Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

angl_yaz / Lesson 6

.doc
Скачиваний:
10
Добавлен:
10.02.2016
Размер:
37.89 Кб
Скачать

Lesson 6

THE READING MODULE

Read the text: Tactics of search of the computer information.

Tactics of search of the computer information is chosen, from data security, functioning of the computer and its peripheral equipment conditions at the moment of investigatory action realization. It is necessary to define whether computer technique means is connected to local network or to the main computer - server where investigatory action is carried out. A casual computer, not the main one, may also contain information.

It is necessary to know that when you erase information from magnetic carriers, physically it doesn’t really get erased it changes its status. It becomes “invisible” and is stored until new information is recorded instead. Thus, there is a possibility to renew it completely using special utilities, and partially – when new information is recorded instead.

It is necessary to quit programs operation, which work at the moment of the examination, preliminary having written down all system messages on the status of the program at the moment of a halt. It is necessary to save active documents with new names, leaving their original versions unchanged. It is reasonable to take a picture of a monitor according to criminalistic photographs regulations, and to record it – if possible.

Computer manipulations on evidence information search should be given to an expert, if an investigator doesn’t possess necessary knowledge and skills. It is recorded in the minutes what actions are committed, their consequence and order, software used for information search. The goal and content of every action is explained. Most of the text and financial programs store a list of the lattest session operation and can render them immediately, if they are not erased or moved to another place. The user usually keeps documents in catalogues on the computer disk with standard names: MY DOCUMENTS, DOCUMENTS, DOCS, ARCHIVE and so forth. Document files have characteristic specification ("expansion"), that is a part of the name which stands after a dot in the file name: *.doc, *.txt and so forth. All computer files keep date of the last change or alteration, and after some programs - date of a file recording.

Popular software package Microsoft Office after installation on the computer conducts the private file - minutes where the date and time of all computer plugs in are recorded. Programs of connection and network operation store addresses of many Internets - contacts of the user, documents of email with addresses of the sender [3,15].

The results of the search are stored in electronic version on the variable magnetic carrier and are printed and are draw up like a supplement to the minutes.

There is no need to limit the search of information by computer. It is necessary to look through all the documentation including scraps of paper, as programmers don’t rely on their memory and make notes passwords, system configurations changes, peculiarities of making out a computer information database. . Many of users keep file recordings on diskettes, in order to prevent their loss at computer failure. That is why any revealed data carriers should be withdrawn and studied.

In special cases at realization of the investigatory actions it is necessary to search for hiding places where variable computer data carriers may be stored; with the expert help open cases of hardware of computer engineering and techniques to reveal specially switched - off internal data carriers, for example, an additional hard disk.

I. Reading Exercises:

Exercise 1. Read and memorize using a dictionary:

Server, status, possibility, examination, preliminary, version, monitor, evidence, expert, goal, immediately, user, dot, Microsoft Office, sender, magnetic carrier diskettes, failure.

Exercise 2. Answer the questions:

1. How can you define tactics of search of the computer information?

2. What is it necessary to know?

3. Is the goal and content of every action explained?

4. How are the results of the search stored?

Exercise 3. Match the left part with right:

1. Computer manipulation on evidence information search

a) to save active documents with new names

2. There is no need to limit

b) are stored in electronic version on the variable magnetic carrier.

3. The results of the search

c) the search of information by computer.

4. It is necessary

d) should be given to an expert.

Exercise 4. Open brackets choosing the right words:

It is (necessary/unnecessary) to Know that when you (erase/store) information (from/into) magnetic carries, physically it (doesn’t/didn’t) really get erased it changes its (status/position). It becomes “invisible” and it stored until (new/old) information is recorded instead. Thus, (there/here) is a possibility (to renew/to put) it completely using special utilities, and partially – (when/where) new (information/database) is recorded instead.

THE SPEAKING MODULE

II. Speaking Exercises:

Exercise 1. Explain:

1. the tactics of search of the computer information;

2. the necessity to quit programs operation;

3. how the user can keep documents.

Exercise 2. Ask questions to the given answers:

1)Question: _______________________________________________________?

Answer: A casual computer, not the main one, may also contain information.

2)Question: _______________________________________________________?

Answer: It becomes “invisible” and it stored until new information is recorded instead.

3)Question: _______________________________________________________?

Answer: All computer files keep date of the last change or alteration, and after some program – date of a file recording.

THE WRITING MODULE

III. Writing exercises:

Exercise 1. Complete the sentences with the suggested words in, for(2), of(3), at.

______ special cases ______ realization _______ the investigatory actions it is necessary to search ______ hiding places where variable computer data carriers may be stored; with the expert help open cases ______ hardware _______ computer engineering and techniques to reveal specially switched– _______ internal data carriers, ______ example, an additional hard disk.

Exercise 2. Finish the sentences.

1. It is necessary to quit __________________________________________________________________.

2. There is a possibility __________________________________________________________________.

3. There is no __________________________________________________________________________.

4. It is necessary to know ________________________________________________________________.

5. It is necessary to search ________________________________________________________________.

6. It is necessary to define ________________________________________________________________.

Exercise 3. Compose retelling the text (up to 100 words).

Соседние файлы в папке angl_yaz