a vertical refresh rate of 60 Hz or less is sometimes headaches and eyestrain. Better quality monitors are now supporting even higher resolutions such as 1280 x 1024 or 1600 x 1280. These resolutions pack so much information on the 145 screen at once that you will usually need a larger (17" or above) monitor to appreciate the fine detail you'll see. Task 2. Answer the following questions: Задание 2.Ответьте на следующие вопросы: 1. Why is it very important to choose a monitor that you are buying very carefully? 2. What important characteristics of monitors do you know? 3. Do you have a computer at home? What kind of monitor have you chosen for it and why? 4. What health dysfunctions can a monitor with vertical refresh rate less then 60Hz or equal cause? Task 3. Use the right prepositions and fill in the blanks: Задание 3. Заполните пропуски предлогами: 1. There are several advantages of flat tube monitors compared … curved tube monitors. 2. The size of a monitor is based … the diagonal distance from one corner of the monitor tube to the other. 3. When shopping … monitors you're likely to see the letters VGA and SVGA written everywhere. 4. The letters VGA and SVGA indicate the type of monitor and what resolutions the monitor is capable … displaying. 5. Monitors come in various sizes usually ranging from 14" to 21" and are usually referred … by their size. Task 4. Find the Russian equivalents for the words and word-combinations given below: 146 Задание 4. Дайте русские эквиваленты следующим словосочетаниям: Dot Pitch, "Flat-Square tube" monitors, curved tube monitors, resolution, Vertical Refresh Rate, by default, dot pitch number, vertical scan rate, a “flicker” effect, flat screen monitors. Task 6. Say what these abbreviations mean: Задание 6. Расшифруйте следующие аббревиатуры и переведите их на русский язык: VGA, SVGA, Hz, IBM. Task 7. Translate these words into Russian: Задание 7. Дайте определения следующим словам на английском языке: Resolution, monitor, screen, dot pitch, vertical scan rate. Task 8. Retell the text: Задание 8. Изложите главную идею текста (5-7 предложений). Постарайтесь осветить следующие пункты: 1. Sizes. 2. Dot Pitch. 3. Flat screen. 4. Resolution. LESSON 35 THE MOUSE [2] 147 Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: The Mouse device is а practical aid for facilitating work with your РC. Also the Mouse is an effective and fun 1001 for your computer. If you have never used а computer before the Mouse will speed your learning process. If you are an experienced user, you will be amazed at the increased speed, ease and pleasure. The Mouse provides the cursor control thus simplifying orientation on the display with user complex programs. When personal computers first became popular, the most common device used to transfer information from the user to the computer was the keyboard. However when the more advanced graphics became to develop users found that а keyboard did not provide the design capabilities of graphics and text representation on the display. The Mouse is an opto-mechanical input device. The Mouse has three or two buttons which control the cursor movement across the screen. Each software program uses these buttons differently. The Mouse's primary functions are to help user to draw, point and select images on your computer display by moving your Mouse across the screen. In general software programs require to press one or more buttons sometimes keeping them depressed or double-click them to issue changes in commands and to draw or to erase images. When you move the Mouse across а flat surface, the ball located on the bottom side of the Mouse turns two rollers. One is tracking the Mouse's vertical movements, the other is tracking horizontal movements. The Mouse has economically designed so it fits comfortably in your hand. The Mouse slopes gently towards the front, so your fingers rest comfortable on the three buttons which respond easily, and click when pressed. Especially this feature is helpful when you must "double-click" the buttons to 148 activate commands. The rotating ball glides easily, giving the user good control over the textual and graphical images. Hardware installation is required to utilize your mouse. There are some precautions to take so do the following steps in the order shown. 1. Turn off all the power to your computer and its peripherals. 2. Select а serial port (СОМ 1 or СОМ2) which is not in use. 3. Find the connector of the compute designed for the unused serial port. This connector must be the standard one in order, to connect it with the standard mouse. 4. Remove the mouse from the package. There is а connector on the end of the cable opposite the mouse. 5. Plug the connector on the mouse's cable into the 9-25 pin connector on the computer. The two connectors are polarized and so will only fit together one way. Installation of the hardware is the first step for using your mouse. Now the software you have that сan utilize а mouse must be told there is а mouse and what kind of mouse it is. The software procedure is completely dependent on the program being used. In general, you will find an INSTALL or MODIFY or СОNFIG or MOUSE рprogram that permits you to modify certain characteristics of а given program. The mouse is also known as а "digitizer" which may help you with programs. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What is the Mouse? 2. What does the mouse provide? 3. How many buttons does the mouse have? 4. What controls the cursor movement across the screen? 5. Are there any precautions to work with the mouse? 6. What are the Mouse's primary functions? 149 Task 3. Give the synonyms and antonyms to the words given below: Задание 3. Подберите в тексте синонимы и антонимы данным словам: supply, great, device, data, help, equipment, to astonish, slightly, program, output,to decrease, always, inexperienced, to loose, to forbid, to fix. Task 4. Which sentences are false according to the text? : Задание 4. Прочтите данные предложения и укажите, какие предложения соответствуют содержанию текста, а какие неверны: 1. The Mouse gives users very small freedom of the option. 2. The Mouse provides the cursor control thus simplifying orientation on the display user complex programs. 3. However when the more advanced graphics became to develop users found that а keyboard provides the design capabilities of graphics and text representation on the display. 4. The Mouse's primary functions are to help user draw, point and select images on your computer display by moving your Mouse across the screen. Task 5. Complete the sentences according to the text: Задание 5. Закончите предложения ниже, выбрав правильный вариант слова: keyboard, device, aid, РС, gives, freedom, transfer, user buttons, movement, screen 1. Usually every computer is provided by а .... . 2. The Моusе ... is а practical ... for facilitating work with your ... . 3. The Mouse device ... users large ... of the option. 4. When personal computers fist became popular the most common device 150 used to ... information from the ... user to the computer was the keyboard. 5. The Mouse has three or two ... which control the cursor across the .... . LESSON 36 INFORMATION, MACHINE WORDS, INSTRUCTIONS, ADDRESSES AND REASONABLE OPERATIONS [2] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: 1. Information is а set of marks or signs that have meaning. These consist of letters or numbers, digits or characters, typewriter signs, other kinds of signs, and so on. А computer reacts differently to different digits or characters, and reacts to them as units that have meaning. For example, information for an аnаlоg computer has to be in the form of distances, or rotations, or voltages, or other physical variables. And for а digital computer information has to be in the form of digits or numbers. 2. Any information may be represented by the binary system including two digits: one (1) and zero (О). Each 1 and 0 is а separate binary digit called а bit. А bit is the smallest part of information. Bits are typically grouped in units that are called bytes. А byte is the basic unit of information used in modem computers and consists of eight bits. 3. The bytes are handled usually in standard groups called machine words or just words. There are two basic types of information or words that can be put into а mеmоrу cell or location: words that are numerical quantities and words that are Computer instructions. Regularly, an instruction to the machine is expressed as а word; and so the same set of characters may have meaning sometimes as а number, sometimes as an instruction. А speed of 96,000 characters per second is the same as а speed of 8,000 words per second. Most human beings could not take even 12digit number per second. 151 4. Physically the set of bits is а set of arrangements of some physical equipment. One of the ways of storing information in а computer is storing by using а set of small magnetically polarized spots (пятна) on а magnetic surface. 5. The computer is told what operations to perform by means of instructions. An instruction is а command to the computer. It consists of а verb (an operational code), and а noun (an operand). For example, if the computer is instructed "Add 365 the number of times (раз) stated in the register R", and if the register R stores the code for number 3, then the computer will perform that operation three times. An instruction word looks like а number, and there is no way to tell from the word itself whether it is а quantity or an instruction. The computer must be told exactly (точно) which address contains an instruction and which contains а quantity. 6. An address is the name of particular memory location or cell. Each memory location (word or byte) has its own unique address or number just like а post office box. For example, if the computer contains 100 memory cells, their respective address might be the numbers from 1 to 100 (or 0 through 99). And instead of saying "А word is in а memory cell", the computer personnel say, "The contents (содержимое) of an address is а word." 7. Reasonable operations are mathematical and logical. Mathematical operations include arithmetic and algebraic operations. Arithmetic operations are addition, subtraction, multiplication, division, taking а square root, etc,; and algebraic operations are called raising to а power as well as differentiating and integrating. 8. Logical operations include comparing, selecting, sorting, matching, etc. These are operations which may be performed either on numbers, or on expressions consisted of letters such as ordinary words. А very important logical operation performed by а computer is determining, i.e., which of two operations is to be performed next. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 152 1. What is information? 2. What does а set of marks consist or? 3. What is one of the ways of storing information in а computer? 4. What is а byte? 5. What is a bit? 6. How many bits does а byte usually contain? 7. What is an instruction? 8. By means of what is the computer told what operations to perform? 9. What are machine words? 10. What does а machine word consist or? 11. What are addresses? 12. What is reasonable operation? 13. What do mathematical operations include? 14. What do logical operations include? 15. In what system is information represented for the modern electronic computer? 16. What are the two basic types of words that are put into а memory? Task 3. Find the English equivalents for the words given below in the text: Задание 3. Найдите в тексте английские эквиваленты следующих выражений: физическое оборудование, скорость в секунду, численные величины, численные измерения, двоичная система, любая информация, один из способов, особая ячейка памяти, используя физические анaлогии, другие физические переменные. Task 4. Find the antonyms in the (a) group and the synonyms in the (b) group: 153 Задание 4. Найдите синонимы в группе слов (а), антонимы в группе слов (б), и переведите их: а) to perform; to compute; to take in; а figure; to arrange; to show; to carry out; а digit; to calculate; little; to display; small; to receive; to position; instruction; data; location; command; information; cell; b) inside; to the right; addition; multiplication; simple; to the left; l division; outside; small; complex; big; subtraction; differentiating; at the right; integrating; at the left; the right-hand column; the left-hand column. Task 5. Complete the following sentences: Задание 5. Закончите следующие предложения: 1. Information is а set of marks or signs that …….. . 2. Reasonable operations are …... . 3. Logical operations include ... . 4. А very important logical operation is ...... . 5. Physically the set of bits is а set of arrangements of some ....... . 6. Determining means which of two operations is to be performed ..... . 7. The computer must be told exactly which address contains ... and which contains .... . 8. The computer is told what operations to perform by means of ... . 9. Any information may be represented by the binary systems including two digits: ... and... . 10. А bit is the smallest part of ..... . LESSON 37 FROM CALCULI TO MODERN COMPUTER [2] Task 1. Read and translate the text: 154 Задание 1. Прочитайте и переведите текст: Although the first modern automatic computers began to work in 1944, the story of the development of ideas, devices, and machines entering into that automatic computer goes back a long time into the past. Problems of calculating with numbers, and recording numbers, have pressed upon human beings for more than five thousand years. Probably the first of the ideas to deal with numbers is the idea of using small objects, such as pebbles, seeds, or shells, to count with, to supplement the fingers. People, however, find it troublesome to count only in units-it takes too much time and effort. So early a second idea appears: the idea of composing a new unit equal to ten of the old units. The source of this idea is clearly the fact that a man has ten fingers; with this idea you could designate 87 by referring to all the fingers Of 8 men, and than 7 more fingers on one more man. In order to deal with numbers in their physical form of counted objects, a third idea appears: a specialized, convenient place upon which to lay out the counted objects. Such a place may be a smooth piece of ground, slab of stone, or a board. It becomes convenient to mark off areas on the slab according to the size of unit you are dealing with-you have one area for or- binary units, one area for tens, one area for hundreds, and so on. These developments gave birth to the abacus, the first computing machine. This device consisted of a slab divided into areas, and a supply of small stones for use as counters or objects to keep track of numbers. The Greek word for slab was abax, and the Latin word for the small stones was calculi, and so the first computing machine, the abacus was invented, consisting originally of a slab and counting stones, and later on, a frame of rods strung with beads, for keeping track of numbers while calculating. The system of numbering and the abacus go hand in hand together. The abacus is still the most widely used computing machine in the world. Then appeared the Arabic positional notation for numerals which reached Western Europe in the 1200's. Just as the small counting stones or calculi could be used in any area on the slab, so the digits 1, 2, 3, 4, 5, 6, 7, 8, 9 could be used in any 155 position of a numeral. Just as the position on the slab answered the question as to whether units, tens, hundreds, etc., were being counted so the place or column or position of the digit (as in 4786 with its four places) answered the question as to what kinds of units were there being counted. And-this was the final key idea-just as a place on the slab could be empty, so the digit 0 could mark "none" in place or column of a number. That idea, by the way, required centuries to develop. The Romans did not have a numeral for zero; but about 300 B.C. in Babylon a symbol for zero was used. Then the Hindus developed the numerical notation that we call Arabic The Arabs used the word "sifr" meaning "vacant" about 800 A.D. for "zero" . About 1200 A.D. the Arabic word was translated into Latin giving rise subsequently to the two English words "cipher" and "zero". The first machine which would add numbers mechanically was invented by the French mathematician and philosopher Blasé Pascal in 1642. It contained geared counter wheels which could be set at any one of ten positions from 0 to 9. Each gear had a little tooth for nudging the next counter wheel when it passed from 9 to 0 so as to carry 1 into the next column. Some 30 years later, in 1673, another mathematician, G.W. Leibnitz, invented a device which would control automatically the amount of adding to be performed by a given digit, and in this way he invented the first multiplying machine. Pascal's and Leibnitz's machines and their improved successors have given rise to electric-powered but hand-operated adding machines and desk calculating machines which are found throughout offices today. The idea of an automatic machine which would not only add, subtract, multiply, and divide but perform a sequence of steps automatically, was probably first conceived in 1812 by Charles Babbage, a professor of mathematics at Cambridge University, England. Babbage intended that his machine should compute the values of the tabulated mathematical functions and print out the results. No attention would be needed from the human operator, once the starting data and the method of computation had been set into the machine. 156 Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. When did the first computers begin to work? 2. What was the first idea to deal with numbers? 3. What was a second idea? 4. What is a third idea according to the text? 5. What is the Greek word for slab? 6. Is the abacus still used? Task 3. Find the English equivalents for the words given below in the text: Задание 3. Найдите эквиваленты следующих слов в тексте: Причиняющий беспокойство, разграничить, равный, механизм, пластина, намереваться, последовательность, приложение, свободный, счеты. Task 4. Translate the following words into Russian: Задание 4. Прочтите следующие слова и словосочетания и переведите их на русский язык: Device, record, object, supplement, however, troublesome, compose, equal, source, designate, refer to, to deal with, smooth, convenient, according to, abacus, slab, frame. Task 5. Make the sentences interrogative: Задание 5. Поставьте следующие предложения в вопросительную форму: 1. The first machine which would add numbers mechanically was invented by the French mathematician and philosopher Blaise Pascal in 1642. 157 2. The Romans did not have a numeral for zero. 3. That idea, by the way, required centuries to develop. 4. Then appeared the Arabic positional notation for numerals5 which reached Western Europe in the 1200's. 5. The first modern automatic computers began to work in 1944. Task 6. Fill in the blanks with the following words given below: Задание 6. Вместо пропусков вставьте соответствующие слова из текста. Idea, abacus, hand, troublesome, goes back 1. The development of ideas, devices, and machines entering into that automatic computer ……….. a long time into the past. 2. The source of this ……… is clearly the fact that a man has ten fingers. 3. People, however, find it ……… to count only in units-it takes too much time and effort. 4. These developments gave birth to the ……….. . 