Documente Academic
Documente Profesional
Documente Cultură
Ìîñêâà
Èçäàòåëüñòâî « »
2012
ÓÄÊ 802.0
ÁÁÊ 81.2Àíãë Unit I.
Å11
Hobby, Addiction, or Future Job?
Ð å ö å í ç å í ò û: ñòàðøèé ïðåïîäàâàòåëü êàôåäðû
àíãëèéñêîé ôèëîëîãèè ôàêóëüòåòà ÐÃÔ ÈâÃÓ, ê.ô.í.
Ì.Â. Áàëàìàêîâà, ñòàðøèé ïðåïîäàâàòåëü êàôåäðû
èíîñòðàííûõ ÿçûêîâ åñòåñòâåííûõ ôàêóëüòåòîâ ÈâÃÓ
Ò.Â. Êèñåëåâà
ISBN 9 7 8 - 5 - 8 9 3 4 9 - 2 0 3 - 3
Ó÷åáíîå ïîñîáèå ìîæåò áûòü èñïîëüçîâàíî äëÿ àíàëèòè÷åñêîãî èëè Prereading Discussion
äîìàøíåãî ÷òåíèÿ ïðîôåññèîíàëüíî-îðèåíòèðîâàííûõ òåêñòîâ, ðàñøè-
ðåíèÿ ñëîâàðíîãî çàïàñà, íàâûêîâ ïðîôåññèîíàëüíîãî îáùåíèÿ íà àíã- 1. What is the computer? Computers are now widespread (common-
ëèéñêîì ÿçûêå â óñòíîé èëè ïèñüìåííîé ôîðìå. Ñîñòîèò èç 9 óðîêîâ,
place), arent they?
êàæäûé èç êîòîðûõ ïîìèìî òåêñòîâ ñîäåðæèò ðÿä èíòåðåñíûõ óïðàæíåíèé,
íàöåëåííûõ íà óñâîåíèå íàó÷íî-òåõíè÷åñêîé ëåêñèêè, à èìåííî òåðìè-
2. Did you learn about computers through science fiction, paper-
íîâ, àááðåâèàòóð, àêðîíèìîâ è ò.ï. Ïîñîáèå îðèåíòèðîâàíî êàê íà çàíÿ- backs, and movies like 2001: A Space Odyssey?
òèÿ â àóäèòîðèè, òàê è íà ñàìîñòîÿòåëüíóþ ðàáîòó. 3. How old were you when you learnt about the computer?
Äëÿ ñòóäåíòîâ, àñïèðàíòîâ è âñåõ, èìåþùèõ áàçîâûå çíàíèÿ àíã- 4. What are the reasons for buying home computers?
ëèéñêîãî ÿçûêà è èíòåðåñóþùèõñÿ àêòó-àëüíûìè ïðîáëåìàìè, ñâÿçàí- 5. Do you like playing on the computer?
íûìè ñ âîçíèêíîâåíèåì, ðàçâèòèåì è áóäóùèì êîìïüþòåðîâ, ñ ãëî- 6. What are your favorite video games (shootem-up, walk-through,
áàëüíîé êîìïüþòåðèçàöèåé îáùåñòâà. role-playing games (RPG), or intellectual games?
7. How often do you work with the computer?
ÓÄÊ 802.0 8. Does good knowledge of English help to operate the computer
ÁÁÊ 81.2Àíãë better?
9. Do you agree that English is a lifetime study and may serve a variety
of purposes? What are they?
10. Who can be called a computer wizard? Do you attribute his/her
ISBN 978-5-89349-203-3 © Èçäàòåëüñòâî « », 2012
success to hard work or talent?
2 3
ÓÄÊ 802.0
ÁÁÊ 81.2Àíãë Unit I.
Å11
Hobby, Addiction, or Future Job?
Ð å ö å í ç å í ò û: ñòàðøèé ïðåïîäàâàòåëü êàôåäðû
àíãëèéñêîé ôèëîëîãèè ôàêóëüòåòà ÐÃÔ ÈâÃÓ, ê.ô.í.
Ì.Â. Áàëàìàêîâà, ñòàðøèé ïðåïîäàâàòåëü êàôåäðû
èíîñòðàííûõ ÿçûêîâ åñòåñòâåííûõ ôàêóëüòåòîâ ÈâÃÓ
Ò.Â. Êèñåëåâà
ISBN 9 7 8 - 5 - 8 9 3 4 9 - 2 0 3 - 3
Ó÷åáíîå ïîñîáèå ìîæåò áûòü èñïîëüçîâàíî äëÿ àíàëèòè÷åñêîãî èëè Prereading Discussion
äîìàøíåãî ÷òåíèÿ ïðîôåññèîíàëüíî-îðèåíòèðîâàííûõ òåêñòîâ, ðàñøè-
ðåíèÿ ñëîâàðíîãî çàïàñà, íàâûêîâ ïðîôåññèîíàëüíîãî îáùåíèÿ íà àíã- 1. What is the computer? Computers are now widespread (common-
ëèéñêîì ÿçûêå â óñòíîé èëè ïèñüìåííîé ôîðìå. Ñîñòîèò èç 9 óðîêîâ,
place), arent they?
êàæäûé èç êîòîðûõ ïîìèìî òåêñòîâ ñîäåðæèò ðÿä èíòåðåñíûõ óïðàæíåíèé,
íàöåëåííûõ íà óñâîåíèå íàó÷íî-òåõíè÷åñêîé ëåêñèêè, à èìåííî òåðìè-
2. Did you learn about computers through science fiction, paper-
íîâ, àááðåâèàòóð, àêðîíèìîâ è ò.ï. Ïîñîáèå îðèåíòèðîâàíî êàê íà çàíÿ- backs, and movies like 2001: A Space Odyssey?
òèÿ â àóäèòîðèè, òàê è íà ñàìîñòîÿòåëüíóþ ðàáîòó. 3. How old were you when you learnt about the computer?
Äëÿ ñòóäåíòîâ, àñïèðàíòîâ è âñåõ, èìåþùèõ áàçîâûå çíàíèÿ àíã- 4. What are the reasons for buying home computers?
ëèéñêîãî ÿçûêà è èíòåðåñóþùèõñÿ àêòó-àëüíûìè ïðîáëåìàìè, ñâÿçàí- 5. Do you like playing on the computer?
íûìè ñ âîçíèêíîâåíèåì, ðàçâèòèåì è áóäóùèì êîìïüþòåðîâ, ñ ãëî- 6. What are your favorite video games (shootem-up, walk-through,
áàëüíîé êîìïüþòåðèçàöèåé îáùåñòâà. role-playing games (RPG), or intellectual games?
7. How often do you work with the computer?
ÓÄÊ 802.0 8. Does good knowledge of English help to operate the computer
ÁÁÊ 81.2Àíãë better?
9. Do you agree that English is a lifetime study and may serve a variety
of purposes? What are they?
10. Who can be called a computer wizard? Do you attribute his/her
ISBN 978-5-89349-203-3 © Èçäàòåëüñòâî « », 2012
success to hard work or talent?
2 3
11. Under what method do you study computers and English (in class,
at home)? What are your study habits?
Reading Analysis
12. Why do you think youll be good for a computer job?
13. Are you baffled by computer language? Wary of the World Wide VOCABULARY LIST
Web? This quiz will help you hack terms you may encounter
while surfing the Internet. Nouns: miracle, male/female, survey, statement, praise, item, gim-
mick, attitude (to), concern, score, addict, quest, access (to), over-
1. cursor, n A: coarse speaker. B: indicator. C: moneychanger. load.
D: technician. Verbs: to deliver, to conscript, to spread, to overtake, to mess, to
2. network, n A: TV channel. B: digital design. appreciate, to earn, to interfere, to complicate, to proliferate, to
C: system of computers. D: filter. curtail, to confess to.
3. download, v A: to copy. B: scramble. C: erase. D: belittle. Adjectives: competitive, ambitious, vague, sensible, virtual, con-
4. virus, n A: flaw. B: poison. C: fatigue. D: infection. temporary, brand-new, up-to-date, out-of-date, online.
5. browser, n software that allows you to A: explore the Internet. Word combinations: vintage car, catch phrase, to surf the Internet,
B: eavesdrop. C: send a fax. D: save a file. to be suspicious, to leave behind, to get frustrated.
6. cracker, n A: fanatic. B: intruder. C: burglar. D: expert.
7. hit, n A: accident. B: stumbling block.
C: unit of measurement. D: visit. TEXT I. COMPUTER STUDIES?
8. authenticate, v A. to fade. B: complicate. C: confirm. D: test.
9. emoticon, n A: robot. B: radiation. C: trick. D: illustration. (1) If youre female, youre going to read this article and feel smug. If
10. boot, v A: to fail gradually. B: enlarge. C: adjust. you are male, you might feel a desire to use the article to wrap up
D: start up. your old chewing gum or just get annoyed and play a computer
11. server, n A: central computer. B: speed control. game.
C: power supply. D: trouble-shooter. (2) According to a recent report, in Britain girls are overtaking boys at
12. modem, n A: digital code. B: keyboard. C: visual display. school. They are even beating them in subjects such as science and
D: connecting device. maths, which people used to think were subjects that boys were
13. glitch, n A: flash. B: excitement. C: error. D: stroke of luck. naturally better at. Surveys show there could be several reasons for
14. compress, v A: to shrink. B: understand. C: fix. D: soften. this. Boys and girls behave very differently from each other both in
15. pixel, n A: picture element. B: programming oddity. and out of school.
C: brief blur. D: long delay. (3) In school, statistics show boys mess about more and get into trou-
16. link, n A: missing piece. B: space station. ble more. Admittedly, they put up their hand to answer questions
C: related site. D: warning signal. more but they often have the wrong answer. The girls who were
17. scanner, n machine that A: reproduces images. interviewed said they often knew the correct answer but didnt like
B: translates files. C: searches a document. to put up their hand if they werent absolutely sure. The survey
D: adds color. also showed girls spent much longer doing homework and check-
18. log on, v A: to pile. B: gain access. C: waste time. D: stretch. ing it with each other. Boys may argue that these things do not
19. shareware, n A: hand-me-down clothing. B: free hardware. make girls more intelligent than boys and in some boys opinions
C: relic. D: trial software. may even make many girls look like swots. However, these things
20. gigabyte, n A: sudden shutdown. B: unit of storage. do show that girls have a different attitude to school than boys. Girls
C: wide gap. D: high pressure. are becoming much more competitive and ambitious.
4 5
11. Under what method do you study computers and English (in class,
at home)? What are your study habits?
Reading Analysis
12. Why do you think youll be good for a computer job?
13. Are you baffled by computer language? Wary of the World Wide VOCABULARY LIST
Web? This quiz will help you hack terms you may encounter
while surfing the Internet. Nouns: miracle, male/female, survey, statement, praise, item, gim-
mick, attitude (to), concern, score, addict, quest, access (to), over-
1. cursor, n A: coarse speaker. B: indicator. C: moneychanger. load.
D: technician. Verbs: to deliver, to conscript, to spread, to overtake, to mess, to
2. network, n A: TV channel. B: digital design. appreciate, to earn, to interfere, to complicate, to proliferate, to
C: system of computers. D: filter. curtail, to confess to.
3. download, v A: to copy. B: scramble. C: erase. D: belittle. Adjectives: competitive, ambitious, vague, sensible, virtual, con-
4. virus, n A: flaw. B: poison. C: fatigue. D: infection. temporary, brand-new, up-to-date, out-of-date, online.
5. browser, n software that allows you to A: explore the Internet. Word combinations: vintage car, catch phrase, to surf the Internet,
B: eavesdrop. C: send a fax. D: save a file. to be suspicious, to leave behind, to get frustrated.
6. cracker, n A: fanatic. B: intruder. C: burglar. D: expert.
7. hit, n A: accident. B: stumbling block.
C: unit of measurement. D: visit. TEXT I. COMPUTER STUDIES?
8. authenticate, v A. to fade. B: complicate. C: confirm. D: test.
9. emoticon, n A: robot. B: radiation. C: trick. D: illustration. (1) If youre female, youre going to read this article and feel smug. If
10. boot, v A: to fail gradually. B: enlarge. C: adjust. you are male, you might feel a desire to use the article to wrap up
D: start up. your old chewing gum or just get annoyed and play a computer
11. server, n A: central computer. B: speed control. game.
C: power supply. D: trouble-shooter. (2) According to a recent report, in Britain girls are overtaking boys at
12. modem, n A: digital code. B: keyboard. C: visual display. school. They are even beating them in subjects such as science and
D: connecting device. maths, which people used to think were subjects that boys were
13. glitch, n A: flash. B: excitement. C: error. D: stroke of luck. naturally better at. Surveys show there could be several reasons for
14. compress, v A: to shrink. B: understand. C: fix. D: soften. this. Boys and girls behave very differently from each other both in
15. pixel, n A: picture element. B: programming oddity. and out of school.
C: brief blur. D: long delay. (3) In school, statistics show boys mess about more and get into trou-
16. link, n A: missing piece. B: space station. ble more. Admittedly, they put up their hand to answer questions
C: related site. D: warning signal. more but they often have the wrong answer. The girls who were
17. scanner, n machine that A: reproduces images. interviewed said they often knew the correct answer but didnt like
B: translates files. C: searches a document. to put up their hand if they werent absolutely sure. The survey
D: adds color. also showed girls spent much longer doing homework and check-
18. log on, v A: to pile. B: gain access. C: waste time. D: stretch. ing it with each other. Boys may argue that these things do not
19. shareware, n A: hand-me-down clothing. B: free hardware. make girls more intelligent than boys and in some boys opinions
C: relic. D: trial software. may even make many girls look like swots. However, these things
20. gigabyte, n A: sudden shutdown. B: unit of storage. do show that girls have a different attitude to school than boys. Girls
C: wide gap. D: high pressure. are becoming much more competitive and ambitious.
4 5
(4) Experts believe that some boys are spending so much time playing west London. Id confess to spending up to four hours a day on
computer games and watching violent films that they are living in the Internet looking for information and speaking to friends. Its
a fantasy world. When girls talk about using home computers, they like an addiction, Alexander said.
often discuss different types of software that they use for learning. (12) If I cant get on to my computer or the Internet, I do get really
Boys simply talk about computer games. When 14-year-old girls frustrated. He spends most of his time finding out the latest infor-
were asked what they would like to do in the future, they men- mation on pop groups and facts for his homework.
tioned realistic jobs such as vet, teacher or doctor. The boys ans- (13) My parents have to tell me to get off the computer, and they
wers were either very vague such as, I just want to be happy and complain a lot, but they also see it as a good thing. Practically
have lots of money or unrealistic and they said things such as, I everyone in my class has a PC with Internet access so all my friends
want to be a fighter pilot. Their answers were considered worry- are also on-line. Its the way forward.
ing because they did not seem very sensible and did not show any
concern about unemployment. However, some people might be- EXERCISES
lieve that 14 is too young to worry anyhow. Also, the truth is that
I. The statements below were other results of the survey. Write G if
the majority of top jobs in England are still done by men so
many might not see the need to worry. The good news is that after
you think the statement might refer to girls and B if you think it
could refer to boys.
the age of 17, many boys become interested in school again and
their exam results show that they have caught up. The problem is 1. Learn to speak earlier.
just keeping them interested until then... 2. Get nervous if there is a pause in the conversation between friends.
(5) A lot of knowledge is a dangerous thing for addicts of the Internet. 3. Take more risks.
Information is becoming the drug of the new century. 4. Are spoken to more by parents.
(6) The research, conducted among 1000 managers in Britain, Ameri- 5. Normally get more praise at school if they do something well.
ca, Europe and the Far East shows that, as information sources 6. Smoke more.
such as the Internet and cable news channels proliferate, we are
witnessing the rise of a generation of dataholics.
II. How modern are you? (pop quiz)
(7) The quest for information can lead to stress. Almost two-thirds said 1. If you were able to have any car you wanted, what would you buy?
their leisure time had been curtailed as a result of having to work a) Id buy a restored vintage car that might become a collec-
late to cope with vast amounts of information; 70 percent reported tors item.
loss of job satisfaction and tension with colleagues because of in- b) Id buy a newly built car with all the latest technology.
formation overload. c) I wouldnt buy a car because I dont like them.
(8) The study also investigated the habits of the children of 300 man- 2. What is your attitude to new scientific developments?
agers and found 55 per cent of parents were concerned their chil- a) Theyre brilliant. They will help to make the world a much-
dren would become information junkies. happier and better place.
(9) Forty-six per cent of parents believed their children spent more b) We know enough about science now. We should stop
time on their PCs than interacting with friends. In one case a child interfering with nature.
had to be wheeled with his computer to the dinner table. c) Some things are good. Some things are bad.
(10) Sue Feldman, mother of Alexander, 13, a self-confessed Inter- 3. How do you speak?
net-addict, said she had not yet been forced to wheeling her son a) I use a lot of new words, slang and catch phrases from the
and computer to the table, but said she often served him sand- television and magazines.
wiches and crisps at his bedroom computer. b) I use exactly the same words and phrases as my parents.
(11) Alexander switches on his computer every day when he returns c) I use a few new words because they are useful for what I
from Latymer School in Hammersmith to his home at Ealing, want to say.
6 7
(4) Experts believe that some boys are spending so much time playing west London. Id confess to spending up to four hours a day on
computer games and watching violent films that they are living in the Internet looking for information and speaking to friends. Its
a fantasy world. When girls talk about using home computers, they like an addiction, Alexander said.
often discuss different types of software that they use for learning. (12) If I cant get on to my computer or the Internet, I do get really
Boys simply talk about computer games. When 14-year-old girls frustrated. He spends most of his time finding out the latest infor-
were asked what they would like to do in the future, they men- mation on pop groups and facts for his homework.
tioned realistic jobs such as vet, teacher or doctor. The boys ans- (13) My parents have to tell me to get off the computer, and they
wers were either very vague such as, I just want to be happy and complain a lot, but they also see it as a good thing. Practically
have lots of money or unrealistic and they said things such as, I everyone in my class has a PC with Internet access so all my friends
want to be a fighter pilot. Their answers were considered worry- are also on-line. Its the way forward.
ing because they did not seem very sensible and did not show any
concern about unemployment. However, some people might be- EXERCISES
lieve that 14 is too young to worry anyhow. Also, the truth is that
I. The statements below were other results of the survey. Write G if
the majority of top jobs in England are still done by men so
many might not see the need to worry. The good news is that after
you think the statement might refer to girls and B if you think it
could refer to boys.
the age of 17, many boys become interested in school again and
their exam results show that they have caught up. The problem is 1. Learn to speak earlier.
just keeping them interested until then... 2. Get nervous if there is a pause in the conversation between friends.
(5) A lot of knowledge is a dangerous thing for addicts of the Internet. 3. Take more risks.
Information is becoming the drug of the new century. 4. Are spoken to more by parents.
(6) The research, conducted among 1000 managers in Britain, Ameri- 5. Normally get more praise at school if they do something well.
ca, Europe and the Far East shows that, as information sources 6. Smoke more.
such as the Internet and cable news channels proliferate, we are
witnessing the rise of a generation of dataholics.
II. How modern are you? (pop quiz)
(7) The quest for information can lead to stress. Almost two-thirds said 1. If you were able to have any car you wanted, what would you buy?
their leisure time had been curtailed as a result of having to work a) Id buy a restored vintage car that might become a collec-
late to cope with vast amounts of information; 70 percent reported tors item.
loss of job satisfaction and tension with colleagues because of in- b) Id buy a newly built car with all the latest technology.
formation overload. c) I wouldnt buy a car because I dont like them.
(8) The study also investigated the habits of the children of 300 man- 2. What is your attitude to new scientific developments?
agers and found 55 per cent of parents were concerned their chil- a) Theyre brilliant. They will help to make the world a much-
dren would become information junkies. happier and better place.
(9) Forty-six per cent of parents believed their children spent more b) We know enough about science now. We should stop
time on their PCs than interacting with friends. In one case a child interfering with nature.
had to be wheeled with his computer to the dinner table. c) Some things are good. Some things are bad.
(10) Sue Feldman, mother of Alexander, 13, a self-confessed Inter- 3. How do you speak?
net-addict, said she had not yet been forced to wheeling her son a) I use a lot of new words, slang and catch phrases from the
and computer to the table, but said she often served him sand- television and magazines.
wiches and crisps at his bedroom computer. b) I use exactly the same words and phrases as my parents.
(11) Alexander switches on his computer every day when he returns c) I use a few new words because they are useful for what I
from Latymer School in Hammersmith to his home at Ealing, want to say.
6 7
4. Which of the following do you think is the most enjoyable? THE ANALYSIS
a) Playing virtual reality computer games.
b) Going to a disco/club that plays music from the 60s and 811: You are not modern at all and you dont want to be. You are
suspicious of new things and dont make an effort to find out about
70s.
them. You would prefer to live in the past. Its nice that you can appre-
c) Listening to techno music.
ciate the simple things in life but you must be careful not to get left
5. Which of the following would be your preferred way of finding out
behind. You are too traditional.
information?
1216: You are not very modern but you are not completely old-
a) I like looking it up in a book.
fashioned either. You like to live in a world that has the good things from
b) Surfing the Internet or using a CD-Rom is the best way.
the past and some of the good things from the present too.
c) Watching a video is best. 1720: You are modern. You know a lot about what is happening
6. You go to a friends house. Their mother earns a lot of money and around you and obviously enjoy progress. On the other hand, you are
works and their father stays at home, cooks and cleans. What is sensible and dont worry about buying and doing all the latest things
your reaction? just because they are fashionable.
a) Nothing. It doesnt matter who works and who cleans. Its 2124: Yes. You are very modern. Being up-to-date is very impor-
the 90s. tant to you. Sometimes perhaps it is too important. Remember that new
b) A bit surprised. It seems a bit strange because its unusual. things are not always the best things. Be careful not to become obsessed
c) The poor man. Cooking and cleaning is a womans job. with every new thing that comes along. Some things are just clever
7. Which of the following types of books or films do you prefer? marketing crazes that will complicate your life.
a) Historical ones.
b) Anything romantic.
c) Contemporary ones about modern day things. TEXT II. COMPUTER SYSTEMS
8. If your computer was six years old and worked perfectly well, which
(1) Computers can be divided into three main types, depending on
of the following would you do?
their size and power.
a) Id buy a brand new one so I could have new technology.
(2) Mainframe computers are the largest and most powerful. They can
b) I wouldnt do anything. Id be happy with it. New technolo-
handle large amounts of information very quickly and can be used
gy is just gimmicks.
by many people at the same time. They usually fill a whole room
c) Id secretly hope it would break, despite the fact that I
and are sometimes referred to as mainframes or computer instal-
didnt need a new computer.
lations. They are found in large institutions like universities and
ADD UP YOUR SCORE AND READ THE ANALYSIS government departments.
(3) Minicomputers, commonly known as minis, are smaller and less
a b c powerful than mainframes. They are about the size of an office desk
and are usually found in banks and offices. They are becoming less
1 2 3 1 popular as microcomputers improve.
2 3 1 2 (4) Microcomputers, commonly known as micros, are the smallest
3 3 1 2 and least powerful. They are about the size of a typewriter. They can
4 3 1 2 handle smaller amounts of information at a time and are slower
5 1 3 2 than the other two types. They are ideal for use as home comput-
6 3 2 1 ers and are also used in education and business. More powerful
7 1 2 3 microcomputers are gradually being produced; therefore they are
8 3 1 2 becoming the most commonly used type of computers.
8 9
4. Which of the following do you think is the most enjoyable? THE ANALYSIS
a) Playing virtual reality computer games.
b) Going to a disco/club that plays music from the 60s and 811: You are not modern at all and you dont want to be. You are
suspicious of new things and dont make an effort to find out about
70s.
them. You would prefer to live in the past. Its nice that you can appre-
c) Listening to techno music.
ciate the simple things in life but you must be careful not to get left
5. Which of the following would be your preferred way of finding out
behind. You are too traditional.
information?
1216: You are not very modern but you are not completely old-
a) I like looking it up in a book.
fashioned either. You like to live in a world that has the good things from
b) Surfing the Internet or using a CD-Rom is the best way.
the past and some of the good things from the present too.
c) Watching a video is best. 1720: You are modern. You know a lot about what is happening
6. You go to a friends house. Their mother earns a lot of money and around you and obviously enjoy progress. On the other hand, you are
works and their father stays at home, cooks and cleans. What is sensible and dont worry about buying and doing all the latest things
your reaction? just because they are fashionable.
a) Nothing. It doesnt matter who works and who cleans. Its 2124: Yes. You are very modern. Being up-to-date is very impor-
the 90s. tant to you. Sometimes perhaps it is too important. Remember that new
b) A bit surprised. It seems a bit strange because its unusual. things are not always the best things. Be careful not to become obsessed
c) The poor man. Cooking and cleaning is a womans job. with every new thing that comes along. Some things are just clever
7. Which of the following types of books or films do you prefer? marketing crazes that will complicate your life.
a) Historical ones.
b) Anything romantic.
c) Contemporary ones about modern day things. TEXT II. COMPUTER SYSTEMS
8. If your computer was six years old and worked perfectly well, which
(1) Computers can be divided into three main types, depending on
of the following would you do?
their size and power.
a) Id buy a brand new one so I could have new technology.
(2) Mainframe computers are the largest and most powerful. They can
b) I wouldnt do anything. Id be happy with it. New technolo-
handle large amounts of information very quickly and can be used
gy is just gimmicks.
by many people at the same time. They usually fill a whole room
c) Id secretly hope it would break, despite the fact that I
and are sometimes referred to as mainframes or computer instal-
didnt need a new computer.
lations. They are found in large institutions like universities and
ADD UP YOUR SCORE AND READ THE ANALYSIS government departments.
(3) Minicomputers, commonly known as minis, are smaller and less
a b c powerful than mainframes. They are about the size of an office desk
and are usually found in banks and offices. They are becoming less
1 2 3 1 popular as microcomputers improve.
2 3 1 2 (4) Microcomputers, commonly known as micros, are the smallest
3 3 1 2 and least powerful. They are about the size of a typewriter. They can
4 3 1 2 handle smaller amounts of information at a time and are slower
5 1 3 2 than the other two types. They are ideal for use as home comput-
6 3 2 1 ers and are also used in education and business. More powerful
7 1 2 3 microcomputers are gradually being produced; therefore they are
8 3 1 2 becoming the most commonly used type of computers.
8 9
(5) A computer can do very little until it is given some information. common output device is a printer. This prints the output of the
This is known as the input and usually consists of a program and CPU onto paper.
some data. (15) A storage device is a peri pheral used for the permanent storage of
(6) A program is a set of instructions, written in a special computer information. It has a much greater capacity than the main memory
language, telling the computer what operations and processes have and commonly uses magnetic tape or magnetic disks as the storage
to be carried out and in what order they should be done. Data, medium.
however, is the particular information that has to be processed by (16) These are the main pieces of hardware of any computer system
the computer, e.g. numbers, names, measurements. Data brought whether a small micro or a large mainframe system.
out of the computer is known as the output.
10 11
(5) A computer can do very little until it is given some information. common output device is a printer. This prints the output of the
This is known as the input and usually consists of a program and CPU onto paper.
some data. (15) A storage device is a peri pheral used for the permanent storage of
(6) A program is a set of instructions, written in a special computer information. It has a much greater capacity than the main memory
language, telling the computer what operations and processes have and commonly uses magnetic tape or magnetic disks as the storage
to be carried out and in what order they should be done. Data, medium.
however, is the particular information that has to be processed by (16) These are the main pieces of hardware of any computer system
the computer, e.g. numbers, names, measurements. Data brought whether a small micro or a large mainframe system.
out of the computer is known as the output.
10 11
IV. Label the diagram of a computer system using these terms: screen and the angle of the arms and wrists.
(5) Experts recommend these steps as coping mechanisms:
CPU
• Turn the screen away from the window to reduce glare, and
cover your screen with a glare deflector. Turn off overhead
2 lights; illuminate your work area with a lamp.
1 4 • Put your monitor on a tilt-and-swivel base.
3
• Get a pneumatically adjustable chair. Position the seat back so
your lower back is supported.
• Place the keyboard low enough to avoid arm and wrist fatigue.
Do not bend your wrists when you type. Use an inexpensive,
5 raised wrist rest. Do not rest your wrists on a sharp edge.
• Sit with your feet firmly on the floor.
• Exercise at your desk occasionally rotating your wrist, rolling
a) Main memory your shoulders, and stretching. Better yet, get up and walk
b) Input device around at regular intervals.
c) Output device
d) Processor
e) Storage device EXERCISES
12 13
IV. Label the diagram of a computer system using these terms: screen and the angle of the arms and wrists.
(5) Experts recommend these steps as coping mechanisms:
CPU
• Turn the screen away from the window to reduce glare, and
cover your screen with a glare deflector. Turn off overhead
2 lights; illuminate your work area with a lamp.
1 4 • Put your monitor on a tilt-and-swivel base.
3
• Get a pneumatically adjustable chair. Position the seat back so
your lower back is supported.
• Place the keyboard low enough to avoid arm and wrist fatigue.
Do not bend your wrists when you type. Use an inexpensive,
5 raised wrist rest. Do not rest your wrists on a sharp edge.
• Sit with your feet firmly on the floor.
• Exercise at your desk occasionally rotating your wrist, rolling
a) Main memory your shoulders, and stretching. Better yet, get up and walk
b) Input device around at regular intervals.
c) Output device
d) Processor
e) Storage device EXERCISES
12 13
III. Translate into English: and forth. Using knobs on a cabinet, the players could hit the ball with
inch-long paddles on the screen.
ÎÏÀÑÍÛÅ ÈÃÐÛ Nolan Bushnell grew up near Salt Lake City, Utah. He loved to
tinker with machines and became an electrical engineer. He played
Êîìïüþòåðû ñòàíîâÿòñÿ âñå áîëåå ïðèâû÷íûì àòðèáóòîì îôè-
ñîâ è êîíòîð, øêîëüíûõ êëàññîâ è äàæå äåòñêèõ ñàäîâ. primitive computer games that were even older than Pong.
Ïðîâåäåííûå àìåðèêàíñêèìè ó÷åíûìè èññëåäîâàíèÿ ïîêàçà- I built it with my own two hands and a soldering iron, Bushnell
ëè, ÷òî ïåðåìåííûå ýëåêòðîìàãíèòíûå ïîëÿ ÷àñòîòîé 60 Ãö ìîãóò said of his creation of the first Pong game.
âûçûâàòü ãëàçíûå çàáîëåâàíèÿ (â ÷àñòíîñòè, êàòàðàêòó), çëîêà÷å- In 1972 Bushnell founded Atari Inc. in Sunnyvale, Calif., to build
ñòâåííûå îïóõîëè, ñíèæàþò èììóííûé ñòàòóñ îðãàíèçìà. Pong games. By 1975 there were 150,000 Pong games in American
Ñóùåñòâóåò ïðåäïîëîæåíèå î ñâÿçè ìåæäó ÷àñòîòîé âîçíèê- homes.
íîâåíèÿ îïóõîëåé ó äåòåé è ìàãíèòíûìè ïîëÿìè. Steve Wozniak, born in 1950, and Steven Jobs, born in 1955, the
Ñïåöèàëèñòû èç ÑØÀ, Êàíàäû, Èñïàíèè è Øâåöèè èçó÷àëè young video game fanatics, working out of a garage, invented the Apple
âîçäåéñòâèå ïåðåìåííûõ ìàãíèòíûõ ïîëåé äèñïëåéíûõ ìîíèòîðîâ computer in 1976. The age of home computers was born.
íà íåáëàãîïðèÿòíîå òå÷åíèå áåðåìåííîñòè ó æåíùèí. One of Ataris early employees 19-year-old Steve Jobs and his friend,
Ó æåíùèí, êîòîðûå âî âðåìÿ áåðåìåííîñòè ïðîâîäèëè íå ìå- Steve Wozniak, who worked for another computer company, both
íåå 20 ÷àñîâ â íåäåëþ çà êîìïüþòåðíûìè òåðìèíàëàìè, âåðîÿò- loved video games.
íîñòü âûêèäûøåé íà 80 % âûøå, ÷åì ó æåíùèí, âûïîëíÿâøèõ òó Jobs and Wozniak dreamed of a personal computer, one that could
æå ðàáîòó áåç ïîìîùè âèäåîòåðìèíàëîâ. do more than play games. From this dream, the Apple Computer Com-
Ïîìíèòå, ÷òî: pany started in a family garage.
• ïðè ðàáîòå çà âèäåîòåðìèíàëîì íåîáõîäèìî ðàñïîëàãàòüñÿ In 1977 Jobs and Wozniak sold their first Apple II, which launched
íà ðàññòîÿíèè âûòÿíóòîé ðóêè îò ýêðàíà; the personal computer industry. By 1985 they had sold more than two
• ñîñåäíèå äèñïëåéíûå ìîíèòîðû äîëæíû íàõîäèòüñÿ îò million Apple IIs.
âàñ íà ðàññòîÿíèè íå ìåíåå 2 ì 22 ñì. The Apple II was more than a toy. People could use it to write
letters, keep financial records and teach their children. And, yes, they
could play games on it. The Apple II evolved into todays high-tech
Related Reading Macintosh computers. These computers popularized the use of the
mouse, the hand-controlled device that moves the cursor on a comput-
MASTERS OF INVENTION er display.
14 15
III. Translate into English: and forth. Using knobs on a cabinet, the players could hit the ball with
inch-long paddles on the screen.
ÎÏÀÑÍÛÅ ÈÃÐÛ Nolan Bushnell grew up near Salt Lake City, Utah. He loved to
tinker with machines and became an electrical engineer. He played
Êîìïüþòåðû ñòàíîâÿòñÿ âñå áîëåå ïðèâû÷íûì àòðèáóòîì îôè-
ñîâ è êîíòîð, øêîëüíûõ êëàññîâ è äàæå äåòñêèõ ñàäîâ. primitive computer games that were even older than Pong.
Ïðîâåäåííûå àìåðèêàíñêèìè ó÷åíûìè èññëåäîâàíèÿ ïîêàçà- I built it with my own two hands and a soldering iron, Bushnell
ëè, ÷òî ïåðåìåííûå ýëåêòðîìàãíèòíûå ïîëÿ ÷àñòîòîé 60 Ãö ìîãóò said of his creation of the first Pong game.
âûçûâàòü ãëàçíûå çàáîëåâàíèÿ (â ÷àñòíîñòè, êàòàðàêòó), çëîêà÷å- In 1972 Bushnell founded Atari Inc. in Sunnyvale, Calif., to build
ñòâåííûå îïóõîëè, ñíèæàþò èììóííûé ñòàòóñ îðãàíèçìà. Pong games. By 1975 there were 150,000 Pong games in American
Ñóùåñòâóåò ïðåäïîëîæåíèå î ñâÿçè ìåæäó ÷àñòîòîé âîçíèê- homes.
íîâåíèÿ îïóõîëåé ó äåòåé è ìàãíèòíûìè ïîëÿìè. Steve Wozniak, born in 1950, and Steven Jobs, born in 1955, the
Ñïåöèàëèñòû èç ÑØÀ, Êàíàäû, Èñïàíèè è Øâåöèè èçó÷àëè young video game fanatics, working out of a garage, invented the Apple
âîçäåéñòâèå ïåðåìåííûõ ìàãíèòíûõ ïîëåé äèñïëåéíûõ ìîíèòîðîâ computer in 1976. The age of home computers was born.
íà íåáëàãîïðèÿòíîå òå÷åíèå áåðåìåííîñòè ó æåíùèí. One of Ataris early employees 19-year-old Steve Jobs and his friend,
Ó æåíùèí, êîòîðûå âî âðåìÿ áåðåìåííîñòè ïðîâîäèëè íå ìå- Steve Wozniak, who worked for another computer company, both
íåå 20 ÷àñîâ â íåäåëþ çà êîìïüþòåðíûìè òåðìèíàëàìè, âåðîÿò- loved video games.
íîñòü âûêèäûøåé íà 80 % âûøå, ÷åì ó æåíùèí, âûïîëíÿâøèõ òó Jobs and Wozniak dreamed of a personal computer, one that could
æå ðàáîòó áåç ïîìîùè âèäåîòåðìèíàëîâ. do more than play games. From this dream, the Apple Computer Com-
Ïîìíèòå, ÷òî: pany started in a family garage.
• ïðè ðàáîòå çà âèäåîòåðìèíàëîì íåîáõîäèìî ðàñïîëàãàòüñÿ In 1977 Jobs and Wozniak sold their first Apple II, which launched
íà ðàññòîÿíèè âûòÿíóòîé ðóêè îò ýêðàíà; the personal computer industry. By 1985 they had sold more than two
• ñîñåäíèå äèñïëåéíûå ìîíèòîðû äîëæíû íàõîäèòüñÿ îò million Apple IIs.
âàñ íà ðàññòîÿíèè íå ìåíåå 2 ì 22 ñì. The Apple II was more than a toy. People could use it to write
letters, keep financial records and teach their children. And, yes, they
could play games on it. The Apple II evolved into todays high-tech
Related Reading Macintosh computers. These computers popularized the use of the
mouse, the hand-controlled device that moves the cursor on a comput-
MASTERS OF INVENTION er display.
14 15
A good example was the Oklahoma City bombing (in April 1995), DRGN was developed by Matt Moller and Canton Becker in March
said Steve Anderson of USA Today. We had a photo and a story online 1995. DRGN provides the opportunity for people to meet and play
within minutes of it happening. Most newspaper readers had to wait music together who would have never met otherwise, Moller said.
until the next morning for their news. People will be able to form global bands easily without the hassles of
Electronic newspapers also allow you to instantly learn more about geographical boundaries.
a news story through hypertext links. For example, at the end of an online
article about the New York Knicks might be headlines of other online
articles on the basketball team. Just click on what you want to see next. FROM MR. DVORAKS COLUMN IN THE FREE
Ever wish you had saved a newspaper article, after you threw it PERIODICAL MICROTIMES
away? With electronic newspapers, you can go online and find old
Dear Mr. Dvorak:
articles you need for class discussions, reports or your own personal Ann Landers wouldnt print this. I have nowhere else to turn. I have
use. to get the word out. Warn other parents. Let me try and explain. Its
Everything thats appeared in The Mercury News for the last 10 about my son, Billy. Hes always been a good, normal, ten-year-old boy.
years is available on our Web site or America Online, said Barry Parr Well, last spring we sat down after dinner to select a summer camp
of The San Jose Mercury News. There are more than a million news for Billy. We sorted through the camp brochures. There were the usual
stories in our database. camps with swimming, canoeing, games, and singing by the campfire
And you can search papers from all over the United States for the you know. There were sports camps and specialty camps for weight
information you need The Mercury News has links to 16 other reduction, music, military camps, and camps that specialized in Ti-
papers. In the future, electronic newspapers may add all kinds of new betan knot tying. I tried to talk him into Camp Winnepoopoo. Its where
features, like audio and video cli ps of news you can see and hear on he went last year. (He made an adorable picture out of painted macaro-
your computer. ni). Billy would have none of it! Instead Billy pulled a brochure out of
Will traditional newspapers ever disappear? Not likely electronic his pocket. It was for à COMPUTER CAMP! We should have put our
newspapers are just one more way to reach more people. foot down right there, if only we had known. He left three weeks ago. I
dont know whats happened. Hes changed. I cant explain it. See for
yourself. These are some of my little Billys letters.
