Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Inozemna_mova.pdf
Скачиваний:
1144
Добавлен:
09.02.2016
Размер:
5.75 Mб
Скачать

security, commercial espionage, the back-up copies, network, criminal extortioner.

Ex. 2. Match the English and the Ukrainian equivalents:

computer fraud

пароль

defraud

на душу населення

remote control

комп`ютерне шахрайство

codeword

обманювати

per head

шантаж

criminal gain

протиправна мета

malicious damage

умисне ушкодження

blackmail

дистанційне управління

Ex. 3. Write down as many nouns as possible with the word “computer” and translate the wordcombinations into Ukrainian:

E.g. Computer fraud

Ex. 4. Choose the synonyms from the box:

fraud, espionage, apprehend

intelligence, forgery, reconnaissance, cheat, spying, arrest, deception, detain.

Ex. 5. Give the word-families of the following verbs, as in the example:

check

E.g.. to check check-up checker

to extort

to inform

to secure

327

to lose

to estimate

to pay

Ex. 6. Write down as many nouns as you can with the following adjectives and translate these wordcombinations into Ukrainian:

fraudulent

personal

Ex. 7. Encircle the suffixes and translate the following words:

information, breaching, housing, competing, user-friendliness, employee, commercial, hacker, extortioner.

Ex. 8. Group the following words and word-combinations into 3 logical groups:

fraud, remote control, breaking national security, bank, codeword, terrorist operation, virus program, insurance company, prevent, abuse, mail order firm, malicious damage, ransom, government network, criminal proceeds, to hack, software, computer file, telephone company, big corporation.

COMPUTER

CRIME

INSTITUTION

Ex. 9. Write down the following numerals as in the examples:

E.g. 0.2% - oh point two per cent

Euro 75 bn – seventy five billion Euro

USD $3 billion………………………. 328

GBP £407 million…………………… GBP £15 million…………………….. 25% …………………………………….

0.8% ……………………………………

1998 …………………………………….

Ex. 10. Find the English equivalents in the text:

дистанційне управління, комп`ютерне шахрайство, пароль, розвідка, комп’ютерна злочинність, шантаж, проникати (незаконно в комп’ютерну програму), вірусна програма, збиток, прибуток, оцінювати, програмне забезпечення.

Ex. 11. Complete the sentences with the words from the box:

жертва, інформація, шпигунство, ”незаконно проникати”, порушення, обманювати, комп`ютернешахрайство, здирництво, злочинний, перевірка.

1.The proceeds of … in the USA are estimated at $3 billion per year.

2.Dishonest employees can … their institutions of huge sums of money.

3.Computers can be used to obtain unauthorized … , for commercial … or … national security.

4.It is very easy to … into a computer system by remote control.

5.Computers offer great opportunities for … or … damage.

6. A huge

amount of money

may be

spent on … оther

programs

for virus.

 

 

7.The …. of computer virus, like other victims of blackmail, seldom report it.

Ex. 12. Find the answers in the text:

1.How are the proceeds of computer fraud estimated in the USA and GB?

2.Who commits most computer crimes?

3.For what purposes can computer be used?

4.Is it possible to hack into a computer system without access to the building housing the main computer?

329

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]