5. The system of numbering and the abacus go hand in …….. together. LESSON 38 MINIATURIZATION [2] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: There are several advantages in making computers as small as one сan. Sometimes weight is particularly important. А modern aircraft, for example, carries quite, а load of electronic apparatus. If it is possible to make any of these smaller, and therefore lighter, the aircraft can carry а bigger load. This kind of consideration applies to space satellites and to all kinds of computers that have to 158 be carried about. But weight is not the only factor. The smaller the computer the faster it can work. The signals go to and from at а very high but almost constant speed. So if one can scale down all dimensions to, let us say, one tenth, the average lengths of the current - paths will be reduced to one tenth. So, very roughly speaking, scaling down of all linear dimensions in the ratio of one to ten also gives а valuable advantage, the speed of operation is scaled up 10 times. Other techniques allow even further speed increases. The increase of operation is а real advantage. There are some applications in which computers could be used which require very fast response times. Many of these are military, of course; but most military applications also have applications in engineering sooner or later. For example, automatic blind handing of aircraft requires continuous computer calculations which result in control of the aircraft flight. The more immediate the responses are, the more stable that control сan be. Another advantage is that less power is required to run the computer. In space vehicles and satellites this is an important matter; but even in а trial application we need not waste power. Sometimes а computer takes so much power that cooling systems which require still more power has to be installed to keep the computer from getting too hot, which would increase the risk of faults developing. So а computer which does not need to be cooled saves power on two counts. Another advantage is reliability. Mini-computers have been made possible by the development of integrated circuits. Instead of soldering bits of wire to join separate components such as resistors and capacitors sometimes in the most intricate networks, designers сan now produce many connected circuits in one unit which involves no soldering and therefore no risk of broken joints at all. And now that transistors and other solid-state devices are used instead of valves, printed circuits with their solid-state components have а very long life indeed. А computer can be built up of large numbers of similar units of this kind. Repair of the old kind (with soldering iron and so on) is no longer needed. If one of the component circuits develops а fault, all that is needed is to locate the 159 faulty unit, throw it away and plug in new one. All these devices, small as they may be to the eve when hundreds of circuits can be packed on to one square inch, асе still much larger than they need be to do the jobs they have to do. So the problem is one of finding ways of making these complicated patterns automatically very precisely and yet smaller and smaller. The limit is а long way off yet. Human brains have more than 100 million cells per cubic centimeter but there is no reason to think that we cannot pack solid-state devices more densely than this. Computers could then easily be built up from these microminiaturized components to have data stores or memories as large as are needed for any job one could imagine. The main problem of very large stores is finding one's way about them, but i they are large in information capacity, but small in physical dimensions, with present-day techniques much time and cost сan be saved. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. Are there any advantages in making computers as small as one can? 2. Is it possible to make them smaller and lighter? 3. What is the speed of the computer? 4. The increase of operation is а real advantage, isn't it? 5. What are the advantages to run the computer? 6. What is the main problem in information capacity. Task 3. Find the Russian equivalents for the words and word-combinations given below in the text: Задание 3. Найдите русские эквиваленты следующим словам и выражениям: information capacity, aircraft flight, military application, cooling system, further 160 speed increases, fast response time, solid- state devices, continuous computer calculation. Task 4. Make the sentences interrogative: Задание 4. Поставьте следующие предложения в вопросительную форму: 1. There are several advantages in making computers as small as one сan. 2. Human brains have more than 100 million cells per cubic centimeter. 3. Mini-computers have been made possible by the development of integrated circuits. 4. The increase of operation is а real advantage. 5. Other techniques allow even further speed increases. LESSON 39 ARTIFICIAL INTELLIGENCE [2] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: "Artificial intelligence" is a metaphoric figure of speech designating an entire scientific trend which includes mathematicians, linguists, psychologists, engineers, and many other specialists. The essence of this trend is the intensification of man's creative activities with the aid of computers. Artificial intelligence (AT) is machine intelligence. It refers to applications of the computer which, in operation, resemble human intelligence. There are different categories of uses which all fall into the AI area. For example, robots or machines with sensory capabilities which detect and recognize sounds, pictures, etc, are one category. Another category is knowledge based systems, which contain a base of 161 knowledge about a subject and can assist us in solving problems. Knowledge based systems being developed from the experience of human experts are called expert systems and can perform such tasks as medical diagnoses. AI will encompass (охватывать) many areas that have not been easily solved using traditional hardware and software. AI will be incorporated into the 5th-generation computer systems. Then the average computer system should not require users to remember a lot of complex codes or commands. Rather, the user should ask: "Can you help me with this type of problem?" The master control program or operating system will be able to direct the user to the appropriate expert' system through questions and answers. AI programming is not magical; it does however imply a change in rules and methods for the traditional application programmer. Normal application programs follow a fixed algorithm: if this - do that. Given a set of input conditions, the output can be precisely determined. AI requires program design with more imagination. New methods of program organization and construction must be developed. AI programs may require the use of heuristic techniques, which are exploratory in nature and use trial and error methods. AI programs are often programmed in the LISP programming language, which allows the program designer to concentrate on the problem-solving logic more effectively than common languages like BASIC and COBOL. It is impossible in principle to develop an artificial intelligence as it is sometimes understood literally (буквально), because the human brain is a very sophisticated system composed of tens of billions of interconnected cells. Each cell is extremely complex in itself. A rather probable hypothesis says that an individual cell processes the signals penetrating it like a computer. Therefore, even the most sophisticated machine we may imagine cannot even be compared to the brain. Man created the machine to fulfill his own requirements. A machine cannot have either human feelings, desires or emotions. Can anyone imagine a machine in love with someone? And what about the experience a person receives during his life in 162 society through dealing all the time with purely human problems? A machine, in general, cannot think, either logically or figuratively. But nevertheless (тем не менее), the research trend of artificial intelligence will acquire ever greater importance as time goes by, because the programming and technical means of artificial intelligence will ensure us of the opportunity to associate directly with the machine without the aid of a huge crowd of engineers, economists, biologists, chemists, and many other specialists. The question of AI acquires special importance for economic planning and management. In conditions when production is becoming automated, management must become automated as well. One of the trends in AI now being intensively, developed is to design socalled thinking robots, capable of a certain amount of independent activities. The model of creative processes in computers gave birth -to the term "artificial intelligence". But that doesn't mean that the computers possess it. The "intelligence" has been packaged in it by an expert who developed the programme for solving some practical creative problem. Man differs from the machine in that he does not simply fulfill the programs stored in his memory, but also develops them himself, depending on the goals facing him. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What is artificial intelligence? 2. What are the categories of artificial intelligence? 3. Is it possible to develop an AI as it is understood literally? 4. Can a machine in general think logically or figuratively? 5. What does the question of AI acquire? 6. What is the difference between a man and a machine? 163 Task 3. Find the English equivalents for the words and word — combinations given below in the text: Задание 3. Найдите эквиваленты следующих слов в тексте: Искусственный, решение, творческий, способный, осуществлять, целый,сущность, помощь, соответствующий, цель, чисто (без примесей), гарантировать. Task 4. Translate the following words and word — combinations into Russian: Задание 4. Прочтите следующие слова и словосочетания и переведите их на русский язык: Capable, birth, solve, creative, differ, depend on, designate, resemble, encompass, incorporate, average, appropriate, application, determine, concentrate on, artificial. Task 5. Make the sentences interrogative: Задание 5. Поставьте следующие предложения в вопросительную форму: 1. The essence of this trend is the intensification of man's creative activities with the aid of computers. 2. Artificial intelligence (AT) is machine intelligence. 3. There are different categories of uses which all fall into the AI area. 4. Each cell is extremely complex in itself. 5. AI will encompass (охватывать) many areas that have not been easily solved using traditional hardware and software. Task 6. Fill in the blanks with the following words given below: Задание 6. Вместо пропусков вставьте соответствующие слова из текста: 164 Appropriate, cell, mean, penetrating, require, essence 1. The …….. of this trend is the intensification of man's creative activities with the aid of computers. 2. The master control program or operating system will be able to direct the user to the ………… expert' system through questions and answers. 3. But that doesn't ………….. that the computers possess it. 4. AI programs may ……………. the use of heuristic techniques. 5. A rather probable hypothesis says that an individual ……….. processes the signals ……………….. it like a computer. LESSON 40 NEWS IN THE COMPUTER FIELD [2] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: 1. Holography and Computer Memory. A new polymer to coat olographic plates - reoxane - has been developed in St.Petersburg. Reoxane will bring about many changes both in holography and in other areas - computers, for instance. These machines required devices with a huge memory capacity. It is now believed that holographic memory is more suitable for these purposes, as any data from it can be retrieved (зд. находить информацию) in a microsecond and the cost of this device will be comparatively moderate. The limit of reoxane memory has not been measured, but it is known that it is hundreds and possibly thousands of times larger than electronic memory. 2. Computing at the Speed of Light. A group of scientists of the Edinburgh University has been investigating the remarkable properties of an indium-antimony compound with a refractive index that varies with the intensity of light falling on it. They have found that a tiny increase in the light incidence can produce a large 165 change in the light emerging. This brighter emerging beam persists even when the triggering light beam is reduced again in brightness. In this way the crystal acts as a switch and "remembers" the triggering light impulses. The group has incorporated these properties into new computer components, which operate on low-powered laser beams and can respond in picoseconds. So the modern electronic computer may be replaced by much faster equipment that uses optical devices. In the future such computers which include these optical devices will be probably called the optical computers. 3. Current Injection Logic Circuits. Scientists from the IBM Company have invented a new family of experimental computer circuits. Called "current injection logic" circuits, they operate in 13 trillionths of a second taking 7 picoseconds to perform their switching function and another 6 picoseconds to send an electric signal from one circuit to another. In fact, the speed of an electrical signal moving between these new circuits is only limited by the speed of light. These circuits function at temperatures close to absolute zero (-273° Celsius), where many metals lose all resistance to electrical current flow. But these "superconducting" circuits operate three times faster than any of circuits previously developed. Because of their speed and low heat output, the new circuits promise a future generation of more powerful computers. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. Where has reoxane been developed? 2. What did these machines require? 3. What do you know about the reoxane memory? 4. What can a tiny increase in light incidence produce? 5. What did scientists call a first new family of experimental computer circuits? 166 6. Can the speed of an electrical signal moving between these circuits be limited? Task 3. Find the English equivalents for the words and word-combinations given below in the text: Задание 3. Найдите эквиваленты следующих слов в тексте: Огромный, емкость, свойства, луч, сравнительно, микросекунда, сопротивление, пусковое устройство, сверхпроводимость, сфера действия. Task 4. Translate the following words and word-combinations into Russian: Задание 4. Прочтите следующие слова и словосочетания и переведите их на русский язык: Holographic plates, require, capacity, suitable, purpose, retrieve, comparatively, measure, remarkable, tiny, reduce, incorporate, respond, resistance, previously. Task 5. Make the sentences interrogative: Задание 5. Поставьте следующие предложения в вопросительную форму: 1. The group has incorporated these properties into new computer components, which operate on low-powered laser beams and can respond in picoseconds. 2. The modern electronic computer may be replaced by much faster equipment that uses optical devices. 3. Scientists from the IBM Company have invented a new family of experimental computer circuits. 4. These machines required devices with a huge memory capacity. 5. Reoxane will bring about many changes both in holography and in other areas — computers, for instance. 167 Task 6. Fill in the blanks with the following words given below: Задание 6. Вместо пропусков вставьте соответствующие слова из текста: Powerful, memory, impulses, measured, suitable, increase, crystal, circuits 1. Because of their speed and low heat output, the new ……… promise a future generation of more ………… computers. 2. They have found that a tiny …….. in the light incidence can produce a large change in the light emerging. 3. In this way the ……….. acts as a switch and "remembers" the triggering light …………. . 4. The limit of reoxane memory has not been ………… ,but it is known that it is hundreds and possibly thousands of times larger than electronic ……… 5. It is now believed that holographic memory is more ………. for these purposes. LESSON 41 SOME FACTS ABOUT ROBOTS [2] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: It is estimated that by the end of the century the overwhelming majority of people will be occupied in science, education, administration and the service industry. Machines and robots will be the primary producers of material wealth. 1. A Robot Laboratory Assistant. When a research worker studies biological objects, the brain, for example, he has to operate with tremendous figures: 15 thousand million neurons, 150 thousand million interneuron elements. One cubic millimeter of blood has 5 million red blood cells. 168 Our scientists have developed a machine to count and determine these biological microobjects. This robot laboratory assistant does in one to three minutes the work that usually takes a month using conventional technique. This robot, besides counting the objects, also determines their size. 2. Robot Assists Surgeon. A cybernetic device which collects information on the main physiological processes taking place in the organism of a patient undergoing an operation has been made at one of St.Petersburg's clinics. A special screen shows the patient's pulse rate, blood pressure and body temperature. It has been decided to improve the device to give recommendations to the operator of artificial heart. A computer being assembled at the clinic, after collecting and processing all the necessary information about the patient, will be able to control a "heart-lung" apparatus automatically. 3. An Underwater Robot. An underwater robot with the TV camera, the first of its kind, has been successfully tested in our country. Intended for detailed studies of the ocean bed at depths as low as 4,000 meters, it was remote-controlled from the shore and could perform previously programmed operations. It could be given "hands" adjusted delicately enough to thread a needle underwater. 4. Sрасе Robots. Space research in our country opens up vast perspectives for robots, Artificial satellites are already circulating the globe. The orbital stations are added to them nowadays. This equipment involves maintenance, repair, part replacement and other jobs which cannot be planned beforehand. Spacecrafts fitted with robots are already in use. The great advantage of the space robots are that they need no life support. They could be left in orbit for ever (навсегда), or sent off in a moon vehicle (летательный аппарат) to explore some remote area without anyone worrying about9 whether it would come back or not. They are also very useful for repairing the outside of a spacecraft or for assembling a space station in orbit. 5. Artificial Man for Medical Students. Science fiction has become reality at a research laboratory in California with the creation of a 6 ft. 2 in. artificial man which breathes and blinks. 169 "Sim-l"-the first of a series of simulators - was created by several scientists from California universities. He is to serve as a "patient" for medical students. His inventors believe that increasingly complex Sims will be built, shortening from eight to six the number of years of study required for a medical degree. "Sim-1" human characteristics include ability to breathe, blink his eyes, open his jaws - which contain a full set of teeth - move his tongue and vocal cords and be affected by drugs in much the same way as a human being. Speech and mobility have not yet been built in, although the inventors say this would be no problem. 6. Robots on a Stroll. In 1910, news was received in Japan that a magic box (a robot using springs) was displayed at the World Exposition in London. This news captured the interest of a boy in the fifth form of an elementary school who started to construct his own robot of tin and cardboard. Ten years passed and the boy, now a young man of 21, had already received a patent for a robot Which could speak. This was the young Aizawa who, since then, has spent all his life in making toys. Aizawa has created 700 robots, ranging from 2 meters tall to those of only 30 centimeters. But he is particularly proud of eight of his creations, which are lifesize robot brothers. These eight robots not only walk, but also can shake hands, wink, bow, nod and talk. Numerous requests are received by Aizawa for the services of his eight robots, which are dispatched to children's halls and children's science museums. Aizawa brought out two of eight brother robots for a stroll outside his home. One is Goro. He is 165 centimeters tall and weighs 123 kilograms. The other is Hachiro, weighing 60 kilograms and 115 centimeters in height. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What will be the primary producers of material wealth by the end of the century? 170 2. What functions does the machine have, which our scientists have developed? 3. How does Robot assist a surgeon? 4. What can you say about underwater and space Robots? 5. What is “Sim — 1”? 6. What robot was displayed at the world Exposition in London? 7. What did you find out about Aizawa? Task 3. Find the English equivalents for the words and word — combinations given below in the text: Задание 3. Найдите эквиваленты следующих слов в тексте: Огромный, просьба, способность, клетка, подземные воды, мерцание, отдаленный, гордиться, лекарство, многочисленный, картон, определять. Task 4. Translate the following words and word — combinations into Russian: Задание 4. Прочтите следующие слова и словосочетания и переведите их на русский язык: Creatе, shake, wink, nod, request, dispatch, rate, pressure, intend, adjust, thread, maintenance, circulate, beforehand, science fiction, capture, wealth. Task 5. Make the sentences interrogative: Задание 5. Поставьте следующие предложения в вопросительную форму: 1. Aizawa brought out two of eight brother robots for a stroll outside his home. 2. Machines and robots will be the primary producers of material wealth. 3. He is particularly proud of eight of his creations. 171 4. This news captured the interest of a boy in the fifth form of an elementary school. 