WEB JAM
Res Rocket Surfer hasnt headlined a major concert, and they dont Dear Mom,
have any gold records. But theyve played all over the Internet globe as The kids are dorky nerds. The food stinks. The computers are the only
the worlds first cyber-band. good part. Were learning how to program. Late at night is the best time to
Computer software called the Distributed Real-Time Groove Net- program, so they let us stay up.
work (DRGN) lets groups of musicians jam on the Internet. Its like Love, Billy.
being in a chat room, but instead of talking, you play instruments. Dear Mom,
Each player sends his part of the impromptu jam session live through Camp is O.K. Last night we had pizza in the middle of the night. We
the Internet. A musician in Germany might start the beat by playing all get to choose what we want to drink. I drink Classic Coke. By the way,
drums. Then someone else in England adds bass, and a person in the can you make Szechwan food? Im getting used to it now. Gotta go, its
United States plays the melody with a lead guitar all at once. time for the flowchart class.
When you start playing, DRGN blends the music together, making Love, Billy.
it seem like everyone is playing at the same time in the same place P.S. This is written on a word processor. Pretty swell, huh? Its spell-
even if there are delays on the Internet. checked too.
16 17
A good example was the Oklahoma City bombing (in April 1995), DRGN was developed by Matt Moller and Canton Becker in March
said Steve Anderson of USA Today. We had a photo and a story online 1995. DRGN provides the opportunity for people to meet and play
within minutes of it happening. Most newspaper readers had to wait music together who would have never met otherwise, Moller said.
until the next morning for their news. People will be able to form global bands easily without the hassles of
Electronic newspapers also allow you to instantly learn more about geographical boundaries.
a news story through hypertext links. For example, at the end of an online
article about the New York Knicks might be headlines of other online
articles on the basketball team. Just click on what you want to see next. FROM MR. DVORAKS COLUMN IN THE FREE
Ever wish you had saved a newspaper article, after you threw it PERIODICAL MICROTIMES
away? With electronic newspapers, you can go online and find old
Dear Mr. Dvorak:
articles you need for class discussions, reports or your own personal Ann Landers wouldnt print this. I have nowhere else to turn. I have
use. to get the word out. Warn other parents. Let me try and explain. Its
Everything thats appeared in The Mercury News for the last 10 about my son, Billy. Hes always been a good, normal, ten-year-old boy.
years is available on our Web site or America Online, said Barry Parr Well, last spring we sat down after dinner to select a summer camp
of The San Jose Mercury News. There are more than a million news for Billy. We sorted through the camp brochures. There were the usual
stories in our database. camps with swimming, canoeing, games, and singing by the campfire
And you can search papers from all over the United States for the you know. There were sports camps and specialty camps for weight
information you need The Mercury News has links to 16 other reduction, music, military camps, and camps that specialized in Ti-
papers. In the future, electronic newspapers may add all kinds of new betan knot tying. I tried to talk him into Camp Winnepoopoo. Its where
features, like audio and video cli ps of news you can see and hear on he went last year. (He made an adorable picture out of painted macaro-
your computer. ni). Billy would have none of it! Instead Billy pulled a brochure out of
Will traditional newspapers ever disappear? Not likely electronic his pocket. It was for à COMPUTER CAMP! We should have put our
newspapers are just one more way to reach more people. foot down right there, if only we had known. He left three weeks ago. I
dont know whats happened. Hes changed. I cant explain it. See for
yourself. These are some of my little Billys letters.
WEB JAM
Res Rocket Surfer hasnt headlined a major concert, and they dont Dear Mom,
have any gold records. But theyve played all over the Internet globe as The kids are dorky nerds. The food stinks. The computers are the only
the worlds first cyber-band. good part. Were learning how to program. Late at night is the best time to
Computer software called the Distributed Real-Time Groove Net- program, so they let us stay up.
work (DRGN) lets groups of musicians jam on the Internet. Its like Love, Billy.
being in a chat room, but instead of talking, you play instruments. Dear Mom,
Each player sends his part of the impromptu jam session live through Camp is O.K. Last night we had pizza in the middle of the night. We
the Internet. A musician in Germany might start the beat by playing all get to choose what we want to drink. I drink Classic Coke. By the way,
drums. Then someone else in England adds bass, and a person in the can you make Szechwan food? Im getting used to it now. Gotta go, its
United States plays the melody with a lead guitar all at once. time for the flowchart class.
When you start playing, DRGN blends the music together, making Love, Billy.
it seem like everyone is playing at the same time in the same place P.S. This is written on a word processor. Pretty swell, huh? Its spell-
even if there are delays on the Internet. checked too.
16 17
Dear Mom, See what I mean? Its been two weeks since Ive heard from my
Dont worry. We do regular camp stuff. We told ghost stories by the little boy. What can I do, Mr. Dvorak? I know that its probably too late
glow of the green computer screens. It was real neat. I dont have much of to save my little Billy. But, if by printing these letters you can save
a tan cause we dont go outside very often. You cant see the computer JUST ONE CHILD from a life of programming, please, I beg of you to
screen in the sunlight anyway. That wimp camp I went to last year fed us do so. Thank you very much.
weird food too. Lay off, Mom. Im okay, really. Sally Gates, Concerned Parent
Love, Billy. Mr. Dvorak inadequately replied: Come on, Sally, boys will be boys.
Dear Mom,
Im fine. Im sleeping enough. Im eating enough. This is the best ANSWERS TO THE TEST
camp ever. We scared the counselor with some phony worm code. It was
1. cursor [B] Movable indicator on computer screen; as, He put the
real funny. He got mad and yelled. Frederick says its okay. Can you send
cursor after the last typed word. Latin currere (to run).
me more money? Ive spent mine on a pocket protector and a box of blank
2. network [C] System of electronically joined computers; as,
diskettes. Ive got to chip in on the phone bill. Did you know that you can
A network offers many opportunities for sharing information. Old En-
talk to people on a computer? Give my regards to Dad.
glish nett (knot) and weorc (act).
Love, Billy.
3. download [A] To copy a file or program onto a personal computer;
Dear Mom, as, She downloaded the transcript of the trial. Old English adune (from the
Forget the money for the telephone. Weve got a way to not pay. Sorry hill) and lad (carrying).
I havent written. Ive been learning a lot. Im real good at getting onto 4. virus [D] Digital infection or poison; as, The virus wreaked havoc
any computer in the country. Its really easy! I got into the universitys in with the banks accounting. Latin.
less than fifteen minutes. Frederick did it in five; hes going to show me 5. browser [A] Software that allows you to explore, or browser the
how. Frederick is my bunk partner. Hes really smart. He says that I Internet. French brouter (to graze or feed on).
shouldnt call myself Billy anymore. So, Im not. 6. cracker [B] Intruder; someone who breaks into, or cracks,
Signed, William. computer systems; as, In the film Mission: Impossible, Tom Cruise
Dear Mom, enters a high-security area with the aid of a cracker. German krachen (to
split).
How nice of you to come up on Parents Day. Whyd you get so upset?
I havent gained that much weight. The glasses arent real. Everybody 7. hit [D] Visit to a Web site. Old Norse hitta (to meet with).
wears them. I was trying to fit in. Believe me, the tape on them is cool. I 8. authenticate [C] To confirm the identity of a computer user; as,
thought that youd be proud of my program. After all, Ive made some Admittance was denied when the computer could not authenticate him.
Greek authentikos (genuine).
money on it. A publisher is sending a check for $30,000. Anyway, Ive
paid for the next six weeks of camp. I wont be home until late August. 9. emoticon [D] Illustration conveying a mood; as, When viewed
Regards, William. sideways, the emoticon :-) signifies happiness. Also called smiley. De-
rived from emotion and icon.
Mother, 10. boot [D] To start up a computer. Abbreviation of bootstrap.
Stop treating me like a child. True physically I am only ten years old. 11. server [A] Central computer sharing resources and data with
It was silly of you to try to kidnap me. Do not try again. Remember, I can other computers on a network. Latin servire (to be of use).
make your life miserable (i.e. the bank, credit bureau, and government 12. modem [D] Connecting device between computers over a phone
computers). I am not kidding. O.K.? I wont write again and this is your only line; as, The journalist submitted her article by modem. Condensed
warning. The emotions of this interpersonal communication drain me. form of modulator and demodulator.
Sincerely, William. 13. glitch [C] Error; malfunction; as, A telecommunications glitch
18 19
Dear Mom, See what I mean? Its been two weeks since Ive heard from my
Dont worry. We do regular camp stuff. We told ghost stories by the little boy. What can I do, Mr. Dvorak? I know that its probably too late
glow of the green computer screens. It was real neat. I dont have much of to save my little Billy. But, if by printing these letters you can save
a tan cause we dont go outside very often. You cant see the computer JUST ONE CHILD from a life of programming, please, I beg of you to
screen in the sunlight anyway. That wimp camp I went to last year fed us do so. Thank you very much.
weird food too. Lay off, Mom. Im okay, really. Sally Gates, Concerned Parent
Love, Billy. Mr. Dvorak inadequately replied: Come on, Sally, boys will be boys.
Dear Mom,
Im fine. Im sleeping enough. Im eating enough. This is the best ANSWERS TO THE TEST
camp ever. We scared the counselor with some phony worm code. It was
1. cursor [B] Movable indicator on computer screen; as, He put the
real funny. He got mad and yelled. Frederick says its okay. Can you send
cursor after the last typed word. Latin currere (to run).
me more money? Ive spent mine on a pocket protector and a box of blank
2. network [C] System of electronically joined computers; as,
diskettes. Ive got to chip in on the phone bill. Did you know that you can
A network offers many opportunities for sharing information. Old En-
talk to people on a computer? Give my regards to Dad.
glish nett (knot) and weorc (act).
Love, Billy.
3. download [A] To copy a file or program onto a personal computer;
Dear Mom, as, She downloaded the transcript of the trial. Old English adune (from the
Forget the money for the telephone. Weve got a way to not pay. Sorry hill) and lad (carrying).
I havent written. Ive been learning a lot. Im real good at getting onto 4. virus [D] Digital infection or poison; as, The virus wreaked havoc
any computer in the country. Its really easy! I got into the universitys in with the banks accounting. Latin.
less than fifteen minutes. Frederick did it in five; hes going to show me 5. browser [A] Software that allows you to explore, or browser the
how. Frederick is my bunk partner. Hes really smart. He says that I Internet. French brouter (to graze or feed on).
shouldnt call myself Billy anymore. So, Im not. 6. cracker [B] Intruder; someone who breaks into, or cracks,
Signed, William. computer systems; as, In the film Mission: Impossible, Tom Cruise
Dear Mom, enters a high-security area with the aid of a cracker. German krachen (to
split).
How nice of you to come up on Parents Day. Whyd you get so upset?
I havent gained that much weight. The glasses arent real. Everybody 7. hit [D] Visit to a Web site. Old Norse hitta (to meet with).
wears them. I was trying to fit in. Believe me, the tape on them is cool. I 8. authenticate [C] To confirm the identity of a computer user; as,
thought that youd be proud of my program. After all, Ive made some Admittance was denied when the computer could not authenticate him.
Greek authentikos (genuine).
money on it. A publisher is sending a check for $30,000. Anyway, Ive
paid for the next six weeks of camp. I wont be home until late August. 9. emoticon [D] Illustration conveying a mood; as, When viewed
Regards, William. sideways, the emoticon :-) signifies happiness. Also called smiley. De-
rived from emotion and icon.
Mother, 10. boot [D] To start up a computer. Abbreviation of bootstrap.
Stop treating me like a child. True physically I am only ten years old. 11. server [A] Central computer sharing resources and data with
It was silly of you to try to kidnap me. Do not try again. Remember, I can other computers on a network. Latin servire (to be of use).
make your life miserable (i.e. the bank, credit bureau, and government 12. modem [D] Connecting device between computers over a phone
computers). I am not kidding. O.K.? I wont write again and this is your only line; as, The journalist submitted her article by modem. Condensed
warning. The emotions of this interpersonal communication drain me. form of modulator and demodulator.
Sincerely, William. 13. glitch [C] Error; malfunction; as, A telecommunications glitch
18 19
nearly wiped out the stockbrokers on-line trading. Origin unknown.
14. compress [A] To shrink; store data in less space; as, The manuscript Unit II.
was compressed on a single floppy disk. Old French compresser.
15. pixel [A] Picture element; basic unit of an on-screen image. Computo, ergo sum
Combination of pix and element.
16. link [C] Related site on Internet; as, One link sent him from
Caruso to Pavarotti. German Gelenk (joint).
17. scanner [A] Machine that reproduces images onto a computer.
Latin scandere (to climb).
18. log on [B] To gain access to a computer network; as, A user ID
and password will help you log on. Origin unknown.
19. shareware [D] Free trial software often requiring later payment.
Combination of share and software.
20. gigabyte [B] Unit of storage, roughly a billion bytes; as, A gi-
gabyte of work was saved on her home computer. Combination of Greek
gigas (giant) and a variant of bit (abbreviation for binary digit).
VOCABULARY RATINGS
Prereading Discussion
1. What is your particular area of interest in computer science?
2. What are computers able to do?
3. How might computers affect your future career?
4. How important is it to be computer literate?
5. Are you a rule learner or a data gatherer?
6. Would you like to become a computer expert?
7. How do you think you ought to start?
8. How does it feel to be a computer student?
9. What disci plines does the course of instruction cover?
20 21
nearly wiped out the stockbrokers on-line trading. Origin unknown.
14. compress [A] To shrink; store data in less space; as, The manuscript Unit II.
was compressed on a single floppy disk. Old French compresser.
15. pixel [A] Picture element; basic unit of an on-screen image. Computo, ergo sum
Combination of pix and element.
16. link [C] Related site on Internet; as, One link sent him from
Caruso to Pavarotti. German Gelenk (joint).
17. scanner [A] Machine that reproduces images onto a computer.
Latin scandere (to climb).
18. log on [B] To gain access to a computer network; as, A user ID
and password will help you log on. Origin unknown.
19. shareware [D] Free trial software often requiring later payment.
Combination of share and software.
20. gigabyte [B] Unit of storage, roughly a billion bytes; as, A gi-
gabyte of work was saved on her home computer. Combination of Greek
gigas (giant) and a variant of bit (abbreviation for binary digit).
VOCABULARY RATINGS
Prereading Discussion
1. What is your particular area of interest in computer science?
2. What are computers able to do?
3. How might computers affect your future career?
4. How important is it to be computer literate?
5. Are you a rule learner or a data gatherer?
6. Would you like to become a computer expert?
7. How do you think you ought to start?
8. How does it feel to be a computer student?
9. What disci plines does the course of instruction cover?
20 21
Reading Analysis creativity or, more usually, the creativity of professional pro-
grammers can imagine for it to do. It is a calculating machine, a
magical typewriter, an unerring accountant, and a host of other tools.
VOCABULARY LIST To transform it from one persona to another requires setting some of
the microscopic switches buried in the hearts of the microchi ps, a
Nouns: (il)literacy, flake, inventory, creativity, accountant, host(ess), task accomplished by typing a command in DOS prompt or by
surge, chaos, cyberphobia, glitch, havoc, executive. clicking with your mouse on some tiny icon on the screen.
Verbs: to turn/hit/switch on/off, to search (for), to outstrip, to (4) Such intelligence is fragile and short-lived. All those millions of
require, to bury, to accomplish, to click (with smth.) on smth., to microscopic switches are constantly fli pping on and off in time to
flip on/off, to clash, to respond (to), to deal with, to intimidate, to dashing surges of electricity. All it takes is an errant instruction or
foul (up), to rebel, to reveal, to hesitate, to avoid smth./doing a stray misreading of a single chi p to send this wonderfully intel-
smth. ligent golem into a state of catatonia or hit the Off switch and what
Adjectives: tiny, miraculous, (un)erring, microscopic, fragile, stray, was a pulsing artificial life dies without a whimper. Then the next
preternatural, fearful, (ir)reparable, artificial. time you turn it on, birth begins all over again.
Adverbs: otherwise, accurately, seemingly, entirely, purposefully, (5) PCs are powerful creations that often seem to have a life of their
scarcely, interestingly, frustratingly. own. Usually they respond to a seemingly magic incantation typed
Word combinations: tabula rasa, the DOS prompt, an errant in- as a C:>prompt or to wave of a mouse by performing tasks we
struction, under (out of) control, computer anxiety/phobia, to force couldnt imagine doing ourselves without some sort of preternatu-
into contact, as a result of, to launch nuclear missiles, to keep up ral help. There are the times when our PCs rebel and open the
with the pace of, computing environment, to be left behind (out), to gates of chaos onto our neatly ordered columns of numbers, our
cause smb. trouble, an invasion of ones privacy, junk mail, com- carefully made sentences, and our beautifully crafted graphics. Are
puter columnist, to come to terms with. we playing with power not entirely under our control?
(6) A middle-aged woman sat down at a personal computer for the
first time in her life. She placed her hands above the keyboard,
TEXT I. WORRY ABOUT COMPUTERS? ME? ready to type but hesitated. Turning to the instructor, she asked
warily: It wont know what Im thinking, will it? Such concerns
(1) When your computer is turned off, it is a dead collection of sheet abound among people whose knowledge of computers comes from
metal, plastic, metallic tracings, and tiny flakes of silicon. When movies like 2001: A Space Odyssey (in which Hal, the computer
you hit On switch, one little burst of electricity only about 5 with the sticky-sweet voice, tries to take control of the spaceshi p).
volts starts a string of events that magically brings to life what Terms such as computer anxiety and computer phobia have en-
otherwise would remain an oversize paperweight. tered our language to describe such wariness. Many people try to
(2) At first the PC is still rather stupid. Beyond taking inventory of avoid situations in which they might be forced into contact with
itself, the newly awakened PC still cant do anything really useful, computers. Even businesspeople who deal with computers daily
intelligent. At best it can search for intelligence in the form of may experience a form of cyberphobia fear of computers. As a
operating system that gives structure to the PCs primitive exist- result of their fear, some office workers who are cyberphobic suf-
ence. Then comes a true education in the form of application soft- fer nausea, sweaty palms, and high blood pressure. Young people
ware programs that tell it how to do tasks faster and more accu- who have grown up with computers may not understand these
rately than we could, a student who has outstripped its teacher. reactions.
(3) What makes your PC such a miraculous device is that each time (7) What are such people afraid of? Some may worry about the mathe-
you turn it on, it is a tabula rasa, capable of doing anything your matical implications of the word computer. It seems to suggest that
22 23
Reading Analysis creativity or, more usually, the creativity of professional pro-
grammers can imagine for it to do. It is a calculating machine, a
magical typewriter, an unerring accountant, and a host of other tools.
VOCABULARY LIST To transform it from one persona to another requires setting some of
the microscopic switches buried in the hearts of the microchi ps, a
Nouns: (il)literacy, flake, inventory, creativity, accountant, host(ess), task accomplished by typing a command in DOS prompt or by
surge, chaos, cyberphobia, glitch, havoc, executive. clicking with your mouse on some tiny icon on the screen.
Verbs: to turn/hit/switch on/off, to search (for), to outstrip, to (4) Such intelligence is fragile and short-lived. All those millions of
require, to bury, to accomplish, to click (with smth.) on smth., to microscopic switches are constantly fli pping on and off in time to
flip on/off, to clash, to respond (to), to deal with, to intimidate, to dashing surges of electricity. All it takes is an errant instruction or
foul (up), to rebel, to reveal, to hesitate, to avoid smth./doing a stray misreading of a single chi p to send this wonderfully intel-
smth. ligent golem into a state of catatonia or hit the Off switch and what
Adjectives: tiny, miraculous, (un)erring, microscopic, fragile, stray, was a pulsing artificial life dies without a whimper. Then the next
preternatural, fearful, (ir)reparable, artificial. time you turn it on, birth begins all over again.
Adverbs: otherwise, accurately, seemingly, entirely, purposefully, (5) PCs are powerful creations that often seem to have a life of their
scarcely, interestingly, frustratingly. own. Usually they respond to a seemingly magic incantation typed
Word combinations: tabula rasa, the DOS prompt, an errant in- as a C:>prompt or to wave of a mouse by performing tasks we
struction, under (out of) control, computer anxiety/phobia, to force couldnt imagine doing ourselves without some sort of preternatu-
into contact, as a result of, to launch nuclear missiles, to keep up ral help. There are the times when our PCs rebel and open the
with the pace of, computing environment, to be left behind (out), to gates of chaos onto our neatly ordered columns of numbers, our
cause smb. trouble, an invasion of ones privacy, junk mail, com- carefully made sentences, and our beautifully crafted graphics. Are
puter columnist, to come to terms with. we playing with power not entirely under our control?
(6) A middle-aged woman sat down at a personal computer for the
first time in her life. She placed her hands above the keyboard,
TEXT I. WORRY ABOUT COMPUTERS? ME? ready to type but hesitated. Turning to the instructor, she asked
warily: It wont know what Im thinking, will it? Such concerns
(1) When your computer is turned off, it is a dead collection of sheet abound among people whose knowledge of computers comes from
metal, plastic, metallic tracings, and tiny flakes of silicon. When movies like 2001: A Space Odyssey (in which Hal, the computer
you hit On switch, one little burst of electricity only about 5 with the sticky-sweet voice, tries to take control of the spaceshi p).
volts starts a string of events that magically brings to life what Terms such as computer anxiety and computer phobia have en-
otherwise would remain an oversize paperweight. tered our language to describe such wariness. Many people try to
(2) At first the PC is still rather stupid. Beyond taking inventory of avoid situations in which they might be forced into contact with
itself, the newly awakened PC still cant do anything really useful, computers. Even businesspeople who deal with computers daily
intelligent. At best it can search for intelligence in the form of may experience a form of cyberphobia fear of computers. As a
operating system that gives structure to the PCs primitive exist- result of their fear, some office workers who are cyberphobic suf-
ence. Then comes a true education in the form of application soft- fer nausea, sweaty palms, and high blood pressure. Young people
ware programs that tell it how to do tasks faster and more accu- who have grown up with computers may not understand these
rately than we could, a student who has outstripped its teacher. reactions.
(3) What makes your PC such a miraculous device is that each time (7) What are such people afraid of? Some may worry about the mathe-
you turn it on, it is a tabula rasa, capable of doing anything your matical implications of the word computer. It seems to suggest that
22 23
only a person with strong analytical and quantitative skills can use (12) Computer fraud and computer security are not simple issues;
the machine. In fact, as we see more and more often, even very they are concerns that society must take seriously. Should we, as
young children whose math skills have yet to form can use com- computer columnist John Dvorak advocates, let things work them-
puters. selves out in the courts? Or, should legislators be encouraged to
(8) Some people are fearful of the computing environment. The movies create laws for societys protection?
love to portray old-fashioned, large computer systems sanitized
rooms walled by machines alive with blinking lights and spinning
reels; it all looks intimidating. There is a notion that computers are EXERCISES
temperamental gadgets and that, once a glitch gets into a computer
system, it may wreak all kinds of havoc from fouling up bank I. Find in the text the English equivalents to:
statements to launching nuclear missiles by mistake. Indeed, com-
puter billing and banking errors are problems; however, most er- äåëîâûå ëþäè; ñòðàõ ïåðåä êîìïüþòåðàìè; èñïûòûâàòü òîøíî-
rors blamed on computers are the result of mistakes made by peo- òó; âûñîêîå êðîâÿíîå äàâëåíèå; ìàòåìàòè÷åñêèé ñìûñë (çíà÷åíèå);
ple. Computers do not put in the data they must work with, people ñòàðîìîäíûå êîìïüþòåðíûå ñèñòåìû; âûãëÿäåòü óñòðàøàþùå; ìåð-
do. Even so, correcting an error can be frustratingly slow. öàþùèå îãíè; âðàùàþùèåñÿ êàòóøêè; âðåìåííûå ïðèñïîñîáëåíèÿ; ïî
(9) Many people worry about computers in relation to their jobs. Some îøèáêå; îáâèíÿòü êîìïüþòåðû; èñïðàâëÿòü îøèáêè; óñòàíîâèòü
people doubt they have the skills to find jobs and keep them in òåðìèíàëû; èñïîëüçîâàòü êëàâèàòóðó; ïîòåðÿòü ñòàòóñ; ïîïàñòü â
a technological labor market. Many feel that keeping up with the «äóðíûå» ðóêè; íàíåñòè íåïîïðàâèìûé óùåðá; íåâîñòðåáîâàííàÿ
swift pace of technological change is impossible because it requires ïî÷òà; çàïîëíèòü áëàíê; çàïèñàòü â êîìïüþòåðíûé ôàéë; ñîçäàòü
costly and continuous training and development. A good many çàêîíû äëÿ çàùèòû îáùåñòâà.
present-day executives whose companies have installed computer
terminals in their offices also worry about typing either they do
II. True or false?
not know how to type or they are afraid they will lose status if they 1. People are not interested in computers, they just dont want to be
use a keyboard. left behind.
(10) Interestingly, there is another side to computer anxiety: the fear 2. Computers are going to make many careers obsolete.
of being left out or left behind. If everyone around you is talking 3. Most jobs will be lost because of computers.
about, living with, and working around computers, how can you 4. Computers change the way jobs are performed.
keep from revealing your limited understanding? 5. People who refuse to have anything to do with computers may soon
(11) People are also nervous that computers might fall into the wrong be regarded as people who refuse to learn to drive.
hands. As examples of electronic wrongdoing, try these for size: 6. Computers are powerful, potentially dangerous tools with a life of
An error purposefully introduced into your computerized credit their own.
report by someone who wanted to cause you trouble might do 7. Most of businesspeople write or commission their own programs.
irreparable damage to your financial standing, ending any hopes 8. Computers are now smaller and more powerful than ever before.
you might have for owning a home someday. An easily obtainable 9. Computers have resulted in massive unemployment in many coun-
computerized list might carry personal information that could lead tries.
to an invasion of your privacy or at the least, a pile of junk mail. 10. Managers with little or no computer experience should overrely on
Think of all the forms you have filled out for schools, jobs, doc- computers.
tors, credit services, government offices, and so on. There is scarcely 11. Computers can result in an invasion of peoples privacy.
one fact related to you that is not on record in a computer file 12. Today the challenge is to manage the information explosion through
somewhere. Could unauthorized persons obtain this information? the use of well-designed information.
24 25
only a person with strong analytical and quantitative skills can use (12) Computer fraud and computer security are not simple issues;
the machine. In fact, as we see more and more often, even very they are concerns that society must take seriously. Should we, as
young children whose math skills have yet to form can use com- computer columnist John Dvorak advocates, let things work them-
puters. selves out in the courts? Or, should legislators be encouraged to
(8) Some people are fearful of the computing environment. The movies create laws for societys protection?
love to portray old-fashioned, large computer systems sanitized
rooms walled by machines alive with blinking lights and spinning
reels; it all looks intimidating. There is a notion that computers are EXERCISES
temperamental gadgets and that, once a glitch gets into a computer
system, it may wreak all kinds of havoc from fouling up bank I. Find in the text the English equivalents to:
statements to launching nuclear missiles by mistake. Indeed, com-
puter billing and banking errors are problems; however, most er- äåëîâûå ëþäè; ñòðàõ ïåðåä êîìïüþòåðàìè; èñïûòûâàòü òîøíî-
rors blamed on computers are the result of mistakes made by peo- òó; âûñîêîå êðîâÿíîå äàâëåíèå; ìàòåìàòè÷åñêèé ñìûñë (çíà÷åíèå);
ple. Computers do not put in the data they must work with, people ñòàðîìîäíûå êîìïüþòåðíûå ñèñòåìû; âûãëÿäåòü óñòðàøàþùå; ìåð-
do. Even so, correcting an error can be frustratingly slow. öàþùèå îãíè; âðàùàþùèåñÿ êàòóøêè; âðåìåííûå ïðèñïîñîáëåíèÿ; ïî
(9) Many people worry about computers in relation to their jobs. Some îøèáêå; îáâèíÿòü êîìïüþòåðû; èñïðàâëÿòü îøèáêè; óñòàíîâèòü
people doubt they have the skills to find jobs and keep them in òåðìèíàëû; èñïîëüçîâàòü êëàâèàòóðó; ïîòåðÿòü ñòàòóñ; ïîïàñòü â
a technological labor market. Many feel that keeping up with the «äóðíûå» ðóêè; íàíåñòè íåïîïðàâèìûé óùåðá; íåâîñòðåáîâàííàÿ
swift pace of technological change is impossible because it requires ïî÷òà; çàïîëíèòü áëàíê; çàïèñàòü â êîìïüþòåðíûé ôàéë; ñîçäàòü
costly and continuous training and development. A good many çàêîíû äëÿ çàùèòû îáùåñòâà.
present-day executives whose companies have installed computer
terminals in their offices also worry about typing either they do
II. True or false?
not know how to type or they are afraid they will lose status if they 1. People are not interested in computers, they just dont want to be
use a keyboard. left behind.
(10) Interestingly, there is another side to computer anxiety: the fear 2. Computers are going to make many careers obsolete.
of being left out or left behind. If everyone around you is talking 3. Most jobs will be lost because of computers.
about, living with, and working around computers, how can you 4. Computers change the way jobs are performed.
keep from revealing your limited understanding? 5. People who refuse to have anything to do with computers may soon
(11) People are also nervous that computers might fall into the wrong be regarded as people who refuse to learn to drive.
hands. As examples of electronic wrongdoing, try these for size: 6. Computers are powerful, potentially dangerous tools with a life of
An error purposefully introduced into your computerized credit their own.
report by someone who wanted to cause you trouble might do 7. Most of businesspeople write or commission their own programs.
irreparable damage to your financial standing, ending any hopes 8. Computers are now smaller and more powerful than ever before.
you might have for owning a home someday. An easily obtainable 9. Computers have resulted in massive unemployment in many coun-
computerized list might carry personal information that could lead tries.
to an invasion of your privacy or at the least, a pile of junk mail. 10. Managers with little or no computer experience should overrely on
Think of all the forms you have filled out for schools, jobs, doc- computers.
tors, credit services, government offices, and so on. There is scarcely 11. Computers can result in an invasion of peoples privacy.
one fact related to you that is not on record in a computer file 12. Today the challenge is to manage the information explosion through
somewhere. Could unauthorized persons obtain this information? the use of well-designed information.
24 25
13. Data = information. machine buzzed, clicked, blinked its lights and eventually came up
14. Computerization leads to elimination of workers jobs (robots) and with car-flavored marmalade. Machine translation has come a long
white-collar jobs (computers). way ...
then. Computer translation systems are now in .
.. in many parts
15. The bank computer thefts are carried out by computer whizzes who of the world.
know the correct codes to use to access accounts in order to steal Not surprisingly, the EEC is very .... With so many official languag-
or mani pulate money. es, translating and interpreting take up ...
than 50% of the Communi-
16. In a few seconds computer can make a mistake so great that it would tys administrative budget. But although the efficiency of machine trans-
take many months to equal it. lation is ...
rapidly, theres no question of ...
translators being made
17. Computer monitoring of people leads to job stress and more fre- redundant. On the contrary, people and machines work together in
quent illnesses. harmony. Todays computers .
.. of little value in translating literary works,
18. One persons error is another persons data. where subtlety is vital, or the spoken word, which tends to be ungram-
19. To err is human; to really foul things up requires a computer. matical, or important texts, where absolute ...
is essential. But for
routine technical reports, working papers and the like, which take up
III. Give definitions to: ...
much of the translation workload of the international organizations,
computers are likely to play an increasing ... . The method of operation
a computer whiz (whizard), a hacker, a computer-literate person,
will probably be for the machines to ...
a rough version, which the
a computer science student, a computer engineer, a computer programmer,
translator will then edit, correcting obvious ...
, and where necessary
a computer operator.
referring ...
to the original.
e.g. a system analyst is a person who identifies the information needed If machines can translate languages, could they ...
teach languag-
and develops a management info system with the assistance of computer es? Yes say enthusiasts, although they doubt that the teacher could
programs. ever be totally ...
by a machine in the classroom. Good old teachers
IV. Give synonyms to: know best!
26 27
13. Data = information. machine buzzed, clicked, blinked its lights and eventually came up
14. Computerization leads to elimination of workers jobs (robots) and with car-flavored marmalade. Machine translation has come a long
white-collar jobs (computers). way ...
then. Computer translation systems are now in .
.. in many parts
15. The bank computer thefts are carried out by computer whizzes who of the world.
know the correct codes to use to access accounts in order to steal Not surprisingly, the EEC is very .... With so many official languag-
or mani pulate money. es, translating and interpreting take up ...
than 50% of the Communi-
16. In a few seconds computer can make a mistake so great that it would tys administrative budget. But although the efficiency of machine trans-
take many months to equal it. lation is ...
rapidly, theres no question of ...
translators being made
17. Computer monitoring of people leads to job stress and more fre- redundant. On the contrary, people and machines work together in
quent illnesses. harmony. Todays computers .
.. of little value in translating literary works,
18. One persons error is another persons data. where subtlety is vital, or the spoken word, which tends to be ungram-
19. To err is human; to really foul things up requires a computer. matical, or important texts, where absolute ...
is essential. But for
routine technical reports, working papers and the like, which take up
III. Give definitions to: ...
much of the translation workload of the international organizations,
computers are likely to play an increasing ... . The method of operation
a computer whiz (whizard), a hacker, a computer-literate person,
will probably be for the machines to ...
a rough version, which the
a computer science student, a computer engineer, a computer programmer,
translator will then edit, correcting obvious ...
, and where necessary
a computer operator.
referring ...
to the original.
e.g. a system analyst is a person who identifies the information needed If machines can translate languages, could they ...
teach languag-
and develops a management info system with the assistance of computer es? Yes say enthusiasts, although they doubt that the teacher could
programs. ever be totally ...
by a machine in the classroom. Good old teachers
IV. Give synonyms to: know best!
26 27
end, you will benefit from such knowledge, but at first it may person. Now they are one-on-one with a machine, at least part of
be frustrating. the time. The experience is different, and maybe slightly scary. But
• Interaction. There is no better way to understand computers keep in mind that others have survived and even triumphed. So
than through interacting with one. So being computer literate can you.
also means being able to use a computer for some simple (6) And dont be surprised to find that some of your fellow students
applications. already seem to know quite a bit about computers. Computer litera-
(3) Note that no part of this definition suggests that you must be able cy courses are required by many schools and colleges and include
to create the instructions that tell a computer what to do. That students with varying degrees of understanding. That mix often al-
would be tantamount to saying that anyone who plans to drive lows students to learn from one another and provides a few with
a car must first become an auto mechanic. Someone else can write the opportunity to teach others what they know.
the instructions for the computer; you simply use the instructions
to get your work done. For example, a bank teller might use
a computer to make sure that customers really have as much mon- EXERCISES
ey in their account as they wish to withdraw. Or an accountant I. Find in the text equivalents to:
might use one to prepare a report, a farmer to check on market
prices, a store manager to analyze sales trends, and a teenager to êîìïüþòåðíàÿ ãðàìîòíîñòü; äîñòóïíîñòü (íàëè÷èå); îñâåäîì-
play a video game. We cannot guarantee that these people are com- ëåííîñòü; âåê èíôîðìàöèè; ïðîæèòü îñòàâøóþñÿ æèçíü; ïðèòÿãà-
puter literate, but they have at least grasped the hands-on com- òåëüíîñòü êîìïüþòåðîâ; ñíÿòü ñ áàíêîâñêîãî ñ÷åòà; òåõíè÷åñêèé
ponent of the definition they can interact with a computer. Is it æàðãîí; âçàèìîäåéñòâèå; ðåêëàìíûé ðîëèê; ê óäèâëåíèþ; ïàðà
possible for everyone to be computer literate? Computer literacy çàíÿòèé; ðàñòåðÿòüñÿ; ïðåäûäóùèé ó÷åáíûé îïûò; ïîäåëèòüñÿ ñî
is not a question of human abilities. Just about anyone can become ñâåðñòíèêàìè; áûòü íàåäèíå ñ; ïîìíèòü; ñòðàøíîâàòûé; îäíîêóðñ-
computer literate. In the near future, people who do not under- íèêè; âûðàñòè â êîìïüþòåðíîé ñðåäå; ó÷èòüñÿ äðóã ó äðóãà; ïîëüçî-
stand computers will have the same status as people today who âàòåëü-íîâè÷îê.
cannot read
(4) If this is your first computer class, you might wonder whether II. Answer the following questions:
using a computer is really as easy as the commercials say. Some 1. What does being computer literate mean?
students think so, but many do not. In fact, some novice computer 2. What are the three aspects of the computers universal appeal?
users can be confused and frustrated at first. Indeed, a few are so 3. What is the best way to understand computers?
frustrated in the early going they think they never will learn. To 4. What are the simplest applications of computers?
their surprise, however, after a couple of lessons they not only are 5. What is the hand-on component of computer literacy?
using computers but enjoying the experience. 6. What are some novice computer users frustrated by?
(5) Some students may be taken aback when the subject matter turns 7. What is the first computer literacy skill?
out to be more difficult than they expected especially if their 8. Is it possible for everyone to be computer literate? Do you need any
only computer experience involved the fun of video games. They special talents?
are confused by the special terms used in computer classes, as if
they had stumbled into some foreign-language course by mistake. III. Put the proper words into sentences:
A few students may be frustrated by the hands-on nature of the
experience, in which they have a one-to-one relationshi p with the computer networks, info, computer literate, routine, boring, repetitive
computer. Their previous learning experiences, in contrast, have tasks, accuracy, to come to terms with, quantative.
been shared and sheltered they have been shared with peers in 1. Society is heading in the direction of ... majority.
a classroom and sheltered by the guiding hand of an experienced 2. Computer programs now can integrate text, ... data and graphs.
