- •2. Answer the following questions.
- •4. Fill in the blanks with words from the text.
- •6. Translate the following sentences in writing paying attention to underlined words and emphatic constructions.
- •7. Arrange the following words in pairs of synonyms.
- •2. Answer the following questions.
- •4. Fill in the blanks with the words from the text.
- •5. Agree or disagree with the following statements.
- •6. Translate the following sentences in writing into Russian paying attention to different functions of the verb «to be».
- •7. Translate the following sentences in writing into Russian:
- •10. Read the text and render its content in Russian:
- •1. Read and translate the text
- •2. Answer the following questions.
- •4. Fill in the blanks with the words from the text.
- •2. Answer the following questions.
- •3. Find the beginning for the following endings.
- •4. Fill in the blanks with words from the text.
- •5. Find in the text the definitions of the meanings of the following words. Translate them into Russian in writing.
- •6. Translate the following sentences in writing paying attention to the underlined words and constructions.
- •3. Complete the following sentences.
- •4. Fill in the blanks with the words from the text.
- •5. Find in the text the definitions of the following terms.
- •6. Translate the following sentences in writing paying attention to the underlined words and constructions.
- •8. Compare the system of checks and balances of the us with that of Russia. Pay attention to the differences in these systems. The plan below may be helpful.
- •2. Answer the following questions.
- •3. Complete the following sentences.
- •4. Insert the English equivalents used in the text.
- •9. Read the text and answer the following questions:
- •Political Parties
- •12. Read the article and do the tasks that follow it:
- •13. Answer the following questions:
- •14. Agree or disagree with the following:
- •16. Review the article.
- •17. Read and translate the article:
- •20. Answer the following questions:
- •21. Find in the article the facts to prove that:
- •II. Answer the following questions:
- •III. Complete the following sentences:
- •IV. Find in the text the facts to prove that:
- •VII. Could you give any examples from history or your personal experience when «the rule of law» works? do you support the idea that «the law is the highest judge»?
- •VIII. Read the following item and render its idea in russian:
- •X. Answer the following questions:
- •Xl agree or disagree with the following statements:
- •XII. Divide the text into logical parts, make up an outline of the text and speak on the text in accordance with your outline. Word study
- •I. Give russian equivalents for:
- •Word study
- •Word study
- •Authority
- •The state
- •Word study
- •Word study
- •Word study
- •The philosophical tradition
- •The empirical tradition
- •Word study
- •Word study
- •The Evolution of Pluralism
- •Word study
- •Word study
- •Word study
- •Text III
- •Text IV
- •In children (by Christine Russell)
- •Text VI
- •Text VII
- •Word study
- •Text VIII
- •Postmodern tv (by Steven Connor)
Text III
I. READ THE ARTICLE AND SAY WHY IT IS CALLED IN THIS WAY:
THE NEXT THREAT: WEAPONS
OF MASS DISTRUCTION
(by George F. Will)
Terrorist attacks have usually been against single targets - individuals, crowds, buildings. But today's net-worked world of complexity and interconnectedness has vast new vulnerabilities with a radius larger than that of any imaginable bomb blast. Terrorists using computers might be able to disrupt information and communication systems and, by doing so, attack banking and financial systems, energy (electricity, oil, gas) and the systems for the physical distribution of economic output.
Hijacked aircraft and powered anthrax — such terrorist tools are crude and scarce compared with computers, which are everywhere and inexpensive. Wielded with sufficient cunning, they can spread the demoralizing helplessness that is terrorism's most important intended byproduct. Computers as weapons, even more than intercontinental ballistic missiles, render irrelevant physical geography — the two broad oceans and two peaceful neighbors — that once was the basis of America's sense of safety.
In a software-driven world, an enemy need not invade the territory, or the air over the territory, of a country in order to control or damage that country's resources.
The attack tools are on sale everywhere: computers, modems, software, telephones. The attacks can shut down services or deliver harmful instructions to systems. And a cyber-attack may not be promptly discovered. Computer intrusions do not announce their presence the way a bomb does.
395
Учебное пособие для философов и политологов
Already «subnational» groups - terrorists, organized crime - are taking advantage of legal and widely available strong software that makes their communications invulnerable to surveillance. If all the personal computers in the world were put to work on a single message, it would still take an estimated 12 million times the age of the universe to break a single message.
Now suppose a state or group or state-supported group used similar cyber-marvels to attack, say, US banking and financial systems, or the production and distribution of electric power.
II. ANSWER THE QUESTIONS:
What new sort of terrorism appeared in the world?
Is it too dangerous? ,
What are its grave consequences?
What are the attack tools for new terrorists?
Is it easy or difficult to discover a cyber-attack?
III. READ THE FOLLOWING ITEMS AND SAY WHAT PROBLEMS ARISE AT THE BACKGROUND OF THE IN FORMATION PRESENTED IN THEM:
THE MICROSOFT MONOPOLY
Is Bill Gates's Windows the best thing that ever happened to its millions of users? Without even knowing American antitrust laws, one can tell that 90 percent of all users make up Gates's captive customer base. It's the same, with Microsoft Office. All other US business giants - cars, telecommunications, banking, finance and mass media -have competition. Even the Mafia has to compete. Many giants go global in order to remain competitive. Microsoft alone has no competition - those who were likely to pop up got clobbered and buried. This is a monopoly in its most sinister form. While others fight the courts for survival, Gates fights to perpetuate this monopoly.
(from «NEWSWEEK» 2000}
396
Part II
Political science
NOTES:
Clobber - атаковать
Sinister - зловещий
EUROPE'S POLS TAKE TO THE NET With British elections coming next week, Web surfers have plenty of opportunity to sample the spectacle. They can get hard news from www.voxpolitics.com, or stage Space Invaders-style battles between the forces of Labour's Tony Blair and Conservative candidate William Hague at www.friendly-giants.com. The parties are tripping over themselves to attract a Web audience: Labour recently mailed its Web-site address to first-time voters, and both parties have multiplatform news portals.
Internet-mania won't end when the British election is over. Many European governments are spending millions of euros to put all their transactions on the Web. The United Kingdom hired Microsoft to build a super-portal that will connect hundreds of government institutions, local and national, to one another by 2005. E-voting trials are underway in Switzerland, Belgium and Germany. Italian and Dutch taxpayers already file online.
But the Euro governments may be overreaching. The complexity of forging seamless data links between myriad local and national departments is enormous - many of the world's top corporations haven't yet managed it. And there are antitrust issues. Right now, only a few thousand people file online via government sites, but what happens when that goes to millions?
Governments may end up farming out many Web services to third parties. The biggest rewards may come to governments that use the Web to increase internal efficiency.
IV. ANSWER: HOW DO GOVERNMENTS USE WEB SITES?
397
Учебное пособие для философов и политологов
Political science
Part II