5. He is to serve as a "patient" for medical students. Task 6. Fill in the blanks with the following words from the text given below: Задание 6. Вместо пропусков вставьте соответствующие слова из текста: Equipment, artificial, temperature, rate, improve, advantage, orbital, pressure 1. The great …….. of the space robots are that they need no life support. 2. This ……… involves maintenance, repair, part replacement and other jobs. 3. A special screen Shows the patient's pulse …….., blood …… and body ……….. . 4. The …………. stations are added to them nowadays. 5. It has been decided to …………. the device to give recommendations to the operator of …………. heart. LESSON 42 ROBOTICS AND ROBOT GENERATIONS [2] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: Robotics is the art and science of the creation and use of robots, i. e., in other words, robot technology. Today practically all sectors of the economy and industry are looking forward to introducing industrial robots. But robot building is not simple and certainly not cheap. If every sector begins to build its own robots, it will be impossible to avoid unnecessary duplication of research and development, 172 and large sums will be wasted. Therefore the need is to concentrate all efforts in robot technology in one pair of hands, in a powerful intersectoral scientific and technical organization. Only in this way it is possible to ensure the maximum standardization of production of industrial robots and multipurpose automatic manipulators. There are two rational ways in the field of robotics. The first one is to build standardized modules - unified elements on the basis of which t will be easy to assemble, in defferent combinations, robots for the most varied purposes. The second way is to create an intersectoral exchange fund of robots so that research and development of designers in different technical fields should be within the reach of all interested organizations and enterprises. The robots are divided into three generations: programmed, adaptive and intellectual. Characteristic of the first generation – the programmed robots - is that their control system acts according to a rigid oft-repeated programme all the time. But the programmed robots are easily returned to various action programmes. The adaptive robots, robots of the second generation, have been ready worked out and will be widely applied in production at the close of this and the beginning of the next decade. Their fundamental difference from the first robot generation is the appearance of artificial sensors, which give the adaptive robots the ability to see, to hear and feel. The possibilities of them are im-measurably greater than the robots of the first generation. The third generation - intellectual robots - will be able to perform intricate selective operations, and carry out practically autonomous work not depending on the operator. Robots with artificial intelligence will be able to identify objects in a pile, select the objects in the appropriate sequence and assemble them into a unit. And then we shall be able to speak, about a robot revolution in the economy, about a many-fold increase of labour productivity, and the advent of a new age of industrial production — the age fully automated enterprises and, maybe, whole branches of industry. Task 2. Answer the following questions: 173 Задание 2. Ответьте на следующие вопросы: 1. What is Robotics? 2. How is it possible to ensure the maximum standardization of industrial robots production? 3. What are two rational ways in the field of robotics according to the text? 4. What 3 generations are the robots divided into? 5. Can you characterize them? Task 3. Find the English equivalents for the words and word — combinations given below in the text: Задание 3. Найдите эквиваленты следующих слов в тексте: Создание, сложный, ветвь, прикладной, последовательность, появление, гарантировать, труд, цель, искусственный, собирать, согласно, избегать, предприятие. Task 4. Translate the following words and word — combinations into Russian: Задание 4. Прочтите следующие слова и словосочетания и переведите их на русский язык: Artificial, object, labour productivity, advent, branch, duplication, multipurpose, rational ways, divide into, ability, intricate, purpose, unify, pile. Task 5. Make the sentences interrogative: Задание 5. Поставьте следующие предложения в вопросительную форму: 1. Robots with artificial intelligence will be able to identify objects in a pile, select the objects in the appropriate sequence and assemble them into a unit. 174 2. The robots are divided into three generations. 3. Robotics is the art and science of the creation and use of robots. 4. There are two rational ways in the field of robotics. 5. Today practically all sectors of the economy and industry are looking forward1 to introducing industrial robots. LESSON 43 AMD COMPANY [4] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: Advanced Micro Devices, Inc. (AMD) is a manufacturer of integrated circuits located in Sunnyvale, California. It is the second-largest supplier of x86compatible processors. It was founded in 1969 by a group of defectors from Fairchild Semiconductor. AMD's current president and CEO is Dr. Hector Ruiz. AMD is best known for the Athlon, Opteron, Turion64, Sempron and Duron lines of x86-compatible processors. Their more general components have been found in early and current Apple computers and numerous other electronic devices. The company started as a producer of logic chips in 1969, and then entered the RAM chip business in 1975. That same year, it introduced a clone of the Intel 8080 microprocessor. During this period, AMD also designed and produced a series of bit-slice processor elements such as Am2900, Am29116, Am293xx which were used in various minicomputer designs. Later AMD decided to switch gears and concentrate solely on Intelcompatible microprocessors and flash memory. In February 1982, AMD signed a contract with Intel, becoming a licensed second-source manufacturer of the 8086 and 8088 processors. This put them in direct competition with Intel for x86 compatible processors and their flash memory secondary markets. 175 AMD produced the 80286, or 286, under the same arrangement, but then Intel cancelled the agreement in 1986, and refused to hand over technical details of the i386 part. Jerry Sanders could have closed the company and retired at this point; instead in 1991 AMD released the Am386, its clone of the later Intel 80386 processor. It took less than a year for AMD to sell a million units. And AMD's 386DX-40 was very popular. AMD followed in 1993 with the Am486. Both sold at a significantly lower price than the Intel versions. The same time AMD challenged the decision to cancel the agreement, and subsequently won under arbitration. A long process of legal dispute followed, that ended in 1991, when the Supreme Court of California finally sided with AMD, and forced Intel to pay over $ 1 billion in compensation for violation of contract. But on December 30, 1994 the Supreme Court of California finally formally denied AMD rights to use the i386's microcode. Afterwards AMD and Intel concluded an agreement, the details of which remain largely secret, which gave AMD the right to produce and sell microprocessors containing the microcodes of Intel 286, 386, and 486. But Intel keeps locking AMD processors out of the global market. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What is AMD? 2. Where is Advanced Micro Devices, Inc. located? 3. When was AMD founded? 4. Who founded Advanced Micro Devices, Inc.? 5. Who is the current president and CEO of AMD? 6. When did AMD enter the RAM chip business? 7. When did AMD release the Am386? 8. When did AMD sign a contract with Intel? 9. Why were AMD's 386DX — 40 and Am386 so popular? 176 10. Why was there a dispute between Intel and AMD? 11. When did AMD's Am486 appear? 12. When was Intel forced to pay over $ 1 billion to AMD company in compensation for violation of contract? Task 3. Find the English equivalents for the words and word — combinations given below in the text: Задание 3. Найдите эквиваленты следующих слов в тексте: Версия, нарушение, точка, многозначительно, передовой, поставщик, согласие, вычеркивать, впоследствии, вспышка, цена, перебежчик, содержать в себе. Task 4. Translate the following words and word — combinations into Russian: Задание 4. Прочтите следующие слова и словосочетания и переведите их на русский язык: The global market, release, under arbitration, technical details, sided with AMD, the Intel versions, compatible processors, solely. Task 5. Make the sentences interrogative: Задание 5. Поставьте следующие предложения в вопросительную форму: 1. Advanced Micro Devices, Inc. (AMD) is a manufacturer of integrated circuits located in Sunnyvale, California. 2. The same time AMD challenged the decision to cancel the agreement, and subsequently won under arbitration. 3. And AMD's 386DX-40 was very popular. 4. It took less than a year for AMD to sell a million units. 177 5. Afterwards AMD and Intel concluded an agreement. LESSON 44 DVD TECHNOLOGY [4] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: DVD is sometimes called «Digital Versatile Disc» or «Digital Video Disc». It is an optical disc storage media format that can be used for data storage, including movies with high video and sound quality. DVDs resemble compact discs as their physical dimensions are the same — 12cm in diameter but they are encoded in a different format and at a much higher density, using the Universal Disk Format (UDF) file system. In the early 1990s two high density optical storage standards were being developed: one was the MultiMedia Compact Disc (MMCD), backed by Philips and Sony, and the other was the Super Density Disc (SD), supported by Toshiba, Time-Warner, Matsushita Electric, Hitachi, Mitsubishi Electric, Pioneer, Thomson, and JVC. Later IBM's president, Lou Gerstner, acting as a matchmaker, led an effort to unite the two camps behind a single standard, anticipating a repeat of the costly format war between VHS and Betamax in the 1980s. Philips and Sony abandoned their MMCD format and agreed upon Toshiba's SD format with two modifications that are both related to the servo tracking technology. The first DVD players and discs were available in November 1996 in Japan, March 1997 in the United States, 1998 in Europe and in 1999 in Australia. The first DVD movie appeared in 1996. The movie had the first test for 2.1 surround sound. In 1999 Independence Day was the first movie to introduce 5.1 surround sound. By the spring of 1999 the price of a DVD player had dropped below the US $300. As a result Wal-Mart began to offer DVD players for sale in its stores. 178 As of 2006 DVD sales make up the bulk of gross sales and VHS is a slim minority. The price of a DVD player has dropped significantly. Many modern computers are sold with DVD-ROM drives stock. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What is DVD? 2. Do DVDs resemble compact discs? 3. What file system format is used in a DVD disc? 4. What is MMCD? 5. What is SD? 6. What companies supported high density optical storage standard SD? 7. What companies supported high density optical storage standard MMCD? 8. When did the first DVD players and discs become available? 9. When did the first DVD movie appear? 10. Why did Wal-Mart begin to offer DVD players for sale in its stores only in 1999? Task 3. Find the English equivalents for the words and word — combinations given below in the text: Задание 3. Найдите эквиваленты следующих слов в тексте: Оставлять, сохранение, иметь сходство, звук, независимость, включать, размеры, имеющийся в наличии, видоизменение, одинаково. Task 4. Translate the following words and word — combinations into Russian: Задание 4. Прочтите следующие слова и словосочетания и переведите их на русский язык: 179 optical disc, storage, data storage, including, physical dimensions, high density, support, a matchmaker, effort, to unite, abandoned, related to, the servo tracking technology, available, appeared, to introduce, bulk, minority. Task 5. Make the sentences interrogative: Задание 5. Поставьте следующие предложения в вопросительную форму: 1. The first DVD players and discs were available in November 1996 in Japan, March 1997 in the United States, 1998 in Europe and in 1999 in Australia. 2. The price of a DVD player has dropped significantly. 3. The first DVD movie appeared in 1996. 4. In the early 1990s two high density optical storage standards were being developed. 5. The movie had the first test for 2.1 surround sound. LESSON 45 DVD VIDEO. DVD DISCS [4] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: DVD — video discs require a DVD — drive with a MPEG - 2 decoder. DVD movies are encoded using a combination of MPEG - 2 compressed video and audio of varying formats. Typical data rates for DVD movies range from 3-10 Mbit / s, and the bit rate is usually adaptive. The video resolution on NTSC discs is 720x480 and on PAL discs is 720x576. The audio data on a DVD movie can be of the format PCM, DTS, MP2, or Dolby Digital (AC - 3). DVDs can contain more than one channel of audio to go 180 together with the video content. In many cases, sound tracks in more than one language are present. DVD Video may also include one or more subtitle tracks in various languages. They are stored as images with transparent background which are overlaid over the video during playback. DVD Video may contain Chapters for easy navigation. There are several possible successors to DVD being developed by different consortiums: Sony's Blu-ray Disc, Hitachi / Toshiba's HD DVD, the Holographic Versatile Disc, and Maxell's holographic disc. The first generation of holographic media with 300 GB of storage capacity and a 160 Mbit / s transfer rate is scheduled for release in Late 2006 by Maxell and its partner, InPhase. On April 15, 2004, in a co-operation project with TOPPAN Printing Co., the electronic giant Sony Corp. successfully developed the paper disc, a storage medium that is made out of 51 % paper and offers up to 25 GB of storage, about five times more than the standard 4.7 Gb DVD. The disc can be easily cut with scissors and recycled, offering foolproof data security and an environment friendly storage media. In 2006 it is not yet clear which technology will win the format war over DVD. HD DVD discs contain less information than Blu-ray discs (15GB vs. 25GB for single layer, and 30GB 50GB for dual layer), but Blu – ray requires changes in manufacturing machinery and techniques. DVDs are made from a 0.6 mm thick disc of polycarbonate plastic coated with a much thinner reflective aluminum layer. Two such discs are glued together to form a 1.2 mm disc. A single-layer DVD can store 4.7 gigabytes (Gb), which is around seven times as much a standard CD disc. By employing a red laser at 650 nm, before it was 780 nm, wavelength and a numerical aperture of 0.6 before it was 0.45, the read-out resolution is increased by a factor 1.65. DVD uses a more efficient coding 181 method. As a result, the DVD format is 47 percent more efficient with respect to CD disc. A DVD can contain simple data, video data and audio data. There are three writing formats: plus, minus and RAM. As to the DVD disc itself, DVD discs may have one or two sides, and one or two layers of data per side; the number of sides and layers determines the disc capacity. So, there are 5 types of DVD discs: DVD — 5, DVD-9, DVD — 10, DVD-14, DVD — 18. DVD-5 means single sided, single layer disc. It is 4.7 gigabytes (GB) and may contain 4.38 gigabytes (Gb) of information. DVD — 9 means single sided, double layer DVD disc which capacity is 8.5 Gb (7.92 Gb). DVD — 10 means double sided, single layer on both sides DVD disc. It is a 9.4 Gb (8.75 Gb) disc. DVD — 14 means double sided, double layer on one side, single layer on other. It is 13.3 Gb disc which can contain up to 12.3 Gb of information. DVD — 18 of f ers the highest capacity. It is double sided, double layer on both sides disc with 17.1 Gb and can contain up to 15.9 Gb. The capacity of a DVD disc can be visually determined by noting the number of data sides, and looking at the data sides of the disc. Double-layered sides are sometimes gold-coloured, while single-layered sides are silver-coloured, like a CD. One additional way to tell if a DVD contains one or two layers is to look at the centre ring on the underside of the disc. If there are two barcodes, it is a dual layer disc. If there is one barcode, there is only one layer. The «+» (plus) and «-» are similar technical standards and are partially compatible. As of 2004, both formats are equally popular, with about half of the industry supporting «+», and the other half «-». All DVD readers are supposed to read both formats, though real-world compatibility is around 90% for both formats. There is the third writing format. It is DVD-RAM (RAM — Random Access Memory). This standard is not as popular as «+» or «-». 182 The data transfer rate of a DVD drive is given in multiples of 1350 Kb /s , which means that a drive with 16x speed designation allows a data transfer rate of 16x1350 = 21600 kB/s(21.09MB/s). As CD drive speeds are given in multiples of 150 kB/s, one DVD «speed» equals nine CD «speeds,» so an 8x DVD drive should have a data transfer rate similar to that of a 72x CD drive. In physical rotation terms (spins per second), one DVD «speed» equals three CD « speeds,» so an 8x DVD drive has the same rotational speed as 24 x CD drive. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. How are DVD movies encoded? 2. What is a typical range for DVD movies? 3. What is the DVD video resolution on NTSC discs? 4. What is the DVD video resolution on PAL discs? 5. What audio formats on a DVD movie do you know? 6. How are subtitle tracks stored? 7. What possible successors to DVD are there? 8. What company successfully developed the paper disc in 2004? 9. How much information can Blu — ray discs contain? 10. How much information can HD DVD discs contain? 11. What materials are used for DVD production? 12. How much information can a single — layer DVD store? 13. What efficiency has a DVD format with respect to CD disc? 14. How many writing formats are there? 15. What determines a DVD disc capacity? 16. How many types of DVD disc are there? 17. What does DVD - 5 mean? 18. What does DVD — 9 mean? 19. What does DVD — 10 mean 183 20. What does DVD — 14 mean ? 21. What does DVD — 18 mean? 22. How can the capacity of a DVD disc be visually determined? 23. What is DVD — RAM? 24. What can you tell about DVD speed comparing with CD speed? Task 3. Find the English equivalents for the words and word — combinations given below in the text: Задание 3. Найдите эквиваленты следующих слов в тексте: требовать, дешифратор, переменный, приспосабливающийся, субтитр, прозрачный, воспроизведение, перемещать, ножницы, слой, длинна волны, двойной, штриховой код, совместимость. Task 4. Translate the following words and word — combinations into Russian: Задание 4. Прочтите следующие слова и словосочетания и переведите их на русский язык: require, content, In many cases, sound tracks, playback, possible, scissors, recycled, glue, efficient, respect, the disc capacity, to contain, The Additional, a dual layer, partially, compatible, both, means, multiples, transfer, rotation, rotational speed . Task 5. Make the sentences interrogative: Задание 5. Поставьте следующие предложения в вопросительную форму: 1. The data transfer rate of a DVD drive is given in multiples of 1350 kB / s. 184 2. The first generation of holographic media with 300 GB of storage capacity and a 160 Mbit / s transfer rate is scheduled for release in Late 2006 by Maxell and its partner, InPhase. 3. Two such discs are glued together to form a 1.2 mm disc. 4. There are several possible successors to DVD being developed by different consortiums. 5. The capacity of a DVD disc can be visually determined by noting the number of data sides, and looking at the data sides of the disc. LESSON 46 PENTIUM I PENTIUM II PENTIUM III [4] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: The Pentium I is a fifth-generation x86 architecture microprocessor by Intel which first shipped on March 22, 1993. It is the successor to the 486 line. The Pentium was originally to be named 80586 or i586, but the name was changed to Pentium presumably because «pent-» means «five» because numbers could not be trademarked. So, the original Pentium microprocessor had the internal code name P5 and has two datapaths (pipelines) that allow it to complete more than one instruction per clock cycle. The earliest Pentiums were released at the clock speeds of 66 MHz and 60 MHz. The early versions of 60-100 MHz Pentiums had a problem in the floating point unit that, in rare cases, resulted in reduced precision of division operations. Later on 75, 90, 100, 120, 133, 150, 166, 200, and 233 MHz versions gradually became available. 