28 29
end, you will benefit from such knowledge, but at first it may person. Now they are one-on-one with a machine, at least part of
be frustrating. the time. The experience is different, and maybe slightly scary. But
• Interaction. There is no better way to understand computers keep in mind that others have survived and even triumphed. So
than through interacting with one. So being computer literate can you.
also means being able to use a computer for some simple (6) And dont be surprised to find that some of your fellow students
applications. already seem to know quite a bit about computers. Computer litera-
(3) Note that no part of this definition suggests that you must be able cy courses are required by many schools and colleges and include
to create the instructions that tell a computer what to do. That students with varying degrees of understanding. That mix often al-
would be tantamount to saying that anyone who plans to drive lows students to learn from one another and provides a few with
a car must first become an auto mechanic. Someone else can write the opportunity to teach others what they know.
the instructions for the computer; you simply use the instructions
to get your work done. For example, a bank teller might use
a computer to make sure that customers really have as much mon- EXERCISES
ey in their account as they wish to withdraw. Or an accountant I. Find in the text equivalents to:
might use one to prepare a report, a farmer to check on market
prices, a store manager to analyze sales trends, and a teenager to êîìïüþòåðíàÿ ãðàìîòíîñòü; äîñòóïíîñòü (íàëè÷èå); îñâåäîì-
play a video game. We cannot guarantee that these people are com- ëåííîñòü; âåê èíôîðìàöèè; ïðîæèòü îñòàâøóþñÿ æèçíü; ïðèòÿãà-
puter literate, but they have at least grasped the hands-on com- òåëüíîñòü êîìïüþòåðîâ; ñíÿòü ñ áàíêîâñêîãî ñ÷åòà; òåõíè÷åñêèé
ponent of the definition they can interact with a computer. Is it æàðãîí; âçàèìîäåéñòâèå; ðåêëàìíûé ðîëèê; ê óäèâëåíèþ; ïàðà
possible for everyone to be computer literate? Computer literacy çàíÿòèé; ðàñòåðÿòüñÿ; ïðåäûäóùèé ó÷åáíûé îïûò; ïîäåëèòüñÿ ñî
is not a question of human abilities. Just about anyone can become ñâåðñòíèêàìè; áûòü íàåäèíå ñ; ïîìíèòü; ñòðàøíîâàòûé; îäíîêóðñ-
computer literate. In the near future, people who do not under- íèêè; âûðàñòè â êîìïüþòåðíîé ñðåäå; ó÷èòüñÿ äðóã ó äðóãà; ïîëüçî-
stand computers will have the same status as people today who âàòåëü-íîâè÷îê.
cannot read
(4) If this is your first computer class, you might wonder whether II. Answer the following questions:
using a computer is really as easy as the commercials say. Some 1. What does being computer literate mean?
students think so, but many do not. In fact, some novice computer 2. What are the three aspects of the computers universal appeal?
users can be confused and frustrated at first. Indeed, a few are so 3. What is the best way to understand computers?
frustrated in the early going they think they never will learn. To 4. What are the simplest applications of computers?
their surprise, however, after a couple of lessons they not only are 5. What is the hand-on component of computer literacy?
using computers but enjoying the experience. 6. What are some novice computer users frustrated by?
(5) Some students may be taken aback when the subject matter turns 7. What is the first computer literacy skill?
out to be more difficult than they expected especially if their 8. Is it possible for everyone to be computer literate? Do you need any
only computer experience involved the fun of video games. They special talents?
are confused by the special terms used in computer classes, as if
they had stumbled into some foreign-language course by mistake. III. Put the proper words into sentences:
A few students may be frustrated by the hands-on nature of the
experience, in which they have a one-to-one relationshi p with the computer networks, info, computer literate, routine, boring, repetitive
computer. Their previous learning experiences, in contrast, have tasks, accuracy, to come to terms with, quantative.
been shared and sheltered they have been shared with peers in 1. Society is heading in the direction of ... majority.
a classroom and sheltered by the guiding hand of an experienced 2. Computer programs now can integrate text, ... data and graphs.
28 29
3. The source of ... is the computer. 12. If Java is the answer,...
4. It is difficult for some people to come ... the speed of change in the 13. They will lose status if...
modern world. 14. Provided you have the necessary tools...
5. Many ... which people find ... and tiring can now be carried out by
machines.
6. Computers give us speed, ..., scope, quality, flexibility, large ca- TEXT III. WHY I WONT BUY A COMPUTER
pacity, elimination of the ... and ...
, increased efficiency.
(1) I do not see that computers are bringing us one step nearer to
7. We need ... with expanding computer technology and adjust our
anything that does matter to me: peace, economic justice, ecolog-
vision to a whole new world. ical health, political honesty, stability, good work.
8. As more and more people are linked by ...
, how soon will it be (2) What would a computer cost me? More money than I can afford
before the paperless office becomes a reality? and more than I wish to pay to people whom I do not admire. But
the cost would not be just monetary. It is well understood that
IV. Construct other sentences in these patterns (models): technological innovation always requires the discarding of the old
model, what would be superseded would be not only something,
1. At best the computer can search for intelligence in the form of but somebody.
operating system. (3) To make myself as plain as I can, I should give my standards for
2. Computers might affect your future career. technological innovations in my work. They are as follows:
3. Young people may not understand these cyberphobic reactions. • The new tool should be cheaper than the one it replaces.
4. Computers do not put in the data they must work with, people do. • It should be at least as small in scale as the one it replaces.
5. Could unauthorized persons obtain personal info? • It should work clearly and demonstrably better than the one it
6. Should legislators be encouraged to create laws for societys protec- replaces.
tion? • It should use less energy
.
7. We cannot guarantee that anyone who drives a car is an auto me- • If possible it should use some form of solar energy
.
chanic. • It should be repairable by a person of ordinary intelligence,
provided he has the necessary tools.
V. Complete the sentences (if, when-clauses): • It should be purchasable and repairable as near to home as
possible.
1. When your PC is turned off... • It should come from a small, privately owned shop or store
2. You will bring it to life when... that will take it back for maintenance and repair.
3. If everyone around you uses computers... • It should not disrupt or replace anything good that already
4. If you are taken aback how to use a computer... exists, and this includes family and community relationshi ps.
5. As multimedia becomes more prevalent on the Web...
6. If you look on the entire Internet today...
7. If the program fails the test... EXERCISES
8. Dont open until...
9. If you are selling weapons, cryptography, military info, pornogra- I. Answer the following questions:
phy... 1. What does the author think a computer would cost him?
10. If the program passes the test... 2. Given the authors standards for technological innovation, what
11. If you dont view your Web site as a global presence... other new tools do you think he might object to?
30 31
3. The source of ... is the computer. 12. If Java is the answer,...
4. It is difficult for some people to come ... the speed of change in the 13. They will lose status if...
modern world. 14. Provided you have the necessary tools...
5. Many ... which people find ... and tiring can now be carried out by
machines.
6. Computers give us speed, ..., scope, quality, flexibility, large ca- TEXT III. WHY I WONT BUY A COMPUTER
pacity, elimination of the ... and ...
, increased efficiency.
(1) I do not see that computers are bringing us one step nearer to
7. We need ... with expanding computer technology and adjust our
anything that does matter to me: peace, economic justice, ecolog-
vision to a whole new world. ical health, political honesty, stability, good work.
8. As more and more people are linked by ...
, how soon will it be (2) What would a computer cost me? More money than I can afford
before the paperless office becomes a reality? and more than I wish to pay to people whom I do not admire. But
the cost would not be just monetary. It is well understood that
IV. Construct other sentences in these patterns (models): technological innovation always requires the discarding of the old
model, what would be superseded would be not only something,
1. At best the computer can search for intelligence in the form of but somebody.
operating system. (3) To make myself as plain as I can, I should give my standards for
2. Computers might affect your future career. technological innovations in my work. They are as follows:
3. Young people may not understand these cyberphobic reactions. • The new tool should be cheaper than the one it replaces.
4. Computers do not put in the data they must work with, people do. • It should be at least as small in scale as the one it replaces.
5. Could unauthorized persons obtain personal info? • It should work clearly and demonstrably better than the one it
6. Should legislators be encouraged to create laws for societys protec- replaces.
tion? • It should use less energy
.
7. We cannot guarantee that anyone who drives a car is an auto me- • If possible it should use some form of solar energy
.
chanic. • It should be repairable by a person of ordinary intelligence,
provided he has the necessary tools.
V. Complete the sentences (if, when-clauses): • It should be purchasable and repairable as near to home as
possible.
1. When your PC is turned off... • It should come from a small, privately owned shop or store
2. You will bring it to life when... that will take it back for maintenance and repair.
3. If everyone around you uses computers... • It should not disrupt or replace anything good that already
4. If you are taken aback how to use a computer... exists, and this includes family and community relationshi ps.
5. As multimedia becomes more prevalent on the Web...
6. If you look on the entire Internet today...
7. If the program fails the test... EXERCISES
8. Dont open until...
9. If you are selling weapons, cryptography, military info, pornogra- I. Answer the following questions:
phy... 1. What does the author think a computer would cost him?
10. If the program passes the test... 2. Given the authors standards for technological innovation, what
11. If you dont view your Web site as a global presence... other new tools do you think he might object to?
30 31
3.
4.
How has technology changed your everyday life?
What new gadgets do you particularly like?
Topics for Essays,
5. Have you learned to use a computer? Why or why not? Oral or Written Reports
6. Do you fear the power of computers?
7. List ten modern inventions: 1. To be or not to be computer literate?
2. Pluses and minuses of computers.
Invention Replacement Advantage Disadvantage
3. How will computers affect our lives in future?
electricity 4. Discoveries, inventions, new products, and their effects (good and
evil).
telephone writing letters less time too slow
silicon chi p
Essay Selection for Reading
cellular as a Stimulus for Writing
phone
8. True or false? KEEP CLICKING!
• Modern technology is out of control, and ruining the quality
of life on Earth; we must limit technology and its influence Computers spoil your eyes, computers are bad for your nerves, com-
on individual. puters this, computers that! Dont believe it! Why dont people crit-
• Modern inventions are labor-saving devices. Without them peo- icize guns that kill much more people? Thats life, youll say. Yes, but
ple remain slaves to boring, repetitive work. how can you blame such a wonderful thing like a computer, when you
9. How will science and technology affect our lives in future? cant even use it properly? All evils imputed to computers are the results of
our inexperience.
II. Complete the following and discuss it:
How can you blame computers for spoiling your eyes if you play Doom
1. Scientific and technological breakthroughs have brought great ben- clones for hours? How can a computer be bad for your nerves if you cry
efits. You only have to look around your own home to see... out, Damn, stupid piece of
(you know what) every time it hangs be-
2. Many illnesses can now be treated or cured, for example,... cause of your being not too smart to tell it what you want to be done.
3. Other examples of changes are... Come on, lighten up, computer is just a piece of hardware and
4. Have our lives always been improved, however? Have we become software mixed. And if you dont know or cant decide how to make this
too passive? Are we too dependent on technology? How dangerous explosive cocktail, ask yourself just one question: Who is more stupid
could it be? of you two? Of course, Im not a computer maniac beating everyone
5. Take, for example, television, computer games, the Internet... blaming an innocent machine. But theres one little thing people cant
6. New products have also made a major difference to our working or dont want to understand: computers are not able to realize ideas
lives. you dont have and undertake the projects you havent mentioned. They
7. Nowadays,... are just tools in your hands. And the results of using them are the
8. In the future there may be even more major breakthroughs in the results of your being patient to tell that old Buddy Wiener in a really
fields of medicine, leisure, work... simple binary way: Come on, boy, do it! Computers are of metal and
9. We may no longer have to... plastic but if you dont scare them by your aggression, they do what
10. We will be able to... should be done.
32 33
3.
4.
How has technology changed your everyday life?
What new gadgets do you particularly like?
Topics for Essays,
5. Have you learned to use a computer? Why or why not? Oral or Written Reports
6. Do you fear the power of computers?
7. List ten modern inventions: 1. To be or not to be computer literate?
2. Pluses and minuses of computers.
Invention Replacement Advantage Disadvantage
3. How will computers affect our lives in future?
electricity 4. Discoveries, inventions, new products, and their effects (good and
evil).
telephone writing letters less time too slow
silicon chi p
Essay Selection for Reading
cellular as a Stimulus for Writing
phone
8. True or false? KEEP CLICKING!
• Modern technology is out of control, and ruining the quality
of life on Earth; we must limit technology and its influence Computers spoil your eyes, computers are bad for your nerves, com-
on individual. puters this, computers that! Dont believe it! Why dont people crit-
• Modern inventions are labor-saving devices. Without them peo- icize guns that kill much more people? Thats life, youll say. Yes, but
ple remain slaves to boring, repetitive work. how can you blame such a wonderful thing like a computer, when you
9. How will science and technology affect our lives in future? cant even use it properly? All evils imputed to computers are the results of
our inexperience.
II. Complete the following and discuss it:
How can you blame computers for spoiling your eyes if you play Doom
1. Scientific and technological breakthroughs have brought great ben- clones for hours? How can a computer be bad for your nerves if you cry
efits. You only have to look around your own home to see... out, Damn, stupid piece of
(you know what) every time it hangs be-
2. Many illnesses can now be treated or cured, for example,... cause of your being not too smart to tell it what you want to be done.
3. Other examples of changes are... Come on, lighten up, computer is just a piece of hardware and
4. Have our lives always been improved, however? Have we become software mixed. And if you dont know or cant decide how to make this
too passive? Are we too dependent on technology? How dangerous explosive cocktail, ask yourself just one question: Who is more stupid
could it be? of you two? Of course, Im not a computer maniac beating everyone
5. Take, for example, television, computer games, the Internet... blaming an innocent machine. But theres one little thing people cant
6. New products have also made a major difference to our working or dont want to understand: computers are not able to realize ideas
lives. you dont have and undertake the projects you havent mentioned. They
7. Nowadays,... are just tools in your hands. And the results of using them are the
8. In the future there may be even more major breakthroughs in the results of your being patient to tell that old Buddy Wiener in a really
fields of medicine, leisure, work... simple binary way: Come on, boy, do it! Computers are of metal and
9. We may no longer have to... plastic but if you dont scare them by your aggression, they do what
10. We will be able to... should be done.
32 33
Unit III. Reading Analysis
The Development of Computers VOCABULARY LIST
TEXT I. PREHISTORY
(1) Tools are any objects other than the parts of our own bodies that
we use to help us do our work. Technology is nothing more than
the use of tools. When you use a screwdriver, a hammer, or an axe,
you are using technology just as much as when you use an auto-
mobile, a television set, or a computer.
(2) We tend to think of technology as a human invention. But the re-
verse is closer to the truth. Stone tools found along with fossils
show that our ape-like ancestors were already putting technology
to use. Anthropologists speculate that using tools may have helped
these creatures evolve into human beings; in a tool-using society,
manual dexterity and intelligence count for more than brute strength.
The clever rather than the strong inherited the earth.
(3) Most of the tools we have invented have aided our bodies rather
than our minds. These tools help us lift and move and cut and
shape. Only quite recently, for the most part, have we developed
tools to aid our minds as well.
Prereading Discussion (4) The tools of communication, from pencil and paper to television, are
designed to serve our minds. These devices transmit information or
1. What are tools? preserve it, but they do not modify it in any way (If the information
2. What was the first tool? is modified, this is considered a defect rather than a virtue, as when a
3. What helped ape-like creatures evolve into human beings? defective radio distorts the music were trying to hear.)
4. What is technology? (5) Our interest lies with machines that classify and modify informa-
5. What tools of communication do you know? tion rather than merely transmitting it or preserving it. The ma-
6. What machines classify and modify information? chines that do this are the computers and the calculators, the so-
7. What do you know about Babbage, Pascal, Leibniz, and Jacquard? called mind tools. The widespread use of machines for information
34 35
Unit III. Reading Analysis
The Development of Computers VOCABULARY LIST
TEXT I. PREHISTORY
(1) Tools are any objects other than the parts of our own bodies that
we use to help us do our work. Technology is nothing more than
the use of tools. When you use a screwdriver, a hammer, or an axe,
you are using technology just as much as when you use an auto-
mobile, a television set, or a computer.
(2) We tend to think of technology as a human invention. But the re-
verse is closer to the truth. Stone tools found along with fossils
show that our ape-like ancestors were already putting technology
to use. Anthropologists speculate that using tools may have helped
these creatures evolve into human beings; in a tool-using society,
manual dexterity and intelligence count for more than brute strength.
The clever rather than the strong inherited the earth.
(3) Most of the tools we have invented have aided our bodies rather
than our minds. These tools help us lift and move and cut and
shape. Only quite recently, for the most part, have we developed
tools to aid our minds as well.
Prereading Discussion (4) The tools of communication, from pencil and paper to television, are
designed to serve our minds. These devices transmit information or
1. What are tools? preserve it, but they do not modify it in any way (If the information
2. What was the first tool? is modified, this is considered a defect rather than a virtue, as when a
3. What helped ape-like creatures evolve into human beings? defective radio distorts the music were trying to hear.)
4. What is technology? (5) Our interest lies with machines that classify and modify informa-
5. What tools of communication do you know? tion rather than merely transmitting it or preserving it. The ma-
6. What machines classify and modify information? chines that do this are the computers and the calculators, the so-
7. What do you know about Babbage, Pascal, Leibniz, and Jacquard? called mind tools. The widespread use of machines for information
34 35
processing is a modern development. But simple examples of infor- 4. The punched card is still very important for computers today.
mation-processing machines can be traced back to ancient times. 5. The calculators Pascal and Leibniz built were reliable.
The following are some of the more important forerunners of the 6. The mechanical calculator could multi ply and divide as well as add
computer. and subtract.
(6) The Abacus. The abacus is the counting frame that was the most 7. Babbage invented the Jacquard loom.
widely used device for doing arithmetic in ancient times and whose 8. Beware of programmers who carry screwdrivers. (L. Brandwein)
use persisted into modern times in the Orient. Early versions of the
abacus consisted of a board with grooves in which pebbles could II. Give synonyms to:
slide. The Latin word for pebble is calculus, from which we get the To aid, strength, to speculate, nothing more than, to lift, ancestors,
words abacus and calculate. to manufacture, to single out, precision, to perfect, in recent times, pattern,
(7) Mechanical Calculators. In the seventeenth century, calculators to develop, information-processing machine.
more sophisticated than the abacus began to appear. Although a
number of people contributed to their development, Blaise Pascal III. Give antonyms to:
(French mathematician and philosopher) and Wilhelm von Leib-
niz (German mathematician, philosopher, and di plomat) usually Descendants, automated machine, exception, virtue, intelligence,
are singled out as pioneers. The calculators Pascal and Leibniz built to transmit, reliable, sufficient, in the early 19th century, in modern
were unreliable, since the mechanical technology of the time was times.
not capable of manufacturing the parts with sufficient precision. As
manufacturing techniques improved, mechanical calculators even-
tually were perfected; they were used widely until they were re-
TEXT II. THE ANALYTICAL ENGINE
placed by electronic calculators in recent times.
(1) When was the automatic computer invented? In the 1930s or the
(8) The Jacquard Loom. Until modern times, most information-pro-
1940s? If you think that, you are only off by a hundred years. A
cessing machines were designed to do arithmetic. An outstanding
computer that was completely modern in conception was designed
exception, however, was Jacquards automated loom, a machine de-
in the 1830s. But, as with the calculators of Pascal and Leibniz,
signed not for hard figures but beautiful patterns. A Jacquard loom
the mechanical technology of the time was not prepared to realize
weaves cloth containing a decorative pattern; the woven pattern is the conception.
controlled by punched cards. Changing the punched cards changes the (2) Charles Babbage. The inventor of that nineteenth-century comput-
pattern the loom weaves. Jacquard looms came into widespread use in er was a figure far more common in fiction than in real life an
the early nineteenth century, and their descendants are still used eccentric mathematician. Most mathematicians live personal lives
today. The Jacquard loom is the ancestor not only of modern auto- not too much different from anyone elses. They just happen to do
mated machine tools but of the player piano as well. mathematics instead of driving trucks or running stores or filling
teeth. But Charles Babbage was the exception.
(3) For instance, all his life, Babbage waged a vigorous campaign
EXERCISES against London organ grinders. He blamed the noise they made for
I. True or false? the loss of a quarter of his working power. Nor was Babbage satis-
fied with writing anti-organ-grinder letters to newspapers and mem-
1. The strong will inherit the earth. bers of Parliament. He personally hauled individual offenders be-
2. In the beginning was the abacus. fore magistrates (and became furious when the magistrates de-
3. The forerunner of the computer is the mechanical calculator. clined to throw the offenders in jail).
36 37
processing is a modern development. But simple examples of infor- 4. The punched card is still very important for computers today.
mation-processing machines can be traced back to ancient times. 5. The calculators Pascal and Leibniz built were reliable.
The following are some of the more important forerunners of the 6. The mechanical calculator could multi ply and divide as well as add
computer. and subtract.
(6) The Abacus. The abacus is the counting frame that was the most 7. Babbage invented the Jacquard loom.
widely used device for doing arithmetic in ancient times and whose 8. Beware of programmers who carry screwdrivers. (L. Brandwein)
use persisted into modern times in the Orient. Early versions of the
abacus consisted of a board with grooves in which pebbles could II. Give synonyms to:
slide. The Latin word for pebble is calculus, from which we get the To aid, strength, to speculate, nothing more than, to lift, ancestors,
words abacus and calculate. to manufacture, to single out, precision, to perfect, in recent times, pattern,
(7) Mechanical Calculators. In the seventeenth century, calculators to develop, information-processing machine.
more sophisticated than the abacus began to appear. Although a
number of people contributed to their development, Blaise Pascal III. Give antonyms to:
(French mathematician and philosopher) and Wilhelm von Leib-
niz (German mathematician, philosopher, and di plomat) usually Descendants, automated machine, exception, virtue, intelligence,
are singled out as pioneers. The calculators Pascal and Leibniz built to transmit, reliable, sufficient, in the early 19th century, in modern
were unreliable, since the mechanical technology of the time was times.
not capable of manufacturing the parts with sufficient precision. As
manufacturing techniques improved, mechanical calculators even-
tually were perfected; they were used widely until they were re-
TEXT II. THE ANALYTICAL ENGINE
placed by electronic calculators in recent times.
(1) When was the automatic computer invented? In the 1930s or the
(8) The Jacquard Loom. Until modern times, most information-pro-
1940s? If you think that, you are only off by a hundred years. A
cessing machines were designed to do arithmetic. An outstanding
computer that was completely modern in conception was designed
exception, however, was Jacquards automated loom, a machine de-
in the 1830s. But, as with the calculators of Pascal and Leibniz,
signed not for hard figures but beautiful patterns. A Jacquard loom
the mechanical technology of the time was not prepared to realize
weaves cloth containing a decorative pattern; the woven pattern is the conception.
controlled by punched cards. Changing the punched cards changes the (2) Charles Babbage. The inventor of that nineteenth-century comput-
pattern the loom weaves. Jacquard looms came into widespread use in er was a figure far more common in fiction than in real life an
the early nineteenth century, and their descendants are still used eccentric mathematician. Most mathematicians live personal lives
today. The Jacquard loom is the ancestor not only of modern auto- not too much different from anyone elses. They just happen to do
mated machine tools but of the player piano as well. mathematics instead of driving trucks or running stores or filling
teeth. But Charles Babbage was the exception.
(3) For instance, all his life, Babbage waged a vigorous campaign
EXERCISES against London organ grinders. He blamed the noise they made for
I. True or false? the loss of a quarter of his working power. Nor was Babbage satis-
fied with writing anti-organ-grinder letters to newspapers and mem-
1. The strong will inherit the earth. bers of Parliament. He personally hauled individual offenders be-
2. In the beginning was the abacus. fore magistrates (and became furious when the magistrates de-
3. The forerunner of the computer is the mechanical calculator. clined to throw the offenders in jail).
36 37
(4) Or consider this. Babbage took issue with Tennysons poem Vi- (11) (The word engine, by the way, comes from the same root as
sion of Sin, which contains this couplet: ingenious. Originally it referred to a clever invention. Only later did
Every minute dies a man, it come to mean a source of power.)
Every minute one is born. (12) In 1823, Babbage obtained a government grant to build the Dif-
Babbage pointed out (correctly) that if this were true, the popula- ference Engine. He ran into difficulties, however, and eventually
tion of the earth would remain constant. In a letter to the poet, abandoned the project. In 1854, a Swedish printer built a working
Babbage suggested a revision: Difference Engine based on Babbages ideas.
Every moment dies a man, (13) The Analytical Engine. One of Babbages reasons for abandoning
And one and a sixteenth is born. the Difference Engine was that he had been struck by a much bet-
Babbage emphasized that one and a sixteenth was not exact, but he ter idea. Inspired by Jacquards punched-card-controlled loom,
thought that it would be good enough for poetry. Babbage wanted to build a punched-card-controlled calculator. Bab-
(5) Yet, despite his eccentricities, Babbage was a genius. He was a pro- bage called his proposed automatic calculator the Analytical En-
lific inventor, whose inventions include the ophthalmoscope for gine.
examining the retina of the eye, the skeleton key, the locomotive (14) The Difference Engine could only compute tables (and only those
cow catcher, and the speedometer. He also pioneered operations tables that could be computed by successive additions). But the
research, the science of how to carry out business and industrial Analytical Engine could carry out any calculation, just as Jac-
operations as efficiently as possible. quards loom could weave any pattern. All one had to do was to
(6) Babbage was a fellow of the Royal Society and held the chair of punch the cards with the instructions for the desired calculation. If
Lucasian Professor of Mathematics at Cambridge University (the the Analytical Engine had been completed, it would have been a
same chair once held by Isaac Newton, the most famous British nineteenth-century computer.
scientist). (15) But, alas, the Analytical Engine was not completed. The govern-
(7) The Difference Engine. The mathematical tables of the nineteenth ment had already sunk thousands of pounds into the Difference
century were full of mistakes. Even when the tables had been calcu- Engine and received nothing in return. It had no intention of re-
lated correctly, printers errors introduced many mistakes. And since peating its mistake. Nor did Babbages eccentricities and abrasive
people who published new tables often copied from existing ones, personality help his cause any.
the same errors cropped up in table after table. (16) The government may have been right. Even if it had financed the
(8) According to one story, Babbage was lamenting about the errors in new invention, it might well have gotten nothing in return. For, as
some tables to his friend Herschel, a noted astronomer. I wish to usual, the idea was far ahead of what the existing mechanical tech-
God these calculations had been executed by steam. Babbage said. nology could build.
It is quite possible, Herschel responded. (17) This was particularly true since Babbages design was grandiose.
(9) (At that time, steam was a new and largely unexplored source of For instance, he planned for his machine to do calculations with
energy. Just as we might wonder today whether or not something fifty-digit accuracy. This is far greater than the accuracy found in
could be done by electricity, in the early nineteenth century it was most modern computers and far more than is needed for most
natural to wonder whether or not it could be done by steam.) calculations.
(10) Babbage set out to build a machine that not only would calculate (18) Also, Babbage kept changing his plans in the middle of his projects
the entries in the tables but would print them automatically as well. so that all the work had to be started anew. Although Babbage had
He called this machine the Difference Engine, since it worked by founded operations research, he had trouble planning the develop-
solving what mathematicians call difference equations. Never- ment of his own inventions.
theless, the name is misleading, since the machine constructed (19) Babbages contemporaries would have considered him more suc-
tables by means of repeated additions, not subtractions. cessful had he stuck to his original plan and constructed the Differ-
38 39
(4) Or consider this. Babbage took issue with Tennysons poem Vi- (11) (The word engine, by the way, comes from the same root as
sion of Sin, which contains this couplet: ingenious. Originally it referred to a clever invention. Only later did
Every minute dies a man, it come to mean a source of power.)
Every minute one is born. (12) In 1823, Babbage obtained a government grant to build the Dif-
Babbage pointed out (correctly) that if this were true, the popula- ference Engine. He ran into difficulties, however, and eventually
tion of the earth would remain constant. In a letter to the poet, abandoned the project. In 1854, a Swedish printer built a working
Babbage suggested a revision: Difference Engine based on Babbages ideas.
Every moment dies a man, (13) The Analytical Engine. One of Babbages reasons for abandoning
And one and a sixteenth is born. the Difference Engine was that he had been struck by a much bet-
Babbage emphasized that one and a sixteenth was not exact, but he ter idea. Inspired by Jacquards punched-card-controlled loom,
thought that it would be good enough for poetry. Babbage wanted to build a punched-card-controlled calculator. Bab-
(5) Yet, despite his eccentricities, Babbage was a genius. He was a pro- bage called his proposed automatic calculator the Analytical En-
lific inventor, whose inventions include the ophthalmoscope for gine.
examining the retina of the eye, the skeleton key, the locomotive (14) The Difference Engine could only compute tables (and only those
cow catcher, and the speedometer. He also pioneered operations tables that could be computed by successive additions). But the
research, the science of how to carry out business and industrial Analytical Engine could carry out any calculation, just as Jac-
operations as efficiently as possible. quards loom could weave any pattern. All one had to do was to
(6) Babbage was a fellow of the Royal Society and held the chair of punch the cards with the instructions for the desired calculation. If
Lucasian Professor of Mathematics at Cambridge University (the the Analytical Engine had been completed, it would have been a
same chair once held by Isaac Newton, the most famous British nineteenth-century computer.
scientist). (15) But, alas, the Analytical Engine was not completed. The govern-
(7) The Difference Engine. The mathematical tables of the nineteenth ment had already sunk thousands of pounds into the Difference
century were full of mistakes. Even when the tables had been calcu- Engine and received nothing in return. It had no intention of re-
lated correctly, printers errors introduced many mistakes. And since peating its mistake. Nor did Babbages eccentricities and abrasive
people who published new tables often copied from existing ones, personality help his cause any.
the same errors cropped up in table after table. (16) The government may have been right. Even if it had financed the
(8) According to one story, Babbage was lamenting about the errors in new invention, it might well have gotten nothing in return. For, as
some tables to his friend Herschel, a noted astronomer. I wish to usual, the idea was far ahead of what the existing mechanical tech-
God these calculations had been executed by steam. Babbage said. nology could build.
It is quite possible, Herschel responded. (17) This was particularly true since Babbages design was grandiose.
(9) (At that time, steam was a new and largely unexplored source of For instance, he planned for his machine to do calculations with
energy. Just as we might wonder today whether or not something fifty-digit accuracy. This is far greater than the accuracy found in
could be done by electricity, in the early nineteenth century it was most modern computers and far more than is needed for most
natural to wonder whether or not it could be done by steam.) calculations.
(10) Babbage set out to build a machine that not only would calculate (18) Also, Babbage kept changing his plans in the middle of his projects
the entries in the tables but would print them automatically as well. so that all the work had to be started anew. Although Babbage had
He called this machine the Difference Engine, since it worked by founded operations research, he had trouble planning the develop-
solving what mathematicians call difference equations. Never- ment of his own inventions.
theless, the name is misleading, since the machine constructed (19) Babbages contemporaries would have considered him more suc-
tables by means of repeated additions, not subtractions. cessful had he stuck to his original plan and constructed the Differ-
38 39
ence Engine. But then he would only have earned a footnote in (óñèëèòü); äîñòàòî÷íî õîðîøèé; íåñìîòðÿ íà; ïëîäîâèòûé èçîáðå-
history. It is for the Analytical Engine he never completed that we òàòåëü; îòìû÷êà; ÷ëåí êîðîëåâñêîãî îáùåñòâà; ñîêðóøàòüñÿ îá
honor him as father of the computer. îøèáêàõ; âûïîëíÿòü ïðè ïîìîùè ïàðà; ãåíèé; èçîáðåòàòåëüíûé;
(20) Lady Lovelace. Even though the Analytical Engine was never com- ñòîëêíóòüñÿ ñ òðóäíîñòÿìè; çàáðîñèòü ïðîåêò; äàëåêî âïåðåäè;
pleted, a demonstration program for it was written. The author of íà÷àòü ñíà÷àëà; ïî ïðåäïîëîæåíèþ; â äâà ðàçà äëèííåå; óäà÷íî
that program has the honor of being the worlds first computer ñêàçàíî!
programmer. Her name was Augusta Ada Byron, later Countess of
Lovelace, the only legitimate daughter of the poet, Lord Byron. II. Answer the following questions:
(21) Ada was a liberated woman at a time when this was hardly fashion-
1. What irritated and bored Charles Babbage?
able. Not only did she have the usual accomplishments in language
2. Prove that Babbage was a prolific inventor.
and music, she was also an excellent mathematician. The latter
3. What kind of machine was the Difference Engine?
was most unusual for a young lady in the nineteenth century. (She
4. What was the Babbages reason for abandoning the project?
was also fond of horse racing, which was even more unusual.)
5. Contrast the Difference and the Analytical Engine.
(22) Adas mathematical abilities became apparent when she was only
6. Who has the honor of being the worlds first computer program-
fifteen. She studied mathematics with one of the most well known
mer?
mathematicians of her time, Augustus de Morgan. At about the
7. What do you know about Ada Lovelace (as a lady and as a program-
time she was studying under de Morgan, she became interested in
mer)?
Babbages Analytical Engine.
8. Charles Babage is a computer Guru, isnt he?
(23) In 1842, Lady Lovelace discovered a paper on the Analytical En-
gine that had been written in French by an Italian engineer. She III. Put the proper words into sentences
resolved to translate the paper into English. At Babbages sugges-
tion, she added her own notes, which turned out to be twice as effort, obsolete, track, arithmetic, device, mathematicians, construct,
long as the paper itself. Much of what we know today about the Engine.
Analytical Engine comes from Lady Lovelaces notes.
1. The famous philosophers Leibniz and Pascal both ... somewhat primi-
(24) To demonstrate how the Analytical Engine would work, Lady Love-
tive calculating ...
lace included in her notes a program for calculating a certain series
2. After a great deal of time and ...
, a working model of the Difference ...
of numbers that is of interest to mathematicians. This was the worlds
was
...
first computer program. We may say more aptly, Lady Lovelace
3. Although the punched card is now becoming ...
, it was of critical
wrote, that the Analytical Engine weaves algebraical patterns just
importance in the development of the computer.
as the Jacquard-loom weaves flowers and leaves. Most aptly said
4. An abacus is a ... that allows the operator to keep ... of numbers while
indeed!
doing the basic ... operations.
5. A square-shaped wheel wouldnt be ... because it wouldnt roll easily.
6. Charles Babbage disliked doing the great amount of ... that ... had to
EXERCISES perform in course of solving problems.
7. Automating means ... machines to do jobs that people do.
I. Find in the text the English equivalents to:
IV. Construct other sentences in these patterns:
ãîðàçäî ïðèâû÷íåå; ýêñöåíòðè÷íûé ìàòåìàòèê; âîäèòü ãðóçî-
âèê; äåðæàòü ìàãàçèí; âèíèòü çà; ðàçâÿçàòü êàìïàíèþ ïðîòèâ; íà- 1. The inventor of the 19th century computer was a figure far more
ðóøèòåëü; îòêëîíèòü(ñÿ); îñòàâàòüñÿ ïîñòîÿííûì; ïîä÷åðêíóòü common in fiction than in real life.
40 41
ence Engine. But then he would only have earned a footnote in (óñèëèòü); äîñòàòî÷íî õîðîøèé; íåñìîòðÿ íà; ïëîäîâèòûé èçîáðå-
history. It is for the Analytical Engine he never completed that we òàòåëü; îòìû÷êà; ÷ëåí êîðîëåâñêîãî îáùåñòâà; ñîêðóøàòüñÿ îá
honor him as father of the computer. îøèáêàõ; âûïîëíÿòü ïðè ïîìîùè ïàðà; ãåíèé; èçîáðåòàòåëüíûé;
(20) Lady Lovelace. Even though the Analytical Engine was never com- ñòîëêíóòüñÿ ñ òðóäíîñòÿìè; çàáðîñèòü ïðîåêò; äàëåêî âïåðåäè;
pleted, a demonstration program for it was written. The author of íà÷àòü ñíà÷àëà; ïî ïðåäïîëîæåíèþ; â äâà ðàçà äëèííåå; óäà÷íî
that program has the honor of being the worlds first computer ñêàçàíî!
programmer. Her name was Augusta Ada Byron, later Countess of
Lovelace, the only legitimate daughter of the poet, Lord Byron. II. Answer the following questions:
(21) Ada was a liberated woman at a time when this was hardly fashion-
1. What irritated and bored Charles Babbage?
able. Not only did she have the usual accomplishments in language
2. Prove that Babbage was a prolific inventor.
and music, she was also an excellent mathematician. The latter
3. What kind of machine was the Difference Engine?
was most unusual for a young lady in the nineteenth century. (She
4. What was the Babbages reason for abandoning the project?
was also fond of horse racing, which was even more unusual.)
5. Contrast the Difference and the Analytical Engine.
(22) Adas mathematical abilities became apparent when she was only
6. Who has the honor of being the worlds first computer program-
fifteen. She studied mathematics with one of the most well known
mer?
mathematicians of her time, Augustus de Morgan. At about the
7. What do you know about Ada Lovelace (as a lady and as a program-
time she was studying under de Morgan, she became interested in
mer)?
Babbages Analytical Engine.
8. Charles Babage is a computer Guru, isnt he?
(23) In 1842, Lady Lovelace discovered a paper on the Analytical En-
gine that had been written in French by an Italian engineer. She III. Put the proper words into sentences
resolved to translate the paper into English. At Babbages sugges-
tion, she added her own notes, which turned out to be twice as effort, obsolete, track, arithmetic, device, mathematicians, construct,
long as the paper itself. Much of what we know today about the Engine.
Analytical Engine comes from Lady Lovelaces notes.
1. The famous philosophers Leibniz and Pascal both ... somewhat primi-
(24) To demonstrate how the Analytical Engine would work, Lady Love-
tive calculating ...
lace included in her notes a program for calculating a certain series
2. After a great deal of time and ...
, a working model of the Difference ...
of numbers that is of interest to mathematicians. This was the worlds
was
...
first computer program. We may say more aptly, Lady Lovelace
3. Although the punched card is now becoming ...
, it was of critical
wrote, that the Analytical Engine weaves algebraical patterns just
importance in the development of the computer.
as the Jacquard-loom weaves flowers and leaves. Most aptly said
4. An abacus is a ... that allows the operator to keep ... of numbers while
indeed!
doing the basic ... operations.
