Студопедия
Новини освіти і науки:
МАРК РЕГНЕРУС ДОСЛІДЖЕННЯ: Наскільки відрізняються діти, які виросли в одностатевих союзах


РЕЗОЛЮЦІЯ: Громадського обговорення навчальної програми статевого виховання


ЧОМУ ФОНД ОЛЕНИ ПІНЧУК І МОЗ УКРАЇНИ ПРОПАГУЮТЬ "СЕКСУАЛЬНІ УРОКИ"


ЕКЗИСТЕНЦІЙНО-ПСИХОЛОГІЧНІ ОСНОВИ ПОРУШЕННЯ СТАТЕВОЇ ІДЕНТИЧНОСТІ ПІДЛІТКІВ


Батьківський, громадянський рух в Україні закликає МОН зупинити тотальну сексуалізацію дітей і підлітків


Відкрите звернення Міністру освіти й науки України - Гриневич Лілії Михайлівні


Представництво українського жіноцтва в ООН: низький рівень культури спілкування в соціальних мережах


Гендерна антидискримінаційна експертиза може зробити нас моральними рабами


ЛІВИЙ МАРКСИЗМ У НОВИХ ПІДРУЧНИКАХ ДЛЯ ШКОЛЯРІВ


ВІДКРИТА ЗАЯВА на підтримку позиції Ганни Турчинової та права кожної людини на свободу думки, світогляду та вираження поглядів



Active Vocabulary

account obviously
company teller
computer-tape librarian temptation
conscience to advertise
crime to catch
customer to fire
employee to get revenge
evidence to notice
flexible to punish
gambler to rob
gun to steal
immensely transaction
insurance witness
involve  

2. Answer the following questions:

1. Why have computers immensely replaced paper work in many businesses?

2. Is it true that many banks advertise their transactions being untouched by human hands?

3. Why can computers be used to steal money if they have no reason to steal it?

4. Is it hard to punish computer criminals?

5. How did the head teller at a New York City bank manage to steal more than one and a half million dollars in last four years?

6. Why was this man caught?

7. Who tends to be more successful in computer crimes – minor employees or real computer experts?

Reconstruct the text “Computer Crime” into a dialogue.

The main rules governing a conversation in English:

The person who asks questions in a conversation usually controls it. Personal questions should be expressed tactfully.

Excuse me for asking.

I hope you don’t mind asking, but I’d like to know more about …

Could you tell me a bit more about …?

Sorry, I don’t quite understand.

What (exactly) do you mean?

Can you explain it in more detail, please?

Excuse me, can I interrupt you for a moment?

Hold on, please.

Just a moment, please.

Don’t you agree that …

Sorry, could you say that again (please)?

Sorry, could you repeat that?

Oh, you know what I mean.

Can you guess what I said, etc.

Sure. I know. I see. Really. Right.

Fine. OK. Well. Exactly so. Quite.

That’s a very interesting question.

Well, let me see …

Excuse me, I’m afraid I have to be going now. It was really a pleasure to talk to you.

That’s very interesting, but I don’t think it’s really to the point.

4. Annotate the text in English. Use the phrases:

I.

a) The title of the article is...
It is written by prof... and published in London in the
journal..., No.3, vol.4, 2011 on pp.3-10  
magazine..., No.3, vol.4, 2011  
collection of articles ... by... editorial house in 2011  
book ... by... editorial house in 2011  
b) The article... by prof... is published in the journal..., in N.Y., pp.5-10.

 

II.

a) The article deals with the problem of ...  
  discusses  
  touches  
  discloses  
  is devoted to  
The text tells us about ...  
   
b) Disclosing the problem the author dwells on (upon) such matters as...  
The major points  
  matters of the text are the following: ...
  problems  
  issues  
   
c) The author pays special attention to …  
  draws readers’ attention to …  
Much attention is paid to...  
Great  
Special  
 
The author concentrates on, focuses on  
stresses, underlines, emphasises  
points out  
dwells on (upon)  
distinguishes between  
speaks in details  
gives the classification  
                 

III.

a) As far as I am an expert in ... I
consider the article to be of some (great) interest for …
believe
suppose
think
guess
 
b) In my opinion the article is of great some interest for  
  From my point of view  
  To my mind  
     
  the students in applied science    
  the specialists in...    
  a wide range of readers    
                     

 

5. Discuss the statements given below. It is advisable that the group be divided into three parties, each party choosing one of the statements and working on them independently. Seek your own sources of information:

1. It is easy to break firewalls. The way you break into a protected system is to fool it into making it believe you’re an invited guest.

2. There are a few fundamental rules in the debugging checklist. Do you know how to debug a code? Above all, think before acting!

3. The hackers’ activities and measures taken by state against the Internet criminals.


Читайте також:

  1. ACTIVE VOCABULARY
  2. Active Vocabulary
  3. Active Vocabulary
  4. Active Vocabulary
  5. Active Vocabulary
  6. Active Vocabulary
  7. Active Vocabulary
  8. Active Vocabulary
  9. ACTIVE VOCABULARY
  10. Active Vocabulary
  11. Active Vocabulary
  12. ACTIVE VOCABULARY




Переглядів: 661

<== попередня сторінка | наступна сторінка ==>
Computer Crime | Writing

Не знайшли потрібну інформацію? Скористайтесь пошуком google:

  

© studopedia.com.ua При використанні або копіюванні матеріалів пряме посилання на сайт обов'язкове.


Генерація сторінки за: 0.019 сек.