266 and 300 MHz versions were later released for mobile computing. 185 Intel has retained the Pentium trademark for naming later generations of processor architectures, which are internally quite different from the Pentium itself: Pentium Pro, Pentium II, Pentium III, Pentium IV, Pentium M, and Pentium D. The Pentium brand is now used for desktop parts, the Celeron brand is used for the parts typically of lower performance and price, and the Xeon brand is used for high-performance parts suitable for servers and workstations. The Pentium II is an x 86 architecture microprocessor produced Intel and introduced on May 7, 1997. It was based on a modified version of the P6 core first used for the Pentium Pro, but with improved 16-bit performance. The original Klamath Pentium IIs ran at 233 and 266 MHz, were produced in a 0.35 um fabrication process and produced for that time an incredible amount of heat. A 300 MHz version was released later in 1997. The Deschutes core Pentium IIs which debuted at 333 MHz in January 1998 were produced in a more suitable 0.25 um fabrication process and ran significantly cooler. During 1998, Pentium IIs running at 266, 300, 350,400, and 450 MHz were also released. Pentium II-based systems also saw the introduction of the new generation RAM-standard, SDRAM which replaced EDO RAM, and the introduction of the AGP graphics bus. Unlike previous Intel processors such as the Pentium and Pentium Pro, the Pentium II was packaged in a slot-based form-factor rather than a socket one. This larger package was a compromise allowing Intel to separate the secondary cache from the processor while still keeping it on a closely coupled bus. A low-end version of the Pentium II — essentially a Pentium II with less or no level 2 cache — was marketed under the name «Celeron». The Pentium II Xeon was a high-end version intended for use on servers. By early 1999, the Pentium III superseded the Pentium II. The Pentium III is the sixth generation of x86 architecture microprocessor by Intel, introduced on February 26, 1999. Initial versions were very similar to the earlier Pentium II, the most notable difference being the addition of SSE instructions and the introduction of a controversial serial number which was 186 embedded in the chip during the manufacturing process. As with the Pentium II, there was also a low-end Celeron version and a high-end Xeon version. The Pentium HI was eventually superseded by the Pentium 4. An improvement on the Pentium HI design is the Pentium M. The original version of Pentium III was Katmai. It was pretty much the same as the Pentium II using a 0.25pm fabrication process, the only differences being the introduction of SSE, and an improved LI cache controller which was the cause of the minor performance improvements over the latter PIIs. It was first released at speeds of 450 and 500 MHz. Two more versions of 550 MHz and 600 MHz were released in 1999. The Katmai used the same slot based design as the Pentium II. The second version of Pentium III was Coppermine. It had an integrated full-speed 256 KB L2 cache with lower latency, which improved performance over Katmai. It was built on a 0.18 pm process. Pentium III Coppermines running at 500, 533, 550, 600, 650, 667, 700, and 733 MHz were first released on October 25, 1999. From December 1999 to May 2000, Intel released Pentium IIIs running at speeds of 750, 800, 850, 866, 900, 933 and 1000 MHz(l GHz). A 1.13 GHz version was released in mid-2000, but famously recalled because it was not stable enough to compile the Linux kernel. Intel needed at least six months to resolve this problem and released 1.1 GHz and 1.13 GHz versions in 2001. The third version, Tualatin, was really just a trial for Intel's new 0.13 pm process. Tualatin performed quite well, especially in variations which had 512 KB L2 cache. This version was called the Pentium III-S. Pentium III Tualatins were released during 2001 and early 2002 at speeds of 1.0, 1.13, 1.2, 1.26, 1.33 and 1.4 GHz. Intel didn't want a repeat of the situation where the performance of a lower priced Celeron rivaled that of the more expensive Pentium III, so Tualatin never ran faster than 1.4 GHz, the introductory clock rate of the Pentium 4. Later on, it was proved that the design was good for at least 1.7 GHz. 187 Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What is the Pentium I? 2. What company created the Pentium I? 3. When was the Pentium I introduced? 4. What model of computer was the predecessor of the Pentium I? 5. What were the clock speeds of the earliest Pentiums? 6. What problem did the early versions of 60-100 MHz Pentiums have? 7. What brand is used for the parts typically of lower performance and price? 8. What brand is used for desktop parts? 9. What brand is used for high-performance parts suitable for servers and workstations? 10. What is the Pentium II? 11. When did the Pentium II appear? 12. What was the first version of Pentium II? 13. What was the original clock rate of the Klamath? 14. When was a 300 MHz version of Pentium II released? 15. What was the distinctive feature of Pentium II comparing with the Pentium and Pentium Pro computers? 16. What is the brand name for a low - end version of the Pentium II? 17. What is the brand name for a high-end version of the Pentium II? 18. When was the Pentium II superseded by the Pentium III? 19. What is the Pentium III? 20. When did the Pentium III appear? 21. What are the most notable differences in the Pentium III? 22. What was the original version of Pentium III? 23. What was the second version of Pentium Ш? What were the main features of the second version of Pentium Ш? 24. Why was a 1.13 GHz version recalled? 188 25. What was the third version of Pentium III? 26. When was the third version of Pentium III released? 27. Why did Tualatin never run faster than 1.1 GHz? 28. What was the introductory clock rate of the Pentium IV? Task 3. Find the English equivalents for the words and word — combinations given below in the text: Задание 3. Найдите эквиваленты следующих слов в тексте: преемник, предположительно, внутренний, цикл, постепенно, торговая марка, удерживать, подходящий, предыдущий, незначительный, начальный, собирать материал, принимать решение, превосходно. Task 4. Translate the following words and word — combinations into Russian: Задание 4. Прочтите следующие слова и словосочетания и переведите их на русский язык: shipped on, to complete, to release, to reduce, precision of division operations, available, workstations, fabrication process, incredible amount of heat, core, to separate , rival, the introductory clock rate. Task 5. Make the sentences interrogative: Задание 5. Поставьте следующие предложения в вопросительную форму: 1. Pentium III Tualatins were released during 2001. 2. The second version of Pentium III was Coppermine. 3. This larger package was a compromise allowing Intel to separate the secondary cache from the processor while still keeping it on a closely coupled bus. 189 4. The Pentium II is an x 86 architecture microprocessor produced Intel and introduced on May 7, 1997. 5. It was based on a modified version of the P6 core first used for the Pentium Pro, but with improved 16-bit performance. LESSON 47 PENTIUM IV [4] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: The Pentium 4 is a seventh-generation x 86 architecture microprocessor produced by Intel and is their first all-new CPU design, called the NetBurst architecture, since the Pentium Pro of 1995. The original Pentium 4, codenamed «Willamette», ran at 1.4 and 1.5 GHz and was released in November 2000. The design goal of the Pentium 4 was to scale to fast clock speeds, because consumers were beginning to purchase computers based on GHz ratings. To this extent the P4 appears to be a classic example of marketing concerns driving technological development. Intel stated in their marketing at the launch of the P4 it was an architecture designed to scale to 10 GHz. However, the architecture used in P4 encountered unsolvable thermal problems at 4 GHz. This forced Intel to abandon development of the Pentium 4 in mid-2005 to focus on the cooler running Pentium M, which was repositioned for the desktop computer and small server markets. In retrospect, the Pentium III core was technologically superior to Pentium 4. And Willamette, the first Pentium 4, suffered long delays in the design process. At that time, the Willamette was only expected to breach the 1 GHz (1000 MHz) barrier upon its introduction. However, once the Pentium III was introduced, obviously Intel could not name Willamette as a Pentium II. Because its architecture 190 was a relatively large departure from the Pentium III, it was named Pentium 4, ending Intel's Roman-Numeral nomenclature system. April 2001 brought the 1.7 GHz P4, the first one to provide performance clearly superior to Pentium III. July saw 1.6 and 1.8 GHz models and in August 2001, Intel released 1.9 and 2.0 GHz Pentium 4s. In the same month, they released a new chipset that supported much cheaper PC133 SDRAM. The 2.0 GHz was the first P4 to provide a serious challenge to the rival Athlon Thunderbird, which until then had been unquestionably the fastest x86 CPU on the market. In October 2001 the Athlon XP regained a clear lead for AMD, but in January 2002 Intel released Pentium 4s with their new Northwood core at 2.0 and 2.2 GHz. A 2.4 GHz P4 was released in April 2002, a 2.53 GHz part in May and a 3.06 GHz Pentium 4 arrived in November. The 3.06 GHz processor supported Hyper-threading, first appeared in Xeon, enabling multiple threads to be run together by duplicating some parts of the processor in order to let the operating system believe that there are two logical processors. Hyper-Threading was present in all Northwood CPUs, but was disabled in the core in all but the 3.06 GHz model. In April 2003, Intel launched new variants, ranging from 2.4 to 3.0 GHz. The key difference on these new versions was that they all supported Hyper-Threading, and ran their system buses at 800 MHz. On February 1, 2004, Intel introduced a new core codenamed «Prescott». The core uses a 90pm process. Although a Prescott clocked at the same rate as a Northwood, benchmarks show that a Northwood runs slightly faster than a Prescott in gaming applications. However, with video editing and other multimedia software, the Prescott's extra cache gives it a clear speed advantage over the Northwood. 3.8 GHz was the fastest Prescott-based processor ever mass-produced. Finally, the thermal problems were so severe, Intel decided to abandon the Prescott architecture altogether, and attempts to roll out a 4 GHz part were abandoned, as a waste of internal resources. Intel released a new Prescott core 191 codenamed « Prescott 2M » by the first quarter of 2005. It features new 64-bit technology. On 14 November 2005, Intel released Prescott 2M processors with VT (Virtualization Technology, codenamed «Wonderpool») enabled. Intel only released two models of this Prescott 2M category: 662 and 672, running at 3.6 and 3.8 GHz, respectively. Intel will release the final version of Pentium 4, codenamed «Cedar Mill» at the first quarter of 2006. Cedar Mill is expected to solve overheat problems of Prescott. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What is the Pentium 4? 2. What was the original Pentium 4 codename? 3. What was the clock speed of the original Pentium 4? 4. When was the first Pentium IV released? 5. What was the design goal of the Pentium 4? 6. What statement was made by Intel while launching the P4? 7. Why did the P4 microprocessors never overcome the 4 GHz barrier? 8. Why did Willamette, the first Pentium 4, suffer long delays in the design process? 9. When was the 1.7 GHz P4 produced? 10. When was 2.0 GHz Pentium 4 released? 11. What was the main feature of the 2.0 GHz P4? 12. When did a 3.06 GHz Pentium 4 arrive? 13. When were the versions of P4 supporting Hyper-Threading technology launched by Intel? 14. What is Hyper Threading technology? 15. When «Prescott» P4 was introduced? 16. Why did Intel make decision to abandon the development of Prescott core architecture? 192 17. What was the fastest Intel processor ever mass-produced? 18. What was the clock speed of the fastest Intel processor? 19. When was «Prescott 2M» core introduced? Task 3. Find the English equivalents for the words and word — combinations given below in the text: Задание 3. Найдите эквиваленты следующих слов в тексте: потребитель, столкнуться, сервер, явно, относительно, исполнение, неоспоримо, восстановление, для того чтобы, запуск, топографическая метка, массовый продукт, давать возможность, соответственно, перегревать. Task 4. Translate the following words and word — combinations into Russian: Задание 4. Прочтите следующие слова и словосочетания и переведите их на русский язык: the design goal, to purchase, To this extent, the desktop, delay, breach, to provide, a new chipset, a serious challenge to the rival, on the market, at the same rate, to roll out, features, respectively. Task 5. Make the sentences interrogative: Задание 5. Поставьте следующие предложения в вопросительную форму: 1. The Pentium 4 is a seventh-generation x 86 architecture microprocessor. 2. Hyper-Threading was present in all Northwood CPUs, but was disabled in the core in all but the 3.06 GHz model. 3. On February 1, 2004, Intel introduced a new core codenamed «Prescott». 4. The core uses a 90 pm process. 5. Cedar Mill is expected to solve overheat problems of Prescott. 193 LESSON 48 CELERON [4] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: A Celeron is any of a large number of different budget microprocessors produced by Intel and marketed as a budget CPU line. The Celeron family complements Intel's higher-performance and more expensive Pentium CPUs family. Introduced in August 1998, the first Celeron was based on the Pentium II core. Later versions were based on the Pentium III, Pentium 4, and Pentium-M. As a product concept, the Celeron was introduced in response to Intel's loss of the low-end market, in particular to Cyrix's 6x86 and AMD's K6 because Intel's existing low-end product, the venerable Pentium MMX, was no longer performance competitive. The first Celeron codenamed Covington was essentially a 266MHz Pentium II manufactured without any secondary cache at all. Although clocked at 266 or 300MHz substantially higher than the old Pentium MMX, the cacheless Celerons were a good deal slower than the parts they were designed to replace. Substantial numbers were sold on first release, largely on the strength of the Intel name, but the Celeron quickly achieved a poor reputation both in the trade press and among computer professionals. The initial market interest faded rapidly in the face of its poor performance and with sales at a very low level, Intel felt obliged to develop a substantially faster replacement as soon as possible. Intel was well aware of the poor reputation of the original Celeron and determined not to make the same mistake twice. As the result the new Mendocino core Celeron was a good performer from the outset. Indeed, most industry analysts regarded the first Mendocino-based Celerons as too successful. Its performance 194 was sufficiently high to not only compete strongly with rival parts, but also to attract buyers away from Intel's high-profit flagship, the Pentium II. The key to the new Celeron's performance was cache. Where the old model had no secondary cache at all, the new part included 128KB of L2 cache as part of the chip itself. The first Mendocino-core Celeron was clocked at 300MHz but was almost twice as fast as the old cacheless Celeron at the same clockspeed. The Mendocino also came in a mobile variant, with speeds 266, 300, 333, 366, 400, 433, and 466 MHz. The next generation Celeron was the Coppermine-128 sometimes known as the Celeron II. It was a derivative of Intel's latest high-end part, the «Coppermine» Pentium III and was released in March 2000. Like the Mendocino, the Coppermine-128 used 128 KB of on-chip L2 cache and was restricted to a 66 MHz bus speed. It was identical to the Pentium III except for the smaller secondary cache and the much slower bus. The next series of Celerons were based on Pentium III Tualatin core. They were nicknamed Tualeron. The series began with 1000 and 1100 MHz parts and the line continued with 1200, 1300, and 1400 MHz chips. Tualerons were identical to their fully-fledged Pentium III sibling, except that Tualerons used a 100 MHz bus rather than the 133 MHz bus of the Pentium III processors. The Celeron D processor is based on the Prescott core and has a larger 256 KB cache. It also features a 533 MHz bus. Their clock speed range was from 2.13 GHz in the model 310 to 3.2 GHz in the model 350. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What is Celeron? 195 2. What company produces Celeron? 3. What was the clock rate of the first Celeron? 4. Why did Intel introduce low-end Celeron? 5. What features did the Mendocino core Celeron have? 6. What was the first Mendocino-core Celeron? 7. What was the second generation of Celeron? 8. What was the key to the new Celeron's performance? 9. When was the «Coppermine» Pentium III released? 10. What clock speeds did «Tualeron» Celeron have? 11. What were the main differences between the Pentium III «Tualeron» and Celeron «Tualeron»? 12. What is the Celeron D processor? Task 3. Find the English equivalents for the words and word — combinations given below in the text: Задание 3. Найдите эквиваленты следующих слов в тексте: бюджет, дополнение, конкурентный, начальный, по существу, сила, определять, ошибка, в достаточной мере, дважды, ограничивать, прозвище, основанный, свойства, скорость. Task 4. Translate the following words and word — combinations into Russian: Задание 4. Прочтите следующие слова и словосочетания и переведите их на русский язык: complement, in particular to, the venerable Pentium MMX, codenamed, essentially, cacheless , to replace, to release, both, the trade, at a very low level, the poor reputation, the same mistake, twice, successful, to attract, identical. 196 Task 5. Make the sentences interrogative: Задание 5. Поставьте следующие предложения в вопросительную форму: 1. The Celeron family complements Intel's higher-performance and more expensive Pentium CPUs family. 2. Introduced in August 1998, the first Celeron was based on the Pentium II core. 3. Later versions were based on the Pentium III, Pentium 4, and Pentium-M. 4. They were nicknamed Tualeron. 5. The next series of Celerons were based on Pentium III Tualatin core. LESSON 49 ATHLON 64. OPTERON [4] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: The Athlon 64 codenamed «ClawHammer», «Newcastle», «Winchester», «Venice», and «San Diego» represents AMD's entry into the consumer 64-bit microprocessor market. It was firstly released on September 23, 2003. This processor is based on the AMD64 architecture. It is AMD's first eighth generation processor core for desktop and mobile computers. Turion 64 is an example of AMD processor for mobile computers. It intended to compete with Intel's Pentium M. ft is equipped with 512 or 1024 KB of L2 cache. There are three variants: Athlon 64, Athlon 64 FX, and the dual-core Athlon 64 X2. The Athlon 64 X2 is a processor consisting of two Athlon 64 cores joined together on one die. The main benefit of dual core processors like the X2 is their ability to process more software «threads» at the same time. 197 Such processors are efficient with programs written with multiple threads and capable of utilizing dual cores include many music and video encoding applications, and especially professional rendering programs. Having two cores, the Athlon 64 X2 has an increased number of transistors. The 1 MB L2 cache X2 processor has 233.2 million transistors hereas its Athlon 64 counterpart has only 114 million transistors. The AMD Opteron is the first eighth-generation processor with K8 core, and the first of AMD's AMD64 processors, released on April 22, 2003. It is intended to compete in the server market, particularly in the same segment as the Intel Xeon processor. In June 2004, it was the tenth fastest supercomputer in the world, dropping to 42-nd in November 2005. On the November 2005 list, 10% of the 500 supercomputer installations were x64 Opteron-based systems, while about 17 % were Intel x64 Xeon-based. In multi-processor systems where there are more than one Opteron on a single motherboard, the CPUs communicate using the Direct Connect Architecture over high-speed HyperTransport links. So, each CPU can access the main memory of another processor. The Opteron approach to multi-processing is not the same as standard symmetric multiprocessing as instead of having one bank of memory for all CPUs, each CPU has its own memory. As of early 2005, most retail motherboards offer one or two CPU sockets. The Opteron CPU directly supports up to an 8-way configuration, which can be found in mid-level servers. Enterprise-level servers use additional and expensive routing chips to support more than 8 CPUs per box. In May of 2005, AMD introduced its first « Multi-Core» Opteron CPU's. At the present time, the term «Multi-Core» at AMD in practice means «dual-core», because each physical Opteron chip actually contains two separate processor cores. This effectively doubles the compute-power. One socket can now deliver the performance of two processors; two sockets can deliver the performance of four processors, and so on. Since motherboard costs go up dramatically as the number of CPU sockets 198 increases, multicore CPU's now allow much higher performing systems to be built with more affordable motherboards. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What is the AMD Opteron? 2. When was the AMD Opteron released? 3. What was the main intention of AMD'S Opteron creation? 4. Where is the Direct Connect Architecture used? 5. What is the main feature of Opteron approach to multi-processing? 6. When did AMD introduce its first «Multi — Core» Opteron CPU's? 7. What models of the Athlon 64 do you know? 8. When was the Athlon 64 released firstly? 9. What AMD eighth generation processor core for desktop and mobile computers do you know? 10. What is Turion 64? 11. How many variants of Athlon 64 are there? 12. What is the main benefit of dual core processors? Task 3. Find the English equivalents for the words and word — combinations given below in the text: Задание 3. Найдите эквиваленты следующих слов в тексте: представлять, потребитель, намереваться, соревноваться, главный, выгода, увеличивать, отрезок, чрезвычайно, установки, материнская плата, доступ, подход, розничный, дополнительный, доставлять, впечатляюще, допустимый. 199 Task 4. Translate the following words and word — combinations into Russian. Задание 4. Прочтите следующие слова и словосочетания и переведите их на русский язык: software, multiple threads, dual cores, applications, rendering programs, the server market, the main memory, instead of, to support, dramatically, increase, affordable, motherboards. Task 5. Make the sentences interrogative: Задание 5. Поставьте следующие предложения в вопросительную форму: 1. Turion 64 is an example of AMD processor for mobile computers. 2. There are three variants: Athlon 64, Athlon 64 FX, and the dual — core Athlon 64 X2. 3. Having two cores, the Athlon 64 X2 has an increased number of transistors. 4. The Opteron CPU directly supports up to an 8 - way configuration, which can be found in mid-level servers. 5. Enterprise — level servers use additional and expensive routing chips to support more than 8 CPUs per box. LESSON 50 SMART STUFF [3] Task 1. Read and translate the text: Задание 1. Прочитайте и переведите текст: Increasingly over the last few years, we have become familiar with the range of small electronic gadgets that come under the heading smart' accessories. 200 Joggers, for example, run with — heart - rate monitors, and shop assistants carry pocket — sized computers. But these are just the first examples of a whole range of new products that promises to change our lives in all sorts of surprising ways. As a scientist at Massachusetts Institute of Technology's Media Lab, Rosalind Picard tries out all kinds of smart accessories before they go on the market. One of these was the so-called 'frown headband'. It came as a shock to Rosalind to realize just how often she frowned. Stuck in a traffic jam recently, waiting for the cars to move forward, Rosalind kept hearing the sounds of the tiny sensor inside the band worn around her forehead — each time she frowned in frustration, the sensor gave out a signal. Headlands that check facial expressions are just one of the things she and her colleagues have designed. Their aim is to make ready – to — wear items that both look good and give the wearer useful feedback. Body sensors, like those in Rosalind's headband, can detect physical changes that the wearer might not otherwise be aware of. Hidden inside watches, rings or shoes, these sensors can check for signs of stress, give information and offer advice. Another computer scientist, Steven Feiner, is working on a pair of glasses that will do more than help you to see. Imagine you want to try a restaurant in a foreign city but you're not familiar with the dishes on the menu. If you are wearing a pair of Steven's glasses, all you have to do is glance above the restaurant's doorway and your glasses will immediately become windows to the Internet, offering you full details of the meals served inside. Are you one of those people who lack confidence when giving a talk to an audience? Look to the right and the glasses will flash your notes in front of your eyes. They could also prove useful for cooks who want to check a recipe without leaving sticky fingermarks all over their cookery books. At the moment, Steven's invention looks more like a pair of ski goggles than a pair of glasses. It's a headset connected to a hand-held computer and a Global Positioning System (GPS) receiver, which tracks the wearer's position. Students 201 who don’t mind being stared at have tried out the Star Trek-like device on campus. But Steven says that these head-worn displays will eventually get smaller, lighter and smarter as technology improves. As they will be relatively cheap, he foresees them replacing the notebooks and manuals that workers have to carry. He predicts that they will be useful to surgeons, giving them instant access to a patient's medical notes while carrying out operations. And, of course, this new technology has a fashionable as well as a useful application. A chemical engineer named Robert Langer has invented a new microchip that, if put inside a ring, can give off different scents according to a person's mood. That, of course, may or may not appeal to you. And, in the end, it is shoppers, not scientists, who will determine which of. These smart accessories will succeed as fashionable items and which are destined to join history's long list of crazy inventions. Steven Feiner, concerned that vanity may prevent some people from wearing his glasses, is already working on the idea of contact lenses with the same features. It is clear, however, that as small computer displays get brighter and cheaper, they will pop up in all sorts of easily — wearable accessories, even in the buttons on your coat. What's more, this is something that's going to happen a lot sooner than we all expect. Task 2. Answer the following questions: Задание 2. Ответьте на следующие вопросы: 1. What is the writer’s view of Robert Langer’s invention? 2. What does the writer think about “smart” accessories? 3. What is the current problem with Steven’s glasses? 4. Whose idea for a smart device seems to be the best? 5. What devices mentioned in the text could improve your life? Task 3. Use the right prepositions and fill in the blanks: 202 Задание 2. Заполните пропуски предлогами: 1. Look ……. the right and the glasses will flash your notes ……. front ….. your eyes. 2. He concerned that vanity may prevent ……. some people ……….. wearing his glasses, is already working ….. the idea ……. contact lenses ….. the same features. 3. Stuck …… a traffic jam recently, waiting …… the cars to move forward, she kept hearing the sounds ……. the tiny sensor inside the band worn around her forehead. 4. She tries …… all kinds ……. smart accessories before they go ……. the market. 5. ……… the moment, his invention looks more like a pair ……. ski goggles than a pair …… glasses. Task 5. Make the sentences interrogative: Задание 5. Задайте все типы вопросов к следующим предложениям: 1. This new technology has a fashionable as well as a useful application. 2. He is working on a pair of glasses. 3. Robert Langer has invented a new microchip. 4. They will be useful to surgeons, giving them instant access to a patient’s medical notes while carrying out operations. 5. The sensor gave out a signal. 203 Словарь английских терминов (Vocabulary) A abacus счеты to abandon отказываться; прекращать ability способность, возможность abolish отменять, исключать about 300 B.C. около 300 года до нашей эры accept принимать (информацию) acceptable приемлемый access доступ, обращение; обращаться, иметь доступ ~ time время доступа ~ database доступ к базе данных sequential ~ последовательный доступ accessible доступный accessories реквизиты accessory equipment вспомогательные устройства accomplish завершать, заканчивать accomplishment завершение; выполнение according соответствующий ~ to в соответствии с accordingly соответственно, соответствующим образом account расчет, подсчет, счет (банковский); учитывать, подсчитывать take into ~ принимать во внимание, учитывать accumulate накапливать (ся), суммировать, собирать 204 accumulator сумматор; накапливающий регистр; устройство суммирования accuracy точность; правильность; четкость accurate точный, правильный achieve достигать, завершать achievement достижение, завершение acquire приобретать, получать acquirement приобретение, получение acronym аббревиатура act действовать, работать action действие, работа, операция put into ~ приводить в действие activity деятельность A.D. нашей эры adapt адаптировать(ся); настраивать(ся); приспосабливать(ся) adapter адаптер adaptive приспосабливающийся add сложение, суммирование added добавочный, дополнительный adder сумматор, устройство (блок) суммирования addition сложение, суммирование in to в дополнение к; помимо address адрес; адресовать; касаться; затрагивать adequate адекватный; соответствующий; достаточный; приемлемый adjacent смежный; соседний; примыкающий adjust регулировать; настраивать, устанавливать adjusted delicately enough to thread a достаточно точно приспособленные, чтобы вдевать нитку в 205 needle under water иголку под водой adjuster регулятор adjustment регулировка; настройка; корректировка; подгонка; поправка advance продвигаться(ся) in ~ заранее advanced улучшенный; усовершенствованный; (более) эффективный advancement продвижение; улучшение; усовершенствование advantage преимущество; выгода to take advantage of smth. воспользоваться чем-либо advent приход; прибытие advice совет; рекомендация advise советовать; рекомендовать; консультировать adviser консультант; справочник affect влиять; воздействовать affordable возможный; допустимый; по средствам AGP ускоренный графический порт agree соответствовать; согласовывать (ся) agreement соглашение aid помошь; содействие aids средства; приспособления aim цель; нацеливать, направлять algorithm алгоритм align выравнивать, выстраивать в линию allocate распределять; размещать; предоставлять (доступ); выделять allocation распределение; назначение; предоставление 206 допускать; позволять allow ~ for учитывать; принимать во внимание allowable допустимый alter (из)менять(ся) alteration изменение; перемена amaze поражать; изумлять AMD (Advanced Micro Devices) компания AMD – производитель микропроцессоров и принадлежащая ей торговая марка AMD64 64-битная архитектурамикропроцессора AMD64 amend исправлять; улучшать amendment поправка; исправление amount количество; величина; размер; объем; составлять; насчитывать of damage степень повреждения of memory объем памяти of time интервал времени proper необходимое количество amplification усиление amplifier усилитель amplify усиливать (ся) analog аналог; аналоговый analog-digital аналого-цифровой analyst аналитик; (системный) разработчик to anticipate ожидать; предчувствовать; приближать aperture отверстие; скважина; дыра; дырка; щель appeal привлекать appear появляться; возникать; оказываться 207 appearance появление; вид to append присоединять appliance устройство; прибор application приложение; применение; употребление; использование; (прикладная) программа applied прикладной apply применять (ся); использовать approach приближение; подход; метод; приближаться, подходить top-down принцип нисходящей разработки comprehensive комплексный подход educational метод обучения general общий подход graphic графический метод self-study метод самообучения step-by-step метод поэтапного решения training метод обучения trial-and-error метод проб и ошибок; метод подбора appropriate подходящий; соответствующий; свойственный; присущий architect разработчик архитектуры architecture архитектура; структура communications архитектура средств связи computer архитектура компьютера disk структура диска instruction set структура системы команд network сетевая архитектура security архитектура системы защиты software структура программного обеспечения 208 an arithmetic and logic unit арифметическое / логическое устройство x86 architecture microprocessor процессор совместимый с процессором 8086 (сделанный на базе архитектуры процессора 8086 компании «Интел») arrange размешать; располагать; устанавливать; монтировать icons выстроить значки arrangement размещение; расположение; упорядочение; устройство array матрица; решетка; массив; упорядочивать, размещать в массиве artificial intelligence искусственный интеллект assemble собирать; объединять; монтировать; ассемблировать assembler ассемблер assembly сборка; монтаж; узел; блок; совокупность; система associate соединять; объединять; связывать associated (при)соединенный; объединенный; связанный; соответствующий ~ documentation соответствующая документация association объединение; взаимосвязь; совокупность assurance гарантия; обеспечение assure гарантировать; обеспечивать attach подсоединять(ся); подключать(ся); прилагать(ся) attachment подсоединение; подключение; (тех.) приспособление attain достигать attempt попытка; пытаться at the proper time в надлежащее время attitude положение; ориентация; отношение autonomous независимый auxiliary вспомогательный; дополнительный 209 avail польза; выгода; быть полезным; помогать availability готовность; доступность; наличие available доступный; имеющийся (в наличии); имеющий место be ~ быть в наличии; доступный have ~ иметь в наличии, иметь в распоряжении when ~ при наличии widely ~ общедоступный average средний the average job time среднее время счета задания avoid избегать; исключать; устранять; предотвращать aware осведомленный; информированный awareness осведомленность; информированность B background фон; предпосылка, основа; подготовка; квалификация; навыки (работы) bar стержень; полоса; строка base база; основа; основание; data база данных information совокупность информации knowledge ~ база знаний user ~ круг пользователей based основанный on the basis of на основе batch пакет; пакетный файл ~ processing пакетная обработка benchmark производительность системы, определяемая в целях сравнения 210 benefit выгода; польза; преимущество; помогать; способствовать bias смещать; смещение binary двоичный ~ coded в двоичном представлении bit бит; двоичный разряд 16-bit performance работа на базе 16-битного кода 64-bit technology 64-битная технология 64-bit microproccessor market рынок 64-битных микропроцессоров blink мерцание; мигать board панель; пульт; плата chip ~ плата с микросхемами circuit ~ монтажная плата key ~ клавиатура switch ~ панель переключения bootstrapping начальная загрузка branch ветвь; раздел; отделение; разветвляться; переходить to breach пробивать брешь, проламывать (стену, оборону и т.п.) break разрыв; прерывание; пауза; прерывать; нарушать (работу); отказывать (о программе) ~ into внедряться, проникать (в систему) breakdown разрушение; поломка brief краткий; сжатый in ~ кратко; вкратце This brighter emerging beam Этот более мягкий появляющийся луч bring (пре)доставлять; давать ~ into вводить; заносить в память 211 ~ into action приводить в действие ~ out показывать; демонстрировать browse просматривать browser программа «бродилка» browsing просмотр buffer буфер; заносить в буфер bug ошибка; дефект; недоработка data ~ ошибка в данных loop ~ ошибка в цикле security ~ недоработка системы защиты bug-free не содержащий ошибок bug-test проверять на наличие ошибок builder разработчик; изготовитель; создатель building разработка; построение; формирование; создание bulk масса; большое количество; основная burden издержки; затраты; обязанности; bus шина; канал; линия (передачи данных); соединять шиной control ~ шина управления data ~ шина данных input ~ входная шина input-output ~ шина ввода-вывода memory ~ шина (доступа) к памяти button кнопка; кнопочный browse ~ кнопка просмотра cancel ~ кнопка отмены emergency ~ аварийная кнопка exit ~ кнопка выхода 212 reset ~ кнопка сброса start ~ кнопка запуска байт; размером в байт byte C cache кэш; файл для хранения (данных); хранить; сохранять extra cache дополнительная кэш; сверхоперативная память L1 cache кэш первого уровня (первичная кэш-память, расположенная на одном кристалле с процессором) L2 cache кэш второго уровня secondary cache вторичная кэш-память; кэш второго уровня (кэш-память, расположенная не внутри микропроцессора, а на системной или какой-либо другой плате) calculate вычислять; рассчитывать calculating device вычислительное устройство while calculating при вычислении calibrate градуировать; выверять; настраивать call вызов; обращение; вызывать; обращаться; называть call for требовать; предусматривать cancel отменять; аннулировать; отмена; аннулирование capability способность; возможность capacitor конденсатор capacity емкость; объем; производительность; пропускная способность media ~ емкость носителя capture собирать (данные); переносить; записывать (в память) to capture information перехватить информацию card плата; карта; карточка cardfile картотека 213 carrier носитель; держатель; сеть передачи данных carry нести; переносить ~ out выполнять (команду) cartridge кассета; картридж cathode-ray tube электроннолучевая трубка cause заставлять; вынуждать; быть причиной; причина; основание to cause eye strain вызывать напряжение глаз to cause intentional harm умышленно причинить вред Celeron низкобюджетный процессор, разработанный фирмой «Интел» cell ячейка; элемент a central processor центральный процессор chain цепь; цепочка; последовательность challenge вызов; трудность; препятствие; представлять трудность change изменение; замена; изменять(ся); сменять(ся) character символ; знак; буква ~ table таблица символов chart диаграмма; график; схема; таблица; строить график; изображать bar ~ столбиковая диаграмма dot ~ точечная диаграмма line ~ график pie ~ круговая / секторная диаграмма check контроль; проверка; проверять checkout проверка; наладка; отладка chip кристалл; микросхема logic chip логический чип 214 RAM chip чип памяти routing chips чипы-рутеры chipset микропроцессорный набор; набор микросхем choose выбирать cipher шифр; шифровка circuit цепь; контур; электрическая схема circuitry (электронные) схемы clear чистый; стертый; удаленный; очищать; стирать; удалять to clock работать (с такой-то частотой) clock cycle тактовая частота (процессора, шины) clock rate тактовая частота; синхронизирующая частота; частота тактовых импульсов clock speed тактовая частота close утрачивать; избавиться; отделываться code код; кодировать; программировать; система команд coding программирование to codename давать кодовое название, наименование COE (главный) исполнительный директор column столбец; колонка; графа communicate сообщать(ся); связывать communication связь; сообщение; взаимодействие comparative сравнительный compare сравнение; сравнивать; соотноситься comparer / comparator компаратор; устройство сравнения compatibility совместимость competitive соперничающий; конкурентный; конкурентоспособный compile собирать; составлять; компилировать 215 compiler компилятор complement дополнение; совершенность; совершенство; множество; комплект complete полный; целый; завершенный; завершать; заканчивать completely полностью; целиком compose составлять; набирать compromise компромисс; соглашение computation вычисление; расчет compute вычислять; рассчитывать computer компьютер; вычислительная машина advanced ~ современный компьютер all-purpose ~ универсальный компьютер analog ~ аналоговый компьютер digital ~ цифровой компьютер first-generation ~ компьютер первого поколения general-purpose ~ универсальный компьютер handheld карманный компьютер IBM-compatible ~ ИБМ-совместимый компьютер mobile ~ портативный / переносной компьютер notebook ~ блокнотный компьютер personal ~ [PC] персональный компьютер portable ~ портативный компьютер ~ mail электронная почта concept понятие; принцип; концепция concern забота; беспокойство; интерес; участие; заинтересованное отношение to conclude завершить; заключать 216 in conclusion в заключение condition условие; состояние; режим confidence доверие confirm подтверждать confirmation подтверждение delivery ~ подтверждение приема connect соединять; подключать; связывать connection подключение; установление связи; соединение; схема consequently следовательно сonsider рассматривать; учитывать; полагать; считать сonsiderable значительный; существенный сonsiderably значительно consortium консорциум constant постоянная; константа