5. A square-shaped wheel wouldnt be ... because it wouldnt roll easily.
6. Charles Babbage disliked doing the great amount of ... that ... had to
EXERCISES perform in course of solving problems.
7. Automating means ... machines to do jobs that people do.
I. Find in the text the English equivalents to:
IV. Construct other sentences in these patterns:
ãîðàçäî ïðèâû÷íåå; ýêñöåíòðè÷íûé ìàòåìàòèê; âîäèòü ãðóçî-
âèê; äåðæàòü ìàãàçèí; âèíèòü çà; ðàçâÿçàòü êàìïàíèþ ïðîòèâ; íà- 1. The inventor of the 19th century computer was a figure far more
ðóøèòåëü; îòêëîíèòü(ñÿ); îñòàâàòüñÿ ïîñòîÿííûì; ïîä÷åðêíóòü common in fiction than in real life.
40 41
2. They just happen to do mathematics instead of filling teeth. enough. Their speed was seriously limited by the time required for
3. Despite his eccentricities, Babbage was a genius. mechanical parts to move from one position to another. For in-
4. If this were true, the population of the earth would remain con- stance, the Mark I took six seconds for a multi plication and twelve
stant. for a division; this was only five or six times faster than what a
5. I wish to God these calculations had been executed by steam. human with an old desk calculator could do.
6. We might wonder today whether or not something could be done (5) ENIAC. What was needed was a machine whose computing, con-
by nuclear energy. trol, and memory elements were completely electrical. Then the
7. The government had no intention of repeating its mistakes. Nor did speed of operation would be limited not by the speed of mechani-
Babbages abrasive personality help his cause any. cal moving parts but by the much greater speed of moving elec-
8. Even though the Analytical Engine was never completed, the pro- trons.
gram for it was written. (6) In the late 1930s, John V. Atanasoff of Iowa State College demon-
9. Her notes turned out to be twice as long as the paper itself. strated the elements of an electronic computer. Though his work
10. It is for Analytical Engine he never completed that we honor Bab- did not become widely known, it did influence the thinking of
bage as father of the computer. John W. Mauchly, one of the designers of ENIAC.
(7) ENIAC Electronic Numerical Integrator and Computer was
the machine that rendered the electromechanical computers obso-
TEXT III. BABBAGES DREAM COMES TRUE lete. ENIAC used vacuum tubes for computing and memory. For
control, it used an electrical plug board, like a telephone switch-
board. The connections on the plug board specified the sequence of
(1) The Harvard Mark I. A hundred years passed before a machine like
operations ENIAC would carry out.
the one Babbage conceived was actually built. This occurred in
(8) ENIAC was 500 times as fast as the best electromechanical com-
1944, when Howard Aiken of Harvard University completed the
puter. A problem that took one minute to solve on ENIAC would
Harvard Mark I Automatic Sequence Controlled Calculator.
require eight to ten hours on an electromechanical machine. After
(2) Aiken was not familiar with the Analytical Engine when he de-
ENIAC, all computers would be electronic.
signed the Mark I. Later, after people had pointed out Babbages
(9) ENIAC was the first of many computers with acronyms for names.
work to him, he was amazed to learn how many of his ideas Bab- The same tradition gave us EDVAC, UNIVAC, JOHNIAC, IL-
bage had antici pated. LIAC, and even MANIAC.
(3) The Mark I is the closest thing to the Analytical Engine that has (10) EDVAC. The Electronic Discrete Variable Computer ED-
ever been built or ever will be. It was controlled by a punched VAC was constructed at about the same time as ENIAC. But
paper tape, which played the same role as Babbages punched EDVAC, influenced by the ideas of the brilliant Hungarian-
cards. Like the Analytical Engine, it was basically mechanical. How- American mathematician John von Neumann, was by far the
ever, it was driven by electricity instead of steam. Electricity also more advanced of the two machines. Two innovations that first
served to transmit information from one part of the machine to appeared in EDVAC have been incorporated in almost every
another, replacing the complex mechanical linkages that Babbage computer since.
had proposed. Using electricity (which had only been a laboratory (11) First, EDVAC used binary notation to represent numbers inside
curiosity in Babbages time) made the difference between success the machine. Binary notation is a system for writing numbers that
and failure. uses only two digits (0 and 1), instead of the ten digits (0-9) used
(4) But, along with several other electromechanical computers built in the conventional decimal notation. Binary notation is now
at about the same time, the Mark I was scarcely finished before it recognized as the simplest way of representing numbers in an elec-
was obsolete. The electromechanical machines simply were not fast tronic machine.
42 43
2. They just happen to do mathematics instead of filling teeth. enough. Their speed was seriously limited by the time required for
3. Despite his eccentricities, Babbage was a genius. mechanical parts to move from one position to another. For in-
4. If this were true, the population of the earth would remain con- stance, the Mark I took six seconds for a multi plication and twelve
stant. for a division; this was only five or six times faster than what a
5. I wish to God these calculations had been executed by steam. human with an old desk calculator could do.
6. We might wonder today whether or not something could be done (5) ENIAC. What was needed was a machine whose computing, con-
by nuclear energy. trol, and memory elements were completely electrical. Then the
7. The government had no intention of repeating its mistakes. Nor did speed of operation would be limited not by the speed of mechani-
Babbages abrasive personality help his cause any. cal moving parts but by the much greater speed of moving elec-
8. Even though the Analytical Engine was never completed, the pro- trons.
gram for it was written. (6) In the late 1930s, John V. Atanasoff of Iowa State College demon-
9. Her notes turned out to be twice as long as the paper itself. strated the elements of an electronic computer. Though his work
10. It is for Analytical Engine he never completed that we honor Bab- did not become widely known, it did influence the thinking of
bage as father of the computer. John W. Mauchly, one of the designers of ENIAC.
(7) ENIAC Electronic Numerical Integrator and Computer was
the machine that rendered the electromechanical computers obso-
TEXT III. BABBAGES DREAM COMES TRUE lete. ENIAC used vacuum tubes for computing and memory. For
control, it used an electrical plug board, like a telephone switch-
board. The connections on the plug board specified the sequence of
(1) The Harvard Mark I. A hundred years passed before a machine like
operations ENIAC would carry out.
the one Babbage conceived was actually built. This occurred in
(8) ENIAC was 500 times as fast as the best electromechanical com-
1944, when Howard Aiken of Harvard University completed the
puter. A problem that took one minute to solve on ENIAC would
Harvard Mark I Automatic Sequence Controlled Calculator.
require eight to ten hours on an electromechanical machine. After
(2) Aiken was not familiar with the Analytical Engine when he de-
ENIAC, all computers would be electronic.
signed the Mark I. Later, after people had pointed out Babbages
(9) ENIAC was the first of many computers with acronyms for names.
work to him, he was amazed to learn how many of his ideas Bab- The same tradition gave us EDVAC, UNIVAC, JOHNIAC, IL-
bage had antici pated. LIAC, and even MANIAC.
(3) The Mark I is the closest thing to the Analytical Engine that has (10) EDVAC. The Electronic Discrete Variable Computer ED-
ever been built or ever will be. It was controlled by a punched VAC was constructed at about the same time as ENIAC. But
paper tape, which played the same role as Babbages punched EDVAC, influenced by the ideas of the brilliant Hungarian-
cards. Like the Analytical Engine, it was basically mechanical. How- American mathematician John von Neumann, was by far the
ever, it was driven by electricity instead of steam. Electricity also more advanced of the two machines. Two innovations that first
served to transmit information from one part of the machine to appeared in EDVAC have been incorporated in almost every
another, replacing the complex mechanical linkages that Babbage computer since.
had proposed. Using electricity (which had only been a laboratory (11) First, EDVAC used binary notation to represent numbers inside
curiosity in Babbages time) made the difference between success the machine. Binary notation is a system for writing numbers that
and failure. uses only two digits (0 and 1), instead of the ten digits (0-9) used
(4) But, along with several other electromechanical computers built in the conventional decimal notation. Binary notation is now
at about the same time, the Mark I was scarcely finished before it recognized as the simplest way of representing numbers in an elec-
was obsolete. The electromechanical machines simply were not fast tronic machine.
42 43
(12) Second, EDVACs program was stored in the machines memory, (20) The Third Generation. The early 1960s saw the introduction of in-
just like the data. Previous computers had stored the program exter- tegrated circuits, which incorporated hundreds of transistors on a
nally on punched tapes or plug boards. Since the programs were single silicon chi p. The chi p itself was small enough to fit on the
stored the same way the data were, one program could mani pu- end of your finger; after being mounted in a protective package, it
late another program as if it were data. We will see that such still would fit in the palm of your hand. With integrated circuits,
program-mani pulating programs play acrucial role in modern com- computers could be made even smaller, less expensive, and more
puter systems. reliable.
(13) A stored-program computer one whose program is stored in (21 Integrated circuits made possible minicomputers, tabletop comput-
memory in the same form as its data is usually called a von ers small enough and inexpensive enough to find a place in the
Neumann machine in honor of the originator of the stored-pro- classroom and the scientific laboratory.
gram concept. (22) In the late 1960s, integrated circuits began to be used for high-
(14) From the 1940s to the present, the technology used to build com- speed memory, providing some competition for magnetic-core
puters has gone through several revolutions. People sometimes speak memory. The trend toward integrated-circuit memory has contin-
of different generations of computers, with each generation using a ued until today, when it has largely replaced magnetic-core mem-
different technology. ory.
(15) The First Generation. First-generation computers prevailed in the (23) The most recent jump in computer technology came with the
1940s and for much of the 1950s. They used vacuum tubes for introduction of large-scale integrated circuits, often referred to simply
calculation, control, and sometimes for memory as well. First- as chips. Whereas the older integrated circuits contained hundred
generation machines used several other ingenious devices for of transistors, the new ones contain thousands or tens of thou-
memory. In one, for instance, information was stored as sound sands.
waves circulating in a column of mercury. Since all these first-gen- (24) It is the large-scale integrated circuits that make possible the mi-
eration memories are now obsolete, no further mention will be croprocessors and microcomputers. They also make possible com-
made of them. pact, inexpensive, high-speed, high-capacity integrated-circuit
(16) Vacuum tubes are bulky, unreliable, energy consuming, and gen- memory.
erate large amounts of heat. As long as computers were tied down (25) All these recent developments have resulted in a microprocessor
to vacuum tube technology, they could only be bulky, cumber- revolution, which began in the middle 1970s and for which there
some, and expensive. is no end in sight.
(17) The Second Generation. In the late 1950s, the transistor became (26) The Fourth Generation. In addition to the common applications of
available to replace the vacuum tube. A transistor, which is only digital watches, pocket calculators, and personal computers, you
slightly larger than a kernel of corn, generates little heat and enjoys can find microprocessors the general-purpose processor-on-a-
long life. chi p in virtually every machine in the home or business
(18) At about the same time, the magnetic-core memory was intro- microwave ovens, cars, copy machines, TV sets, and so on. Com-
duced. This consisted of a latticework of wires on which were strung puters today are hundred times smaller than those of the first gene-
tiny, doughnut-shaped beads called cores. Electric currents flowing ration, and a single chi p is far more powerful than ENIAC.
in the wires stored information by magnetizing the cores. Informa- (27) The Fifth Generation. The term was coined by the Japanese to
tion could be stored in core memory or retrieved from it in about describe the powerful, intelligent computers they wanted to build
a millionth of a second. by the mid-1990s. Since then it has become an umbrella term,
(19) Core memory dominated the high-speed memory scene for much encompassing many research fields in the computer industry. Key
of the second and third generations. To programmers during this areas of ongoing research are artificial intelligence (AI), expert
period, core and high-speed memory were synonymous. systems, and natural language.
44 45
(12) Second, EDVACs program was stored in the machines memory, (20) The Third Generation. The early 1960s saw the introduction of in-
just like the data. Previous computers had stored the program exter- tegrated circuits, which incorporated hundreds of transistors on a
nally on punched tapes or plug boards. Since the programs were single silicon chi p. The chi p itself was small enough to fit on the
stored the same way the data were, one program could mani pu- end of your finger; after being mounted in a protective package, it
late another program as if it were data. We will see that such still would fit in the palm of your hand. With integrated circuits,
program-mani pulating programs play acrucial role in modern com- computers could be made even smaller, less expensive, and more
puter systems. reliable.
(13) A stored-program computer one whose program is stored in (21 Integrated circuits made possible minicomputers, tabletop comput-
memory in the same form as its data is usually called a von ers small enough and inexpensive enough to find a place in the
Neumann machine in honor of the originator of the stored-pro- classroom and the scientific laboratory.
gram concept. (22) In the late 1960s, integrated circuits began to be used for high-
(14) From the 1940s to the present, the technology used to build com- speed memory, providing some competition for magnetic-core
puters has gone through several revolutions. People sometimes speak memory. The trend toward integrated-circuit memory has contin-
of different generations of computers, with each generation using a ued until today, when it has largely replaced magnetic-core mem-
different technology. ory.
(15) The First Generation. First-generation computers prevailed in the (23) The most recent jump in computer technology came with the
1940s and for much of the 1950s. They used vacuum tubes for introduction of large-scale integrated circuits, often referred to simply
calculation, control, and sometimes for memory as well. First- as chips. Whereas the older integrated circuits contained hundred
generation machines used several other ingenious devices for of transistors, the new ones contain thousands or tens of thou-
memory. In one, for instance, information was stored as sound sands.
waves circulating in a column of mercury. Since all these first-gen- (24) It is the large-scale integrated circuits that make possible the mi-
eration memories are now obsolete, no further mention will be croprocessors and microcomputers. They also make possible com-
made of them. pact, inexpensive, high-speed, high-capacity integrated-circuit
(16) Vacuum tubes are bulky, unreliable, energy consuming, and gen- memory.
erate large amounts of heat. As long as computers were tied down (25) All these recent developments have resulted in a microprocessor
to vacuum tube technology, they could only be bulky, cumber- revolution, which began in the middle 1970s and for which there
some, and expensive. is no end in sight.
(17) The Second Generation. In the late 1950s, the transistor became (26) The Fourth Generation. In addition to the common applications of
available to replace the vacuum tube. A transistor, which is only digital watches, pocket calculators, and personal computers, you
slightly larger than a kernel of corn, generates little heat and enjoys can find microprocessors the general-purpose processor-on-a-
long life. chi p in virtually every machine in the home or business
(18) At about the same time, the magnetic-core memory was intro- microwave ovens, cars, copy machines, TV sets, and so on. Com-
duced. This consisted of a latticework of wires on which were strung puters today are hundred times smaller than those of the first gene-
tiny, doughnut-shaped beads called cores. Electric currents flowing ration, and a single chi p is far more powerful than ENIAC.
in the wires stored information by magnetizing the cores. Informa- (27) The Fifth Generation. The term was coined by the Japanese to
tion could be stored in core memory or retrieved from it in about describe the powerful, intelligent computers they wanted to build
a millionth of a second. by the mid-1990s. Since then it has become an umbrella term,
(19) Core memory dominated the high-speed memory scene for much encompassing many research fields in the computer industry. Key
of the second and third generations. To programmers during this areas of ongoing research are artificial intelligence (AI), expert
period, core and high-speed memory were synonymous. systems, and natural language.
44 45
EXERCISES V. Answer the following questions:
I. Find in the text the English equivalents to: 1. What was the main shortcoming of the Mark I and the other elec-
tromechanical computers?
çàäóìàòü; áûòü çíàêîìûì ñ; ïðåäâêóøàòü; ëàáîðàòîðíûé êóðü-
2. What is an acronym? Give examples of acronyms.
åç; ìåõàíè÷åñêèå ñîåäèíåíèÿ; òåëåôîííûé êîììóòàòîð; ïîñëåäîâà-
3. What was the distinguishing feature of ENIAC?
òåëüíîñòü îïåðàöèé; ïîòðåáîâàëàñü ìèíóòà äëÿ ðåøåíèÿ; ïîä
4. What were the two distinguishing features of EDVAC?
âëèÿíèåì èäåé; àêðîíèì äëÿ íàçâàíèÿ; òîãäà êàê; èãðàòü ðåøàþùóþ
5. What is a von Neumann machine?
ðîëü; â ÷åñòü êîãî-òî; ðòóòíûé ñòîëáèê; ýíåðãîåìêèé; âûðàáàòû-
6. Describe the technological features characteristic of each computer
âàòü áîëüøîå êîëè÷åñòâî òåïëà; ãðîìîçäêèé; ñòàòü äîñòóïíûì;
generation.
èçâëåêàòü èç ïàìÿòè; ïîìåñòèòüñÿ íà ëàäîíè (íà êîí÷èêå ïàëüöà);
7. What type of computer memory was once so widely used that its
ñêà÷îê â òåõíèêå; âêëþ÷àòü; ïðîäîëæàþùèåñÿ èññëåäîâàíèÿ; ïðèäó-
name became almost synonymous with high-speed memory?
ìàòü òåðìèí; âñåîõâàòûâàþùèé òåðìèí (íîìèíàöèÿ).
8. What technological developments made (a) minicomputers and
II. Give synonyms to: (b) microcomputers possible?
to encompass, bulky, simply, scarcely, ongoing, linkage, to conceive, VI. Construct other sentences in these patterns:
to anticipate, to be familiar with, fast, advanced, obsolete.
1. It was a machine like the one Babbage conceived.
III. Give antonyms to: 2. That has ever been or ever will be.
3. Using electricity made the difference between success and failure.
success, externally, to store, energy-consuming, cumbersome, expen- 4. This work did influence the thinking of the designers of ENIAC.
sive, binary notation, end in sight, obsolete. 5. It took one minute to solve a problem on ENIAC.
6. EDVAC was by far the more advanced of the two machines.
IV. Put the proper words into sentences: 7. One program could mani pulate another program as if it were data.
analytical, digital, unreliable, sophisticated, solve, core, processor, 8. People sometimes speak of different generations of computers, with
computations, an integral circuit. each generation using a different technology.
9. Integrated circuits made possible minicomputers, small enough to
1. The Difference Engine could ... equations and led to another calcu- find place in the classroom.
lating machine, the ... Engine, which embodied the key parts of a 10. It is the large-scale integrated circuits that make possible micropro-
computer system: an input device, a ..., a control unit, a storage cessors.
place, and an output device.
2. Ada Lovelace helped to develop instructions for carrying out ... on VII. Make a timeline map: ( )
Babbage machine.
Inventions/
3. J. Atanasoff devised the first ... computer to work by electronic means. Times Inventors
Developments
4. First-generation computers were ..., the main form of memory be-
ing magnetic
... recent times Analytical Engine Von Neumann
5. In the third generation software became more
...
17th century Abacus Pascal
6. What was the name of the first ... computer to work electronically?
(Leibniz)
7. When electricity passed through the ..., it could be magnetized as
either off or on. World War II ENIAC/vacuum Herman Hollerith
8. A ... is a complete electronic circuit on a small chi p of silicon. tubes
46 47
EXERCISES V. Answer the following questions:
I. Find in the text the English equivalents to: 1. What was the main shortcoming of the Mark I and the other elec-
tromechanical computers?
çàäóìàòü; áûòü çíàêîìûì ñ; ïðåäâêóøàòü; ëàáîðàòîðíûé êóðü-
2. What is an acronym? Give examples of acronyms.
åç; ìåõàíè÷åñêèå ñîåäèíåíèÿ; òåëåôîííûé êîììóòàòîð; ïîñëåäîâà-
3. What was the distinguishing feature of ENIAC?
òåëüíîñòü îïåðàöèé; ïîòðåáîâàëàñü ìèíóòà äëÿ ðåøåíèÿ; ïîä
4. What were the two distinguishing features of EDVAC?
âëèÿíèåì èäåé; àêðîíèì äëÿ íàçâàíèÿ; òîãäà êàê; èãðàòü ðåøàþùóþ
5. What is a von Neumann machine?
ðîëü; â ÷åñòü êîãî-òî; ðòóòíûé ñòîëáèê; ýíåðãîåìêèé; âûðàáàòû-
6. Describe the technological features characteristic of each computer
âàòü áîëüøîå êîëè÷åñòâî òåïëà; ãðîìîçäêèé; ñòàòü äîñòóïíûì;
generation.
èçâëåêàòü èç ïàìÿòè; ïîìåñòèòüñÿ íà ëàäîíè (íà êîí÷èêå ïàëüöà);
7. What type of computer memory was once so widely used that its
ñêà÷îê â òåõíèêå; âêëþ÷àòü; ïðîäîëæàþùèåñÿ èññëåäîâàíèÿ; ïðèäó-
name became almost synonymous with high-speed memory?
ìàòü òåðìèí; âñåîõâàòûâàþùèé òåðìèí (íîìèíàöèÿ).
8. What technological developments made (a) minicomputers and
II. Give synonyms to: (b) microcomputers possible?
to encompass, bulky, simply, scarcely, ongoing, linkage, to conceive, VI. Construct other sentences in these patterns:
to anticipate, to be familiar with, fast, advanced, obsolete.
1. It was a machine like the one Babbage conceived.
III. Give antonyms to: 2. That has ever been or ever will be.
3. Using electricity made the difference between success and failure.
success, externally, to store, energy-consuming, cumbersome, expen- 4. This work did influence the thinking of the designers of ENIAC.
sive, binary notation, end in sight, obsolete. 5. It took one minute to solve a problem on ENIAC.
6. EDVAC was by far the more advanced of the two machines.
IV. Put the proper words into sentences: 7. One program could mani pulate another program as if it were data.
analytical, digital, unreliable, sophisticated, solve, core, processor, 8. People sometimes speak of different generations of computers, with
computations, an integral circuit. each generation using a different technology.
9. Integrated circuits made possible minicomputers, small enough to
1. The Difference Engine could ... equations and led to another calcu- find place in the classroom.
lating machine, the ... Engine, which embodied the key parts of a 10. It is the large-scale integrated circuits that make possible micropro-
computer system: an input device, a ..., a control unit, a storage cessors.
place, and an output device.
2. Ada Lovelace helped to develop instructions for carrying out ... on VII. Make a timeline map: ( )
Babbage machine.
Inventions/
3. J. Atanasoff devised the first ... computer to work by electronic means. Times Inventors
Developments
4. First-generation computers were ..., the main form of memory be-
ing magnetic
... recent times Analytical Engine Von Neumann
5. In the third generation software became more
...
17th century Abacus Pascal
6. What was the name of the first ... computer to work electronically?
(Leibniz)
7. When electricity passed through the ..., it could be magnetized as
either off or on. World War II ENIAC/vacuum Herman Hollerith
8. A ... is a complete electronic circuit on a small chi p of silicon. tubes
46 47
Inventions/ «ñêîòîñáðàñûâàòåëü» è äð. Íåñìîòðÿ íà ñâîþ ýêñöåíòðè÷íîñòü,
Times Inventors îí áûë ãåíèåì.
Developments
7. Îäíîé èç ïðè÷èí, ïî êîòîðîé Áýááèäæ çàáðîñèë ñâîþ ðàçíî-
thousands Primitive George Boole ñòíóþ ìàøèíó, áûëà ãîðàçäî ëó÷øàÿ èäåÿ, ïðèøåäøàÿ åìó â
of years ago calculating devices ãîëîâó. Âäîõíîâëåííûé æàêêàðäîâûì ñòàíêîì, óïðàâëÿåìûì
ïåðôîêàðòàìè, Áýááèäæ çàõîòåë ñäåëàòü êàëüêóëÿòîð,
Transistors, printed óïðàâëÿåìûé ïåðôîêàðòàìè.
19th century Charles Babbage
circuits, microchi ps 8. Èìåííî èç-çà àíàëèòè÷åñêîé ìàøèíû, êîòîðóþ îí íèêîãäà íå
early 20th çàâåðøèë, Áýááèäæ èìååò ÷åñòü íàçûâàòüñÿ «îòöîì êîìïüþ-
Stored programs Ada Lovelace òåðà».
century
9. Àâòîð äåìîíñòðàöèîííîé ïðîãðàììû äëÿ àíàëèòè÷åñêîé ìà-
after Mechanical calculator Jobs / Wozniak øèíû Àäà Ëîâëèñ ñòàëà ïåðâûì â ìèðå êîìïüþòåðíûì ïðî-
World War II ãðàììèñòîì. Ïî ïðåäëîæåíèþ Áýááèäæà, ïåðåâîäÿ ñòàòüþ îá
àíàëèòè÷åñêîé ìàøèíå, íàïèñàííóþ èòàëüÿíñêèì èíæåíåðîì
in 1944 Punched card Aiken ïî-ôðàíöóçñêè, îíà äîáàâèëà ñîáñòâåííûå çàìå÷àíèÿ,
êîòîðûå îêàçàëèñü â äâà ðàçà äëèííåå ñàìîé ñòàòüè.
First computer program Atanasoff / Berry 10. Àíàëèòè÷åñêàÿ ìàøèíà «òêåò» àëãåáðàè÷åñêèå óçîðû òî÷íî òàê
First PC æå, êàê ñòàíîê Æàêêàðäà òêåò öâåòû è ëèñòüÿ. Äåéñòâèòåëüíî
First digital computer, óäà÷íî ñêàçàíî!
Mark I 11. Ìîäåëü I ñàìàÿ áëèçêàÿ ê àíàëèòè÷åñêîé ìàøèíà, êîòîðàÿ
êîãäà-ëèáî áûëà èëè áóäåò ñîçäàíà.
12. Íàðÿäó ñ íåñêîëüêèìè äðóãèìè ýëåêòðîìåõàíè÷åñêèìè êîì-
VIII. Translate into English ïüþòåðàìè, ïîñòðîåííûìè ïðèáëèçèòåëüíî â òî æå âðåìÿ,
Ìîäåëü I óñòàðåëà ñðàçó æå ïîñëå òîãî, êàê áûëà çàâåðøåíà.
1. Îðóäèÿ ýòî ëþáûå ïðåäìåòû ïîìèìî ÷àñòåé íàøåãî ñîá-
13. Ëþäè èíîãäà ãîâîðÿò î ðàçëè÷íûõ ïîêîëåíèÿõ êîìïüþòåðîâ,
ñòâåííîãî òåëà, êîòîðûå ìû èñïîëüçóåì, ÷òîáû ïîìî÷ü ñåáå
ïðè÷åì êàæäîå ïîêîëåíèå èñïîëüçóåò ðàçíóþ òåõíîëîãèþ.
âûïîëíèòü ðàáîòó.
Ìàøèíû ïåðâîãî ïîêîëåíèÿ èñïîëüçîâàëè íåñêîëüêî õèòðî-
2. Àíòðîïîëîãè ñ÷èòàþò, ÷òî èñïîëüçîâàíèå îðóäèé ìîãëî áû
óìíûõ óñòðîéñòâ äëÿ çàïîìèíàíèÿ. Â îäíîì, íàïðèìåð,
ïîìî÷ü ýâîëþöèè ÷åëîâåêîïîäîáíûõ ñóùåñòâ è ïðåâðàùåíèþ
èíôîðìàöèÿ õðàíèëàñü â êà÷åñòâå çâóêîâûõ âîëí,
èõ â ëþäåé; â îáùåñòâå, èñïîëüçóþùåì îðóäèÿ, ëîâêîñòü ðóê öèðêóëèðóþùèõ â ñòîëáèêå ðòóòè.
è óì çíà÷àò ãîðàçäî áîëüøå, ÷åì ãðóáàÿ ñèëà. Óìíûå, à íå 14. Âàêóóìíûå ëàìïû áûëè ãðîìîçäêèìè, íåíàäåæíûìè, ýíåðãî-
ñèëüíûå, óíàñëåäîâàëè Çåìëþ. åìêèìè è âûðàáàòûâàëè îãðîìíîå êîëè÷åñòâî òåïëà.
3. Íàñ èíòåðåñóþò ìàøèíû, êîòîðûå êëàññèôèöèðóþò è ìîäè- 15. Òðàíçèñòîð ðàçìåðîì ÷óòü áîëüøå ÿäðûøêà õëåáíîãî çåðíà
ôèöèðóþò èíôîðìàöèþ, à íå ïðîñòî ïåðåäàþò åå èëè õðàíÿò. âûðàáàòûâàåò ìàëî òåïëà è æèâåò äîëãî.
4. Êàëüêóëÿòîðû, ñäåëàííûå Ïàñêàëåì è Ëåéáíèöåì, áûëè íå- 16.  íà÷àëå 60õ íàáëþäàëîñü âíåäðåíèå èíòåãðàëüíûõ ñõåì,
íàäåæíû, òàê êàê òåõíîëîãèÿ òîãî âðåìåíè áûëà íå â êîòîðûå âêëþ÷àëè ñîòíè òðàíçèñòîðîâ íà îäíîì ñèëèêîíîâîì
ñîñòîÿíèè ïðîèçâîäèòü äåòàëè ñ äîñòàòî÷íîé òî÷íîñòüþ. ÷èïå. Èìåííî áîëüøèå èíòåãðàëüíûå ñõåìû ñäåëàëè
5. Êîìïüþòåð, ïîëíîñòüþ ñîâðåìåííûé ïî êîíöåïöèè, áûë çà- âîçìîæíûìè ìèêðîïðîöåññîðû è ìèêðîêîìïüþòåðû.
äóìàí â 30õ ãîäàõ 19 âåêà. 17. Ñåãîäíÿøíèå êîìïüþòåðû ðàç â 100 ìåíüøå, ÷åì êîìïüþòåðû
6. Áýááèäæ áûë ïëîäîòâîðíûì èçîáðåòàòåëåì, åãî ðàçðàáîòêè 1ãî ïîêîëåíèÿ, à êàæäûé îòäåëüíûé ÷èï ãîðàçäî ìîùíåå
âêëþ÷àþò òàêèå, êàê îôòàëüìîñêîï, îòìû÷êè, ñïèäîìåòð, ENIAC.
48 49
Inventions/ «ñêîòîñáðàñûâàòåëü» è äð. Íåñìîòðÿ íà ñâîþ ýêñöåíòðè÷íîñòü,
Times Inventors îí áûë ãåíèåì.
Developments
7. Îäíîé èç ïðè÷èí, ïî êîòîðîé Áýááèäæ çàáðîñèë ñâîþ ðàçíî-
thousands Primitive George Boole ñòíóþ ìàøèíó, áûëà ãîðàçäî ëó÷øàÿ èäåÿ, ïðèøåäøàÿ åìó â
of years ago calculating devices ãîëîâó. Âäîõíîâëåííûé æàêêàðäîâûì ñòàíêîì, óïðàâëÿåìûì
ïåðôîêàðòàìè, Áýááèäæ çàõîòåë ñäåëàòü êàëüêóëÿòîð,
Transistors, printed óïðàâëÿåìûé ïåðôîêàðòàìè.
19th century Charles Babbage
circuits, microchi ps 8. Èìåííî èç-çà àíàëèòè÷åñêîé ìàøèíû, êîòîðóþ îí íèêîãäà íå
early 20th çàâåðøèë, Áýááèäæ èìååò ÷åñòü íàçûâàòüñÿ «îòöîì êîìïüþ-
Stored programs Ada Lovelace òåðà».
century
9. Àâòîð äåìîíñòðàöèîííîé ïðîãðàììû äëÿ àíàëèòè÷åñêîé ìà-
after Mechanical calculator Jobs / Wozniak øèíû Àäà Ëîâëèñ ñòàëà ïåðâûì â ìèðå êîìïüþòåðíûì ïðî-
World War II ãðàììèñòîì. Ïî ïðåäëîæåíèþ Áýááèäæà, ïåðåâîäÿ ñòàòüþ îá
àíàëèòè÷åñêîé ìàøèíå, íàïèñàííóþ èòàëüÿíñêèì èíæåíåðîì
in 1944 Punched card Aiken ïî-ôðàíöóçñêè, îíà äîáàâèëà ñîáñòâåííûå çàìå÷àíèÿ,
êîòîðûå îêàçàëèñü â äâà ðàçà äëèííåå ñàìîé ñòàòüè.
First computer program Atanasoff / Berry 10. Àíàëèòè÷åñêàÿ ìàøèíà «òêåò» àëãåáðàè÷åñêèå óçîðû òî÷íî òàê
First PC æå, êàê ñòàíîê Æàêêàðäà òêåò öâåòû è ëèñòüÿ. Äåéñòâèòåëüíî
First digital computer, óäà÷íî ñêàçàíî!
Mark I 11. Ìîäåëü I ñàìàÿ áëèçêàÿ ê àíàëèòè÷åñêîé ìàøèíà, êîòîðàÿ
êîãäà-ëèáî áûëà èëè áóäåò ñîçäàíà.
12. Íàðÿäó ñ íåñêîëüêèìè äðóãèìè ýëåêòðîìåõàíè÷åñêèìè êîì-
VIII. Translate into English ïüþòåðàìè, ïîñòðîåííûìè ïðèáëèçèòåëüíî â òî æå âðåìÿ,
Ìîäåëü I óñòàðåëà ñðàçó æå ïîñëå òîãî, êàê áûëà çàâåðøåíà.
1. Îðóäèÿ ýòî ëþáûå ïðåäìåòû ïîìèìî ÷àñòåé íàøåãî ñîá-
13. Ëþäè èíîãäà ãîâîðÿò î ðàçëè÷íûõ ïîêîëåíèÿõ êîìïüþòåðîâ,
ñòâåííîãî òåëà, êîòîðûå ìû èñïîëüçóåì, ÷òîáû ïîìî÷ü ñåáå
ïðè÷åì êàæäîå ïîêîëåíèå èñïîëüçóåò ðàçíóþ òåõíîëîãèþ.
âûïîëíèòü ðàáîòó.
Ìàøèíû ïåðâîãî ïîêîëåíèÿ èñïîëüçîâàëè íåñêîëüêî õèòðî-
2. Àíòðîïîëîãè ñ÷èòàþò, ÷òî èñïîëüçîâàíèå îðóäèé ìîãëî áû
óìíûõ óñòðîéñòâ äëÿ çàïîìèíàíèÿ. Â îäíîì, íàïðèìåð,
ïîìî÷ü ýâîëþöèè ÷åëîâåêîïîäîáíûõ ñóùåñòâ è ïðåâðàùåíèþ
èíôîðìàöèÿ õðàíèëàñü â êà÷åñòâå çâóêîâûõ âîëí,
èõ â ëþäåé; â îáùåñòâå, èñïîëüçóþùåì îðóäèÿ, ëîâêîñòü ðóê öèðêóëèðóþùèõ â ñòîëáèêå ðòóòè.
è óì çíà÷àò ãîðàçäî áîëüøå, ÷åì ãðóáàÿ ñèëà. Óìíûå, à íå 14. Âàêóóìíûå ëàìïû áûëè ãðîìîçäêèìè, íåíàäåæíûìè, ýíåðãî-
ñèëüíûå, óíàñëåäîâàëè Çåìëþ. åìêèìè è âûðàáàòûâàëè îãðîìíîå êîëè÷åñòâî òåïëà.
3. Íàñ èíòåðåñóþò ìàøèíû, êîòîðûå êëàññèôèöèðóþò è ìîäè- 15. Òðàíçèñòîð ðàçìåðîì ÷óòü áîëüøå ÿäðûøêà õëåáíîãî çåðíà
ôèöèðóþò èíôîðìàöèþ, à íå ïðîñòî ïåðåäàþò åå èëè õðàíÿò. âûðàáàòûâàåò ìàëî òåïëà è æèâåò äîëãî.
4. Êàëüêóëÿòîðû, ñäåëàííûå Ïàñêàëåì è Ëåéáíèöåì, áûëè íå- 16.  íà÷àëå 60õ íàáëþäàëîñü âíåäðåíèå èíòåãðàëüíûõ ñõåì,
íàäåæíû, òàê êàê òåõíîëîãèÿ òîãî âðåìåíè áûëà íå â êîòîðûå âêëþ÷àëè ñîòíè òðàíçèñòîðîâ íà îäíîì ñèëèêîíîâîì
ñîñòîÿíèè ïðîèçâîäèòü äåòàëè ñ äîñòàòî÷íîé òî÷íîñòüþ. ÷èïå. Èìåííî áîëüøèå èíòåãðàëüíûå ñõåìû ñäåëàëè
5. Êîìïüþòåð, ïîëíîñòüþ ñîâðåìåííûé ïî êîíöåïöèè, áûë çà- âîçìîæíûìè ìèêðîïðîöåññîðû è ìèêðîêîìïüþòåðû.
äóìàí â 30õ ãîäàõ 19 âåêà. 17. Ñåãîäíÿøíèå êîìïüþòåðû ðàç â 100 ìåíüøå, ÷åì êîìïüþòåðû
6. Áýááèäæ áûë ïëîäîòâîðíûì èçîáðåòàòåëåì, åãî ðàçðàáîòêè 1ãî ïîêîëåíèÿ, à êàæäûé îòäåëüíûé ÷èï ãîðàçäî ìîùíåå
âêëþ÷àþò òàêèå, êàê îôòàëüìîñêîï, îòìû÷êè, ñïèäîìåòð, ENIAC.
48 49
Topics for Essays, Unit IV.
Oral or Written Reports
Personal Computers
1. From the abacus to the computer.
2. The evolution of computers in terms of generations.
3. Computer a Gods gift or a Devils toy?
4. If I were the inventor of computer ...
5. If there were no computers they had to be thought out.
6. Science fiction: serving the science.
Prereading Discussion
1. Who uses computers today? Give examples of the impact they have
on our lives.
2. When did the first personal computer appear? How was it different
from the computers that preceded it?
3. How have computers changed since the first one was introduced in
the early 1940s?
4. Where is the Silicon Valley? How is it related to the computer
industry?
50 51
Topics for Essays, Unit IV.
Oral or Written Reports
Personal Computers
1. From the abacus to the computer.
2. The evolution of computers in terms of generations.
3. Computer a Gods gift or a Devils toy?
4. If I were the inventor of computer ...
5. If there were no computers they had to be thought out.
6. Science fiction: serving the science.
Prereading Discussion
1. Who uses computers today? Give examples of the impact they have
on our lives.
2. When did the first personal computer appear? How was it different
from the computers that preceded it?
3. How have computers changed since the first one was introduced in
the early 1940s?
4. Where is the Silicon Valley? How is it related to the computer
industry?
50 51
Reading Analysis new companies started in a single week. The Silicon Valley attracted
many risk-takers and gave them an opportunity to thrive in an
atmosphere where creativity was expected and rewarded.
