Головна сторінка Випадкова сторінка КАТЕГОРІЇ: АвтомобіліБіологіяБудівництвоВідпочинок і туризмГеографіяДім і садЕкологіяЕкономікаЕлектронікаІноземні мовиІнформатикаІншеІсторіяКультураЛітератураМатематикаМедицинаМеталлургіяМеханікаОсвітаОхорона праціПедагогікаПолітикаПравоПсихологіяРелігіяСоціологіяСпортФізикаФілософіяФінансиХімія |
Оформлення звітуДата добавления: 2015-09-19; просмотров: 634
2. Answer the following questions: 1. Why have computers immensely replaced paper work in many businesses? 2. Is it true that many banks advertise their transactions being untouched by human hands? 3. Why can computers be used to steal money if they have no reason to steal it? 4. Is it hard to punish computer criminals? 5. How did the head teller at a New York City bank manage to steal more than one and a half million dollars in last four years? 6. Why was this man caught? 7. Who tends to be more successful in computer crimes – minor employees or real computer experts? 3. Reconstruct the text “Computer Crime” into a dialogue. The main rules governing a conversation in English: The person who asks questions in a conversation usually controls it. Personal questions should be expressed tactfully. Excuse me for asking. I hope you don’t mind asking, but I’d like to know more about … Could you tell me a bit more about …? Sorry, I don’t quite understand. What (exactly) do you mean? Can you explain it in more detail, please? Excuse me, can I interrupt you for a moment? Hold on, please. Just a moment, please. Don’t you agree that … Sorry, could you say that again (please)? Sorry, could you repeat that? Oh, you know what I mean. Can you guess what I said, etc. Sure. I know. I see. Really. Right. Fine. OK. Well. Exactly so. Quite. That’s a very interesting question. Well, let me see … Excuse me, I’m afraid I have to be going now. It was really a pleasure to talk to you. That’s very interesting, but I don’t think it’s really to the point. 4. Annotate the text in English. Use the phrases: I.
II.
III.
5. Discuss the statements given below. It is advisable that the group be divided into three parties, each party choosing one of the statements and working on them independently. Seek your own sources of information: 1. It is easy to break firewalls. The way you break into a protected system is to fool it into making it believe you’re an invited guest. 2. There are a few fundamental rules in the debugging checklist. Do you know how to debug a code? Above all, think before acting! 3. The hackers’ activities and measures taken by state against the Internet criminals. Writing Write a short composition on “Microprogramming a computer is not the same as programming a microcomputer”.
Extended reading Text C. Boolean Algebra
Read and translate the text into Ukrainian at home. Sum up the main ideas of the text, following the outlines given below: 1. Boolean algebra is the algebra of sets. 2. The application of Boolean algebra to the design of computers. 3. The usage of the limited special type of Boolean algebra in cybernetics. Express your appreciation of George Boole and write a composition “George Boole – the creator of an abstract algebra”.
|