consume потреблять; расходовать consumer потребитель; абонент consumption потребление; расход power ~ расход энергии content содержание; смысл contrast контраст; противоположность as ~ed with в отличие in ~ напротив; наоборот contribute содействовать; способствовать; вносить вклад contribution вклад; содействие control управление; регулирование; управлять; регулировать access ~ управление доступом device ~ управление устройством 217 distance ~ дистанционное управление error ~ контроль за ошибками ~ generator генератор управления inventory ~ инвентаризация; переучет ~ panel панель управления ~ programs управляющие программы ~ signals сигналы управления ~ unit блок управления controversial спорный; сомнительный; поставленный под сомнение; дискуссионный convenience удобство; пригодность convenient удобный; пригодный conversion преобразование convert преобразовывать converter преобразователь; конвертор convey передавать; сообщать conveying передача (информации) сору копия; экземпляр; копировать core ядро; оперативная память; суть; основная часть dual-core двуядерный processor core ядро процессора Core Image Library загрузочная библиотека correct верный; правильный; нужный; требуемый; исправлять correction исправление; устранение (неисправности); коррекция corrective корректирующий corrector корректор; блок или программа корректирования corrupt разрушать; портить; искажать; искаженный 218 corrupted искаженный; запорченный corruption разрушение; искажение; порча; повреждение data ~ искажение данных cost стоимость; цена cost-effective экономичный; экономически оправданный count счет; подсчет; отсчет; считать; подсчитывать counter счетчик; binary ~ двоичный счетчик character ~ счетчик символов data ~ счетчик (элементов) данных instruction ~ счетчик команд pulse ~ счетчик импульсов sequence ~ счетчик команд software ~ программный счетчик storage ~ накапливающий счетчик time-out ~ счетчик времени ожидания countess графиня to couple соединять; связывать; ассоциировать CPU центральный процессор CPU design модель центрального процессора crease складка; морщинка; мяться create создавать; формировать creation создание; формирование crime преступление current-address register регистр текущего адреса current injection logic circuits схемы с токовой инжекторной логикой 219 curriculum учебная программа cursor стрелка; указатель cycle цикл; период; такт; этап D damage повреждение; разрушение data данные; информация application ~ данные прикладной программы approximate ~ приближенные данные available ~ имеющиеся данные bad ~ неверные (искаженные) данные calculation ~ расчетные данные check ~ контрольные данные help ~ справочные данные missing ~ недостающие (отсутствующие) данные ~ processing обработка данных source ~ исходные данные database база данных; заносить в базу данных deal (with) иметь дело (c); работать dealer посредник; поставщик debug отлаживать (программу) debugger отладчик debugging отладка; наладка decide решать; принимать решение decision решение decode декодировать decoder дешифратор decrease уменьшение; снижение; уменьшать; снижать 220 (by) default по умолчанию; подразумеваемый; умолчание; стандартный параметр defector перебежчик за границу deficiency недостаток; нехватка; отсутствие define определять; задавать definition определение; задание degree степень; мера; ~ of compatibility степень совместимости ~ of protection степень защиты ~ of security степень безопасности delay задержка; запаздывание; задерживать; откладывать delete удалять; стирать; очищать deleter программа удаления deletion удаление; стирание delivery подача; доставка; поставка demagnetize размагничивать demand требование; запрос; требовать; запрашивать density плотность; удельный вес data ~ плотность записи данных drive ~ плотность дисковода packing ~ плотность упаковки storage ~ плотность заполнения памяти to deny отрицать; отвергать departure (for, from) отступление; отклонение; отход depend on зависеть от (чего-либо) dependence зависимость dependent зависимый; зависящий 221 depending в зависимости от deposit помещать; размещать depository склад; хранилище at depths as low as на глубинах до derivative производный; выведенный; вторичный; деривативный descriptive описательный design проектирование; конструирование; разработка; построение to designate обозначать; назначать designation обозначение; называние; указание; знак desktop computer настольный (стационарный) компьютер destine предназначать detail деталь; подробность in ~ подробно; детально detect обнаруживать; выявлять detection обнаружение; выявление error ~ выявление ошибок failure ~ обнаружение неисправностей; выявление ошибок detector детектор; средство обнаружения; датчик to deteriorate ухудшаться to determine определять; устанавливать (с помощью расчетов, рассуждений, проведения расследования и т.п.) device устройство; прибор; аппарат; приспособление accounting ~ счетное устройство alarm ~ сигнальное устройство clock ~ датчик времени; таймер computing ~ вычислительное устройство; способ вычислений control ~ устройство управления 222 drawing ~ чертежное устройство encoding ~ кодирующее устройство incompatible ~ несовместимое устройство measuring ~ измерительное устройство pen ~ чертежное устройство; световое перо plotting ~ чертежное устройство printing ~ печатающее устройство recording ~ записывающее устройство sensing ~ датчик; детектор switching ~ переключатель devise разрабатывать; изобретать die матрица digit цифра; разряд (числа); знак binary ~ двоичная цифра binary-coded ~ цифра в двоичной кодировке check ~ контрольный разряд information ~ информационный разряд input ~ вводимая цифра significant ~ значащая цифра digital цифровой digitally цифровом представлении digit-by(to)-digit поразрядный digitize преобразовывать к цифровому ряду digitizer аналого-цифровой преобразователь; графический планшет; сканер dimension размер; измерение direct направлять; управлять; руководить; указывать 223 ение; руководство; указание direction backward ~ обратное направление clockwise ~ направление по часовой стрелке counterclockwise ~ направление против часовой стрелки data ~ направление передачи данных forward ~ прямое направление inverse / reverse ~ обратное направление printing ~ направление печати transmission ~ направление передачи данных directory каталог; справочник; перечень (данных); руководство disadvantage недостаток; неудобство disagreement несоответствие; расхождение; противоречие disappear исчезать; пропадать discharge разгрузка; разгружать, освобождать (систему) disclose раскрывать; обнаруживать disconnect разъединять; отключать; discount не учитывать; не принимать в расчет; скидка discover обнаруживать; выявлять discovery обнаружение; выявление discrete дискретный; отдельный disintegrate разделять (ся); распадаться на составные части disk диск blank ~ пустой диск flexible ~ гибкий диск floppy ~ гибкий, флоппи-диск hard ~ жесткий диск ~ capacity емкость диска 224 dispatch отправлять, сообщение displace перемещать; смещать display дисплей; устройство (визуального) отображения to display an image показывать изображение distinction отличие; различие to distinguish различать; отличать distortion искажение distribute распределять; распространять distributed распределенный; рассредоточенный; распространенный distribution распределение; распространение distributor распространитель; распределитель diversity разнообразие; различие Dolby Digital цифровая схема шумоподавления «Долби» dot точка; ставить точку download загружать; считывать; считывание (файлов) с сервера dramatically эффектно; ярко; заметно; впечатляюще; разительно; поразительно; значительно; сильно drastic решительный to draw рисовать; чертить drive привод; дисковод; запоминающее устройство disk ~ дисковод magnetic-tape ~ запоминающее устройство на магнитной ленте driver драйвер; двигатель print ~ драйвер печати software ~ программный драйвер to drop падать; резко опускаться; снижаться DTS система передачи данных 225 dual layer двуслойный due to благодаря; из-за; вследствие dump разгрузка; дамп; вывод; разгружать сбрасывать; выводить duplication дублирование; копирование duplicator копировальное устройство DVD универсальный цифровой видеодиск DVD-ROM drive DVD привод E edit редактировать; editor редактор; программа редактирования EDO RAM (Extended Data Out RAM) память с расширенными возможностями вывода (с ускоренным доступом и/или с увеличенным временем доступности данных) effect действовать; оказывать воздействие; влияние; эффект effective действенный; результативный efficiency эффективность; коэффициент полезного действия effort усилия; работа e.g. = for example (for instance) например eject выбрасывать; выталкивать; выдавать (данные); выброс; выдача elaborate разрабатывать; развивать elaboration развитие; разработка eliminable устранимый eliminate устранять; удалять; отменять; ликвидировать elimination устранение; отмена e-mail электронная почта e-mailing отправка (сообщений) по электронной почте 226 to embed вводить; внедрять; насаждать to embrace охватывать; содержать emergency авария; чрезвычайная ситуация; аварийный to emit испускать; излучать; выдавать; генерировать (данные) to emphasize выделять; подчеркивать to employ применять empty пустой; свободный enable разрешать; позволять; делать возможным; допускать encapsulate герметизировать; изолировать; помещать (в пакет) to encode кодировать; шифровать encoder шифратор; кодирующее устройство; шифровальщик to encompass заключать; охватывать to encounter (неожиданно) встретить(ся); столкнуться (с кем-л./чем-л.); наталкивать (на трудности и т.п.); столкнуться (с трудностями) to encrypt кодировать engine механизм; устройство enrichment обогащение ensure обеспечивать; гарантировать enter входить; вводить; заносить enterprise-level промышленный entire целый; полный; весь entirely целиком; полностью entry ввод; занесение; вход enumerate перечислять enumeration перечисление; перечень environment среда; окружение; условия (эксплуатации); средства 227 application ~ прикладная среда communications ~ коммуникационная среда computing ~ вычислительная среда ~ Division раздел оборудования execution ~ среда выполнения программы external ~ внешняя среда ~-friendly экологически чистый hardware ~ аппаратная среда management ~ среда / средства управления network ~ сетевая среда processing ~ условия обработки security ~ условия защиты; режим безопасности software ~ программная среда user ~ операционная среда equal равный; одинаковый equality равенство equation уравнение; equip оборудовать; оснащать equipment оборудование; приборы; аппаратура; (аппаратные) средства erase стирать; удалять erasing стирание; удаление; очистка error ошибка; погрешность access ошибка доступа coding программная ошибка common типичная ошибка connection неправильное соединение 228 operating ошибка из-за нарушения правил эксплуатации outstanding неустраненная ошибка permissible допустимая ошибка processing ошибка при обработке данных; погрешность вычисления startup ошибка при начальной загрузке time-out ошибка из-за неготовности устройства к работе unrecoverable неисправимая ошибка handling обработка ошибок trapping ловушка для ошибок error-free не содержащий ошибок еггог-ргоnе подверженный ошибкам espionage шпионаж essence сущность; суть essential существенный; значительный; неотъемлемый; необходимый event событие; случай; исход examination исследование; рассмотрение; просмотр; проверка examine исследовать; проверять except for за исключением exchange обмен; замена execute выполнять; исполнять execution выполнение; исполнение executive диспетчер; управляющая программа; операционная система existence существование; наличие exit выход; выходить expand расширять(ся); увеличивать; наращивать (возможности) 229 expansion расширение; увеличение; experience опыт; квалификация; испытывать (трудности) to exploit использовать exponentiation возводить в степень extend расширять; удлинять extension расширение; дополнение; удлинение; продление extent мера; степень; рамки; пределы; размер; величина external внешний extract выделять; извлекать extraction извлечение; выборка; выделение extremely чрезвычайно; крайне; очень F fabricate изготовлять fabrication изготовление fabrication process процесс производства facility устройство; средство; удобство facilities оборудование; приспособления; возможности; средства communication средства связи database средства (поиска) базы данных display ~ средства (визуального) отображения / вывода на экран management ~ средства управления to fade постепенно исчезать; расплываться; растворяться; ослабевать; постепенно затихать; замирать (о звуках); постепенно уменьшать силу звука или четкость изображения fail сбой; отказ; повреждение; выходить из строя; отказывать; не удаваться failure отказ; повреждение; дефект; сбой; ошибка; неудача 230 famously здорово; лихо; отлично; превосходно fault неисправность; дефект; отказ; сбой; давать сбой; отказывать assembly ~ дефект сборки data ~ ошибка в данных design ~ проектная недоработка device ~ неисправность устройства latent ~ скрытый дефект random ~ случайный сбой /ошибка feasibility возможность; осуществимость; выполнимость feasible возможный; выполнимый; осуществимый feature свойство; признак; особенность; характерная черта fee плата feed подавать; питать; заправлять (бумагу); вводить (данные) feedback обратная связь field поле; область; зона; сфера (деятельности) figurative переносный; метафорический figure цифра; число; вычислять; figure out вычислять; определять file файл; заносить в файл batch ~ пакетный файл common ~ общий файл data ~ файл / картотека данных help ~ файл подсказок input ~ входной файл output ~ выходной файл user ~ файл пользователя 231 ~ recovery восстановление файла firmware встроенное программное обеспечение flagship фланманский корабль; флагман flash вспышка; проблеск; мгновение flexibility гибкость; адаптируемость; настраиваемость; изменяемость flexible гибкий; адаптируемый; настраиваемый; изменяемый floppy гибкий диск; дискета flow ход выполнения (программы); последовательность; проходить flowcharting построение блок-схемы font шрифт; набор символов alpha-numeric ~ текстовый шрифт default ~ шрифт, выбираемый по умолчанию; стандартный шрифт plotter ~ чертежный шрифт print / type ~ печатный шрифт foolprof защищенный от неправильного использования force сила; усилие; вынуждать; заставлять; вводить, вставлять (с силой) foresee предвидеть fraction дробь; доля; часть frame блок (данных); структура; система; корпус framework структура; система; схема; основа; основания; принципы fraud мошенничество; обман frequency частота frustration крушение; разочарование fulfill выполнять; осуществлять; завершать fulfillment выполнение; осуществление; завершение 232 fundamental основной; существенный; фундаментальный; furnish поставлять; снабжать G gadget приспособление; вспомогательное устройство gadget приспособление; вспомогательное устройство gain достигать; извлекать пользу; выигрывать; выгода; усиление garment одежда gather собирать(ся) geared counter wheels зубчатые счетные колесики general общий; универсальный; generate генерировать; создавать; производить generation создание; формирование; образование; поколение to get tired уставать give back возвращаться give out выдавать; предоставлять give up отказывать (об устройстве); не справляться; отказываться glide скользить glance взгляд; бросить взгляд to glue приклеиваться; прилипать; склеиваться grade степень; ранг; класс; сорт; упорядочивать; размещать по рангу grading классификация; упорядочивание; выравнивание to graduate from заканчивать ВУЗ grapher самописец graphic(al) графический ~ plotting tables графические планшеты 233 графика graphics ~ bus графическая шина gross sales оптовые продажи groundwork основа; основание guard защита; защищать; предохранять guidance управление; наведение (на цель); руководство guide руководство; инструкция; справочник installation ~ инструкция по установке (системы) on-line ~ электронный справочник programming ~ руководство по программированию reference ~ справочное руководство software ~ руководство по программному обеспечению troubleshooting ~ основные принципы поиска неисправностей user's ~ руководство для пользователя H навык; привычка; свойство habit computing ~s навыки работы с компьютером to handle управлять handling обработка; управление; регулирование data ~ работа с данными fault / error ~ обработка ошибок hand-operated управляемый вручную hand over передавать hand-printed машинописный hang (up) «зависать»; блокировать hardware аппаратура; оборудование; аппаратное обеспечение /средства 234 by ~ аппаратными средствами computer ~ аппаратное обеспечение компьютера device ~ аппаратная часть устройства display ~ аппаратные средства вывода на экран expansion ~ дополнительное аппаратное обеспечение support ~ аппаратное обеспечение harm вред; ущерб; повреждение harmful вредный harmless безвредный (о вирусе) heading заголовок healthy исправный; работоспособный (о системе); незапорченный “heart-lung” apparatus аппарат «сердце-легкие» help подсказка; справка; помошь hereafter далее; в дальнейшем hereby таким образом; тем самым heuristic techniques эвристические приемы (методы) hierarchy иерархия high-capacity большой емкости high-density с высокой плотностью high-end высокобюджетный; мощный; профессиональный; высококачественный; высокго класса; с широкими функциональными возможностями high-fidelity (Hi-fi) с высокой точностью воспроизведения high-frequency высокочастотный high-level высокоуровневый high-quality высококачественный high-reliable высоконадежный 235 higher-performance более высокая производительность hold хранить; содержать (данные) hole отверстие; гнездо; окно access ~ окно доступа connector ~ гнездо разъема holographic голографический home начало; исходная позиция hook рычаг hook-up подключать; подсоединять (устройство) housekeeping operations вспомогательные операции human-oriented ориентированный на пользователя hurt повреждение; вред; ущерб; повреждать; вредить hypertext гипертекст Hyper-threading технология Hyper-threading I icon условный символ; пиктограмма; изображать условно identical тот же самый (об одном предмете); такой же; одинаковый; идентичный (to, with) Identification Division раздел идентифиации identifier идентификатор; имя; обозначение identify идентифицировать; распознавать; выявлять (ошибку) ignorance незнание ignorant несведущий; не знающий imbed встраивать; внедрять; включать immeasurably неизмеримо; безмерно immunity невосприимчивость; нечувствительность impact влияние 236 implement выполнять; осуществлять implementation реализация; осуществление; разработка; внедрение implementor конструктор; разработчик imply подразумевать; означать impose возлагать; налагать improper непригодный; недопустимый; неправильный; неподходящий improve улучшать; уточнять (данные) improvement улучшение; усовершенствование; уточнение (данных) inaccurate неточный; ошибочный inadequate несоответствующий; непригодный; неприемлемый in a split second в долю секунды incapable неспособный include включать; содержать incompatible несовместимый inconsiderable незначительный incorporate включать; содержать; встраивать; внедрять increase увеличивать; возрастать; увеличение; повышение incredible невероятный; неслыханный; потрясающий independent независимый to indicate показывать an indium-antimony compound with a refractive index соединение индия с сурьмой с показателем преломления to infect заразить inferior низший; худший (по качеству) influence влияние; воздействие; влиять; воздействовать initial первоначальный; исходный 237 initially первоначально; в исходном состоянии inject вносить; вводить injection внесение; введение injury повреждение; порча ink-jet струйный (о принтере) innovate вводить новшества; усовершенствовать innovation нововведение; новшество; усовершенствование innovative новаторский; инновационный in order to для того, чобы input ввод; входное устройство; вводить; подавать на вход character ~ посимвольный ввод command ~ ввод команды data ~ ввод данных; устройство ввода данных disk ~ ввод (данных) с диска keyboard ~ ввод с клавиатуры system ~ ввод по запросу системы input/output устройство ввода/вывода inquiry запрос; опрос in respect to в ответ на to insert вставлять install устанавливать; монтировать installation установка; размещение; монтаж; вставка; настройка instead of вместо integrated circuit интегральная схема “intelligent” умный intensification усиление; увеличение intensity сила; глубина; интенсивность 238 intentional умышленный to intercept перехватить interdependent взаимозависимый интерфейс; сопряжение; место стыковки; сопрягаться) interface common ~ стандартный интерфейс data ~ информационный интерфейс database ~ интерфейс (программы) с базой данных external ~ внешнее сопряжение flexible ~ гибкий / настраиваемый интерфейс floppy-disk ~ интерфейс гибкого диска general-purpose ~ универсальный интерфейс software/hardware ~ интерфейс ввода-вывода in terms of на языке; с точки зрения internal внутренний interprete