VOCABULARY LIST (3) Robert Noyce was a risk-taker who was successful both as an engi-
neer and as an entrepreneur. The son of an Iowa minister, he was
Verbs: anticipate, collaborate, devise, donate, emerge, foresee, informal, genuine, and methodical. Even when he was running
intimidate, market, thrive. one of the most successful businesses in the Silicon Valley, he
Nouns: application, capacity, components, entrepreneur, exper- dressed informally and his office was an open cubicle that looked
tise, gadget, innovation, investment, potential, technology, ven- like everyone elses. A graduate of the Massachusetts Institute of
ture, wizard, pioneer, integrated circuit, microprocessor, circuit,
Technology (MIT), he started working for one of the first com-
peripherals.
puter-related businesses in 1955. While working with these pio-
Adjectives/Participles: cumbersome, genuine, inevitable, makeshift,
neers of computer engineering, he learned many things about com-
massive, muted, skeptical, state-of-the-art, user-friendly.
puters and business management.
Adverbials: passionately, technologically, thereby, whereas.
(4) As an engineer, he co-invented the integrated circuit, which was
the basis for later computer design. This integrated circuit was less
than an eighth of an inch square but had the same power as a
TEXT I. THE EARLY YEARS transistor unit that was over 15 inches square or a vacuum tube
unit that was 6.5 feet square. As a businessman, Noyce co-founded
(1) Until the late 1970s, the computer was viewed as a massive ma- Intel, one of the most successful companies in the Silicon Valley
chine that was useful to big business and big government but not to and the first company to introduce the microprocessor. The micro-
the general public. Computers were too cumbersome and expensive processor chi p became the heart of the computer, making it pos-
for private use, and most people were intimidated by them. As sible for a large computer system that once filled an entire room to
technology advanced, this was changed by a distinctive group of be contained on a small chi p that could be held in ones hand.The
engineers and entrepreneurs who rushed to improve the designs of directors of Intel could not have antici pated the effects that the
then current technology and to find ways to make the computer microprocessor would have on the world. It made possible the in-
attractive to more people. Although these innovators of computer vention of the personal computer and eventually led to the birth of
technology were very different from each other, they had a com- thousands of new businesses. Noyces contributions to the develop-
mon enthusiasm for technical innovation and the capacity to fore- ment of the integrated circuit and the microprocessor earned him
see the potential of computers. This was a very competitive and both wealth and fame before his death in 1990. In fact, many
stressful time, and the only people who succeeded were the ones people consider his role to be one of the most significant in the
who were able to combine extraordinary engineering expertise with Silicon Valley story.
progressive business skills and an ability to foresee the needs of the (5) The two men who first introduced the personal computer (PC) to
future. the marketplace had backgrounds unlike Robert Noyces. They had
(2) Much of this activity was centered in the Silicon Valley in north- neither prestigious university education nor experience in big busi-
ern California where the first computer-related company had locat- ness. Twenty-year-old Steven Jobs and twenty-four-year-old Stephen
ed in 1955. That company attracted thousands of related business- Wozniak were college drop-outs who had collaborated on their
es, and the area became known as the technological capital of the first project as computer hobbiests in a local computer club. Built
world. Between 1981 and 1986, more than 1000 new technology- in the garage of Jobss parents, this first personal computer uti-
oriented businesses started there. At the busiest times, five or more lized the technology of Noyces integrated circuit. It was typewrit-
52 53
Reading Analysis new companies started in a single week. The Silicon Valley attracted
many risk-takers and gave them an opportunity to thrive in an
atmosphere where creativity was expected and rewarded.
VOCABULARY LIST (3) Robert Noyce was a risk-taker who was successful both as an engi-
neer and as an entrepreneur. The son of an Iowa minister, he was
Verbs: anticipate, collaborate, devise, donate, emerge, foresee, informal, genuine, and methodical. Even when he was running
intimidate, market, thrive. one of the most successful businesses in the Silicon Valley, he
Nouns: application, capacity, components, entrepreneur, exper- dressed informally and his office was an open cubicle that looked
tise, gadget, innovation, investment, potential, technology, ven- like everyone elses. A graduate of the Massachusetts Institute of
ture, wizard, pioneer, integrated circuit, microprocessor, circuit,
Technology (MIT), he started working for one of the first com-
peripherals.
puter-related businesses in 1955. While working with these pio-
Adjectives/Participles: cumbersome, genuine, inevitable, makeshift,
neers of computer engineering, he learned many things about com-
massive, muted, skeptical, state-of-the-art, user-friendly.
puters and business management.
Adverbials: passionately, technologically, thereby, whereas.
(4) As an engineer, he co-invented the integrated circuit, which was
the basis for later computer design. This integrated circuit was less
than an eighth of an inch square but had the same power as a
TEXT I. THE EARLY YEARS transistor unit that was over 15 inches square or a vacuum tube
unit that was 6.5 feet square. As a businessman, Noyce co-founded
(1) Until the late 1970s, the computer was viewed as a massive ma- Intel, one of the most successful companies in the Silicon Valley
chine that was useful to big business and big government but not to and the first company to introduce the microprocessor. The micro-
the general public. Computers were too cumbersome and expensive processor chi p became the heart of the computer, making it pos-
for private use, and most people were intimidated by them. As sible for a large computer system that once filled an entire room to
technology advanced, this was changed by a distinctive group of be contained on a small chi p that could be held in ones hand.The
engineers and entrepreneurs who rushed to improve the designs of directors of Intel could not have antici pated the effects that the
then current technology and to find ways to make the computer microprocessor would have on the world. It made possible the in-
attractive to more people. Although these innovators of computer vention of the personal computer and eventually led to the birth of
technology were very different from each other, they had a com- thousands of new businesses. Noyces contributions to the develop-
mon enthusiasm for technical innovation and the capacity to fore- ment of the integrated circuit and the microprocessor earned him
see the potential of computers. This was a very competitive and both wealth and fame before his death in 1990. In fact, many
stressful time, and the only people who succeeded were the ones people consider his role to be one of the most significant in the
who were able to combine extraordinary engineering expertise with Silicon Valley story.
progressive business skills and an ability to foresee the needs of the (5) The two men who first introduced the personal computer (PC) to
future. the marketplace had backgrounds unlike Robert Noyces. They had
(2) Much of this activity was centered in the Silicon Valley in north- neither prestigious university education nor experience in big busi-
ern California where the first computer-related company had locat- ness. Twenty-year-old Steven Jobs and twenty-four-year-old Stephen
ed in 1955. That company attracted thousands of related business- Wozniak were college drop-outs who had collaborated on their
es, and the area became known as the technological capital of the first project as computer hobbiests in a local computer club. Built
world. Between 1981 and 1986, more than 1000 new technology- in the garage of Jobss parents, this first personal computer uti-
oriented businesses started there. At the busiest times, five or more lized the technology of Noyces integrated circuit. It was typewrit-
52 53
er-sized, as powerful as a much larger computer, and inexpensive of Tecmar, Inc., was one of the first people to foresee this need.
to build. To Wozniak the new machine was a gadget to share with When IBM released its first personal computer in 1981, Alpert
other members of their computer club. To Jobs, however, it was bought the first two models. He took them apart and worked twen-
a product with great marketing potential for homes and small busi- ty-four hours a day to find out how other products could be at-
nesses. To raise the $1300 needed to fill their first orders Jobs sold tached to them. After two weeks, he emerged with the first com-
his Volkswagen bus and Wozniak sold his scientific calculator. puter peri pherals for the IBM PC, and he later became one of
Wozniak built and delivered the first order of 100 computers in ten the most successful creators of personal computer peri pherals. For
days. Lacking funds, he was forced to use the least expensive mate- example, he designed memory extenders that enabled the comput-
rials, the fewest chi ps, and the most creative arrangement of com- er to store more information, and insertable boards that allowed
ponents. Jobs and Wozniak soon had more orders than they could people to use different keyboards while sharing the same printer.
fill with their makeshift production line. After 1981, Tecmar produced an average of one new product per
(6) Jobs and Wozniak brought different abilities to their venture: Wozniak week.
was the technological wizard, and Jobs was the entrepreneur. Wozniak (9) Alpert had neither the technical training of Noyce nor the com-
designed the first model, and Jobs devised its applications and puter clubs of Jobs and Wozniak to encourage his interest in com-
attracted interest from investors and buyers. Wozniak once admitted puter engineering. His parents were German refugees who worked
that without Jobs he would never have considered selling the com- in a factory and a bakery to pay for his college education. They
puter or known how to do it. Steve didnt do one circuit, design insisted that he study medicine even though his interest was in
or piece of code. Hes not really been into computers, and to this electronics. Throughout medical school he studied electronics pas-
sionately but privately. He became a doctor, but practiced only part
day he has never gone through a computer manual. But it never
time while pursuing his preferred interest in electronics. His first
crossed my mind to sell computers. It was Steve who said, Lets
electronics products were medical instruments that he built in his
hold them up and sell a few.
living room. His wife recognized the potential of his projects before
(7) From the very beginning, Apple Computer had been sensitive to
he did, and enrolled in a graduate program in business manage-
the needs of a general public that is intimidated by high technology.
ment so she could run his electronics business successfully. Their
Jobs insisted that the computers be light, trim, and made in muted
annual sales reached $1 million, and they had 15 engineers work-
colors. He also insisted that the language used with the computers ing in their living room before they moved to a larger building in
be user-friendly and that the operation be simple enough for 1981. It wasnt until 1983 that Alpert stopped practicing medicine
the average person to learn in a few minutes. These features helped and gave his full attention to Tecmar. By 1984 Tecmar was valued
convince a skeptical public that the computer was practical for the at $150 million.
home and small business. Jobs also introduced the idea of donating (10) Computer technology has opened a variety of opportunities for
Apple Computers to thousands of California schools, thereby indi- people who are creative risk-takers. Those who have been success-
rectly introducing his product into the homes of millions of stu- ful have been alert technologically, creatively, and financially. They
dents. Their second model, the Apple II, was the state-of-the-art have known when to use the help of other people and when to
PC in home and small business computers from 1977 to 1982. By work alone. Whereas some have been immediately successful,
1983 the total company sales were almost $600 million, and it others have gone unrewarded for their creative and financial in-
controlled 23 percent of the worldwide market in personal com- vestments; some failure is inevitable in an environment as compet-
puters. itive as the Silicon Valley. Rarely in history have so many people
(8) As the computer industry began to reach into homes and small been so motivated to create. Many of them have been rewarded
businesses around the world, the need for many new products for greatly with fame and fortune, and the world has benefited from
the personal computer began to emerge. Martin Alpert, the founder this frenzy of innovation.
54 55
er-sized, as powerful as a much larger computer, and inexpensive of Tecmar, Inc., was one of the first people to foresee this need.
to build. To Wozniak the new machine was a gadget to share with When IBM released its first personal computer in 1981, Alpert
other members of their computer club. To Jobs, however, it was bought the first two models. He took them apart and worked twen-
a product with great marketing potential for homes and small busi- ty-four hours a day to find out how other products could be at-
nesses. To raise the $1300 needed to fill their first orders Jobs sold tached to them. After two weeks, he emerged with the first com-
his Volkswagen bus and Wozniak sold his scientific calculator. puter peri pherals for the IBM PC, and he later became one of
Wozniak built and delivered the first order of 100 computers in ten the most successful creators of personal computer peri pherals. For
days. Lacking funds, he was forced to use the least expensive mate- example, he designed memory extenders that enabled the comput-
rials, the fewest chi ps, and the most creative arrangement of com- er to store more information, and insertable boards that allowed
ponents. Jobs and Wozniak soon had more orders than they could people to use different keyboards while sharing the same printer.
fill with their makeshift production line. After 1981, Tecmar produced an average of one new product per
(6) Jobs and Wozniak brought different abilities to their venture: Wozniak week.
was the technological wizard, and Jobs was the entrepreneur. Wozniak (9) Alpert had neither the technical training of Noyce nor the com-
designed the first model, and Jobs devised its applications and puter clubs of Jobs and Wozniak to encourage his interest in com-
attracted interest from investors and buyers. Wozniak once admitted puter engineering. His parents were German refugees who worked
that without Jobs he would never have considered selling the com- in a factory and a bakery to pay for his college education. They
puter or known how to do it. Steve didnt do one circuit, design insisted that he study medicine even though his interest was in
or piece of code. Hes not really been into computers, and to this electronics. Throughout medical school he studied electronics pas-
sionately but privately. He became a doctor, but practiced only part
day he has never gone through a computer manual. But it never
time while pursuing his preferred interest in electronics. His first
crossed my mind to sell computers. It was Steve who said, Lets
electronics products were medical instruments that he built in his
hold them up and sell a few.
living room. His wife recognized the potential of his projects before
(7) From the very beginning, Apple Computer had been sensitive to
he did, and enrolled in a graduate program in business manage-
the needs of a general public that is intimidated by high technology.
ment so she could run his electronics business successfully. Their
Jobs insisted that the computers be light, trim, and made in muted
annual sales reached $1 million, and they had 15 engineers work-
colors. He also insisted that the language used with the computers ing in their living room before they moved to a larger building in
be user-friendly and that the operation be simple enough for 1981. It wasnt until 1983 that Alpert stopped practicing medicine
the average person to learn in a few minutes. These features helped and gave his full attention to Tecmar. By 1984 Tecmar was valued
convince a skeptical public that the computer was practical for the at $150 million.
home and small business. Jobs also introduced the idea of donating (10) Computer technology has opened a variety of opportunities for
Apple Computers to thousands of California schools, thereby indi- people who are creative risk-takers. Those who have been success-
rectly introducing his product into the homes of millions of stu- ful have been alert technologically, creatively, and financially. They
dents. Their second model, the Apple II, was the state-of-the-art have known when to use the help of other people and when to
PC in home and small business computers from 1977 to 1982. By work alone. Whereas some have been immediately successful,
1983 the total company sales were almost $600 million, and it others have gone unrewarded for their creative and financial in-
controlled 23 percent of the worldwide market in personal com- vestments; some failure is inevitable in an environment as compet-
puters. itive as the Silicon Valley. Rarely in history have so many people
(8) As the computer industry began to reach into homes and small been so motivated to create. Many of them have been rewarded
businesses around the world, the need for many new products for greatly with fame and fortune, and the world has benefited from
the personal computer began to emerge. Martin Alpert, the founder this frenzy of innovation.
54 55
EXERCISES III. Give a synonym for words in parentheses:
I. Find in the text the English equivalents to: 1. Steven Jobs and Stephen Wozniak (worked together) to (invent)
the personal computer, and then produced it in a (temporary)
ðàññìàòðèâàòü êàê; ñëèøêîì äîðîãàÿ; äëÿ ëè÷íîãî ïîëüçîâàíèÿ; production line in a garage.
ñóùåñòâóþùàÿ òîãäà òåõíîëîãèÿ; ñäåëàòü ïðèâëåêàòåëüíûì; ïðåä- 2. Steven Jobs wanted to (advertise and sell) the personal computer to
âèäåòü ïîòåíöèàë; òåõíè÷åñêèå çíàíèÿ; îäåâàòüñÿ íåôîðìàëüíî; ìåíåå people who would use it in their homes, so he knew it could be
îäíîé âîñüìîé äþéìà; çíà÷èòåëüíàÿ ðîëü; âûïîëíÿòü çàêàçû; èñïû- neither (very large) nor (awkward).
òûâàòü íåäîñòàòîê â ôîíäàõ; áûòü âûíóæäåííûì; ñàìîäåëüíûé (âðå- 3. Stephen Wozniak applied the (most up-to-date) (applied science)
ìåííûé) êîíâåéåð; ïðèõîäèòü â ãîëîâó; ÷óâñòâèòåëüíûé ê íóæäàì; when designing the first personal computer, while Steven Jobs
óáåäèòü ñêåïòèêîâ; òåì ñàìûì; äàòü âîçìîæíîñòü; ñúåìíûå ïëàòû; designed its (practical functions).
ïîääåðæàòü èíòåðåñ ê; íåìåöêèå áåæåíöû; åæåãîäíàÿ ïðîäàæà; 4. People seemed to be less (frightened) by computers when they were
òîãäà êàê; êîíêóðåíòíàÿ ñðåäà; íåèçáåæíûå íåóäà÷è; âîçíàãðàæ- made in (soft) colors and were (easily understood by the average
äåííûå ñëàâîé è áîãàòñòâîì. person).
5. Robert Noyces (specialization) in computers was a result of his
II. True or false?
experience with the (first people) in the computer field while
1. Robert Noyce graduated from a prestigious university and gained working at his first job.
engineering expertise before he devised the integrated circuit. 6. Martin Alperts wife was never (doubtful) about (the future possi-
2. Robert Noyce was one of the pioneers of the computer industry. bilities) of Tecmar.
3. The microprocessor influenced the world in ways that its inventors 7. Martin Alpert studied the first IBM personal computer (with great
did not foresee and subsequently led to the invention of the inte- love and emotion), and (by that means) he was the first innovator to
grated circuit. (come forward) with (supplementary devices) for the computer.
4. Stephen Wozniak and Steven Jobs used the state-of-the-art technol- 8. Whereas some people (grow) as a result of competition, others are
ogy developed by Robert Noyce when they devised the first per- (threatened) by it.
sonal computer.
5. When Wozniak designed the first model of the PC, he did not plan IV. Some of the following statements describe an act of an entrepre-
to market it to the general population. neur (E), others describe an act of an inventor (I), and others could
6. Jobs did not want the PC to be as intimidating to the general public describe both titles (B). Identify each one and be prepared to explain
as previous computers were, so he insisted that it include features your answer.
that were practical and attractive.
7. The Apple Computer company sold their computers to thousands 1. Alexander Graham Bell originated the first telephone.
of American schools at discounted rates, thereby introducing their 2. Robert Noyce co-invented the integrated circuit and co-founded
product into the homes of millions of students. Intel.
8. Martin Alpert foresaw that the success of the first IBM personal 3. In 1890 John Loud created the first ballpoint pen.
computer was inevitable, so he bought the first two models and 4. Robert Noyces engineering expertise contributed to the develop-
devised ways to change them. ment of the microprocessor.
9. Martin Alperts wife was skeptical about the potential of her hus- 5. Robert Noyces financial investments helped build one of the most
bands technical innovations. successful companies in the Silicon Valley.
10. Alperts interest in technology was more passionate than his interest 6. Steven Jobs had the original idea to market the first personal com-
in medicine. puter.
56 57
EXERCISES III. Give a synonym for words in parentheses:
I. Find in the text the English equivalents to: 1. Steven Jobs and Stephen Wozniak (worked together) to (invent)
the personal computer, and then produced it in a (temporary)
ðàññìàòðèâàòü êàê; ñëèøêîì äîðîãàÿ; äëÿ ëè÷íîãî ïîëüçîâàíèÿ; production line in a garage.
ñóùåñòâóþùàÿ òîãäà òåõíîëîãèÿ; ñäåëàòü ïðèâëåêàòåëüíûì; ïðåä- 2. Steven Jobs wanted to (advertise and sell) the personal computer to
âèäåòü ïîòåíöèàë; òåõíè÷åñêèå çíàíèÿ; îäåâàòüñÿ íåôîðìàëüíî; ìåíåå people who would use it in their homes, so he knew it could be
îäíîé âîñüìîé äþéìà; çíà÷èòåëüíàÿ ðîëü; âûïîëíÿòü çàêàçû; èñïû- neither (very large) nor (awkward).
òûâàòü íåäîñòàòîê â ôîíäàõ; áûòü âûíóæäåííûì; ñàìîäåëüíûé (âðå- 3. Stephen Wozniak applied the (most up-to-date) (applied science)
ìåííûé) êîíâåéåð; ïðèõîäèòü â ãîëîâó; ÷óâñòâèòåëüíûé ê íóæäàì; when designing the first personal computer, while Steven Jobs
óáåäèòü ñêåïòèêîâ; òåì ñàìûì; äàòü âîçìîæíîñòü; ñúåìíûå ïëàòû; designed its (practical functions).
ïîääåðæàòü èíòåðåñ ê; íåìåöêèå áåæåíöû; åæåãîäíàÿ ïðîäàæà; 4. People seemed to be less (frightened) by computers when they were
òîãäà êàê; êîíêóðåíòíàÿ ñðåäà; íåèçáåæíûå íåóäà÷è; âîçíàãðàæ- made in (soft) colors and were (easily understood by the average
äåííûå ñëàâîé è áîãàòñòâîì. person).
5. Robert Noyces (specialization) in computers was a result of his
II. True or false?
experience with the (first people) in the computer field while
1. Robert Noyce graduated from a prestigious university and gained working at his first job.
engineering expertise before he devised the integrated circuit. 6. Martin Alperts wife was never (doubtful) about (the future possi-
2. Robert Noyce was one of the pioneers of the computer industry. bilities) of Tecmar.
3. The microprocessor influenced the world in ways that its inventors 7. Martin Alpert studied the first IBM personal computer (with great
did not foresee and subsequently led to the invention of the inte- love and emotion), and (by that means) he was the first innovator to
grated circuit. (come forward) with (supplementary devices) for the computer.
4. Stephen Wozniak and Steven Jobs used the state-of-the-art technol- 8. Whereas some people (grow) as a result of competition, others are
ogy developed by Robert Noyce when they devised the first per- (threatened) by it.
sonal computer.
5. When Wozniak designed the first model of the PC, he did not plan IV. Some of the following statements describe an act of an entrepre-
to market it to the general population. neur (E), others describe an act of an inventor (I), and others could
6. Jobs did not want the PC to be as intimidating to the general public describe both titles (B). Identify each one and be prepared to explain
as previous computers were, so he insisted that it include features your answer.
that were practical and attractive.
7. The Apple Computer company sold their computers to thousands 1. Alexander Graham Bell originated the first telephone.
of American schools at discounted rates, thereby introducing their 2. Robert Noyce co-invented the integrated circuit and co-founded
product into the homes of millions of students. Intel.
8. Martin Alpert foresaw that the success of the first IBM personal 3. In 1890 John Loud created the first ballpoint pen.
computer was inevitable, so he bought the first two models and 4. Robert Noyces engineering expertise contributed to the develop-
devised ways to change them. ment of the microprocessor.
9. Martin Alperts wife was skeptical about the potential of her hus- 5. Robert Noyces financial investments helped build one of the most
bands technical innovations. successful companies in the Silicon Valley.
10. Alperts interest in technology was more passionate than his interest 6. Steven Jobs had the original idea to market the first personal com-
in medicine. puter.
56 57
7. King C. Gillette designed the first disposable razor blade. VII. Cross out the one word that does not have the same meaning as
8. A Frenchman named Benedictus introduced the idea of making safe- the other three words:
ty glass in 1903 after he discovered a chemical that held broken
glass together. 1. Everyone liked the computer salesman because he was (genuine/
9. Martin Alpert devised many new products for the personal comput- calculating/ sincere/ unaffected) .
er. 2. The corporation president (benefited/contributed/gave/donated) his
10. Martin Alperts wife managed his business and marketed his prod- services to the school of business.
ucts. 3. The sudden decrease in sales was not (understood/ foreseen/ antic-
i pated/ predicted) by anyone.
V. Describe the relationship between each of the following pairs of 4. The corporate office of the manufacturing company was so close to
words (antonyms, synonyms, neither): the factory that the noise in the office was (muted/ vivid/ intense/
extreme).
massive/small skeptical/unfriendly
5. There are many specialized (parts/ components/ contributors/ ele-
cumbersome/awkward potential/ability
ments) in the memory bank of a computer.
expertise/innovation donate/loan
6. The software company has the (capacity/ extent/ potential/ ability)
muted/bright collaborated/worked
to employ 500 people.
antici pate/foresee together
7. After the young investor earned a million dollars, he was highly
inevitable/avoidable genuine/insincere
regarded for his financial (skillfulness/ wizardry/ good fortune/
venture/risk devise/invent aptitude).
makeshift/permanent 8. The software engineers (expertise/ intelligence/ proficiency/ mas-
VI. Choose the word to complete each of the following sentences: tery) was limited to one area.
9. The computer-game business (celebrated/ thrived/ prospered/ pro-
1. Whenever the inventor was working on an innovation, she (emerged gressed) during the summer months.
from/withdrew to) her house because she didnt want to be dis- 10. They undertook their (venture/ risky undertaking/ challenge/ deci-
turbed. sion) after making careful calculations.
2. The new computer program was (collaborated/devised) by the newest
student in the class. VIII. Construct other sentences in this pattern (compound adjec-
3. The executives bought a (cumbersome/portable) copy machine be- tives)
cause they needed to take it to meetings.
4. The computer enthusiast devised a portable model that had several 1. He is seeking a computer-related career.
practical (applications/markets) for educators. 2. Typewriter-sized computers became available in the 1970s to re-
5. It was Wozniaks (expertise/skepticism) that made it possible for place the room-sized computers of the 1960s.
him to devise the first personal computer. 3. Children tend to like sugar-based cereals.
6. The government (loaned/donated) $100 million to the corpora- 4. Whereas an integrated circuit is thumbnail-sized, the vacuum tubes
tion, expecting it to be repaid with 12 percent interest. in earlier computers were cigar-sized.
7. The investors (antici pated/intimidated) the higher profits because 5. We are shopping for a precision-built car.
of the activity in the stock market. 6. They lived near a tree-edged lake.
8. When computers are not working, it is (inevitable/avoidable) that 7. Jobs and Wozniak were self-taught computer experts.
work will be delayed.
58 59
7. King C. Gillette designed the first disposable razor blade. VII. Cross out the one word that does not have the same meaning as
8. A Frenchman named Benedictus introduced the idea of making safe- the other three words:
ty glass in 1903 after he discovered a chemical that held broken
glass together. 1. Everyone liked the computer salesman because he was (genuine/
9. Martin Alpert devised many new products for the personal comput- calculating/ sincere/ unaffected) .
er. 2. The corporation president (benefited/contributed/gave/donated) his
10. Martin Alperts wife managed his business and marketed his prod- services to the school of business.
ucts. 3. The sudden decrease in sales was not (understood/ foreseen/ antic-
i pated/ predicted) by anyone.
V. Describe the relationship between each of the following pairs of 4. The corporate office of the manufacturing company was so close to
words (antonyms, synonyms, neither): the factory that the noise in the office was (muted/ vivid/ intense/
extreme).
massive/small skeptical/unfriendly
5. There are many specialized (parts/ components/ contributors/ ele-
cumbersome/awkward potential/ability
ments) in the memory bank of a computer.
expertise/innovation donate/loan
6. The software company has the (capacity/ extent/ potential/ ability)
muted/bright collaborated/worked
to employ 500 people.
antici pate/foresee together
7. After the young investor earned a million dollars, he was highly
inevitable/avoidable genuine/insincere
regarded for his financial (skillfulness/ wizardry/ good fortune/
venture/risk devise/invent aptitude).
makeshift/permanent 8. The software engineers (expertise/ intelligence/ proficiency/ mas-
VI. Choose the word to complete each of the following sentences: tery) was limited to one area.
9. The computer-game business (celebrated/ thrived/ prospered/ pro-
1. Whenever the inventor was working on an innovation, she (emerged gressed) during the summer months.
from/withdrew to) her house because she didnt want to be dis- 10. They undertook their (venture/ risky undertaking/ challenge/ deci-
turbed. sion) after making careful calculations.
2. The new computer program was (collaborated/devised) by the newest
student in the class. VIII. Construct other sentences in this pattern (compound adjec-
3. The executives bought a (cumbersome/portable) copy machine be- tives)
cause they needed to take it to meetings.
4. The computer enthusiast devised a portable model that had several 1. He is seeking a computer-related career.
practical (applications/markets) for educators. 2. Typewriter-sized computers became available in the 1970s to re-
5. It was Wozniaks (expertise/skepticism) that made it possible for place the room-sized computers of the 1960s.
him to devise the first personal computer. 3. Children tend to like sugar-based cereals.
6. The government (loaned/donated) $100 million to the corpora- 4. Whereas an integrated circuit is thumbnail-sized, the vacuum tubes
tion, expecting it to be repaid with 12 percent interest. in earlier computers were cigar-sized.
7. The investors (antici pated/intimidated) the higher profits because 5. We are shopping for a precision-built car.
of the activity in the stock market. 6. They lived near a tree-edged lake.
8. When computers are not working, it is (inevitable/avoidable) that 7. Jobs and Wozniak were self-taught computer experts.
work will be delayed.
58 59
IX. In pairs or small groups, discuss each of the following questions: soon (7) ... as the primary competition in the personal computer
(8) ... IBM had many advantages over Apple: their engineering was
1. Imagine that you just moved into an empty house. What can you use done by a more experienced engineering staff, and their advertising was
for a makeshift table? a makeshift pillow? a makeshift hammer? done by their more experienced (9) ... staff. Since Apple had been so
2. Here are five gadgets found in many kitchens. Describe the functions successful with the Apple I and the Apple II, the failure of their
of each: can opener, ice crusher, apple peeler, cheese grater. Name (10) ... with the Apple II Plus was both (11) ... and disappointing.
some other gadgets that are found in many kitchens.
3. If you were to design a state-of-the-art product, how would you
improve the following products: toothbrush, bathtub, notebook, TEXT II. DEEP BLUE
hairbrush? (1) Special-purpose machines, DEEP BLUE and its predecessor DEEP
4. Which of the following do you find intimidating? Why? (a teacher, THOUGHT, were originally created to explore how to use parallel
a large truck on the road, a policeman, an automatic bank teller, processing to solve complex problems. DEEP THOUGHT was a
a school counselor, a telephone-answering machine) first computer to defeat a chess grandmaster, thanks to its ability to
5. What marketing techniques would you use if you wanted to sell analyze 750,000 positions per second. But in 1990, an experimen-
a new soft drink product? What market would you focus on? tal 6-processor version of DEEP THOUGHT, capable of search-
6. Which would be preferable for each of the following buildings, ing 2 million positions per second, played against Kasparov and
muted colors or bright? Why? (a restaurant, a post office, a hospital lost. Kasparov went on to defeat DEEP BLUE by winning 3 games
a high school, a music store, a day-care center) and 2 draws. Six IBM employees used a hefty machine to win a chess
7. What are the components of each of the following: a good marriage? game against the reigning world champion in the rematch in 1997.
a modern kitchen? a good stereo system? No other tool of human invention could leverage their talents so
8. Describe another entrepreneur whose investments led to fame and magnificently. DEEP BLUE now has the ability to calculate 50 to
fortune. 100 billion moves within 3 minutes. But DEEP BLUE is not mim-
9. Under what circumstances does a business thrive? a tree? a young icking human thought. It does not antici pate, it only reacts. DEEP
child? a marriage? BLUE is a 32-node IBM power Parallel SP2 high performance
10. Name a notable pioneer in each of the following fields. (manufac- computer. Each node of the SP2 employs a single microchannel
turing, science, art, architecture, medicine, social services) card containing 8 dedicated VLSI chess processors for a total of
11. What is a practical application of the personal computer in busi- 256 processors working in tandem. DEEP BLUEs programming
ness? In the home? code is developed in C and runs under the AIX operating system.
(2) To the uninformed advanced technology is indistinguishable from
X. Complete the paragraph below: magic. We must continue to develop these machines and methods
Although Jobs and Wozniak have become known as two of the most of harnessing them to human needs. Computers amplify our cogni-
brilliant innovators in the technological revolution, not all of their tive and reasoning abilities.
(1) ... were as successful as the Apple I and the Apple II. They (2) ... the
Apple II Plus in 1980 when they (3) ... that small businesses would have
a need for a more professional and integrated system than the Apple I EXERCISES
or II. The Apple II Plus was an advanced version of the Apple II that I. True or false?
they aimed at the small business (4) ... Unfortunately, they did not
(5) ... the competition of the IBM Personal Computer. Although IBM 1. The Intelligent Computer is a myth.
was not the original (6) ... of the personal computer, they had been the 2. It were actually Deep Blues designers, programmers, and builders
leader in the business machine industry for several decades, and they who had beaten Kasparov, not the machine itself.
60 61
IX. In pairs or small groups, discuss each of the following questions: soon (7) ... as the primary competition in the personal computer
(8) ... IBM had many advantages over Apple: their engineering was
1. Imagine that you just moved into an empty house. What can you use done by a more experienced engineering staff, and their advertising was
for a makeshift table? a makeshift pillow? a makeshift hammer? done by their more experienced (9) ... staff. Since Apple had been so
2. Here are five gadgets found in many kitchens. Describe the functions successful with the Apple I and the Apple II, the failure of their
of each: can opener, ice crusher, apple peeler, cheese grater. Name (10) ... with the Apple II Plus was both (11) ... and disappointing.
some other gadgets that are found in many kitchens.
3. If you were to design a state-of-the-art product, how would you
improve the following products: toothbrush, bathtub, notebook, TEXT II. DEEP BLUE
hairbrush? (1) Special-purpose machines, DEEP BLUE and its predecessor DEEP
4. Which of the following do you find intimidating? Why? (a teacher, THOUGHT, were originally created to explore how to use parallel
a large truck on the road, a policeman, an automatic bank teller, processing to solve complex problems. DEEP THOUGHT was a
a school counselor, a telephone-answering machine) first computer to defeat a chess grandmaster, thanks to its ability to
5. What marketing techniques would you use if you wanted to sell analyze 750,000 positions per second. But in 1990, an experimen-
a new soft drink product? What market would you focus on? tal 6-processor version of DEEP THOUGHT, capable of search-
6. Which would be preferable for each of the following buildings, ing 2 million positions per second, played against Kasparov and
muted colors or bright? Why? (a restaurant, a post office, a hospital lost. Kasparov went on to defeat DEEP BLUE by winning 3 games
a high school, a music store, a day-care center) and 2 draws. Six IBM employees used a hefty machine to win a chess
7. What are the components of each of the following: a good marriage? game against the reigning world champion in the rematch in 1997.
a modern kitchen? a good stereo system? No other tool of human invention could leverage their talents so
8. Describe another entrepreneur whose investments led to fame and magnificently. DEEP BLUE now has the ability to calculate 50 to
fortune. 100 billion moves within 3 minutes. But DEEP BLUE is not mim-
9. Under what circumstances does a business thrive? a tree? a young icking human thought. It does not antici pate, it only reacts. DEEP
child? a marriage? BLUE is a 32-node IBM power Parallel SP2 high performance
10. Name a notable pioneer in each of the following fields. (manufac- computer. Each node of the SP2 employs a single microchannel
turing, science, art, architecture, medicine, social services) card containing 8 dedicated VLSI chess processors for a total of
11. What is a practical application of the personal computer in busi- 256 processors working in tandem. DEEP BLUEs programming
ness? In the home? code is developed in C and runs under the AIX operating system.
(2) To the uninformed advanced technology is indistinguishable from
X. Complete the paragraph below: magic. We must continue to develop these machines and methods
Although Jobs and Wozniak have become known as two of the most of harnessing them to human needs. Computers amplify our cogni-
brilliant innovators in the technological revolution, not all of their tive and reasoning abilities.
(1) ... were as successful as the Apple I and the Apple II. They (2) ... the
Apple II Plus in 1980 when they (3) ... that small businesses would have
a need for a more professional and integrated system than the Apple I EXERCISES
or II. The Apple II Plus was an advanced version of the Apple II that I. True or false?
they aimed at the small business (4) ... Unfortunately, they did not
(5) ... the competition of the IBM Personal Computer. Although IBM 1. The Intelligent Computer is a myth.
was not the original (6) ... of the personal computer, they had been the 2. It were actually Deep Blues designers, programmers, and builders
leader in the business machine industry for several decades, and they who had beaten Kasparov, not the machine itself.
60 61
3. The world will be overtaken by silicon-based life forms. ñîçäàòü ñâîþ. Îñíîâíûì ÿçûêîì ïðîãðàììèðîâàíèÿ ñòàë Áåéñèê
4. Chess playing is to logic and calculation what intelligence is to ÿçûê î÷åíü ïðîñòîé è äîñòóïíûé. Âñÿêèé ÷åëîâåê, ïîñâÿòèâøèé
relationshi ps and negotiations. ïàðó ìåñÿöåâ åãî èçó÷åíèþ, ìîã ñ÷èòàòü ñåáÿ óìóäðåííûì è ìíî-
5. Chess is social; intelligence is abstract. ãîîïûòíûì «ãóðó». Òîãäà æå áûëè ñîçäàíû ýëåêòðîííûå òàáëèöû
6. The Deep Blue has inhuman logico-mathematical capability. è òåêñòîâûå ðåäàêòîðû âåñüìà óäîáíûå, èñòèííî ïåðñîíàëü-
7. There are 7 dimensions of intelligence: linguistic, logico-mathemati- íûå èíñòðóìåíòû. Íèêàêîãî îáùåãî ñòàíäàðòà íå áûëî, è åùå íå
cal, spatial, musical, kinesthetic, intrapersonal, and interperson- ïðîñâå÷èâàëà ñêâîçü êàæäîå ïðèëîæåíèå ëóêàâàÿ óëûáêà Áèëëà
al. Ãåéòñà.
8. The Deep Blue has all these dimensions. Ïîÿâèëèñü êîìïüþòåðíûå èãðû, è ñàìàÿ çíàìåíèòàÿ èç íèõ
9. Any sufficiently advanced technology is indistinguishable from «Òåòðèñ». Îäíàêî, êàê òîëüêî ñäåëàëîñü ïîíÿòíî, ÷òî ïåðñîíàëü-
magic. (A.C. Clarke) íûé êîìïüþòåð íå òîëüêî èãðóøêà, ÷òî îí ìîæåò ðåàëüíî ðàáî-
òàòü, ïîòðåáîâàëñÿ ñòàíäàðò è âçàèìíàÿ ñîâìåñòèìîñòü ïðîãðàìì,
II. Translate into English: ïðîöåññîðîâ, ñèñòåì õðàíåíèÿ èíôîðìàöèè, ðåçêî âîçðîñëè òðå-
áîâàíèÿ ê êâàëèôèêàöèè ïðîãðàììèñòà è íàäåæíîñòè «æåëåçà»,
ÍÀÑÒÓÏËÅÍÈÅ ÏÅÐÑÎÍÀËÜÍÛÕ ìíîãèå ôèðìû ðàçîðèëèñü, äðóãèå óøëè â òåíü ìîùíûõ êîíêó-
ÊÎÌÏÜÞÒÅÐÎÂ ðåíòîâ. Ñèòóàöèÿ ñòàáèëèçèðîâàëàñü, è êîìïüþòåðíûé ìèð ïðè-
îáðåë âïîëíå îôîðìëåííûå î÷åðòàíèÿ.