интерпретировать; истолковывать interpreter интерпретатор; переводчик interrupt прерывание; прерываться intersectoral exchange fund промежуточный обменный фонд intricate сложный; запутанный introductory вводный; вступительный; начальный; предварительный to introduce вводить an instruction decoder дешифратор команд an instruction register регистр команд while an instruction is being executed во время выполнения команды intrusion вторжение 239 invade вторгаться; проникать invalid неверный; недопустимый; недействительный; необоснованный invalidate аннулировать; отменять invalidity неверность; недопустимость; необоснованность invasion вторжение; проникновение investigate исследовать; расследовать investigation исследование invisible невидимый; неразличимый involve включать; вовлекать; вызывать irregular неправильный; непостоянный; нестандартный irrelative несвязанный; несущественный; не относящийся к делу irreplaceable не подлежащий замене; несменный issue вывод; выдача; выводить; выдавать (сообщение); посылать item элемент; составная часть J jack гнездо jam заедание; заклинивание job работа; задание; работать Job Control управление потоком заданий join соединение; соединять Josephson-junction emory запоминающее устройство с переходом Джозеф joystick джойстик (рычажковое устройство) junction соединение; стык Just as …, so … точно также как …, так и … justification выравнивание (данных); обоснование; доказательство 240 выравнивать; обосновывать; доказывать; оправдывать justify K KB килобайт (1024 байта) to keep track of numbers удерживать след чисел kernel сердцевина; ядро key клавиша; кнопка; переключатель break ~ клавиша прерывания control <Ctrl> ~ управляющая клавиша delete ~ клавиша удаления end ~ клавиша перехода в конец enter ~ клавиша ввода erase ~ клавиша удаления escape ~ клавиша выхода home ~ клавиша перехода в начало insert ~ клавиша вставки page-down ~ клавиша листания вперед page up ~ клавиша листания назад pause ~ клавиша остановы (паузы) reset ~ кнопка сброса shift ~ клавиша переключения регистров keyboard клавиатура; клавишный kind вид; разновидность knock out выбивать know-how технология; методика; знания; приемы; жарг. ноу-хау knowledge знания; осведомленность ~ based system экспертные системы be common ~ быть общеизвестным 241 programming ~ знания в области программирования осведомленный; компетентный knowledgeable L lack отсутствие; недостаток lagging отставание; запаздывание language all-purpose / generalpurpose ~ универсальный язык artificial ~ искусственный язык assembler ~ язык ассемблера business-oriented ~ язык для (программирования) экономических задач compiler ~ язык компилятора data ~ информационный язык database ~ язык для работы с базой данных high-level ~ язык высокого уровня low-level ~ язык низкого уровня modelling / simulation ~ язык моделирования programming / development ~ язык программирования latency скрытое состояние; задержка между стимулом и реакцией launch запускать (программу); вводить в действие layout размещение; распределение lead [led] свинец learn-on-line обучаться с помощью компьютера letter буква; символ level уровень; выравнивать access ~ уровень доступа 242 data ~ информационный уровень device ~ уровень устройств error ~ уровень ошибки hardware ~ аппаратный уровень input ~ уровень входного сигнала output ~ выходной уровень performance ~ степень быстродействия presentation ~ уровень представления protection / security ~ уровень / степень защиты software ~ программный уровень transmission ~ уровень передаваемого сигнала Librarian программа «Библиотекарь» lifetime срок службы life support жизненный средства к существованию the light incidence угол падения света the light emerging появление света line строка; линия; шина; канал linear линейный link связь; соединение; связывать; соединять linkage Editor программа «Редактор связей» list список; перечень; таблица listing распечатка; перечень; представление в виде списка literacy грамотность literally буквально literate грамотный load загружать; заправлять (ленту); груз loading загрузка; заправка; 243 locate размещать; располагать location местоположение; позиция logic логика; логическая последовательность; логический блок processing ~ логическая последовательность обработки program ~ логическая последовательность выполнения программы to look forward ожидать с нетерпением loop цикл; петля; виток; контур looping logic логическая схема выполнения (операций) в цикле loss потеря; затраты ~ of performance снижение быстродействия / пропускной способности ~ of productivity снижение производительности труда data ~ потеря данных low-end низкобюджетный; дешевый; любительский lower понижать; уменьшать ~ manufacturing снижение производительности M macro definitions макроопределения magnetize намагничивать mail (электронная) почта main главный; основной maintain поддерживать; сохранять; эксплуатировать malfunction сбой; отказ; неисправность; отказывать; давать сбой manage управлять; организовывать management управление; регулирование; организация data ~ работа с данными database ~ управление базой данных error ~ управление обработкой ошибок 244 software ~ разработка и сопровождение программного обеспечения task ~ управление ходом выполнения задач manipulate управлять; манипулировать; обрабатывать manipulation управление; работа; обработка; преобразование manipulator блок обработки manual руководство; справочник; инструкция; описание help ~ справочное руководство operation ~ руководство по эксплуатации manufacture изготовлять; производить; разрабатывать manufacturer изготовитель; производитель; разработчик many-fold increase многократное увеличение mark признак; метка; знак; помечать; обозначать; выделять to master овладеть match сопоставлять; сравнивать; согласовывать; соответствовать matchmaker антрепренер; человек, улаживающий спор mean значить; подразумевать; средство meaning значение; смысл means средства; способ measure измерять; мера; критерий measurement измерение; размер medium (pl media) среда; носитель; средство; способ; средний data ~ носитель данных input ~ носитель для входных данных; способ ввода (данных) output ~ носитель для выходных данных; способ вывода portable / removable ~ съемный носитель удовлетворять (условию); отвечать; соответствовать meet ~ the demands удовлетворять нужды, потребности 245 /requirements память; запоминающее устройство memory additional ~ добавочная память core ~ оперативная память extended ~ дополнительная память external ~ внешняя память high-capacity ~ память большой емкости internal ~ внутренняя память main ~ основная память random-access ~ (RAM) оперативное запоминающее устройство (ОЗУ) read-only ~ (ROM) постоянное запоминающее устройство (ПЗУ) secondary ~ вторичная память merge слияние; объединение; сливать(ся); объединять(ся) message сообщение; запрос; посылать сообщение metaphoric figure of speech метафорический образ речи meter измерительный прибор; датчик; счетчик metering измерение MHz мегагерц micro = microcomputer микрокомпьютер military военный minor незначительный, несущественный, второстепенный; легкий, несерьезный minority меньшинство; меньшее число missile снаряд; метательный предмет mode способ; метод; режим free-running ~ режим свободного доступа 246 operating ~ рабочий режим programming ~ режим программирования read-only ~ режим доступа к данным без возможности их изменения moderate умерять; смягчать modification модификация; изменение; вариант; версия modify модифицировать; изменять; преобразовывать monitor монитор; дисплей; наблюдать: контролировать; следить monitoring мониторинг; наблюдение: контроль mostly главным образом; большей частью; преимущественно motherboard материнская плата; объединительная плата; системная плата mouse мышь movable перемешаемый; подвижный; съемный move двигать; перемещать; передвигать; переходить movement движение; перемещение MPEG-2 стандарт сжатия движущегося изображения и звука The MultiMedia Compact Disc (MMCD) Мультимедийный компакт — дис multimedia software мультимедийное программное обеспечение multiple множественный; многокомпонентный; составной multiplication умножение; усиление multiply умножать; усиливать; увеличивать multi-processing многопрцессорная обработка данных mutual взаимный; общий; совместный N need потребность; необходимость; требовать(ся); быть необходимым network сеть; схема; контур 247 ~ drive сетевой накопитель noncomparable несравнимый noncompatible несовместимый noncompatible невычисляемый noncontrollable неуправляемый north-south Север — юг notation запись; представление; обозначение binary ~ двоичная система notepad блокнот for nudging для выталкивания NTSC телевизионный стандарт number число; количество; цифра numeric числовой; цифровой numerous многочисленный O obey подчиняться; выполнять команду objective цель; целевая функция; требование observation наблюдение; отслеживание observe наблюдать; следить; соблюдать (правила) obtain получать; достигать occur происходить; случаться offset офсет; возмещать on-board расположенный на плате; встроенный; бортовой ongoing продолжающийся; постоянный; непрерывный on-line неавтономный; подключенный к компьютеру onset начало; ввод в действие open открывать; начинать; размыкать 248 операнд operand address ~ адресный операнд operate работать; действовать; функционировать operation работа; действие basic ~ основной режим работы cancel ~ операция отмены computer ~ работа компьютера debugging ~ работа в режиме отладки error-free ~ безотказная работа exchange ~ операция обмена input / output ~s операции ввода — вывода opportunity возможность option выбор; вариант; средство; возможность optionally необязательно; по усмотрению; при желании order команда; порядок; последовательность ~ of execution последовательность выполнения ~ of use очередность использования put in ~ приводить в порядок outline контур; очертание; схема; план; краткое изложение out-of-order неисправный output вывод; выход; устройство вывода; выводить hard-copy ~ распечатка; данные, выведенные на печать soft-copy ~ данные, выведенные на экран outset начало; начинание to overlay лежать; класть сверху the overwhelming majority подавляющее большинство 249 P пакет; блок; модуль package application ~ прикладной пакет data ~ пакет данных packaged software готовое программное обеспечение PAL телевизионный стандарт PAL particularly очень; чрезвычайно password пароль pattern шаблон; образец; форма ~ recognition распознавание образов PCM кодово-импульсная модуляция, импульсно — кодовая (способ координирования аналогового сигнала для передачи его в форме цифрового потока с полосой 61 Kbps) pebbles голыш; галька; булыжник реn перо graphic / light ~ световое перо penetrate проникать penetration проникновение percive воспринимать perform выполнять; осуществлять; работать; действовать performance (рабочая) характеристика; производительность; быстродействие; режим работы; исполнение; выполнение application ~ скорость работы прикладной программы computer ~ быстродействие компьютера device ~ скорость работы устройства error ~ скорость исправления ошибок execution ~ скорость выполнения (программы) 250 memory ~ скорость доступа к памяти; скорость выборки network ~ пропускная способность processor ~ быстродействие процессора permission разрешение permit разрешать; допускать permitted допустимый persist упорствовать; сохранять pervade распространять; охватывать photocell фотоэлемент pick выбирать; извлекать playback воспроизведение; проигрывангие plotter графопостроитель plug штепсель; вилка; штекер; подключать; подсоединять point точка; место; узел; суть; указывать; отмечать in ~ of в отношении (чего-л.) ~ out указывать; отмечать pointer указатель; стрелка polynomial полиномиальный possess владеть; захватывать potent могущественный; мощный; убедительный power мощность; энергия; питание ~ supply источник питания powered by tiny semiconductor chips приводимые в действие крошечными полупроводниковыми кристаллами (чипами) precautions меры предосторожности precisely точно; определенно predefined symbols заранее заданные символы 251 predict предсказывать; прогнозировать predominant преобладающий predominate преобладать; доминировать prefer предпочитать prepare подготавливать; составлять pressure давление presumably предположительно; возможно; вероятно prevent from предотвращать; предохранять; препятствовать prevention предотвращение; предупреждение primarily главным образом; преимущественно; в основном print печатать; выводить на экран ~ engine механизм печати ~ head головка печати принтер; печатающее устройство printer character ~ символьный принтер dot-matrix ~ точечно — матричный принтер graphical / image ~ графический принтер impact ~ контактный принтер ink-jet ~ струйный принтер laser ~ лазерный принтер letter-quality ~ принтер с типографским качеством печати line (at-a-time) ~ принтер с построчной печатью page (at-a-time) ~ ~ принтер с постраничной печатью print out распечатка; вывод на печать или экран procedure процедура; процесс; метод; алгоритм accounting ~ процедура учета computational ~ алгоритм вычислений 252 control ~ метод управления error-correcting ~ процедура / алгоритм исправления ошибок formatting ~ процедура / процесс форматирования installation ~ процедура / процесс установки (системы) solution ~ алгоритм решения process процесс, обработка; обрабатывать processing обработка (данных) processor процессор; программа обработки control ~ управляющий процессор data ~ программа обработки данных error ~ блок обработки ошибок general-purpose ~ универсальный процессор image ~ графический процессор mail ~ программа обработки сообщений электронной почты message ~ программа обработки сообщений numeric ~ числовой процессор special-purpose ~ специализированный процессор text / word ~ текстовый процессор product development выпуск продукции program программа; план; программировать access ~ программа для доступа application ~ прикладная программа archived ~ заархивированная программа binary ~ программа в двоичном коде common ~ часто используемая, распространенная программа compatible ~ совместимая программа debugging ~ программа отладки 253 educational ~ обучающая программа free ~ бесплатная программа general-purpose ~ универсальная программа high-performance ~ программа, выполняемая с большой скоростью incompatible ~ несовместимая программа machine language ~ программа в машинном коде off-line несетевая программа on-line сетевая программа processing программа обработки protected-mode программа, выполняемая в защищенном режиме remote дистанционная программа running выполняемая программа self-loading самозагружающаяся программа simulation программа моделирования support вспомогательная программа utility сервисная программа watch-dog сторожевая программа programmable программируемый programmer программист programming программирование environment среда программирования language язык программирования prompt подсказка; запрос proof-read считывать с целью проверки (правильности записи) proof-reader корректор properly правильно; как следует property свойство; качество; собственность pl. параметры; 254 характеристики propose предлагать; предполагать protect защищать protection защита; система / средства защиты protector защитное устройство; предохранитель provide доставлять; обеспечивать; снабжать; предусматривать provided при условии, что; в том случае, если; только если provider поставщик; провайдер provision обеспечение; снабжение; pl. средства pulse импульс punch пробивать (отверстия) punched card перфокарта purchase покупать purpose цель; (пред) назначение push нажимать; толкать push-button кнопка Q quality качество; свойство; характеристика image качество изображения running рабочая характеристика quantity количество; число; величина; значение absolute абсолютная величина alternating переменная величина continuous непрерывная величина digital числовое значение discrete дискретная величина input входная / вводимая величина 255 unknown неизвестная величина variable переменная величина quit выход (из программы); выходить (из программы) quitting выход (из программы) R raise поднимать; повышать; увеличивать; подъем; повышение RAM память (запоминающее устройство) random случайный; произвольный random-access с произвольным доступом memory (RAM) память с произвольным доступом range диапазон; область; интервал; выстраивать в ряд; располагать в порядке rapid быстрый; скорый rate степень; скорость; быстрота; оценивать; определять; устанавливать of change скорость изменения of exchange скорость обмена of response быстрота реакции ratio отношение; коэффициент; соотношение reader устройство считывания bar-code устройство считывания штрих-кода character устройство считывания / распознавания знаков reading чтение; считывание read-only работающий только в режиме чтения read-out считывающий reason причина; основание; довод; обосновывать; заключать reasonable разумный; допустимый 256 to recall отзывать receive принимать; получать receiver приемное устройство record запись; регистрация; записывать; регистрировать recorder устройство / программа регистрации; самописец data устройство регистрации данных tape запись на (магнит.) ленту to recycle повторно использовать red blood cells красные кровяные шарики redirect перенапрвить reduce уменьшать; сокращать; понижать; сжимать ~ precision уменьшить точность reduction уменьшение; сокращение; понижение; сжатие (данных) reel катушка; бобина reference ссылка; сноска; справочник; руководство computer руководство по работе с компьютером hardware документация по аппаратному обеспечению for для справки in to по отношению к make ссылаться; упоминать user руководство для пользователя without to независимо от referenced вызываемый; указываемый reflective отражающий; отражательный to regain обретать снова; возвращать себе; восстанавливать regardless несмотря на; независимо от register регистр; устройство регистрации; счетчик; датчик; 257 запоминать; выражать address адресный регистр base базовый регистр cash кассовый аппарат clock счетчик времени; таймер command / instruction регистр команд counter регистр счетчика general-purpose регистр общего назначения memory / storage регистр памяти operand регистр операнда special-purpose регистр специального назначения relate связывать; иметь отношение relation отношение; соотношение; зависимость; связь relative относительный relatively относительно release освобождать; выпускать reliability надежность reliable надежный reload перезагружать; повторная загрузка Relocated library перемещаемая библиотека rely основывать(ся); полагать(ся) to remain оставаться; находиться remote дистанционный remote-controlled дистанционно управляемый control program программа дистанционного управления management дистанционное управление remove удалять; устранять; убирать 258 rename переименовывать rendering program программа рендеринга/стереопоказа reoxane реоксан (полимер) repertoire репертуар replace заменять; замещать replacement замена; замещение; смена; подстановка represent представлять representation представление pictorial / picture графическое представление request просьба; заявка require требовать requirement требование; необходимое условие; потребность research исследование; изучение; исследовать to resemble походить; иметь сходство reset сброс; восстановление; возврат в исходное состояние; сбрасывать; восстанавливать button кнопка сброса computer перезагружать компьютер to resolve решать(ся); принимать решение resource ресурс; средство; возможность data информационный ресурс printer средство вывода на печать security средство защиты software программный ресурс storage ресурс памяти resolution разрешающая способность экрана respect отношение; учитывать; принимать во внимание; соблюдать 259 respectively в указанном порядке; соответственно; соотвтсвующим образом respond отвечать; реагировать response отклик; реакция; ответ time время реакции responsibility ответственность responsible ответственный restore восстанавливать; возвращать (в прежнее состояние) to restrict Ограничивать (в пределах чего-либо) restriction ограничение resume возобновлять, продолжать retail розничный; продающий в розницу retain сохранять; удерживать retire выходить на заслуженный отдых retrieve отыскивать; извлекать, выбирать (данные); восстанавливать (файл) retry выполнять повторно; повторять reusable многократно используемый reverse возвращать; двигать в обратном направлении; перематывать назад; обратный ход reversibility обратимость; возможность изменить направление на противоположное reversible обратимый; реверсивный reversion возвращение; возврат ribbon лента a rigid off-repeated programme жесткая неоднократно повторяющаяся программа rival соперник; конкурент; соперничающий; конкурирующий roller ролик; валик 260 rotate вращать(ся); чередовать(ся) rotation вращение; чередование; смена routine (стандартная) программа / операция; (установленный) порядок ruggedness прочность rule правило; управлять; руководить ruler (масштабная) линейка run выполнять, запускать (программу); работать; запуск; прогон; выполнение running запуск; выполнение; работа run-time version исполняемая версия S safe безопасный; надежный safety безопасность; надежность save сохранять; сберегать scale шкала; масштаб; определять масштаб; сводить к определенному масштабу; устанавливать пропорции, соотношения scaling масштабирование scan просмотр; сканирование; развертка; просматривать scanner сканер; устройство оптического считывания bar-code ~ устройство считывания штрих-кода color ~ цветной сканер hand / manual ~ ручной сканер laser ~ лазерный сканер optical / visual ~ оптический сканер scanning просмотр; поиск; развертка; считывание; сканирование scent аромат; запах; чутье 261 schedule план; расписание; график; составлять; назначать; планировать scheduling составление расписания или графика; планирование science наука; теория scientific научный scientist ученый computer ~ специалист по вычислительной технике и информатике second-year student второкурсник screen экран; отображать на экране ~ saver хранитель экрана screening вывод на экран SDRAM синхронное динамическое ЗУПВ (работающее одновременно с двумя областями адресов) search поиск; искать; просматривать security безопасность; сохранность seed зерно; сеять seek искать; поиск select выбирать; выделять (на экране) selection выбор; выделение color ~ выбор цвета directory ~ выбор каталога drive ~ выбор дисковода / привода function ~ выбор функции keyboard ~ выбор клавиатуры security ~ выбор способа защиты selective отбирающий; выбирающий selectivity избирательность 262 полупроводник semiconductor bipolar ~ биполярный полупроводник metal-oxide ~ структура металл — оксид полупроводник sensibility чувствительность sensitive чувствительный sensor датчик sensory capability сенсорная способность (способность воспринимать) separate отделять(ся); отдельный; изолированный separation разделение; отделение sequence последовательность alphabetic ~ алфавитный порядок arithmetic ~ последовательность арифметических операций binary ~ двоичная последовательность character / string ~ порядок следования символов code ~ последовательность кодов command / instruction ~ порядок выполнения команд data ~ порядок размещения данных digital ~ цифровая последовательность historical ~ хронологическая последовательность increasing ~ возрастающая последовательность in ~ последовательно; по порядку out of ~ не по порядку serve обслуживать; служить server сервер; обслуживающая / сервисная программа service обслуживание; услуги; сервис data ~ информационная услуга debugging ~ средство отладки 263 installation ~ (сервисная) программа начальной установки memory ~ программа обеспечения доступа у памяти running ~ выполняемая сервисная программа security ~ служба безопасности; средство защиты servo tracking technology технология вспомогательного трекинга set набор; совокупность; серия ~ of actions совокупность действий ~ of guidelines набор рекомендаций ~ of keys группа клавиш ~ of rules набор правил ~ of utilities набор сервисных программ ~ off отключать ~ on включать severe строгий, суровый; требовательный shape форма; придавать форму share совместно использовать; делиться (информацией); часть; доля sharing совместное использование; коллективный доступ; разделение shell раковина, оболочка, кожура shift сдвигать; перемещать; сдвиг; смещение; смена регистра to ship выйти в свет; появиться shortcoming недостаток; изъян; дефект sibling брат или сестра; потомство одних родителей to side примкнуть; поддерживать (кого — либо) sign знак; символ significance значимость; важность; значительность; значение; смысл 264 silicon кремний similar подобный; аналогичный similarity сходство; подобие similarly подобным образом; так же simple-to-use простой в использовании simplicity простота simplify упрощать(ся) simplifying упрощающий simulate моделировать; имитировать simulation моделирование; имитация simulator имитатор; тренажер; программа моделирования / имитации single layer однослойный skill навык; мастерство skip пропускать; переходить slab кусок; плита slide скользить; сдвигать; смещать ~ rule логарифмическая линейка slim слабый, скудный, небольшой slot гнездо; разъем; щель; ниша; слот; область памяти, занимаемая страницей ~-based слотовая основа bus ~ гнездо для подключения к шине expansion ~ разъем для модуля расширения small-dimensioned малогабаритный socket гнездо soft программный; программируемый; электронный (о копии); мягкий 265 программное обеспечение; программные средства software ~ compatibility программная совместимость ~ engineering технология проектирования программного обеспечения ~ package программный пакет ~ program прикладная программа application ~ прикладное программное обеспечение database ~ программное обеспечение для работы с базой данных educational ~ программные средства обеспечения management ~ управляющие программы simulation ~ программные средства моделирования solid body твердое тело; кристалл; полупроводник solution решение solve решать (проблему) sophisticated сложный sound звук; звуковой сигнал ~ board звуковая плата ~ card звуковая плата источник; исходное устройство; исходная программа source ~ code исходный код light ~ источник освещения ~ Statement library текстовая библиотека исходных программ пространство; область space ~ exploration исследование космоса ~ ship космический корабль ~ vehicle космический летательный аппарат special counter wheel специальное счетное колесико specialty специальность 266 specific особый; особенный; определенный; конкретный specifications (технические) характеристики, требования specifics специальные черты; характерные особенности specify задавать; определять; указывать; специфицировать speed скорость; спешить; ускорять ~ of operation быстродействие ~ of response скорость реакции spin вращение; верчение spray распылять; разбрызгивать spread разброс (значений); протяженность; продолжительность ~ out расширять(ся); распространять(ся) network ~ протяженность сети stable стойкий; устойчивый; крепкий; прочный stand for обозначать stand-alone автономный stare at уставиться на start запуск; начало; запускать state состояние; режим; сообщать; утверждать; констатировать; заявлять; формулировать active ~ рабочее состояние control ~ режим управления default ~ стандартный режим (выбираемый по умолчанию) emergency ~ аварийное состояние read-only ~ режим чтения без (возможности) записи statement заявление, отчет, баланс step шаг; этап; стадия; ступень one ~ at a time поэтапно; постепенно 267 ~ down понижать, уменьшать ~ out выходить (из окна, цикла) ~ up повышать; увеличивать conversion ~ этап преобразования данных program ~ шаг программы programming ~ этап программирования step by step пошаговый; поэтапный ~ instructions поэтапные команды sticky липкий, ткгой stock запас; снабжать ~ broker биржевой брокер ~ market forecasting биржевые прогнозы storage запоминающее устройство; память; хранение; запоминание archival ~ архивная память available ~ доступная память buffer ~ буферная память computer ~ запоминающее устройство / память компьютера data ~ хранение данных input ~ хранение входных данных intermediate ~ промежуточное запоминающее устройство internal ~ внутренняя память magnetic-disk ~ запоминающее устройство на магнитных дисках magnetic-tape ~ запоминающее устройство на магнитных лентах основная память; оперативное запоминающее устройство main ~ (ОЗУ) автономное запоминающее устройство; автономное off-line ~ хранение 268 on-line ~ оперативно доступная память; неавтономное хранение sequential-access ~ запоминающее устройство с последовательным доступом ~ unit память variable ~ память для хранения переменных store хранить; запоминать; заносить / размещать в памяти string строка; последовательность ~ of characters последовательность символов subsequent последующий; дальнейший subsequently в дальнейшем; затем; впоследствии substantial действительный, материальный, реальный, реально существующий; основной, главный; важный, значимый, значительный, немаловажный, существенный, большой substantially по существу; в основном; большей частью; главным образом; существенно, в значительной степени substitute заменять; замещать substitution замена; подстановка subtitle субтитр; надпись под изображением subtract вычитать subtraction вычитание success успех successful успешный succession последовательность successor следующий член (последовательности); очередная версия; преемник suit походить; соответствовать suitable подходящий; соответствующий suite набор; комплект; группа; серия protocol ~ набор протоколов 269 software ~ комплект программных средств superior лучший, превосходный, лучшего качества; превосходящий, больший to supersede заменять; замещать; смещать; вытесныть; занимать (чье-л.) место supplement дополнение; приложение supplier поставщик supply подача; питание; ввод; подавать; вводить; снабжать data ~ ввод данных paper ~ подача бумаги power ~ источник питания support поддержка; обеспечение; поддерживать; обеспечивать surface поверхность a surgeon хирург surround окружать ~ sound многоканальный звук surrounding окружающий; соседний switch переключать; переставлять; переключатель; коммутатор ~ between programs переходить к выполнению другой программы ~ between windows переходить из одного окна в другое ~ gears переключать мощьности ~ in / on включать; запускать ~ off выключать; отключать ~ over переключать binary ~ двоичный переключатель button ~ кнопочный переключатель reset ~ кнопка сброса 270 система; установка; устройство; способ; принцип; методика system artificial-intelligence ~ система искусственного интеллекта assistance / help ~ справочная система basic input / output ~ базовая система ввода — вывода closed ~ замкнутая система common ~ распространенная система disk operating ~ дисковая операционная система executive / operating ~ операционная система general-purpose ~ универсальная система healthy ~ исправная система ~ Resident unit системное резидентное устройство ~ Service program системная сервисная программа T table таблица tabulate табулировать; заносить в таблицу tabulation занесение в таблицу take брать; выбирать (команду); принимать (вид, значение) ~ advantage of воспользоваться ~ саге принимать меры; проследить ~ into account / учитывать; принимать во внимание consideration ~ notes записывать; регистрировать tape магнитная лента устройство получения резервных копий на магнитной ~ backup unit ленте ~ decks комплекты (наборы) перфолент ~ drive накопитель на магнитной ленте 271 метод; способ; техника; технические приемы; методика technique advanced ~ усовершенствованная методика; современная технология computing ~ вычислительная техника display / video ~ техника отображения; способ вывода на экран formatting ~ способ форматирования hardware ~ метод аппаратного решения measuring ~ измерительная техника numerical ~ метод числовых вычислений programming ~ методика программирования software ~ метод программного решения technology технология; техника; методика; методы; способы template шаблон; маска; образец; форма temporarily временно terminal терминал; зажим; вывод; конец alphanumeric ~ текстовый терминал character ~ текстовый терминал point-of-sale ~ кассовый терминал remote ~ удаленный терминал security ~ защищенный терминал ~ adapter терминальный адаптер ~ mode терминальный режим textural текстурный thin-film magnetic medium тонкопленочный магнитный носитель thorough тщательный; подробный thoroughly тщательно; как следует thread зд. нить, трэд (в мультизадачных средах: подпроцесс, запускаемый другим процессом в адресном пространстве 272 этого (запускающего) процесса) threat угроза at a time за одно время (одновременно) timing хронометрирование; согласование во времени; расчет времени tin and cardboard жесть и картон tiny сверхмалый; крошечный title заголовок; название toggle тумблер; переключатель tool средство; инструмент total общий; суммарный; совокупный; итоговый; весь; целый touch pad сенсорная панель tracing слежение; поиск; выявление; определение; трассировка fault ~ поиск неисправностей track след; траектория; путь; следить; прокладывать путь trackball трекбол transaction транзакция; группа операций; сделка transfer передача; пересылка; переход; передавать; пересылать; переносить ~ rate скорость пересылки transform преобразовывать; превращать; трансформировать transformation преобразование; трансформация transformational, transformative трансформационный; связанный с преобразованием transformer преобразователь; устройство преобразования; трансформатор transition переход; превращение; модификация translate транслировать; преобразовывать; переводить 273 translator транслятор; преобразователь transmission передача; пересылка; распространение; пропускание transmit передавать; посылать; пропускать transmitter передатчик; датчик; преобразователь transfer переносить, перемещать transfer rate скорость передачи данных transparent прозрачный; незаметный; просвечивающий transparently с соблюдением прозрачности; незаметным образом trapping вылавливание; перехват error ~ поиск ошибок tremendous громадный, огромный trial испытательный, пробный; контрольный trigger пусковая кнопка the triggering light beam запускающий световой луч trouble неисправность; pl.нарушения; неполадки; трудности; затруднения troubleshoot искать неисправности; диагностировать; отыскивать ошибки troublesome досадный, хлопотный tuner ручка настройки; программа настройки (параметров) tuning настройка; регулирование Turion 64 Турион 64 turn поворот; оборот; виток; вращать; поворачивать; превращать in its ~ в свою очередь ~ off выключать; отключать ~ on включать; запускать tutorial обучающая программа; средство обучения; учебное 274 пособие тип; вид; разновидность; способ; шрифт; печатать; выводить на печать type ~ in вводить с клавиатуры ~ out выводить на печать; распечатывать heavy ~ жирный шрифт italic ~ курсив typewriter ~ машинописный шрифт печатающее устройство typewriter U unable неспособный unacknowledged неподтвержденный (о приеме сообщений) unaided eye невооруженный глаз unattached неподсоединенный unauthorized user неавторизованный пользователь unbelievable невероятный; неправдоподобный unchanged неизменный; неизмененный uncontrollable неуправляемый; нерегулируемый; неконтролируемый underline подчеркивать underside нижняя часть; дно, низ; оборотная сторона undertake предпринимать undo отменять; отмена unit устройство; модуль; механизм; узел; блок; элемент ~ of data блок данных ~ of language элемент языка ~ of measurement единица измерения ~ of memory блок памяти 275 arithmetic ~ арифметическое устройство arithmetic and logical ~ арифметико-логическое устройство central processing ~ центральный процессор computing ~ вычислительное устройство control ~ устройство управления input ~ устройство ввода input / output ~ блок ввода-вывода operational ~ работающее устройство output ~ устройство вывода power (supply) ~ блок питания processing ~ устройство обработки; процессор programming ~ устройство программирования; программатор reader ~ считывающее устройство recording ~ записывающее устройство storage ~ запоминающее устройство unlawful незаконный unload выгружать; удалять из памяти unplug вынимать (разъем из гнезда); отсоединять; отключать unplugging отсоединение; отключение unsanctioned несанкционированный unsanctioned acces несанкционированный доступ unsuitable неподходящий; непригодный unused core storage неиспользованная часть ОЗУ usage использование; применение; эксплуатация use польза; использовать; применять in ~ используемый; задействованный of ~ полезный 276 of general ~ общеупотребительный of no ~ бесполезный make ~ of применять; использовать used используемый; применяемый useful полезный; пригодный useless бесполезный user пользователь; абонент advanced / expert ~ квалифицированный пользователь utility полезность; пригодность; (сервисная) программа; вспомогательное средство up-to-date мая последняя версия программы utilize использовать V valid правильный; допустимый validity правильность; адекватность; допустимость; пригодность valuable ценный; полезный value значение; величина; значимость acceptable ~ допустимое значение additional ~ дополнительное значение binary ~ двоичное значение byte ~ значение в виде байта character ~ значение кода символа check ~ контрольное значение correct ~ правильное значение data ~ информационное значение invalid ~ неверное, недопустимое значение numeric ~ числовое значение 277 output ~ выводимое / выходное значение valid ~ верное / допустимое значение variable переменная (величина) variety разнообразие; разновидность; ряд, множество vary менять(ся) vastly очень, крайне velocity скорость venerable многоуважаемый, почтенный verification проверка; контроль verifier устройство / программа проверки verify проверять; контролировать versatile разносторонний; многофункциональный; универсальный versatility разносторонность; многофункциональность; универсальность version версия; вариант common ~ распространенная версия data ~ вариант данных electronic ~ электронная версия executable ~ исполняемая версия original ~ первоначальный вариант VHS бытовой (кассетный) магнитофон vice-versa и наоборот video resolution видеоразрешение (разрешение видеоэкрана) view вид; представление; просмотр viewpoint точка зрения viewport окно просмотра / вывода violation of contract нарушение контракта 278 violators нарушители virtual виртуальный; нереальный; несуществующий visible видимый vocal cords голосовые связки voltage (электрическое) напряжение volume объем; величина; количество sound ~ громкость звука vulnerability уязвимость; чувствительность; подверженность vulnerable чувствительный; уязвимый; подверженный W wafer пластина; подложка wait ожидание; ждать, ожидать want недостаток; нехватка; потребность; недоставать; требоваться wanted нужный; необходимый warning предупреждение watchdog сторожевая программа waveguide волновод wavelength длина волны way путь; способ; средство; возможность in a ~ в некотором отношении; до известной степени in any ~ любым способом; как угодно in different ~s разными способами; по-разному in no ~ ни в коей мере; никак in the same ~ так же; таким же образом weather forecasting прогноз погоды web (информационная) сеть 279 information ~ информационная сеть (сайтов на серверах сети Internet) World-Wide ~ всемирная информационная сеть wide area network глобальная сеть width ширина; разрядность (шины, памяти) withdraw удалять; убирать; вынимать withdrawal удаление; выемка; изъятие word слово; текстовый ~ processing редактирование текстов ~ processing program текстовый редактор ~ wrap перенос слов worksheet электронная таблица world wide глобальный; всемирный worm (компьютерный) червь writer записывающее устройство; программа записи; автор; разработчик X xerocopy ксерокопия xerox ксерокопировать Х-гау рентгеновский (об излучении монитора) Y yet тем не менее; все же; еще yield выход (результатов); выдача; выдавать; получать (значение) Z zero нуль; нулевой; обнулять of ~ равный нулю to ~ out обнулять 280 time ~ начало отсчета времени zone зона; область; полоса buffer ~ буферная область storage ~ область памяти Список рекомендуемой литературы Основная литература 1. Бжиская, Ю. В. Английский язык: Информационные системы и технологии / Ю. В. Бжиская, Е. В Краснова. – Ростов н / д: Феникс, 2008. 2. Радовель В. А. Английский язык: Основы компьеторной грамотности / В. А. Радовель. – Ростов н / д: Феникс, 2005. 3. Стэнтон, А. Английский язык: Кратчайший путь к ФСИ / А. Стэнтон. – Англия: Лонгман, 2001. 281 4. Тимощук, В. А. Современные английские разговорные темы / В. А. Тимощук. – Ростов н / д: Феникс, 2007. Дополнительная литература 1. Синдеев, Ю. Англо-русский политехнический словарь / Ю. Синдеев. – Ростов н / д : Феникс, 2002. 2. Мюллер, В. К. Новый Англо-русский словарь / В. К. Мюллер – Москва, 2000. Bibliography References 1. Bizhskaya, U. V. English. Information systems and technologies: Teacher Edition / U. V. Bizhskaya, E. V. Krasnova. - Rostov – on - Don: Feniks, 2008. 2. Radovel, V. A. English. Computer literacy basics: Teacher Edition / V. A. Radovel. - Rostov –on - Don: Feniks, 2005. 3. Stanton, A. Fast Track to FCE / A. Stanton. – Longman, 2001. 3. Timoschuk, V. A. English urgent topics / V. A. Timoschuk, G. L. Kubarkov. Rostov – on - Don: Feniks, 2007. Supplementary literature 282 1. Sindeev, U. English-Russian Polytechnic dictionary / U. Sindeev. – Rostov –onDon: Feniks, 2002. 2. Muller, V. K. New English-Russian dictionary / V.K. Muller. – M.: Russian, 2000. Учебное издание Гаянэ Эмилбаровна Маркосян, Людмила Макаровна Митрофаненко 283 АВТОМАТИЗИРОВАННЫЕ СИСТЕМЫ ОБРАБОТКИ ИНФОРМАЦИИ И УПРАВЛЕНИЯ Учебное пособие (практикум на английском языке) Редакторы: _____________________________________________________________________________ Подписано в печать Формат 60x84 1/16. Усл. п. л. – . Уч.-изд. л. – . Бумага офсетная. Печать офсетная. Заказ Тираж 500 экз. ГОУВПО «Северо-Кавказский государственный технический университет» 355028, г. Ставрополь, пр. Кулакова, 2 Издательство ГОУВПО «Северо-Кавказский государственный технический университет» Отпечатано в типографии СевКавГТУ 284