 70-å ãîäû ïîÿâëÿþòñÿ ïåðñîíàëüíûå êîìïüþòåðû. Ïðåæäå
âñåãî, Apple. Êîìïüþòåð ïðèøåë ê ÷åëîâåêó. È õîòÿ ìîùíîñòü
ïåðâûõ Apple áûëà íåñðàâíèìî ìåíüøå, ÷åì ó IBM, êîìïüþòåð
III. Find an article about a business venture. Prepare to describe that
ñòàë áëèæå è ïîíÿòíåå. Êñòàòè, èìåííî òîãäà áûëè ðåàëèçîâàíû venture in class.
îñíîâíûå ïðèíöèïû ìíîãîîêîííîãî èíòåðôåéñà, êîòîðûå ïîçäíåå
IV. Read the following paragraph as many times as you can in
áóäóò âîñïðèíÿòû îáîëî÷êîé Windows. Êîìïüþòåð ñòàë «äóìàòü»
3 minutes. Then rewrite as much info as you can remember.
î ÷åëîâåêå, î åãî óäîáñòâàõ, à íå òîëüêî î òîì, êàê áû áûñòðåå
ïîñ÷èòàòü. Îò ïîñëåäîâàòåëüíîñòè, êîãäà ÷åëîâåê ãîòîâèò çàäàíèå, By 1987 the computer market on American college campuses was
à êîìïüþòåð çàäàíèå âûïîëíÿåò, áûë ñîâåðøåí ïåðåõîä ê ïàðàë- thriving. Sales people from all the personal computer companies were
ëåëüíîé ðàáîòå ÷åëîâåêà è êîìïüþòåðà. actively pursuing the business of college administrators, professors and
Ôèðìà IBM, êàê è âñÿêàÿ îãðîìíàÿ èìïåðèÿ, îêàçàëàñü î÷åíü officials. They were selling computers less than half price and were
íåïîâîðîòëèâà: ïîíà÷àëó îíà äàæå íå îáðàòèëà âíèìàíèÿ íà ïåð- adding attractive bonuses such as free software and support services.
ñîíàëüíûé êîìïüþòåð. Íî êîãäà îáúåìû ïðîäàæ Apple ñòàëè îá- They were willing to venture a great deal of time and money in this
âàëüíî íàðàñòàòü, â IBM ïîñòåïåííî ïîíÿëè, ÷òî óïóñêàþò ñî- market because they foresaw that it would thrive for a long time. There
âåðøåííî íîâûé ñåãìåíò ðûíêà. Ïîñëåäîâàë «îãðîìíûé are 14 million people who provide or receive education on campuses,
íåóêëþæèé ñêðèïó÷èé ïîâîðîò ðóëÿ», è âìåñòå ñ Microsoft IBM including 12.5 million new freshmen every year. Students who also buy
âûáðîñèëà íà ðûíîê ìèëëèîí (sic) êîìïüþòåðîâ PC. Ýòî ïðî- computers are likely to become lifetime customers who may enter busi-
èçîøëî â 1981 ãîäó. Òîãäà è íà÷àëàñü ñîâðåìåííàÿ êîìïüþòåðíàÿ ness after graduation and influence corporate buying decisions.
ýðà. Â ýòîò íåêðóãëûé ãîä êîìïüþòåð âîøåë â îôèñû è äîìà è
ðàñïîëîæèëñÿ òàì, íàâåðíîå, íàâñåãäà.
Ýòî ïåðèîä ðåçâîãî ìëàäåí÷åñòâà ïåðñîíàëüíûõ êîìïüþòåðîâ.
Îïåðàöèîííûå ñèñòåìû âîçíèêàþò äåñÿòêàìè. ×óòü ëè íå êàæäàÿ
êîìïàíèÿ, ïðîèçâîäèâøàÿ êîìïüþòåðû, ñ÷èòàëà äîëãîì ÷åñòè
62 63
3. The world will be overtaken by silicon-based life forms. ñîçäàòü ñâîþ. Îñíîâíûì ÿçûêîì ïðîãðàììèðîâàíèÿ ñòàë Áåéñèê
4. Chess playing is to logic and calculation what intelligence is to ÿçûê î÷åíü ïðîñòîé è äîñòóïíûé. Âñÿêèé ÷åëîâåê, ïîñâÿòèâøèé
relationshi ps and negotiations. ïàðó ìåñÿöåâ åãî èçó÷åíèþ, ìîã ñ÷èòàòü ñåáÿ óìóäðåííûì è ìíî-
5. Chess is social; intelligence is abstract. ãîîïûòíûì «ãóðó». Òîãäà æå áûëè ñîçäàíû ýëåêòðîííûå òàáëèöû
6. The Deep Blue has inhuman logico-mathematical capability. è òåêñòîâûå ðåäàêòîðû âåñüìà óäîáíûå, èñòèííî ïåðñîíàëü-
7. There are 7 dimensions of intelligence: linguistic, logico-mathemati- íûå èíñòðóìåíòû. Íèêàêîãî îáùåãî ñòàíäàðòà íå áûëî, è åùå íå
cal, spatial, musical, kinesthetic, intrapersonal, and interperson- ïðîñâå÷èâàëà ñêâîçü êàæäîå ïðèëîæåíèå ëóêàâàÿ óëûáêà Áèëëà
al. Ãåéòñà.
8. The Deep Blue has all these dimensions. Ïîÿâèëèñü êîìïüþòåðíûå èãðû, è ñàìàÿ çíàìåíèòàÿ èç íèõ
9. Any sufficiently advanced technology is indistinguishable from «Òåòðèñ». Îäíàêî, êàê òîëüêî ñäåëàëîñü ïîíÿòíî, ÷òî ïåðñîíàëü-
magic. (A.C. Clarke) íûé êîìïüþòåð íå òîëüêî èãðóøêà, ÷òî îí ìîæåò ðåàëüíî ðàáî-
òàòü, ïîòðåáîâàëñÿ ñòàíäàðò è âçàèìíàÿ ñîâìåñòèìîñòü ïðîãðàìì,
II. Translate into English: ïðîöåññîðîâ, ñèñòåì õðàíåíèÿ èíôîðìàöèè, ðåçêî âîçðîñëè òðå-
áîâàíèÿ ê êâàëèôèêàöèè ïðîãðàììèñòà è íàäåæíîñòè «æåëåçà»,
ÍÀÑÒÓÏËÅÍÈÅ ÏÅÐÑÎÍÀËÜÍÛÕ ìíîãèå ôèðìû ðàçîðèëèñü, äðóãèå óøëè â òåíü ìîùíûõ êîíêó-
ÊÎÌÏÜÞÒÅÐÎÂ ðåíòîâ. Ñèòóàöèÿ ñòàáèëèçèðîâàëàñü, è êîìïüþòåðíûé ìèð ïðè-
îáðåë âïîëíå îôîðìëåííûå î÷åðòàíèÿ.
 70-å ãîäû ïîÿâëÿþòñÿ ïåðñîíàëüíûå êîìïüþòåðû. Ïðåæäå
âñåãî, Apple. Êîìïüþòåð ïðèøåë ê ÷åëîâåêó. È õîòÿ ìîùíîñòü
ïåðâûõ Apple áûëà íåñðàâíèìî ìåíüøå, ÷åì ó IBM, êîìïüþòåð
III. Find an article about a business venture. Prepare to describe that
ñòàë áëèæå è ïîíÿòíåå. Êñòàòè, èìåííî òîãäà áûëè ðåàëèçîâàíû venture in class.
îñíîâíûå ïðèíöèïû ìíîãîîêîííîãî èíòåðôåéñà, êîòîðûå ïîçäíåå
IV. Read the following paragraph as many times as you can in
áóäóò âîñïðèíÿòû îáîëî÷êîé Windows. Êîìïüþòåð ñòàë «äóìàòü»
3 minutes. Then rewrite as much info as you can remember.
î ÷åëîâåêå, î åãî óäîáñòâàõ, à íå òîëüêî î òîì, êàê áû áûñòðåå
ïîñ÷èòàòü. Îò ïîñëåäîâàòåëüíîñòè, êîãäà ÷åëîâåê ãîòîâèò çàäàíèå, By 1987 the computer market on American college campuses was
à êîìïüþòåð çàäàíèå âûïîëíÿåò, áûë ñîâåðøåí ïåðåõîä ê ïàðàë- thriving. Sales people from all the personal computer companies were
ëåëüíîé ðàáîòå ÷åëîâåêà è êîìïüþòåðà. actively pursuing the business of college administrators, professors and
Ôèðìà IBM, êàê è âñÿêàÿ îãðîìíàÿ èìïåðèÿ, îêàçàëàñü î÷åíü officials. They were selling computers less than half price and were
íåïîâîðîòëèâà: ïîíà÷àëó îíà äàæå íå îáðàòèëà âíèìàíèÿ íà ïåð- adding attractive bonuses such as free software and support services.
ñîíàëüíûé êîìïüþòåð. Íî êîãäà îáúåìû ïðîäàæ Apple ñòàëè îá- They were willing to venture a great deal of time and money in this
âàëüíî íàðàñòàòü, â IBM ïîñòåïåííî ïîíÿëè, ÷òî óïóñêàþò ñî- market because they foresaw that it would thrive for a long time. There
âåðøåííî íîâûé ñåãìåíò ðûíêà. Ïîñëåäîâàë «îãðîìíûé are 14 million people who provide or receive education on campuses,
íåóêëþæèé ñêðèïó÷èé ïîâîðîò ðóëÿ», è âìåñòå ñ Microsoft IBM including 12.5 million new freshmen every year. Students who also buy
âûáðîñèëà íà ðûíîê ìèëëèîí (sic) êîìïüþòåðîâ PC. Ýòî ïðî- computers are likely to become lifetime customers who may enter busi-
èçîøëî â 1981 ãîäó. Òîãäà è íà÷àëàñü ñîâðåìåííàÿ êîìïüþòåðíàÿ ness after graduation and influence corporate buying decisions.
ýðà. Â ýòîò íåêðóãëûé ãîä êîìïüþòåð âîøåë â îôèñû è äîìà è
ðàñïîëîæèëñÿ òàì, íàâåðíîå, íàâñåãäà.
Ýòî ïåðèîä ðåçâîãî ìëàäåí÷åñòâà ïåðñîíàëüíûõ êîìïüþòåðîâ.
Îïåðàöèîííûå ñèñòåìû âîçíèêàþò äåñÿòêàìè. ×óòü ëè íå êàæäàÿ
êîìïàíèÿ, ïðîèçâîäèâøàÿ êîìïüþòåðû, ñ÷èòàëà äîëãîì ÷åñòè
62 63
Topics for Essays, Unit V.
Oral or Written reports
Computer and Ñrime
1. Describe a kitchen gadget that you think should be invented. What
would it do? Who would buy it? How should it be marked?
2. How has the world benefited from the invention of the PC? What
problems have accompanied the computer revolution?
3. Of all advantages that the computer has brought to the modern
world, which is the most beneficial?
4. Describe the invention that has had the greatest effect on the 20th
century.
Prereading Discussion
1. What is the Russian for hacker?
2. Are hackers good or bad?
3. What examples of computer abuse do you know?
4. What are the reasons for computer crime?
64 65
Topics for Essays, Unit V.
Oral or Written reports
Computer and Ñrime
1. Describe a kitchen gadget that you think should be invented. What
would it do? Who would buy it? How should it be marked?
2. How has the world benefited from the invention of the PC? What
problems have accompanied the computer revolution?
3. Of all advantages that the computer has brought to the modern
world, which is the most beneficial?
4. Describe the invention that has had the greatest effect on the 20th
century.
Prereading Discussion
1. What is the Russian for hacker?
2. Are hackers good or bad?
3. What examples of computer abuse do you know?
4. What are the reasons for computer crime?
64 65
Reading Analysis (4) These rules made programming at MITs Artificial Intelligence
Laboratory a challenging, all encompassing endeavor. Just for the
exhilaration of programming, students in the AI Lab would write a
VOCABULARY LIST new program to perform even the smallest tasks. The program would
be made available to others who would try to perform the same task
Nouns: freshman, access to, authority, reign, pride, innovation, with fewer instructions. The act of making the computer work
bogus, endeavor, exhilaration, insights. more elegantly was, to a bonafide hacker, awe-inspiring.
Verbs: to encompass, to promote. (5) Hackers were given free reign on the computer by two AI Lab
Adjectives: bonafide, awe-inspiring, mere, efficient. professors, Uncle John McCarthy and Marvin Minsky, who
realized that hacking created new insights. Over the years, the AI
Lab created many innovations: LIFE, a game about survival; LISP,
a new kind of programming language; the first computer chess
TEXT I. THE FIRST HACKERS
game; The CAVE, the first computer adventure; and SPACEWAR,
(1) The first hackers were students at the Massachusetts Institute of the first video game.
Technology (MIT) who belonged to the TMRC (Tech Model
Railroad Club). Some of the members really built model trains. But
many were more interested in the wires and circuits underneath EXERCISES
the track platform. Spending hours at TMRC creating better cir-
I. True or false?
cuitry was called a mere hack. Those members who were interes-
ted in creating innovative, stylistic, and technically clever circuits 1. Those who can, do. Those who cannot, teach. Those who cannot
called themselves (with pride) hackers. teach, HACK!
(2) During the spring of 1959, a new course was offered at MIT, a 2. The first hackers were interested in railroad circuitry.
freshman programming class. Soon the hackers of the railroad club 3. The first hackers studied at MIT.
were spending days, hours, and nights hacking away at their com- 4. The point of a hackers work was to create a faster and smaller code.
puter, an IBM 704. Instead of creating a better circuit, their hack 5. Hackers had their own Ethic Code.
became creating faster, more efficient program with the least 6. TMRC stands for Toy Machinery Railroad Car.
number of lines of code. Eventually they formed a group and cre- 7. Hackers sabotaged the work of the AI Lab.
ated the first set of hackers rules, called the Hackers Ethic. 8. An elegant computer was, to a real hacker, awe-inspiring.
(3) Steven Levy, in his book Hackers, presented the rules: 9. At AI Lab hackers wrote a computer program for every other task.
10. Hackers were quite prolific in innovations.
• Rule 1: Access to computers and anything, which might teach 11. Hackers were given free reign on the two AI Lab professors.
you, something about the way the world works should be
unlimited and total. II. Put the proper words into sentences:
• Rule 2: All information should be free. programming, insights, innovation, ethic, instructions, exhilaration,
• Rule 3: Mistrust authority promote decentralization. endeavor, awe-inspiring, encompass, freshmen, authority, bogus, mistrust.
• Rule 4: Hackers should be judged by their hacking, not bogus
1. Decentralization results in ... to the chief.
criteria such as degrees, race, or position. 2. Holding the door for a lady is the question of...
• Rule 5: You can create art and beauty on a computer. 3. This still life isnt Picassos; its a...
• Rule 6: Computers can change your life for the better. 4. The report youve presented doesnt ... some of the problems.
66 67
Reading Analysis (4) These rules made programming at MITs Artificial Intelligence
Laboratory a challenging, all encompassing endeavor. Just for the
exhilaration of programming, students in the AI Lab would write a
VOCABULARY LIST new program to perform even the smallest tasks. The program would
be made available to others who would try to perform the same task
Nouns: freshman, access to, authority, reign, pride, innovation, with fewer instructions. The act of making the computer work
bogus, endeavor, exhilaration, insights. more elegantly was, to a bonafide hacker, awe-inspiring.
Verbs: to encompass, to promote. (5) Hackers were given free reign on the computer by two AI Lab
Adjectives: bonafide, awe-inspiring, mere, efficient. professors, Uncle John McCarthy and Marvin Minsky, who
realized that hacking created new insights. Over the years, the AI
Lab created many innovations: LIFE, a game about survival; LISP,
a new kind of programming language; the first computer chess
TEXT I. THE FIRST HACKERS
game; The CAVE, the first computer adventure; and SPACEWAR,
(1) The first hackers were students at the Massachusetts Institute of the first video game.
Technology (MIT) who belonged to the TMRC (Tech Model
Railroad Club). Some of the members really built model trains. But
many were more interested in the wires and circuits underneath EXERCISES
the track platform. Spending hours at TMRC creating better cir-
I. True or false?
cuitry was called a mere hack. Those members who were interes-
ted in creating innovative, stylistic, and technically clever circuits 1. Those who can, do. Those who cannot, teach. Those who cannot
called themselves (with pride) hackers. teach, HACK!
(2) During the spring of 1959, a new course was offered at MIT, a 2. The first hackers were interested in railroad circuitry.
freshman programming class. Soon the hackers of the railroad club 3. The first hackers studied at MIT.
were spending days, hours, and nights hacking away at their com- 4. The point of a hackers work was to create a faster and smaller code.
puter, an IBM 704. Instead of creating a better circuit, their hack 5. Hackers had their own Ethic Code.
became creating faster, more efficient program with the least 6. TMRC stands for Toy Machinery Railroad Car.
number of lines of code. Eventually they formed a group and cre- 7. Hackers sabotaged the work of the AI Lab.
ated the first set of hackers rules, called the Hackers Ethic. 8. An elegant computer was, to a real hacker, awe-inspiring.
(3) Steven Levy, in his book Hackers, presented the rules: 9. At AI Lab hackers wrote a computer program for every other task.
10. Hackers were quite prolific in innovations.
• Rule 1: Access to computers and anything, which might teach 11. Hackers were given free reign on the two AI Lab professors.
you, something about the way the world works should be
unlimited and total. II. Put the proper words into sentences:
• Rule 2: All information should be free. programming, insights, innovation, ethic, instructions, exhilaration,
• Rule 3: Mistrust authority promote decentralization. endeavor, awe-inspiring, encompass, freshmen, authority, bogus, mistrust.
• Rule 4: Hackers should be judged by their hacking, not bogus
1. Decentralization results in ... to the chief.
criteria such as degrees, race, or position. 2. Holding the door for a lady is the question of...
• Rule 5: You can create art and beauty on a computer. 3. This still life isnt Picassos; its a...
• Rule 6: Computers can change your life for the better. 4. The report youve presented doesnt ... some of the problems.
66 67
5. If you can survive both in the jungle and the desert, a ... Indian you Yet, in the past, organized crime has used stolen or counterfeit
are. credit cards to finance its operations. Banks that offer after-hours
6. The ... in how hardware works is obligatory for a good programmer. or remote banking through cash-dispensing terminals may find
7. Each ... is another step to a new technological revolution. themselves unwillingly subsidizing organized crime.
8. In 1961 the Soviet Scientists ... to conquer the space was a success. (7) Theft of Information. Much personal information about individuals
9. ... without any reason proves ones carelessness. is now stored in computer files. An unauthorized person with ac-
10. Iron gri p boss expects you to carry out all his ... cess to this information could use it for blackmail. Also, confiden-
11. Annually MIT gains over 5000 ... tial information about a companys products or operations can be
12. ... should cause ... terror in your heart. stolen and sold to unscrupulous competitors. (One attempt at the
latter came to light when the competitor turned out to be scrupu-
lous and turned in the people who were trying to sell him stolen
TEXT II. COMPUTER CRIMES information.)
(8) Software Theft. The software for a computer system is often more
(1) More and more, the operations of our businesses, governments, expensive than the hardware. Yet this expensive software is all too
and financial institutions are controlled by information that exists easy to copy. Crooked computer experts have devised a variety of
only inside computer memories. Anyone clever enough to modify tricks for getting these expensive programs printed out, punched
this information for his own purposes can reap substantial re- on cards, recorded on tape, or otherwise delivered into their hands.
wards. Even worse, a number of people who have done this and This crime has even been perpetrated from remote terminals that
been caught at it have managed to get away without punishment. access the computer over the telephone.
(2) These facts have not been lost on criminals or would-be criminals. A (9) Theft of Time-Sharing Services. When the public is given access to
recent Stanford Research Institute study of computer abuse was based a system, some members of the public often discover how to use
on 160 case histories, which probably are just the proverbial ti p of the system in unauthorized ways. For example, there are the phone
the iceberg. After all, we only know about the unsuccessful crimes. freakers who avoid long distance telephone charges by sending
How many successful ones have gone undetected is anybodys guess. over their phones control signals that are identical to those used
(3) Here are a few areas in which computer criminals have found the by the telephone company.
pickings all too easy. (10) Since time-sharing systems often are accessible to anyone who
(4) Banking. All but the smallest banks now keep their accounts on dials the right telephone number, they are subject to the same
computer files. Someone who knows how to change the numbers kinds of mani pulation.
in the files can transfer funds at will. For instance, one program- (11) Of course, most systems use account numbers and passwords to
mer was caught having the computer transfer funds from other restrict access to authorized users. But unauthorized persons have
peoples accounts to his wifes checking account. Often, tradition- proved to be adept at obtaining this information and using it for
ally trained auditors dont know enough about the workings of their own benefit. For instance, when a police computer system
computers to catch what is taking place right under their noses. was demonstrated to a school class, a precocious student noted the
(5) Business. A company that uses computers extensively offers many access codes being used; later, all the students teachers turned up
opportunities to both dishonest employees and clever outsiders. on a list of wanted criminals.
For instance, a thief can have the computer shi p the companys (12) Perfect Crimes. Its easy for computer crimes to go undetected if no
products to addresses of his own choosing. Or he can have it issue one checks up on what the computer is doing. But even if the crime
checks to him or his confederates for imaginary supplies or ser- is detected, the criminal may walk away not only unpunished but with
vices. People have been caught doing both. a glowing recommendation from his former employers.
(6) Credit Cards. There is a trend toward using cards similar to credit (13) Of course, we have no statistics on crimes that go undetected. But
cards to gain access to funds through cash-dispensing terminals. its unsettling to note how many of the crimes we do know about
68 69
5. If you can survive both in the jungle and the desert, a ... Indian you Yet, in the past, organized crime has used stolen or counterfeit
are. credit cards to finance its operations. Banks that offer after-hours
6. The ... in how hardware works is obligatory for a good programmer. or remote banking through cash-dispensing terminals may find
7. Each ... is another step to a new technological revolution. themselves unwillingly subsidizing organized crime.
8. In 1961 the Soviet Scientists ... to conquer the space was a success. (7) Theft of Information. Much personal information about individuals
9. ... without any reason proves ones carelessness. is now stored in computer files. An unauthorized person with ac-
10. Iron gri p boss expects you to carry out all his ... cess to this information could use it for blackmail. Also, confiden-
11. Annually MIT gains over 5000 ... tial information about a companys products or operations can be
12. ... should cause ... terror in your heart. stolen and sold to unscrupulous competitors. (One attempt at the
latter came to light when the competitor turned out to be scrupu-
lous and turned in the people who were trying to sell him stolen
TEXT II. COMPUTER CRIMES information.)
(8) Software Theft. The software for a computer system is often more
(1) More and more, the operations of our businesses, governments, expensive than the hardware. Yet this expensive software is all too
and financial institutions are controlled by information that exists easy to copy. Crooked computer experts have devised a variety of
only inside computer memories. Anyone clever enough to modify tricks for getting these expensive programs printed out, punched
this information for his own purposes can reap substantial re- on cards, recorded on tape, or otherwise delivered into their hands.
wards. Even worse, a number of people who have done this and This crime has even been perpetrated from remote terminals that
been caught at it have managed to get away without punishment. access the computer over the telephone.
(2) These facts have not been lost on criminals or would-be criminals. A (9) Theft of Time-Sharing Services. When the public is given access to
recent Stanford Research Institute study of computer abuse was based a system, some members of the public often discover how to use
on 160 case histories, which probably are just the proverbial ti p of the system in unauthorized ways. For example, there are the phone
the iceberg. After all, we only know about the unsuccessful crimes. freakers who avoid long distance telephone charges by sending
How many successful ones have gone undetected is anybodys guess. over their phones control signals that are identical to those used
(3) Here are a few areas in which computer criminals have found the by the telephone company.
pickings all too easy. (10) Since time-sharing systems often are accessible to anyone who
(4) Banking. All but the smallest banks now keep their accounts on dials the right telephone number, they are subject to the same
computer files. Someone who knows how to change the numbers kinds of mani pulation.
in the files can transfer funds at will. For instance, one program- (11) Of course, most systems use account numbers and passwords to
mer was caught having the computer transfer funds from other restrict access to authorized users. But unauthorized persons have
peoples accounts to his wifes checking account. Often, tradition- proved to be adept at obtaining this information and using it for
ally trained auditors dont know enough about the workings of their own benefit. For instance, when a police computer system
computers to catch what is taking place right under their noses. was demonstrated to a school class, a precocious student noted the
(5) Business. A company that uses computers extensively offers many access codes being used; later, all the students teachers turned up
opportunities to both dishonest employees and clever outsiders. on a list of wanted criminals.
For instance, a thief can have the computer shi p the companys (12) Perfect Crimes. Its easy for computer crimes to go undetected if no
products to addresses of his own choosing. Or he can have it issue one checks up on what the computer is doing. But even if the crime
checks to him or his confederates for imaginary supplies or ser- is detected, the criminal may walk away not only unpunished but with
vices. People have been caught doing both. a glowing recommendation from his former employers.
(6) Credit Cards. There is a trend toward using cards similar to credit (13) Of course, we have no statistics on crimes that go undetected. But
cards to gain access to funds through cash-dispensing terminals. its unsettling to note how many of the crimes we do know about
68 69
were detected by accident, not by systematic audits or other secu- II. True or false?
rity procedures. The computer criminals who have been caught
may have been the victims of uncommonly bad luck. 1. A person is innocent until proven guilty.
(14) For example, a certain keypunch operator complained of having 2. Computer-related crime has diminished.
to stay overtime to punch extra cards. Investigation revealed that 3. A thief can transfer funds from other peoples accounts.
the extra cards she was being asked to punch were for fraudulent 4. Dishonest employees cant shi p the companys products to ad-
transactions. In another case, disgruntled employees of the thief dresses of their choosing.
ti pped off the company that was being robbed. An undercover 5. It is impossible to counterfeit credit cards.
narcotics agent stumbled on still another case. An employee was 6. Phone freaks can be found out.
selling the companys merchandise on the side and using the com- 7. Personal information should not be stored in computer files.
puter to get it shi pped to the buyers. While negotiating for LSD, 8. A real bank checks very carefully before handling out any money.
the narcotics agent was offered a good deal on a stereo! 9. Unauthorized persons have proved to be inefficient laymen.
(15) Unlike other embezzlers, who must leave the country, commit sui- 10. Hardware is less expensive than software.
cide, or go to jail, computer criminals sometimes brazen it out, 11. Computer criminals will never be caught.
demanding not only that they not be prosecuted but also that they be 12. Companies dont punish some criminals because they dont want
given good recommendations and perhaps other benefits, such as bad publicity.
severance pay. All too often, their demands have been met.
(16) Why? Because company executives are afraid of the bad publicity III. Give synonyms to:
that would result if the public found out that their computer had
to come to light; confidential; attempt; crooked; to deliver; to perpe-
been misused. They cringe at the thought of a criminal boasting in
trate crime; freaks; to avoid; to obtain; to reveal; merchandise; transac-
open court of how he juggled the most confidential records right
tion; severance pay; publicity; executive.
under the noses of the companys executives, accountants, and
security staff. And so another computer criminal departs with just IV. Give antonyms to:
the recommendations he needs to continue his exploits elsewhere.
fraudulent; common; to ship; like; to go to jail; to be adept at;
to reveal; a precocious student; former; by accident; to complain of.
EXERCISES
V. Construct other sentences in these patterns (transitional expres-
I. Find in the text the English equivalents to: sions):
èçáåæàòü íàêàçàíèÿ; ïîòåíöèàëüíûå ïðåñòóïíèêè; çëîóïîòðåá- 1. After all, we know only about unsuccessful crimes.
ëåíèå êîìïüþòåðîì; ïðåñëîâóòàÿ âåðõóøêà àéñáåðãà; îñòàòüñÿ íå- 2. All but the smallest banks keep their accounts in computer files.
îáíàðóæåííûì; ìîæíî òîëüêî äîãàäûâàòüñÿ; õðàíèòü ñ÷åòà; ïåðå- 3. Yet, in the past, organized crime used stolen credit cards to finance
âîäèòü ïî æåëàíèþ; âîîáðàæàåìûå ïîñòàâêè; ïîëó÷èòü äîñòóï ê; its operations.
îáíàëè÷èâàíèå (äåíåã); ôàëüøèâûå ýëåêòðîííûå êàðòî÷êè; ñóáñèäè- 4. Also, confidential information can be stolen.
ðîâàòü îðãàíèçîâàííóþ ïðåñòóïíîñòü; êðàæà èíôîðìàöèè; øàíòàæ; 5. For example, three phone freakers who avoid paying distance tele-
íåùåïåòèëüíûå êîíêóðåíòû; ðàçðàáîòàòü ìíîæåñòâî òðþêîâ; òå- phone charges.
ëåôîííûå ìîøåííèêè; ïëàòà çà ìåæäóãîðîäíèå çâîíêè; íàáðàòü òå- 6. Of course, most systems use passwords to restrict access to autho-
ëåôîííûé íîìåð; îãðàíè÷èòü äîñòóï; ëèöà áåç ïðàâà äîñòóïà; ðà- rized users.
çûñêèâàåìûå ïðåñòóïíèêè; ñëó÷àéíî; ïðîâåðêè; ìåðû áåçîïàñíîñòè; 7. Unlike other embezzlers, computer criminals demand that they be
òàéíûé àãåíò. given good recommendations.
70 71
were detected by accident, not by systematic audits or other secu- II. True or false?
rity procedures. The computer criminals who have been caught
may have been the victims of uncommonly bad luck. 1. A person is innocent until proven guilty.
(14) For example, a certain keypunch operator complained of having 2. Computer-related crime has diminished.
to stay overtime to punch extra cards. Investigation revealed that 3. A thief can transfer funds from other peoples accounts.
the extra cards she was being asked to punch were for fraudulent 4. Dishonest employees cant shi p the companys products to ad-
transactions. In another case, disgruntled employees of the thief dresses of their choosing.
ti pped off the company that was being robbed. An undercover 5. It is impossible to counterfeit credit cards.
narcotics agent stumbled on still another case. An employee was 6. Phone freaks can be found out.
selling the companys merchandise on the side and using the com- 7. Personal information should not be stored in computer files.
puter to get it shi pped to the buyers. While negotiating for LSD, 8. A real bank checks very carefully before handling out any money.
the narcotics agent was offered a good deal on a stereo! 9. Unauthorized persons have proved to be inefficient laymen.
(15) Unlike other embezzlers, who must leave the country, commit sui- 10. Hardware is less expensive than software.
cide, or go to jail, computer criminals sometimes brazen it out, 11. Computer criminals will never be caught.
demanding not only that they not be prosecuted but also that they be 12. Companies dont punish some criminals because they dont want
given good recommendations and perhaps other benefits, such as bad publicity.
severance pay. All too often, their demands have been met.
(16) Why? Because company executives are afraid of the bad publicity III. Give synonyms to:
that would result if the public found out that their computer had
to come to light; confidential; attempt; crooked; to deliver; to perpe-
been misused. They cringe at the thought of a criminal boasting in
trate crime; freaks; to avoid; to obtain; to reveal; merchandise; transac-
open court of how he juggled the most confidential records right
tion; severance pay; publicity; executive.
under the noses of the companys executives, accountants, and
security staff. And so another computer criminal departs with just IV. Give antonyms to:
the recommendations he needs to continue his exploits elsewhere.
fraudulent; common; to ship; like; to go to jail; to be adept at;
to reveal; a precocious student; former; by accident; to complain of.
EXERCISES
V. Construct other sentences in these patterns (transitional expres-
I. Find in the text the English equivalents to: sions):
èçáåæàòü íàêàçàíèÿ; ïîòåíöèàëüíûå ïðåñòóïíèêè; çëîóïîòðåá- 1. After all, we know only about unsuccessful crimes.
ëåíèå êîìïüþòåðîì; ïðåñëîâóòàÿ âåðõóøêà àéñáåðãà; îñòàòüñÿ íå- 2. All but the smallest banks keep their accounts in computer files.
îáíàðóæåííûì; ìîæíî òîëüêî äîãàäûâàòüñÿ; õðàíèòü ñ÷åòà; ïåðå- 3. Yet, in the past, organized crime used stolen credit cards to finance
âîäèòü ïî æåëàíèþ; âîîáðàæàåìûå ïîñòàâêè; ïîëó÷èòü äîñòóï ê; its operations.
îáíàëè÷èâàíèå (äåíåã); ôàëüøèâûå ýëåêòðîííûå êàðòî÷êè; ñóáñèäè- 4. Also, confidential information can be stolen.
ðîâàòü îðãàíèçîâàííóþ ïðåñòóïíîñòü; êðàæà èíôîðìàöèè; øàíòàæ; 5. For example, three phone freakers who avoid paying distance tele-
íåùåïåòèëüíûå êîíêóðåíòû; ðàçðàáîòàòü ìíîæåñòâî òðþêîâ; òå- phone charges.
ëåôîííûå ìîøåííèêè; ïëàòà çà ìåæäóãîðîäíèå çâîíêè; íàáðàòü òå- 6. Of course, most systems use passwords to restrict access to autho-
ëåôîííûé íîìåð; îãðàíè÷èòü äîñòóï; ëèöà áåç ïðàâà äîñòóïà; ðà- rized users.
çûñêèâàåìûå ïðåñòóïíèêè; ñëó÷àéíî; ïðîâåðêè; ìåðû áåçîïàñíîñòè; 7. Unlike other embezzlers, computer criminals demand that they be
òàéíûé àãåíò. given good recommendations.
70 71
8. All too often, their demands have been met. Òðåòüå ïîêîëåíèå êèáåððåâîëþöèîíåðîâ, õàêåðû íà÷àëà
9. So, another criminal continues his exploits elsewhere. 80-õ, ñîçäàëî ìíîæåñòâî ïðèêëàäíûõ, ó÷åáíûõ è èãðîâûõ ïðîãðàìì
äëÿ ïåðñîíàëüíûõ êîìïüþòåðîâ. Òèïè÷íàÿ ôèãóðà Ìè÷ Êåéïîð,
VI. Translate into English. áûâøèé ó÷èòåëü òðàíñöåíäåíòàëüíîé ìåäèòàöèè, ñîçäàâøèé ïðî-
ãðàììó «Lotus 1-2-3», êîòîðàÿ âåñüìà ñïîñîáñòâîâàëà óñïåõó êîì-
ÕÀÊÅÐÛ: ÏËÎÕÈÅ ÈËÈ ÕÎÐÎØÈÅ?
ïüþòåðîâ IBM.
Ñëîâî õàêåð ñîâìåùàåò â ñåáå, ïî êðàéíåé ìåðå, äâà çíà÷åíèÿ Çà ãîäû, ïðîøåäøèå ñ âûõîäà êíèãè Ëåâè, ê âëàñòè ïðèøëî
(îäèí äîòîøíûé õàêåð íàñ÷èòàë öåëûõ 69): îäíî îêðàøåííîå ÷åòâåðòîå ïîêîëåíèå ðåâîëþöèîíåðîâ. Èìåííî îíè ïðåîáðàçîâàëè
íåãàòèâíî (âçëîìùèê), äðóãîå íåéòðàëüíîå èëè äàæå õâàëåáíîå ìèëèòàðèñòñêóþ Arpanet â òîòàëüíóþ äèãèòàëüíóþ ýïèäåìèþ, èç-
(àñ, ìàñòåð). âåñòíóþ íûíå êàê Internet.
Àíãëèéñêèé ãëàãîë to hack ïðèìåíèòåëüíî ê êîìïüþòåðàì ìî- Ïëîõèå õàêåðû ÷èòàþò ÷óæèå ïèñüìà, âîðóþò ÷óæèå ïðî-
æåò îçíà÷àòü äâå âåùè âçëîìàòü ñèñòåìó èëè ïî÷èíèòü åå. ãðàììû è âñåìè äîñòóïíûìè ñïîñîáàìè âðåäÿò ïðîãðåññèâíîìó
 îñíîâå ýòèõ äåéñòâèé ëåæèò îáùàÿ îñíîâà: ïîíèìàíèå òîãî, êàê ÷åëîâå÷åñòâó.
óñòðîåí êîìïüþòåð, è ïðîãðàììû, êîòîðûå íà íåì ðàáîòàþò.
 1984 ãîäó Ñòèâåí Ëåâè â ñâîåé çíàìåíèòîé êíèãå Õàêåðû:
Ãåðîè êîìïüþòåðíîé ðåâîëþöèè ñôîðìóëèðîâàë ïðèíöèïû õàêåðñ- Topics for Essays,
êîé ýòèêè:
Oral or Written Reports
Äîñòóï ê êîìïüþòåðàì äîëæåí áûòü íåîãðàíè÷åííûì è ïîëíûì.
Âñÿ èíôîðìàöèÿ äîëæíà áûòü áåñïëàòíîé. 1. A day in a hackers life.
Íå âåðü âëàñòÿì áîðèñü çà äåöåíòðàëèçàöèþ. 2. Hackers of today.
Òû ìîæåøü òâîðèòü íà êîìïüþòåðå èñêóññòâî è êðàñîòó. 3. If I were a hacker
Êîìïüþòåðû ìîãóò èçìåíèòü òâîþ æèçíü ê ëó÷øåìó. 4. Hacking for fun or running for life?
 ñâîåé êíèãå Ëåâè ãîâîðèò î òðåõ ïîêîëåíèÿõ õàêåðîâ. Ïåðâîå 5. Do we need hackers?
âîçíèêëî â øåñòèäåñÿòûõ ãîäàõ íà÷àëå ñåìèäåñÿòûõ íà îòäåëåíèÿõ
êîìïüþòåðíûõ íàóê â óíèâåðñèòåòàõ. Èñïîëüçóÿ òåõíèêó ðàçäåëåíèÿ
âðåìåíè, ýòè ïàðíè ïðåîáðàçîâàëè êîìïüþòåðû îáùåãî ïîëüçîâàíèÿ Essay Selection for Reading
(mainframes) â âèðòóàëüíûå ïåðñîíàëüíûå êîìïüþòåðû.
 êîíöå 70-õ âòîðîå ïîêîëåíèå äåëàåò ñëåäóþùèé øàã èçîá- as a Stimulus for Writing
ðåòåíèå è ïðîèçâîäñòâî ïåðñîíàëüíûõ êîìïüþòåðîâ. Ýòè íåàêàäå-
ìè÷åñêèå õàêåðû áûëè ÿðêèìè ïðåäñòàâèòåëÿìè êîíòðêóëüòóðû. HACKERS OF TODAY
Íàïðèìåð, Ñòèâ Äæîáñ, õèïïè-áèòëîìàí, áðîñèâøèé êîëëåäæ,
èëè Ñòèâ Âîçíÿê, èíæåíåð â «Hewlett-Packard». Ïðåæäå ÷åì ïðå- Hackers, having started as toy railroad circuitry designers in the late
óñïåòü â «Apple», îáà Ñòèâà çàíèìàëèñü òåì, ÷òî ñîáèðàëè è ïðî- fifties, are completely new people now. Once turned to computers, they
äàâàëè òàê íàçûâàåìûå ãîëóáûå êîðîáêè ïðèñïîñîáëåíèÿ, ïî- became gods and devils. Nowadays holders and users of the World Wide
çâîëÿþùèå áåñïëàòíî çâîíèòü ïî òåëåôîíó. Web hide their PCs under passwords when the keyword hacker is heard.
Ðóêîâîäñòâóÿñü òîé æå õàêåðñêîé ýòèêîé, ÷òî è ïðåäûäóùèå When and how did this change take place? Why are we so frightened of
ïîêîëåíèÿ, îíè ïðîòèâîñòîÿò êîììåðöèàëèçàöèè Internet, Hacker The Mighty and The Elusive?
ñîçäàâàÿ ïðîãðàììû, êîòîðûå òóò æå ñòàíîâÿòñÿ äîñòóïíû âñÿêîìó, One of the legends says that hackers have changed under the influence
êòî èõ ïîæåëàåò, òàê íàçûâàåìûå freeware èëè shareware. of crackers the people who loved to talk on the phone at somebody
72 73
8. All too often, their demands have been met. Òðåòüå ïîêîëåíèå êèáåððåâîëþöèîíåðîâ, õàêåðû íà÷àëà
9. So, another criminal continues his exploits elsewhere. 80-õ, ñîçäàëî ìíîæåñòâî ïðèêëàäíûõ, ó÷åáíûõ è èãðîâûõ ïðîãðàìì
äëÿ ïåðñîíàëüíûõ êîìïüþòåðîâ. Òèïè÷íàÿ ôèãóðà Ìè÷ Êåéïîð,
VI. Translate into English. áûâøèé ó÷èòåëü òðàíñöåíäåíòàëüíîé ìåäèòàöèè, ñîçäàâøèé ïðî-
ãðàììó «Lotus 1-2-3», êîòîðàÿ âåñüìà ñïîñîáñòâîâàëà óñïåõó êîì-
ÕÀÊÅÐÛ: ÏËÎÕÈÅ ÈËÈ ÕÎÐÎØÈÅ?
ïüþòåðîâ IBM.
Ñëîâî õàêåð ñîâìåùàåò â ñåáå, ïî êðàéíåé ìåðå, äâà çíà÷åíèÿ Çà ãîäû, ïðîøåäøèå ñ âûõîäà êíèãè Ëåâè, ê âëàñòè ïðèøëî
(îäèí äîòîøíûé õàêåð íàñ÷èòàë öåëûõ 69): îäíî îêðàøåííîå ÷åòâåðòîå ïîêîëåíèå ðåâîëþöèîíåðîâ. Èìåííî îíè ïðåîáðàçîâàëè
íåãàòèâíî (âçëîìùèê), äðóãîå íåéòðàëüíîå èëè äàæå õâàëåáíîå ìèëèòàðèñòñêóþ Arpanet â òîòàëüíóþ äèãèòàëüíóþ ýïèäåìèþ, èç-
(àñ, ìàñòåð). âåñòíóþ íûíå êàê Internet.
Àíãëèéñêèé ãëàãîë to hack ïðèìåíèòåëüíî ê êîìïüþòåðàì ìî- Ïëîõèå õàêåðû ÷èòàþò ÷óæèå ïèñüìà, âîðóþò ÷óæèå ïðî-
æåò îçíà÷àòü äâå âåùè âçëîìàòü ñèñòåìó èëè ïî÷èíèòü åå. ãðàììû è âñåìè äîñòóïíûìè ñïîñîáàìè âðåäÿò ïðîãðåññèâíîìó
 îñíîâå ýòèõ äåéñòâèé ëåæèò îáùàÿ îñíîâà: ïîíèìàíèå òîãî, êàê ÷åëîâå÷åñòâó.
óñòðîåí êîìïüþòåð, è ïðîãðàììû, êîòîðûå íà íåì ðàáîòàþò.
 1984 ãîäó Ñòèâåí Ëåâè â ñâîåé çíàìåíèòîé êíèãå Õàêåðû:
Ãåðîè êîìïüþòåðíîé ðåâîëþöèè ñôîðìóëèðîâàë ïðèíöèïû õàêåðñ- Topics for Essays,
êîé ýòèêè:
Oral or Written Reports
Äîñòóï ê êîìïüþòåðàì äîëæåí áûòü íåîãðàíè÷åííûì è ïîëíûì.
Âñÿ èíôîðìàöèÿ äîëæíà áûòü áåñïëàòíîé. 1. A day in a hackers life.
Íå âåðü âëàñòÿì áîðèñü çà äåöåíòðàëèçàöèþ. 2. Hackers of today.
Òû ìîæåøü òâîðèòü íà êîìïüþòåðå èñêóññòâî è êðàñîòó. 3. If I were a hacker
Êîìïüþòåðû ìîãóò èçìåíèòü òâîþ æèçíü ê ëó÷øåìó. 4. Hacking for fun or running for life?
 ñâîåé êíèãå Ëåâè ãîâîðèò î òðåõ ïîêîëåíèÿõ õàêåðîâ. Ïåðâîå 5. Do we need hackers?
âîçíèêëî â øåñòèäåñÿòûõ ãîäàõ íà÷àëå ñåìèäåñÿòûõ íà îòäåëåíèÿõ
êîìïüþòåðíûõ íàóê â óíèâåðñèòåòàõ. Èñïîëüçóÿ òåõíèêó ðàçäåëåíèÿ
âðåìåíè, ýòè ïàðíè ïðåîáðàçîâàëè êîìïüþòåðû îáùåãî ïîëüçîâàíèÿ Essay Selection for Reading
(mainframes) â âèðòóàëüíûå ïåðñîíàëüíûå êîìïüþòåðû.
 êîíöå 70-õ âòîðîå ïîêîëåíèå äåëàåò ñëåäóþùèé øàã èçîá- as a Stimulus for Writing
ðåòåíèå è ïðîèçâîäñòâî ïåðñîíàëüíûõ êîìïüþòåðîâ. Ýòè íåàêàäå-
ìè÷åñêèå õàêåðû áûëè ÿðêèìè ïðåäñòàâèòåëÿìè êîíòðêóëüòóðû. HACKERS OF TODAY
Íàïðèìåð, Ñòèâ Äæîáñ, õèïïè-áèòëîìàí, áðîñèâøèé êîëëåäæ,
èëè Ñòèâ Âîçíÿê, èíæåíåð â «Hewlett-Packard». Ïðåæäå ÷åì ïðå- Hackers, having started as toy railroad circuitry designers in the late
óñïåòü â «Apple», îáà Ñòèâà çàíèìàëèñü òåì, ÷òî ñîáèðàëè è ïðî- fifties, are completely new people now. Once turned to computers, they
äàâàëè òàê íàçûâàåìûå ãîëóáûå êîðîáêè ïðèñïîñîáëåíèÿ, ïî- became gods and devils. Nowadays holders and users of the World Wide
çâîëÿþùèå áåñïëàòíî çâîíèòü ïî òåëåôîíó. Web hide their PCs under passwords when the keyword hacker is heard.
Ðóêîâîäñòâóÿñü òîé æå õàêåðñêîé ýòèêîé, ÷òî è ïðåäûäóùèå When and how did this change take place? Why are we so frightened of
ïîêîëåíèÿ, îíè ïðîòèâîñòîÿò êîììåðöèàëèçàöèè Internet, Hacker The Mighty and The Elusive?
ñîçäàâàÿ ïðîãðàììû, êîòîðûå òóò æå ñòàíîâÿòñÿ äîñòóïíû âñÿêîìó, One of the legends says that hackers have changed under the influence
êòî èõ ïîæåëàåò, òàê íàçûâàåìûå freeware èëè shareware. of crackers the people who loved to talk on the phone at somebody
72 73
elses expense. Those people hooked up to any number and enjoyed the
pleasure of telephone conversation, leaving the most fun bills for the Unit VI.
victim. Another legend tells us that modern hackers were born when a new
computer game concept was invented. Rules were very simple: two comput- Computer Security
er programs were fighting for the reign on the computer. Memory, disk-
space and CPU time were the battlefield. The results of that game are two
in number and are well known: hackers and computer viruses. One more
story tells that the new hackers came to existence when two MIT stu-
dents that attended the AI Lab found an error in a network program. They
let people, responsible for the network, know but with no result. The of-
fended wrote a code that completely paralyzed the network and only after
that the error was fixed. By the way, those students founded The Motorola
Company later.
Today, when the Internet has entered everyones house theres no
shield between a hacker and your PC. You can password yourself up, but
then either hackers will crack your PC anyway or nobody will enter your
site, because passwords kill accessibility. If your PC is easy to access no
one can guarantee whatll happen to your computer - hackers, you know
them.
Monsters? Chimeras? Not at all! Every hacker is a human being and
has soft spots: good food, pretty girls or boys (it happens both ways),
classical music, hot chocolate at the fireplace, apple pie on Sunday. Hack-
er is first of all a connoisseur, a professional with no computer secret out of
his experience. And what is the application for skills depends on him, God,
and Holy Spirit.
Prereading Discussion
1. What are some common motivations for computer crime?
2. What is computer security?
3. What threatens a computer system?
4. Was the first bug real?
5. What viruses do you know?
6. What does biometrics study?
7. What is cryptography?
74 75
elses expense. Those people hooked up to any number and enjoyed the
pleasure of telephone conversation, leaving the most fun bills for the Unit VI.
victim. Another legend tells us that modern hackers were born when a new
computer game concept was invented. Rules were very simple: two comput- Computer Security
er programs were fighting for the reign on the computer. Memory, disk-
space and CPU time were the battlefield. The results of that game are two
in number and are well known: hackers and computer viruses. One more
story tells that the new hackers came to existence when two MIT stu-
dents that attended the AI Lab found an error in a network program. They
let people, responsible for the network, know but with no result. The of-
fended wrote a code that completely paralyzed the network and only after
that the error was fixed. By the way, those students founded The Motorola
Company later.
Today, when the Internet has entered everyones house theres no
shield between a hacker and your PC. You can password yourself up, but
then either hackers will crack your PC anyway or nobody will enter your
site, because passwords kill accessibility. If your PC is easy to access no
one can guarantee whatll happen to your computer - hackers, you know
them.
Monsters? Chimeras? Not at all! Every hacker is a human being and
has soft spots: good food, pretty girls or boys (it happens both ways),
classical music, hot chocolate at the fireplace, apple pie on Sunday. Hack-
er is first of all a connoisseur, a professional with no computer secret out of
his experience. And what is the application for skills depends on him, God,
and Holy Spirit.
Prereading Discussion
1. What are some common motivations for computer crime?
2. What is computer security?
3. What threatens a computer system?
4. Was the first bug real?
5. What viruses do you know?
6. What does biometrics study?
7. What is cryptography?
74 75
Reading Analysis of identifying the people who are authorized to use it. The identifi-
cation procedure has to be quick, simple, and convenient. It should
be so thorough that there is little chance of the computer being
VOCABULARY LIST fooled by a clever imposter. At the same time, the computer must
not reject legitimate users. Unfortunately, no identification system
Nouns: ransom, theft, espionage, imposter, forgery, advocate, fin- currently in use meets all these requirements.
gerprints, distortion, purchase, vendor. (5) At present, signatures are widely used to identify credit-card hold-
Verbs: safeguard, entitle, claim, arise, encrypt, evade, circumvent, ers, but it takes an expert to detect a good forgery. Sometimes even
override. a human expert is fooled, and there is no reason to believe that a
Adjectives: vulnerable, legitimate, thorough, distinct, promising, computer could do any better.
plain, secure, particular. (6) A variation is to have the computer analyze a persons hand move-
Word combinations: white-collar crime, to keep secret, under way, ments as he signs his name instead of analyzing the signature itself.
by chance, needless to say, security provisions, credit card holder, Advocates of this method claim that different persons hand move-
at the intersection of. ments are sufficiently distinct to identify them. And while a forger
might learn to duplicate another persons signature, he probably
would not move his hand exactly the way the person whose signa-
TEXT I. SECURITY: PLAYING IT SAFE ture he was forging did.
(7) Photographs are also sometimes used for identification. But, peo-
(1) The computer industry has been extremely vulnerable in the mat- ple find it inconvenient to stop by a bank or credit card company
ter of security. Computer security once meant the physical securi- and be photographed. Companies might lose business if they made
ty of the computer itself guarded and locked doors. Computer the pictures an absolute requirement. Also, photographs are less
screens were given dark filters so others could not easily see the data useful these days, when people frequently change their appear-
on the screen. But filters and locks by no means prevented access. ance by changing the way they wear their hair. Finally, computer
More sophisticated security means safeguarding the computer sys- programs for analyzing photographs are still highly experimental.
tem against such threats as burglary, vandalism, fire, natural di- (8) Cash-dispensing systems often use two identification numbers: one
sasters, theft of data for ransom, industrial espionage, and various is recorded on a magnetic stri pe on the identification card, and
forms of white-collar crime. the other is given to the cardholder. When the user inserts his card
(2) Emphasis on Access and Throughput. For the last decade or so, into the cash-dispensing terminal, he keys in the identification
computer programmers have concentrated on making it easy for number he has been given. The computer checks to see that the
people to use computer systems. Unfortunately, in some situations number recorded on the card and the one keyed in by the user
the systems are all too easy to use; they dont impose nearly enough both refer to the same person. Someone who stole the card would
restrictions to safeguard confidential information or to prevent un- not know what number had to be keyed in to use it. This method
authorized persons from changing the information in a file. currently is the one most widely used for identifying computer
(3) Its as if a bank concentrated all its efforts on handing out money as users.
fast is it could and did very little to see that the persons who (9) For a long time, fingerprints have provided a method of positive
requested the money were entitled to it. Of course, a real bank works identification. But they suffer from two problems, one technical
just the opposite way, checking very carefully before handing out and one psychological.
any money. Computer systems that handle sensitive personal and (10) The technical problem is that there is no simple system for com-
financial data should be designed with the same philosophy in mind. paring fingerprints electronically. Also, most methods of taking fin-
(4) Positive Identification of Users. A computer system needs a sure way gerprints are messy. The psychological problem is that fingerprints
76 77
Reading Analysis of identifying the people who are authorized to use it. The identifi-
cation procedure has to be quick, simple, and convenient. It should
be so thorough that there is little chance of the computer being
VOCABULARY LIST fooled by a clever imposter. At the same time, the computer must
not reject legitimate users. Unfortunately, no identification system
Nouns: ransom, theft, espionage, imposter, forgery, advocate, fin- currently in use meets all these requirements.
gerprints, distortion, purchase, vendor. (5) At present, signatures are widely used to identify credit-card hold-
Verbs: safeguard, entitle, claim, arise, encrypt, evade, circumvent, ers, but it takes an expert to detect a good forgery. Sometimes even
override. a human expert is fooled, and there is no reason to believe that a
Adjectives: vulnerable, legitimate, thorough, distinct, promising, computer could do any better.
plain, secure, particular. (6) A variation is to have the computer analyze a persons hand move-
Word combinations: white-collar crime, to keep secret, under way, ments as he signs his name instead of analyzing the signature itself.
by chance, needless to say, security provisions, credit card holder, Advocates of this method claim that different persons hand move-
at the intersection of. ments are sufficiently distinct to identify them. And while a forger
might learn to duplicate another persons signature, he probably
would not move his hand exactly the way the person whose signa-
TEXT I. SECURITY: PLAYING IT SAFE ture he was forging did.
(7) Photographs are also sometimes used for identification. But, peo-
(1) The computer industry has been extremely vulnerable in the mat- ple find it inconvenient to stop by a bank or credit card company
ter of security. Computer security once meant the physical securi- and be photographed. Companies might lose business if they made
ty of the computer itself guarded and locked doors. Computer the pictures an absolute requirement. Also, photographs are less
screens were given dark filters so others could not easily see the data useful these days, when people frequently change their appear-
on the screen. But filters and locks by no means prevented access. ance by changing the way they wear their hair. Finally, computer
More sophisticated security means safeguarding the computer sys- programs for analyzing photographs are still highly experimental.
tem against such threats as burglary, vandalism, fire, natural di- (8) Cash-dispensing systems often use two identification numbers: one
sasters, theft of data for ransom, industrial espionage, and various is recorded on a magnetic stri pe on the identification card, and
forms of white-collar crime. the other is given to the cardholder. When the user inserts his card
(2) Emphasis on Access and Throughput. For the last decade or so, into the cash-dispensing terminal, he keys in the identification
computer programmers have concentrated on making it easy for number he has been given. The computer checks to see that the
people to use computer systems. Unfortunately, in some situations number recorded on the card and the one keyed in by the user
the systems are all too easy to use; they dont impose nearly enough both refer to the same person. Someone who stole the card would
restrictions to safeguard confidential information or to prevent un- not know what number had to be keyed in to use it. This method
authorized persons from changing the information in a file. currently is the one most widely used for identifying computer
(3) Its as if a bank concentrated all its efforts on handing out money as users.
fast is it could and did very little to see that the persons who (9) For a long time, fingerprints have provided a method of positive
requested the money were entitled to it. Of course, a real bank works identification. But they suffer from two problems, one technical
just the opposite way, checking very carefully before handing out and one psychological.
any money. Computer systems that handle sensitive personal and (10) The technical problem is that there is no simple system for com-
financial data should be designed with the same philosophy in mind. paring fingerprints electronically. Also, most methods of taking fin-
(4) Positive Identification of Users. A computer system needs a sure way gerprints are messy. The psychological problem is that fingerprints
76 77
are strongly associated in the public mind with police procedures. are about 1022 possible sixty-four-bit keys, no one is likely to dis-
Because most people associate being fingerprinted with being ar- cover the correct one by chance. And, without the correct key,
rested, they almost surely would resist being fingerprinted for rou- knowing the algorithm is useless.
tine identification. (19) A recent important development involves what are called public-
(11) Voiceprints may be more promising. With these, the user has key cryptosystems.
only to speak a few words into a microphone for the computer to (20) In a public-key cryptosystem, each person using the system has
analyze his voice. There are no psychological problems here. And two keys, a public key and a private key. Each persons public key is
technically its easier to take and analyze voiceprints than finger- published in a directory for all to see; each persons private key is
prints. Also, for remote computer users, the identifying words kept secret. Messages encrypted with a persons public key can be
could be transmitted over the telephone. decrypted with that persons (but no one elses) private key. Mes-
(12) However, voiceprints still require more research. It has yet to be sages encrypted with a persons private key can be decrypted with
proved that the computer cannot be fooled by mimics. Also, tech- that persons (but no one elses) public key.
nical difficulties arise when the voice is subjected to the noise and (21) Protection through Software. The software of a computer system,
distortion of a telephone line. particularly the operating system, can be designed to prevent un-
(13) Even li p prints have been suggested. But its doubtful that kissing authorized access to the files stored on the system.
computers will ever catch on. (22) The protection scheme uses a special table called a security matrix.
(14) To date, the most reliable method of positive identification is the
card with the magnetic stri pe. If the technical problems can be Data A Data B Data C
worked out, however, voiceprints may prove to be even better.
(15) Data Encryption. When sensitive data is transmitted to and from Read
remote terminals, it must be encrypted (translated into a secret User A Modify Modify Read
code) at one end and decrypted (translated back into plain text) at Execute
the other. Files also can be protected by encrypting the data before
storing it and decrypting it after it has been retrieved. User B Read Modify Modify
(16) Since it is impractical to keep secret the algorithms that are used Execute
to encrypt and decrypt data, these algorithms are designed so that
their operation depends on a certain data item called the key. It is User C Read Read Read
the key that is kept secret. Even if you know all the details of the Modify Execute
encrypting and decrypting algorithms, you cannot decrypt any mes-
sages unless you know the key that was used when they were en-
crypted. (23) Each row of the security matrix corresponds to a data item stored in
(17) For instance, the National Bureau of Standards has adopted an the system. Each entry in the table lies at the intersection of a
algorithm for encrypting and decrypting the data processed by fede- particular row and a particular column. The entry tells what kind of
ral agencies. The details of the algorithm have been published in the access the person corresponding to the row in which the entry lies
Federal Register. Plans are under way to incorporate the algorithm has to the data item corresponding to the column in which the
in special purpose microprocessors, which anyone can purchase entry lies.
and install in his computer. (24) Usually, there are several kinds of access that can be specified. For
(18) So the algorithm is available to anyone who bothers to look it up instance, a person may be able to read a data item but not change it.
or buy one of the special purpose microprocessors. But the opera- Or he may be able to both read and modify it. If the data is a
tion of the algorithm is governed by a sixty-four-bit key. Since there program, a person may be able to have the computer execute the
78 79
are strongly associated in the public mind with police procedures. are about 1022 possible sixty-four-bit keys, no one is likely to dis-
Because most people associate being fingerprinted with being ar- cover the correct one by chance. And, without the correct key,
rested, they almost surely would resist being fingerprinted for rou- knowing the algorithm is useless.
tine identification. (19) A recent important development involves what are called public-
(11) Voiceprints may be more promising. With these, the user has key cryptosystems.
only to speak a few words into a microphone for the computer to (20) In a public-key cryptosystem, each person using the system has
analyze his voice. There are no psychological problems here. And two keys, a public key and a private key. Each persons public key is
technically its easier to take and analyze voiceprints than finger- published in a directory for all to see; each persons private key is
prints. Also, for remote computer users, the identifying words kept secret. Messages encrypted with a persons public key can be
could be transmitted over the telephone. decrypted with that persons (but no one elses) private key. Mes-
(12) However, voiceprints still require more research. It has yet to be sages encrypted with a persons private key can be decrypted with
proved that the computer cannot be fooled by mimics. Also, tech- that persons (but no one elses) public key.
nical difficulties arise when the voice is subjected to the noise and (21) Protection through Software. The software of a computer system,
distortion of a telephone line. particularly the operating system, can be designed to prevent un-
(13) Even li p prints have been suggested. But its doubtful that kissing authorized access to the files stored on the system.
computers will ever catch on. (22) The protection scheme uses a special table called a security matrix.
(14) To date, the most reliable method of positive identification is the
card with the magnetic stri pe. If the technical problems can be Data A Data B Data C
worked out, however, voiceprints may prove to be even better.
(15) Data Encryption. When sensitive data is transmitted to and from Read
remote terminals, it must be encrypted (translated into a secret User A Modify Modify Read
code) at one end and decrypted (translated back into plain text) at Execute
the other. Files also can be protected by encrypting the data before
storing it and decrypting it after it has been retrieved. User B Read Modify Modify
(16) Since it is impractical to keep secret the algorithms that are used Execute
to encrypt and decrypt data, these algorithms are designed so that
their operation depends on a certain data item called the key. It is User C Read Read Read
the key that is kept secret. Even if you know all the details of the Modify Execute
encrypting and decrypting algorithms, you cannot decrypt any mes-
sages unless you know the key that was used when they were en-
crypted. (23) Each row of the security matrix corresponds to a data item stored in
(17) For instance, the National Bureau of Standards has adopted an the system. Each entry in the table lies at the intersection of a
algorithm for encrypting and decrypting the data processed by fede- particular row and a particular column. The entry tells what kind of
ral agencies. The details of the algorithm have been published in the access the person corresponding to the row in which the entry lies
Federal Register. Plans are under way to incorporate the algorithm has to the data item corresponding to the column in which the
in special purpose microprocessors, which anyone can purchase entry lies.
and install in his computer. (24) Usually, there are several kinds of access that can be specified. For
(18) So the algorithm is available to anyone who bothers to look it up instance, a person may be able to read a data item but not change it.
or buy one of the special purpose microprocessors. But the opera- Or he may be able to both read and modify it. If the data is a
tion of the algorithm is governed by a sixty-four-bit key. Since there program, a person may be able to have the computer execute the
78 79
program without being able either to read or modify it. Thus, 2. What is the most serious problem: the loss of hardware, software,
people can be allowed to use programs without being able to change or the loss of data?
them or find out how they work. 3. How does a computer system detect whether you are the person
(25) Needless to say, access to the security matrix itself must be re- who should be granted access to it?
stricted to one authorized person. 4. What are the shortcomings of each biometric means?
(26) Also, the software has to be reliable. Even the software issued by 5. What is to prevent any user from copying PC software onto dis-
reputable vendors may be full of bugs. One or more bugs may make kettes?
it possible for a person to circumvent the security system. The secu- 6. What steps can be taken to prevent theft or alteration of data?
rity provisions of more than one computer system have been evad- 7. What is the weakest link in any computer system?
ed by high school and college students. 8. Should a programmer also be a computer operator?
(27) Restricting the Console Operator. Most computer systems are ex- 9. What is a security matrix?
tremely vulnerable to the console operator. Thats because the op- 10. Can the computer industry risk being without safeguards for securi-
erator can use the switches on the computers control panel to ty and privacy?
insert programs of his own devising, to read in unauthorized pro-
IV. Put the proper words into sentences:
grams, or to examine and modify confidential information, in-
cluding the security matrix. In the face of these capabilities, any foolproof, complicated, virus, unauthorized, crime, fingerprint, alter-
software security system is helpless. Computer systems for han- ing, messages.
dling sensitive information must be designed so that the console
operator, like other users, works through the software security 1. Computer security is more ... today than it was in the past.
system and cannot override it. One solution is to incorporate the 2. International literature tells lurid stories about computer viruses ...
security system in firmware instead of software, so that unautho- about bank swindles, espionage, ... sent from one computer to
rized changes to it cannot be made easily. destroy the contents of others.
3. Movies like War Games have dramatized the dangers from ... entry
to the computer systems that control nuclear weapons.
EXERCISES 4. Methods used in computer-based criminal activity range from switch-
ing or ...
data as they enter the computer, to pulling self-conceal-
I. Give synonyms to: ing instruction into the software.
5. The person who develops a ...
lock for the computer data will make
To encrypt, to secure, confidential, biometric, recognition, imposter, a fortune.
to meet requirements, to detect, to lose business, appearance, to incorpo- 6. .
.. is the name generally given to software that causes .
.. of computer
rate, unless, to circumvent. files.
7. People must be taught that some kinds of help, such as assisting ...
II. Give antonyms to: users with passwords are inappropriate.
8. According to a published article, the Mafia has kidnapped an IBM
Convenient, advocate, to reject, to encrypt, legitimate, messy, autho-
executive and cut off his finger because it needed his ...
to breach
rized, white-collar crime, to safeguard info, sensitive, to retrieve data,
a computer security system.
practical, by chance, private.
9. Data sent over communication lines can be protected by encryp-
III. Answer the questions: tion, the process of scrambling ...
10. Firewall is security measures taken to block ...
access to an Internet
1. What is computer security? site.
80 81
program without being able either to read or modify it. Thus, 2. What is the most serious problem: the loss of hardware, software,
people can be allowed to use programs without being able to change or the loss of data?
them or find out how they work. 3. How does a computer system detect whether you are the person
(25) Needless to say, access to the security matrix itself must be re- who should be granted access to it?
stricted to one authorized person. 4. What are the shortcomings of each biometric means?
(26) Also, the software has to be reliable. Even the software issued by 5. What is to prevent any user from copying PC software onto dis-
reputable vendors may be full of bugs. One or more bugs may make kettes?
it possible for a person to circumvent the security system. The secu- 6. What steps can be taken to prevent theft or alteration of data?
rity provisions of more than one computer system have been evad- 7. What is the weakest link in any computer system?
ed by high school and college students. 8. Should a programmer also be a computer operator?
(27) Restricting the Console Operator. Most computer systems are ex- 9. What is a security matrix?
tremely vulnerable to the console operator. Thats because the op- 10. Can the computer industry risk being without safeguards for securi-
erator can use the switches on the computers control panel to ty and privacy?
insert programs of his own devising, to read in unauthorized pro-
IV. Put the proper words into sentences:
grams, or to examine and modify confidential information, in-
cluding the security matrix. In the face of these capabilities, any foolproof, complicated, virus, unauthorized, crime, fingerprint, alter-
software security system is helpless. Computer systems for han- ing, messages.
dling sensitive information must be designed so that the console
operator, like other users, works through the software security 1. Computer security is more ... today than it was in the past.
system and cannot override it. One solution is to incorporate the 2. International literature tells lurid stories about computer viruses ...
security system in firmware instead of software, so that unautho- about bank swindles, espionage, ... sent from one computer to
rized changes to it cannot be made easily. destroy the contents of others.
3. Movies like War Games have dramatized the dangers from ... entry
to the computer systems that control nuclear weapons.
EXERCISES 4. Methods used in computer-based criminal activity range from switch-
ing or ...
data as they enter the computer, to pulling self-conceal-
I. Give synonyms to: ing instruction into the software.
5. The person who develops a ...
lock for the computer data will make
To encrypt, to secure, confidential, biometric, recognition, imposter, a fortune.
to meet requirements, to detect, to lose business, appearance, to incorpo- 6. .
.. is the name generally given to software that causes .
.. of computer
rate, unless, to circumvent. files.
7. People must be taught that some kinds of help, such as assisting ...
II. Give antonyms to: users with passwords are inappropriate.
8. According to a published article, the Mafia has kidnapped an IBM
Convenient, advocate, to reject, to encrypt, legitimate, messy, autho-
executive and cut off his finger because it needed his ...
to breach
rized, white-collar crime, to safeguard info, sensitive, to retrieve data,
a computer security system.
practical, by chance, private.
9. Data sent over communication lines can be protected by encryp-
III. Answer the questions: tion, the process of scrambling ...
10. Firewall is security measures taken to block ...
access to an Internet
1. What is computer security? site.
80 81
V. Construct other sentences of these patterns: 2. Do not install software unless you know it is safe. Viruses tend
to show up on free software acquired from sales representa-
1. All these systems are too easy to use. tives, resellers, computer repair people, power users, and
2. Its as if a bank concentrated all its efforts on handing out money as consultants.
fast as it could. 3. Make your applications (and other executable files) read-
3. The identification procedure has to be quick and simple. only. This will not prevent infection, but it can help contain
4. It takes an expert to detect a good forgery. those viruses that attack applications.
5. The voice is subjected to the noise and distortion of a telephone line. 4. Stop the so-called sneakernet crowd. This is the group that
6. It is the key that is kept secret. moves around the office (in sneakers, of course) and prefers
7. You cannot decrypt any message unless you know the key. to transfer files quickly via floppy disk.
8. No one is likely to discover the correct algorithm by chance. 5. Make backups. This is a given: Always back up your hard disk
9. The security system is incorporated in firmware, so that unautho- and floppies.
rized changes to it cannot be made easily.
10. Suppose I want to send you a signed message
.
EXERCISES
TEXT II. CHECKING YOUR OWN SECURITY I. Find in the text the English equivalents to:
A Personal Checklist for Hardware. With the subject of security äàâíî ïîðà; òåìà áåçîïàñíîñòè; ïåðå÷åíü; ïîäâåðãàòü; ðåçåðâíûå
fresh in your mind, now is a good time to consider a checklist for your êîïèè; áëîêèðîâêà ïèòàíèÿ; çàùèòà îò âûáðîñà; âûïîëíÿåìûé ôàéë;
own personal computer and its software. We will confine this list to a çäðàâûé ñìûñë; çàùèòèòü äàííûå â îòäåëüíîì ôàéëå èëè íà öåëîì
computer presumed to be in the home. äèñêå; òîëüêî äëÿ ÷òåíèÿ; ïîìåøàòü çàðàæåíèþ; ñ ïîìîùüþ;
ïåðåäàâàòü ôàéë.
1. No eating, drinking, or smoking near the computer.
2. Do not place the computer near open windows or doors. II. Answer the following questions:
3. Do not subject the computer to extreme temperatures.
4. Clean equi pment regularly. 1. What are security devices?
5. Place a cable lock on the computer. 2. What can help minimize theft?
6. Use a surge protector. 3. What can a surge protector do?
7. Store diskettes properly in a locked container. 4. Why is the so-called sneakernet crowd dangerous?
8. Maintain backup copies of all files.
9. Store copies of critical files off site. III. Translate into English:
A Personal Checklist for Software. A word of prevention is in order. 1. Åùå â øêîëå Áèëë Ãåéòñ ñóìåë ïîäîáðàòü êëþ÷ ê ñèñòåìå
Although there are programs that can prevent virus activity, protecting çàùèòû è ïîñòîÿííî âîðîâàë âðåìÿ ýêñïëóàòàöèè ìàøèíû.
yourself from viruses depends more on common sense than on building 2. Íàðóøåíèå àâòîðñêîãî ïðàâà íåçàêîííîå êîïèðîâàíèå, â
a fortress around the computer. Here are a few common-sense ti ps: ÷àñòíîñòè, ïðîãðàììû.
1. If your software allows it, follow write-protect measures for 3. Ïàðîëü ýòî íàáîð ñèìâîëîâ, èñïîëüçóåìûõ â êà÷åñòâå êîäà ê
your floppy disks before installing any new software. If it does âû÷èñëèòåëüíîé ñèñòåìå èëè áàçå äàííûõ. Êîìïüþòåðíûå õó-
not allow it, write-protect the disks immediately after instal- ëèãàíû ìîãóò ëåãêî ïîäîáðàòü ïàðîëü, åñëè îí ïðåäñòàâëÿåò
lation. ñîáîé èíèöèàëû èëè ïîñëåäîâàòåëüíûå ðÿäû ÷èñåë.
82 83
V. Construct other sentences of these patterns: 2. Do not install software unless you know it is safe. Viruses tend
to show up on free software acquired from sales representa-
1. All these systems are too easy to use. tives, resellers, computer repair people, power users, and
2. Its as if a bank concentrated all its efforts on handing out money as consultants.
fast as it could. 3. Make your applications (and other executable files) read-
3. The identification procedure has to be quick and simple. only. This will not prevent infection, but it can help contain
4. It takes an expert to detect a good forgery. those viruses that attack applications.
5. The voice is subjected to the noise and distortion of a telephone line. 4. Stop the so-called sneakernet crowd. This is the group that
6. It is the key that is kept secret. moves around the office (in sneakers, of course) and prefers
7. You cannot decrypt any message unless you know the key. to transfer files quickly via floppy disk.
8. No one is likely to discover the correct algorithm by chance. 5. Make backups. This is a given: Always back up your hard disk
9. The security system is incorporated in firmware, so that unautho- and floppies.
rized changes to it cannot be made easily.
10. Suppose I want to send you a signed message
.
EXERCISES
TEXT II. CHECKING YOUR OWN SECURITY I. Find in the text the English equivalents to:
A Personal Checklist for Hardware. With the subject of security äàâíî ïîðà; òåìà áåçîïàñíîñòè; ïåðå÷åíü; ïîäâåðãàòü; ðåçåðâíûå
fresh in your mind, now is a good time to consider a checklist for your êîïèè; áëîêèðîâêà ïèòàíèÿ; çàùèòà îò âûáðîñà; âûïîëíÿåìûé ôàéë;
own personal computer and its software. We will confine this list to a çäðàâûé ñìûñë; çàùèòèòü äàííûå â îòäåëüíîì ôàéëå èëè íà öåëîì
computer presumed to be in the home. äèñêå; òîëüêî äëÿ ÷òåíèÿ; ïîìåøàòü çàðàæåíèþ; ñ ïîìîùüþ;
ïåðåäàâàòü ôàéë.
1. No eating, drinking, or smoking near the computer.
2. Do not place the computer near open windows or doors. II. Answer the following questions:
3. Do not subject the computer to extreme temperatures.
4. Clean equi pment regularly. 1. What are security devices?
5. Place a cable lock on the computer. 2. What can help minimize theft?
6. Use a surge protector. 3. What can a surge protector do?
7. Store diskettes properly in a locked container. 4. Why is the so-called sneakernet crowd dangerous?
8. Maintain backup copies of all files.
9. Store copies of critical files off site. III. Translate into English:
A Personal Checklist for Software. A word of prevention is in order. 1. Åùå â øêîëå Áèëë Ãåéòñ ñóìåë ïîäîáðàòü êëþ÷ ê ñèñòåìå
Although there are programs that can prevent virus activity, protecting çàùèòû è ïîñòîÿííî âîðîâàë âðåìÿ ýêñïëóàòàöèè ìàøèíû.
yourself from viruses depends more on common sense than on building 2. Íàðóøåíèå àâòîðñêîãî ïðàâà íåçàêîííîå êîïèðîâàíèå, â
a fortress around the computer. Here are a few common-sense ti ps: ÷àñòíîñòè, ïðîãðàììû.
1. If your software allows it, follow write-protect measures for 3. Ïàðîëü ýòî íàáîð ñèìâîëîâ, èñïîëüçóåìûõ â êà÷åñòâå êîäà ê
your floppy disks before installing any new software. If it does âû÷èñëèòåëüíîé ñèñòåìå èëè áàçå äàííûõ. Êîìïüþòåðíûå õó-
not allow it, write-protect the disks immediately after instal- ëèãàíû ìîãóò ëåãêî ïîäîáðàòü ïàðîëü, åñëè îí ïðåäñòàâëÿåò
lation. ñîáîé èíèöèàëû èëè ïîñëåäîâàòåëüíûå ðÿäû ÷èñåë.
82 83
4. Çíàåòå ëè âû, êàê âåñòè ñåáÿ â Èíòåðíåòå? Ñóùåñòâóåò ëè ýòèêà of a vaccine, or antivirus, program, a computer program that stops the
Ñåòåâîãî Áðàòñòâà? spread of and often eradicates the virus.
5. Òàùàò âñå: ëè÷íûå êîäû êðåäèòíûõ êàðòî÷åê, àâòîðñêèå ìóçû- Transmitting a Virus. Consider this typical example. A programmer
êàëüíûå ïðîèçâåäåíèÿ, ïîñëåäíèå êîìïüþòåðíûå èãðû. Õà- secretly inserts a few unauthorized instructions in a personal computer
êåðû íàçûâàþò ýòî äåëåæêîé, îñòàëüíîå îòêðîâåííûì âî- operating system program. The illicit instructions lie dormant until three
ðîâñòâîì. events occur together: 1. the disk with the infected operating system is
6. Ëåãàëüíûé êîìïüþòåðíûé áèçíåñ ïîäíèìàåòñÿ íà ñâîþ çàùèòó. in use; 2. a disk in another drive contains another copy of the operating
7. Åñëè âû èñïîëüçóåòå êîìïüþòåð â ñâîåì áèçíåñå, òî âû äîëæ- system and some data files; and 3. a command, such as COPY or DIR,
íû èìåòü àíòèâèðóñíûå ïðîãðàììû è îáíîâëÿòü èõ ïîñòîÿííî. from the infected operating system references a data file. Under these
8. Åñòü äâà ñïîñîáà èçáåæàòü çàðàæåíèÿ êîìïüþòåðíûìè âèðóñà- circumstances, the virus instructions are now inserted into the other
ìè: íå óñòàíàâëèâàòü íîâîå ïðîãðàììíîå îáåñïå÷åíèå áåç ïðî- operating system. Thus the virus has spread to another disk, and the
âåðêè è íå çàãðóæàòü áåñïëàòíóþ èíôîðìàöèþ èç ñåòè. process can be repeated again and again. In fact, each newly infected
9. Ñàìûìè áûñòðûìè ñïîñîáàìè íåëåãàëüíîãî ðàñïðîñòðàíåíèÿ disk becomes a virus carrier.
ïðîãðàììíîãî îáåñïå÷åíèÿ ñåé÷àñ ÿâëÿþòñÿ: âîðîâñòâî, âçëîì Damage from Viruses. We have explained how the virus is transmit-
è òîðãîâëÿ êðàäåíûì. ted; now we come to the interesting part the consequences. In this
example, the virus instructions add 1 to a counter each time the virus
is copied to another disk. When the counter reaches 4, the virus erases
all data files. But this is not the end of the destruction, of course; three
Related Reading other disks have also been infected. Although viruses can be destruc-
tive, some are quite benign; one simply displays a peace message on the
VIRUSES AND VACCINES screen on a given date. Others may merely be a nuisance, like the Ping-
Pong virus that bounces a Ping-Pong ball around your screen while
The terms viruses and vaccines have entered the jargon of the com-
you are working. But a few could result in disaster for your disk, as in
puter industry to describe some of the bad things that can happen to the case of Michelangelo.
computer systems and programs. Unpleasant occurrences like the March 6, Prevention. A word about prevention is in order. Although there are
1991, attack of the Michelangelo virus will be with us for years to programs called vaccines that can prevent virus activity, protecting
come. In fact, from now on you need to check your IBM or IBM- your computer from viruses depends more on common sense than on
compatible personal computer for the presence of Michelangelo be- building a fortress around the machine. Although there have been
fore March 6 every year or risk losing all the data on your hard disk occasions where commercial software was released with a virus, these
when you turn on your machine that day. And Macintosh users need to situations are rare. Viruses tend to show up most often on free software
do the same for another intruder, the Jerusalem virus, before each acquired from friends. Even commercial bulletin board systems, once
Friday the 13th, or risk a similar fate for their data. considered the most likely suspects in transferring viruses, have cleaned
A virus, as its name suggests, is contagious. It is a set of illicit in- up their act and now assure their users of virus-free environments. But
structions that infects other programs and may spread rapidly. The Mich- not all bulletin board systems are run professionally. So you should
elangelo virus went worldwide within a year. Some types of viruses in- always test diskettes you share with others by putting their write-pro-
clude the worm, a program that spreads by replicating itself; the bomb, tection tabs in place. If an attempt is made to write to such a protected
a program intended to sabotage a computer by triggering damage based diskette, a warning message appears on the screen. It is not easy to
on certain conditions usually at a later date; and the Trojan horse, a protect hard disks, so many people use antivirus programs. Before any
program that covertly places illegal, destructive instructions in the middle diskette can be used with a computer system, the antivirus program
of an otherwise legitimate program. A virus may be dealt with by means scans the diskette for infection. The drawback is that once you buy this
84 85
4. Çíàåòå ëè âû, êàê âåñòè ñåáÿ â Èíòåðíåòå? Ñóùåñòâóåò ëè ýòèêà of a vaccine, or antivirus, program, a computer program that stops the
Ñåòåâîãî Áðàòñòâà? spread of and often eradicates the virus.
5. Òàùàò âñå: ëè÷íûå êîäû êðåäèòíûõ êàðòî÷åê, àâòîðñêèå ìóçû- Transmitting a Virus. Consider this typical example. A programmer
êàëüíûå ïðîèçâåäåíèÿ, ïîñëåäíèå êîìïüþòåðíûå èãðû. Õà- secretly inserts a few unauthorized instructions in a personal computer
êåðû íàçûâàþò ýòî äåëåæêîé, îñòàëüíîå îòêðîâåííûì âî- operating system program. The illicit instructions lie dormant until three
ðîâñòâîì. events occur together: 1. the disk with the infected operating system is
6. Ëåãàëüíûé êîìïüþòåðíûé áèçíåñ ïîäíèìàåòñÿ íà ñâîþ çàùèòó. in use; 2. a disk in another drive contains another copy of the operating
7. Åñëè âû èñïîëüçóåòå êîìïüþòåð â ñâîåì áèçíåñå, òî âû äîëæ- system and some data files; and 3. a command, such as COPY or DIR,
íû èìåòü àíòèâèðóñíûå ïðîãðàììû è îáíîâëÿòü èõ ïîñòîÿííî. from the infected operating system references a data file. Under these
8. Åñòü äâà ñïîñîáà èçáåæàòü çàðàæåíèÿ êîìïüþòåðíûìè âèðóñà- circumstances, the virus instructions are now inserted into the other
ìè: íå óñòàíàâëèâàòü íîâîå ïðîãðàììíîå îáåñïå÷åíèå áåç ïðî- operating system. Thus the virus has spread to another disk, and the
âåðêè è íå çàãðóæàòü áåñïëàòíóþ èíôîðìàöèþ èç ñåòè. process can be repeated again and again. In fact, each newly infected
9. Ñàìûìè áûñòðûìè ñïîñîáàìè íåëåãàëüíîãî ðàñïðîñòðàíåíèÿ disk becomes a virus carrier.
ïðîãðàììíîãî îáåñïå÷åíèÿ ñåé÷àñ ÿâëÿþòñÿ: âîðîâñòâî, âçëîì Damage from Viruses. We have explained how the virus is transmit-
è òîðãîâëÿ êðàäåíûì. ted; now we come to the interesting part the consequences. In this
example, the virus instructions add 1 to a counter each time the virus
is copied to another disk. When the counter reaches 4, the virus erases
all data files. But this is not the end of the destruction, of course; three
Related Reading other disks have also been infected. Although viruses can be destruc-
tive, some are quite benign; one simply displays a peace message on the
VIRUSES AND VACCINES screen on a given date. Others may merely be a nuisance, like the Ping-
Pong virus that bounces a Ping-Pong ball around your screen while
The terms viruses and vaccines have entered the jargon of the com-
you are working. But a few could result in disaster for your disk, as in
puter industry to describe some of the bad things that can happen to the case of Michelangelo.
computer systems and programs. Unpleasant occurrences like the March 6, Prevention. A word about prevention is in order. Although there are
1991, attack of the Michelangelo virus will be with us for years to programs called vaccines that can prevent virus activity, protecting
come. In fact, from now on you need to check your IBM or IBM- your computer from viruses depends more on common sense than on
compatible personal computer for the presence of Michelangelo be- building a fortress around the machine. Although there have been
fore March 6 every year or risk losing all the data on your hard disk occasions where commercial software was released with a virus, these
when you turn on your machine that day. And Macintosh users need to situations are rare. Viruses tend to show up most often on free software
do the same for another intruder, the Jerusalem virus, before each acquired from friends. Even commercial bulletin board systems, once
Friday the 13th, or risk a similar fate for their data. considered the most likely suspects in transferring viruses, have cleaned
A virus, as its name suggests, is contagious. It is a set of illicit in- up their act and now assure their users of virus-free environments. But
structions that infects other programs and may spread rapidly. The Mich- not all bulletin board systems are run professionally. So you should
elangelo virus went worldwide within a year. Some types of viruses in- always test diskettes you share with others by putting their write-pro-
clude the worm, a program that spreads by replicating itself; the bomb, tection tabs in place. If an attempt is made to write to such a protected
a program intended to sabotage a computer by triggering damage based diskette, a warning message appears on the screen. It is not easy to
on certain conditions usually at a later date; and the Trojan horse, a protect hard disks, so many people use antivirus programs. Before any
program that covertly places illegal, destructive instructions in the middle diskette can be used with a computer system, the antivirus program
of an otherwise legitimate program. A virus may be dealt with by means scans the diskette for infection. The drawback is that once you buy this
84 85
type of software, you must continuously pay the price for upgrades as Hackers and criminally minded individuals invade systems, causing
new viruses are discovered. disruptions, misuse, and damage accidents that result in breaking several
communications links, affecting entire regions. Finally, we face the possi-
bility of systems damage by info terrorists.
Topics for Essays, Fault tolerance is our best guarantee that high confidence systems will
not betray the intentions of their builders and the trust of their users by
Oral or Written Reports: succumbing to physical, design or human-machine interaction faults, or by
allowing viruses and malicious acts to disrupt essential services.
1. Which of user identifications is best? As the computing sciences move rapidly toward professionalization,
2. Common means of protecting data: the new topic must be incorporated into the curriculum ethics, i.e.
• securing waste; professional ethical behavior. Computer professionals are experts in their
• separating employee functions; field with up-to-date knowledge that they can effectively and consequently
• implementing passwords, internal controls, audit checks. apply in product development. They are also responsible to the products
3. Cryptography. users and must understand the effects of their decisions and actions on the
4. Copy protection; public at large.
5. What are computer viruses and how do they differ? Professionals are responsible for designing and developing products,
6. What makes a perfect virus? which avoid failures that might lead to losses, cause physical harm, or
7. A day in the life of the virus hunter. compromise national or company security. With so much info flowing across
8. Professional ethical behavior. the Internet and because of the rising popularity of applets and similar
modular applications, it is vital for the professionals to take responsibility
in maintaining high standards for the products they develop.
Essay Selection for Reading
as a Stimulus for Writing
WHOM TO BLAME AND WHAT TO DO?
As computing and communications become irreplaceable tools of mod-
ern society, one fundamental principle emerges: the greater the benefits
these systems bring to our well-being and quality of life, the greater the
potential for harm when they fail to perform their functions or perform
them incorrectly. Consider air, rail, and automobile traffic control; emer-
gency response systems, and, most of all, our rapidly growing dependence
on health care delivery via high-performance computing and communica-
tions. When these systems fail, lives and fortunes may be lost.
At the same time, threats to dependable operations are growing in scope
and severity. Leftover design faults (bugs and glitches) cause system crashes
during peak demands, resulting in service disruptions and financial losses.
Computer systems suffer stability problems due to unforeseen interactions of
overlapping fault events and mismatched defense mechanisms.
86 87
type of software, you must continuously pay the price for upgrades as Hackers and criminally minded individuals invade systems, causing
new viruses are discovered. disruptions, misuse, and damage accidents that result in breaking several
communications links, affecting entire regions. Finally, we face the possi-
bility of systems damage by info terrorists.
Topics for Essays, Fault tolerance is our best guarantee that high confidence systems will
not betray the intentions of their builders and the trust of their users by
Oral or Written Reports: succumbing to physical, design or human-machine interaction faults, or by
allowing viruses and malicious acts to disrupt essential services.
1. Which of user identifications is best? As the computing sciences move rapidly toward professionalization,
2. Common means of protecting data: the new topic must be incorporated into the curriculum ethics, i.e.
• securing waste; professional ethical behavior. Computer professionals are experts in their
• separating employee functions; field with up-to-date knowledge that they can effectively and consequently
• implementing passwords, internal controls, audit checks. apply in product development. They are also responsible to the products
3. Cryptography. users and must understand the effects of their decisions and actions on the
4. Copy protection; public at large.
5. What are computer viruses and how do they differ? Professionals are responsible for designing and developing products,
6. What makes a perfect virus? which avoid failures that might lead to losses, cause physical harm, or
7. A day in the life of the virus hunter. compromise national or company security. With so much info flowing across
8. Professional ethical behavior. the Internet and because of the rising popularity of applets and similar
modular applications, it is vital for the professionals to take responsibility
in maintaining high standards for the products they develop.
Essay Selection for Reading
as a Stimulus for Writing
WHOM TO BLAME AND WHAT TO DO?
As computing and communications become irreplaceable tools of mod-
ern society, one fundamental principle emerges: the greater the benefits
these systems bring to our well-being and quality of life, the greater the
potential for harm when they fail to perform their functions or perform
them incorrectly. Consider air, rail, and automobile traffic control; emer-
gency response systems, and, most of all, our rapidly growing dependence
on health care delivery via high-performance computing and communica-
tions. When these systems fail, lives and fortunes may be lost.
At the same time, threats to dependable operations are growing in scope
and severity. Leftover design faults (bugs and glitches) cause system crashes
during peak demands, resulting in service disruptions and financial losses.
Computer systems suffer stability problems due to unforeseen interactions of
overlapping fault events and mismatched defense mechanisms.
86 87
Unit VII. Reading Analysis
Virtual Reality VOCABULARY LIST
(1) One of the most exciting new areas of computer research is virtual
reality. Having been featured in TV sitcoms as well as public televi-
sion documentaries, virtual reality is merely an ambitious new style
of computer interface. Virtual reality creates the illusion of being in
an artificial world one created by computers.
(2) Virtual reality visitors strap on a set of eyephones, 3-D goggles
Prereading Discussion that are really individual computer screens for the eyes. Sli p-
ping on the rest of the gear allows you not only to see and hear,
1. What developments in computer technology have changed the way but also to sense your voyage. The world of virtual reality has
people live and work? been called cyberspace, a computer-enhanced fantasy world in
2. How have some home entertainments such as television, video re- which you move around and mani pulate objects to your minds
corders, and video games affected peoples life? content.
3. How will further advances in computer technology continue to (3) When you move your head, magnetic sensors instruct the comput-
change the world? er to refocus your eye phones to your new viewpoint. Sounds
4. It has been said that technology is a double-edged sword. What does surround you, and a fiber-optic glove allows you to mani pulate
that statement mean? what you see. You may seek out strange new worlds, fight monsters
5. What is virtual reality? in computer combat, or strap yourself into the seat of a Star
6. Who can use virtual reality? Wars-type jet and scream through cyberspace, blasting all comers
7. How can virtual reality benefit society? to oblivion (computer oblivion, at least). Or, with your stomach
8. How can virtual reality harm society? appropriately settled, you might even try out the most incredible
9. Which uses of virtual reality appeal to you most? roller coaster ride you will ever take in your life.
88 89
Unit VII. Reading Analysis
Virtual Reality VOCABULARY LIST
(1) One of the most exciting new areas of computer research is virtual
reality. Having been featured in TV sitcoms as well as public televi-
sion documentaries, virtual reality is merely an ambitious new style
of computer interface. Virtual reality creates the illusion of being in
an artificial world one created by computers.
(2) Virtual reality visitors strap on a set of eyephones, 3-D goggles
Prereading Discussion that are really individual computer screens for the eyes. Sli p-
ping on the rest of the gear allows you not only to see and hear,
1. What developments in computer technology have changed the way but also to sense your voyage. The world of virtual reality has
people live and work? been called cyberspace, a computer-enhanced fantasy world in
2. How have some home entertainments such as television, video re- which you move around and mani pulate objects to your minds
corders, and video games affected peoples life? content.
3. How will further advances in computer technology continue to (3) When you move your head, magnetic sensors instruct the comput-
change the world? er to refocus your eye phones to your new viewpoint. Sounds
4. It has been said that technology is a double-edged sword. What does surround you, and a fiber-optic glove allows you to mani pulate
that statement mean? what you see. You may seek out strange new worlds, fight monsters
5. What is virtual reality? in computer combat, or strap yourself into the seat of a Star
6. Who can use virtual reality? Wars-type jet and scream through cyberspace, blasting all comers
7. How can virtual reality benefit society? to oblivion (computer oblivion, at least). Or, with your stomach
8. How can virtual reality harm society? appropriately settled, you might even try out the most incredible
9. Which uses of virtual reality appeal to you most? roller coaster ride you will ever take in your life.
88 89
(4) For the disabled, virtual reality promises a new form of freedom. 3. Plug a terminal directly into the brain via a prepared skull and you can
Consider the wheelchair bound paraplegic child who is suddenly enter cyberspace.
able to use virtual reality gear to take part in games like baseball or 4. Ive got a set of eyephones, 3D goggles, a fiber optic glove and the
basketball. Research funded by the government takes a military point rest of the gear.
of view, investigating the possibility of sending robots into the real 5. There are many word substitutes for invalids, e.g. the handicapped,
conflict while human beings don cyberspace gear to guide them challenged by birth or by accidents, disabled people.
from back in the lab. 6. The bowman took a deep breath, aimed at the target and shot, but
(5) Spectrum Holobyte, a computer games development company, the arrow went astray.
announced its first virtual reality computer game for the home
Virtual reality _________________
during 1991 Christmas season. Imagine yourself suddenly clutching
your handheld laser pistol as a giant bird swoops right at you from Three-dimensional (3D) _________________
the age of dinosaurs! Your laser shot goes astray, and you feel Cyberspace _________________
yourself suddenly lifted off the ground and carried higher and higher. Gear _________________
Thats enough - for some of us it can be virtually too real. Disabled _________________
To go astray _________________
90 91
(4) For the disabled, virtual reality promises a new form of freedom. 3. Plug a terminal directly into the brain via a prepared skull and you can
Consider the wheelchair bound paraplegic child who is suddenly enter cyberspace.
able to use virtual reality gear to take part in games like baseball or 4. Ive got a set of eyephones, 3D goggles, a fiber optic glove and the
basketball. Research funded by the government takes a military point rest of the gear.
of view, investigating the possibility of sending robots into the real 5. There are many word substitutes for invalids, e.g. the handicapped,
conflict while human beings don cyberspace gear to guide them challenged by birth or by accidents, disabled people.
from back in the lab. 6. The bowman took a deep breath, aimed at the target and shot, but
(5) Spectrum Holobyte, a computer games development company, the arrow went astray.
announced its first virtual reality computer game for the home
Virtual reality _________________
during 1991 Christmas season. Imagine yourself suddenly clutching
your handheld laser pistol as a giant bird swoops right at you from Three-dimensional (3D) _________________
the age of dinosaurs! Your laser shot goes astray, and you feel Cyberspace _________________
yourself suddenly lifted off the ground and carried higher and higher. Gear _________________
Thats enough - for some of us it can be virtually too real. Disabled _________________
To go astray _________________
90 91
4. Virtual reality lets you travel to places youve never ...
, do things User Use Implementation Benefit
youve never without ...
the room.
5. Some day, you will .
.. that virtual reality makes other forms of NASA recreating flight simulation; risk-free,
entertainment, such as TV and movies, obsolete. different battle simulation inexpensive
worlds military
IV. Guess the meaning of the italicized words: training
1. Virtual reality straddles the foggy boundary between fantasy and
Urban
fact.
planners
2. Imagine a place and youll be able to step into it. Conjure up a dream
and youll be able to fly through it. Architects early problem
3. Hes launched one of the first computers to mass-produce virtual solving
reality systems.
4. Virtual reality techniques have been used to make a 3D model of the Medicine turning a CAT
planet Mars. There are, of course, more down-to-earth applica- scan into 3D
tions. Virtual reality models of urban landscapes are allowing urban model of the
planners to redesign Main Street without leaving the room. patients body
5. Were now reaching a point where the simulations are so realistic
that the line between playing a game or a simulation and actually Disabled
blowing people up is becoming blurred.
VII. Translate into English:
V. Construct other sentences in these patterns:
1. Âèðòóàëüíàÿ ðåàëüíîñòü ýòî èíòåðàêòèâíàÿ, ìóëüòèñåíñîð-
1. Virtual reality has been featured in TV sitcoms as well as public íàÿ ñðåäà, ñìîäåëèðîâàííàÿ êîìïüþòåðîì.
television documentaries. 2. Äëÿ ÷åëîâå÷åñêîé ðàñû âèðòóàëüíàÿ ðåàëüíîñòü ñòàíåò ïîâî-
2. Sli pping on the rest of the gear allows you to sense your voyage. ðîòíîé âåõîé.
3. For the disabled, virtual reality promises a new form of freedom. 3. Âèðòóàëüíàÿ ðåàëüíîñòü ïðèíåñåò ÷åëîâå÷åñòâó áîëüøå âðåäà,
4. Eyephones are not the only virtual reality gear. ÷åì ïîëüçû.
5. You can not only see or hear in virtual reality, but also feel and 4. Íàèëó÷øåå ïðèìåíåíèå âèðòóàëüíàÿ ðåàëüíîñòü íàéäåò â âî-
smell
åííîé è ìåäèöèíñêîé òåõíèêå.
6. Virtual reality lets you travel to places you have never visited. 5. Âèðòóàëüíàÿ ðåàëüíîñòü äàåò øàíñ ïîëíîöåííîãî ðàçâèòèÿ
7. In the future, people will be able to have easy access to virtual èíâàëèäàì.
reality systems. 6. ×åëîâåê ñîçäàë êîìïüþòåð, êîìïüþòåð ñîçäàë âèðòóàëüíóþ
8. If virtual reality technology were more affordable at present time, ðåàëüíîñòü.
many more people would be able to try it. 7. Ñ äàëüíåéøèì ñîâåðøåíñòâîâàíèåì òåõíèêè âèðòóàëüíàÿ ðå-
9. Virtual reality makes other forms of entertainment such as TV and àëüíîñòü ñòàíåò îäíèì èç íàèáîëåå ïîïóëÿðíûõ ñïîñîáîâ ïó-
òåøåñòâèÿ.
movies obsolete.
8. Èñêóññòâî ñî âðåìåíåì ñòàíåò íåíóæíûì, òàê êàê åãî çàìåíèò
VI. Fill in the chart with the appropriate info: âèðòóàëüíàÿ ðåàëüíîñòü.
9. Êîãäà-íèáóäü âèðòóàëüíàÿ ðåàëüíîñòü ñäåëàåò äðóãèå ôîðìû
Who uses virtual reality? ðàçâëå÷åíèÿ, òàêèå êàê òåëåâèäåíèå è êèíî, óñòàðåâøèìè.
92 93
4. Virtual reality lets you travel to places youve never ...
, do things User Use Implementation Benefit
youve never without ...
the room.
5. Some day, you will .
.. that virtual reality makes other forms of NASA recreating flight simulation; risk-free,
entertainment, such as TV and movies, obsolete. different battle simulation inexpensive
worlds military
IV. Guess the meaning of the italicized words: training
1. Virtual reality straddles the foggy boundary between fantasy and
Urban
fact.
planners
2. Imagine a place and youll be able to step into it. Conjure up a dream
and youll be able to fly through it. Architects early problem
3. Hes launched one of the first computers to mass-produce virtual solving
reality systems.
4. Virtual reality techniques have been used to make a 3D model of the Medicine turning a CAT
planet Mars. There are, of course, more down-to-earth applica- scan into 3D
tions. Virtual reality models of urban landscapes are allowing urban model of the
planners to redesign Main Street without leaving the room. patients body
5. Were now reaching a point where the simulations are so realistic
that the line between playing a game or a simulation and actually Disabled
blowing people up is becoming blurred.
VII. Translate into English:
V. Construct other sentences in these patterns:
1. Âèðòóàëüíàÿ ðåàëüíîñòü ýòî èíòåðàêòèâíàÿ, ìóëüòèñåíñîð-
1. Virtual reality has been featured in TV sitcoms as well as public íàÿ ñðåäà, ñìîäåëèðîâàííàÿ êîìïüþòåðîì.
television documentaries. 2. Äëÿ ÷åëîâå÷åñêîé ðàñû âèðòóàëüíàÿ ðåàëüíîñòü ñòàíåò ïîâî-
2. Sli pping on the rest of the gear allows you to sense your voyage. ðîòíîé âåõîé.
3. For the disabled, virtual reality promises a new form of freedom. 3. Âèðòóàëüíàÿ ðåàëüíîñòü ïðèíåñåò ÷åëîâå÷åñòâó áîëüøå âðåäà,
4. Eyephones are not the only virtual reality gear. ÷åì ïîëüçû.
5. You can not only see or hear in virtual reality, but also feel and 4. Íàèëó÷øåå ïðèìåíåíèå âèðòóàëüíàÿ ðåàëüíîñòü íàéäåò â âî-
smell
åííîé è ìåäèöèíñêîé òåõíèêå.
6. Virtual reality lets you travel to places you have never visited. 5. Âèðòóàëüíàÿ ðåàëüíîñòü äàåò øàíñ ïîëíîöåííîãî ðàçâèòèÿ
7. In the future, people will be able to have easy access to virtual èíâàëèäàì.
reality systems. 6. ×åëîâåê ñîçäàë êîìïüþòåð, êîìïüþòåð ñîçäàë âèðòóàëüíóþ
8. If virtual reality technology were more affordable at present time, ðåàëüíîñòü.
many more people would be able to try it. 7. Ñ äàëüíåéøèì ñîâåðøåíñòâîâàíèåì òåõíèêè âèðòóàëüíàÿ ðå-
9. Virtual reality makes other forms of entertainment such as TV and àëüíîñòü ñòàíåò îäíèì èç íàèáîëåå ïîïóëÿðíûõ ñïîñîáîâ ïó-
òåøåñòâèÿ.
movies obsolete.
8. Èñêóññòâî ñî âðåìåíåì ñòàíåò íåíóæíûì, òàê êàê åãî çàìåíèò
VI. Fill in the chart with the appropriate info: âèðòóàëüíàÿ ðåàëüíîñòü.
9. Êîãäà-íèáóäü âèðòóàëüíàÿ ðåàëüíîñòü ñäåëàåò äðóãèå ôîðìû
Who uses virtual reality? ðàçâëå÷åíèÿ, òàêèå êàê òåëåâèäåíèå è êèíî, óñòàðåâøèìè.
92 93
10. Òåðìèí êèáåðïðîñòðàíñòâî áûë ïðèäóìàí ïèñàòåëåì-ôàíòàñ- algorithms we have are huge and approximate. And its still not possible to
òîì Â. Ãèáñîíîì äëÿ îïèñàíèÿ áåçðàçìåðíîãî âèðòóàëüíîãî show such a movie in real time.
ïðîñòðàíñòâà ýëåêòðîííîé ñðåäû. If wed like just to imitate the movements of molecules, which are easy
to be programmed, and this way to model the reality, again, we have
a great wall to be stepped over. Our knowledge of micro world is poor and
Topics for Essays, even though Einstein himself worked at the Uniform Field Theory, it is still
uncompleted. On the other hand, the molecules are so many that program-
Oral or Written Reports ming a single cell, let alone even an insect, is the work of life for hundreds
of programmers. Nobody can imagine the difficulty of virtualization of
1. Virtual reality, a reality? a human being. To model the universe we should create another one.
2. Is it possible to create a perfect virtual reality? There are tasks to be solved before we can create 99% acceptable
3. Computers take you on mind tri ps. Where would you like to go on virtual reality: e.g. the speed of processing, fractal algorithms for render-
a mind tri p? ing, quark mechanics and so on. But has anybody thought of connecting
4. Virtual reality as the way of exploring the world. a computer to humans brain and clipping the images you and your ances-
5. The perspectives of the virtual reality development. tors have seen to present for someone else, or maybe using the calculating
and data processing capabilities of the cortex? By the way, the process of
seeing, hearing, smelling, and feeling the world is just a bunch of electric
Essay Selection for Reading signals entering the brain. May be, the answer is here, and the distance is
not the unaccomplished technical achievements, but ideas, strategic deci-
as a Stimulus for Writing sions, some crazy projects like the Head Of Professor Dowel. Will there be
the final step to create perfect virtual reality? Lets see.
Human beings have always been seeking for a better place to live,
better food to eat, better people to meet. The wise have concluded that
theres no perfection itself. Humans brain identifies reality by its imper-
fection. And thus, the attempts to create ideal world turned to creating the
world alike reality virtual reality.
On the first stage, when technology wasnt so developed, virtual reality
models just presented the essence of the current processes. But along with
the development of technology and science a real world model is quite
similar to our life. Its still something alike, a copy but not perfect. Copying
itself isnt an example to follow, but this way we may explore the universe
more carefully. So what are the problems of creating perfect virtual reality
cyberspace where you cant say whether its cyberspace or not?
One of the difficulties is that it doesnt look like reality. We cant
present the needed number of colors, the full palette our eye can catch. We
cant introduce shades that really look like shades because the rendering
94 95
10. Òåðìèí êèáåðïðîñòðàíñòâî áûë ïðèäóìàí ïèñàòåëåì-ôàíòàñ- algorithms we have are huge and approximate. And its still not possible to
òîì Â. Ãèáñîíîì äëÿ îïèñàíèÿ áåçðàçìåðíîãî âèðòóàëüíîãî show such a movie in real time.
ïðîñòðàíñòâà ýëåêòðîííîé ñðåäû. If wed like just to imitate the movements of molecules, which are easy
to be programmed, and this way to model the reality, again, we have
a great wall to be stepped over. Our knowledge of micro world is poor and
Topics for Essays, even though Einstein himself worked at the Uniform Field Theory, it is still
uncompleted. On the other hand, the molecules are so many that program-
Oral or Written Reports ming a single cell, let alone even an insect, is the work of life for hundreds
of programmers. Nobody can imagine the difficulty of virtualization of
1. Virtual reality, a reality? a human being. To model the universe we should create another one.
2. Is it possible to create a perfect virtual reality? There are tasks to be solved before we can create 99% acceptable
3. Computers take you on mind tri ps. Where would you like to go on virtual reality: e.g. the speed of processing, fractal algorithms for render-
a mind tri p? ing, quark mechanics and so on. But has anybody thought of connecting
4. Virtual reality as the way of exploring the world. a computer to humans brain and clipping the images you and your ances-
5. The perspectives of the virtual reality development. tors have seen to present for someone else, or maybe using the calculating
and data processing capabilities of the cortex? By the way, the process of
seeing, hearing, smelling, and feeling the world is just a bunch of electric
Essay Selection for Reading signals entering the brain. May be, the answer is here, and the distance is
not the unaccomplished technical achievements, but ideas, strategic deci-
as a Stimulus for Writing sions, some crazy projects like the Head Of Professor Dowel. Will there be
the final step to create perfect virtual reality? Lets see.
Human beings have always been seeking for a better place to live,
better food to eat, better people to meet. The wise have concluded that
theres no perfection itself. Humans brain identifies reality by its imper-
fection. And thus, the attempts to create ideal world turned to creating the
world alike reality virtual reality.
On the first stage, when technology wasnt so developed, virtual reality
models just presented the essence of the current processes. But along with
the development of technology and science a real world model is quite
similar to our life. Its still something alike, a copy but not perfect. Copying
itself isnt an example to follow, but this way we may explore the universe
more carefully. So what are the problems of creating perfect virtual reality
cyberspace where you cant say whether its cyberspace or not?
One of the difficulties is that it doesnt look like reality. We cant
present the needed number of colors, the full palette our eye can catch. We
cant introduce shades that really look like shades because the rendering
94 95
Unit VIII. Verbs: to mature, to approach, to roam, to browse, to surf, to
reveal, to obscure, to hinder, to enhance.
IT Revolution Adjectives: crucial, instant, dismissive, entrepreneurial, volumi-
nous, incredible.
Word combinations: back and forth, file transfer protocol (ftp), to
filter out, to make sense, stress relievers, invasion of privacy.
96 97
Unit VIII. Verbs: to mature, to approach, to roam, to browse, to surf, to
reveal, to obscure, to hinder, to enhance.
IT Revolution Adjectives: crucial, instant, dismissive, entrepreneurial, volumi-
nous, incredible.
Word combinations: back and forth, file transfer protocol (ftp), to
filter out, to make sense, stress relievers, invasion of privacy.
96 97
net: netters, e-surfers, internet surfers, netizens, spiders, geeks... T
he their PCs to edit documents not a good use of their time when
Internet has its own prerogatives: for example, the dismissive term they could be dreaming up creative applications. It is time to eval-
lurker for the person who hangs around the net, reading what is uate anew the role of science and technology in the affairs of the
there but not contributing anything. The term flaming refers to the human species.
public humiliation of another netter as punishment for a real or (8) So, if you are riding on the information highway, you should take
imagined transgression against net culture. steps to cope with information overload. The gift of boundless in-
(5) Large-scale use of computer-to-computer transfer of information formation is causing a new kind of stress known alternately as tech-
was implemented by the US military in the late 60s and early nostress, information overload or Information Fatigue Syndrome.
70s part of the superpower competition of the cold war and the Some experts say that we dont get anywhere near the data it takes
arms race. The US military created an electronic network (Arpa- to overload our neurons. According to some estimates, our mind
net) to use computers for handling the transfer of large amounts is capable of processing and analyzing many gigabytes of data per
of sensitive data over long distances at incredible speed. Computer- second a lot more data than any of todays supercomputers can
to-computer virtual connections, using satellites and fiber optics, process and act on in real time. We feel overloaded by the quantity
have distinct advantages over telephone or radio communications of information because we are getting it unfiltered. We should filter
in the event of a nuclear attack. Mathematicians and scientists (and out the junk and turn data into shapes that make sense to us. Stress
their universities) have been linked and electronically exchanging in moderation is good: it drives us to achieve, stimulates our cre-
information over the Internet since the mid-70s. ativity and is the force behind social and technological breakthroughs.
(6) Now the Internet has become commercialized with private and Stress is revealing how humans are in some ways more primitive
than the technology they have created. Meditation, muscular re-
public companies offering access to it. (CompuServe is the best-
laxation, aerobics, jogging, yoga can be effective stress relievers,
known international commercial electronic access provider). The
but no technique is universal: experiment and find the one that
Internet is being expanded and improved so that every home,
best works for you.
every school, every institution can be linked to share data, infor-
(9) The cornerstone of an economy are land, labor, capital and entre-
mation, music, video and other resources. If you have a computer
preneurial spirit. That traditional definition is now being challenged.
or a computer terminal, some kind of connection (probably, mo-
Today you find a fifth key economic element: information domi-
dem and telephone line) to the Internet, and some kind of Inter- nant. As we evolve from an industrial to an information society,
net service provider, you can partici pate in electronic communi- our jobs are changing from physical to mental labor. Just as people
cation and become a citizen of the global village. moved physically from farms to factories in the Industrial age, so
(7) Information technology is a good vehicle for the argument. Some today people are shifting muscle power to brain power in a new,
scientists remind us that voluminous information does not neces- computer-based, globally linked by the Internet society.
sarily lead to sound thinking. There are many genuine dangers that
computers bring to modern society: efficient invasion of privacy,
overreliance on polling in politics, even abdication of control over EXERCISES
military decision-making. Data glut obscures basic questions of jus-
tice and purpose and may even hinder rather than enhance our I. How much has technology changed in just the last 20 years?
productivity. Edutainment software and computer games degrade
the literacy of children. On the other hand, only a few use PCs on II. If you were to bury a time capsule to be opened in 2100 what would
network to share information and ideas. In most cases IT is used to you put into it?
speed routine tasks, to automate manual processes rather than to
change work patterns and business practices. Most managers use III. Explain the buzzwords in the text.
98 99
net: netters, e-surfers, internet surfers, netizens, spiders, geeks... T
he their PCs to edit documents not a good use of their time when
Internet has its own prerogatives: for example, the dismissive term they could be dreaming up creative applications. It is time to eval-
lurker for the person who hangs around the net, reading what is uate anew the role of science and technology in the affairs of the
there but not contributing anything. The term flaming refers to the human species.
public humiliation of another netter as punishment for a real or (8) So, if you are riding on the information highway, you should take
imagined transgression against net culture. steps to cope with information overload. The gift of boundless in-
(5) Large-scale use of computer-to-computer transfer of information formation is causing a new kind of stress known alternately as tech-
was implemented by the US military in the late 60s and early nostress, information overload or Information Fatigue Syndrome.
70s part of the superpower competition of the cold war and the Some experts say that we dont get anywhere near the data it takes
arms race. The US military created an electronic network (Arpa- to overload our neurons. According to some estimates, our mind
net) to use computers for handling the transfer of large amounts is capable of processing and analyzing many gigabytes of data per
of sensitive data over long distances at incredible speed. Computer- second a lot more data than any of todays supercomputers can
to-computer virtual connections, using satellites and fiber optics, process and act on in real time. We feel overloaded by the quantity
have distinct advantages over telephone or radio communications of information because we are getting it unfiltered. We should filter
in the event of a nuclear attack. Mathematicians and scientists (and out the junk and turn data into shapes that make sense to us. Stress
their universities) have been linked and electronically exchanging in moderation is good: it drives us to achieve, stimulates our cre-
information over the Internet since the mid-70s. ativity and is the force behind social and technological breakthroughs.
(6) Now the Internet has become commercialized with private and Stress is revealing how humans are in some ways more primitive
than the technology they have created. Meditation, muscular re-
public companies offering access to it. (CompuServe is the best-
laxation, aerobics, jogging, yoga can be effective stress relievers,
known international commercial electronic access provider). The
but no technique is universal: experiment and find the one that
Internet is being expanded and improved so that every home,
best works for you.
every school, every institution can be linked to share data, infor-
(9) The cornerstone of an economy are land, labor, capital and entre-
mation, music, video and other resources. If you have a computer
preneurial spirit. That traditional definition is now being challenged.
or a computer terminal, some kind of connection (probably, mo-
Today you find a fifth key economic element: information domi-
dem and telephone line) to the Internet, and some kind of Inter- nant. As we evolve from an industrial to an information society,
net service provider, you can partici pate in electronic communi- our jobs are changing from physical to mental labor. Just as people
cation and become a citizen of the global village. moved physically from farms to factories in the Industrial age, so
(7) Information technology is a good vehicle for the argument. Some today people are shifting muscle power to brain power in a new,
scientists remind us that voluminous information does not neces- computer-based, globally linked by the Internet society.
sarily lead to sound thinking. There are many genuine dangers that
computers bring to modern society: efficient invasion of privacy,
overreliance on polling in politics, even abdication of control over EXERCISES
military decision-making. Data glut obscures basic questions of jus-
tice and purpose and may even hinder rather than enhance our I. How much has technology changed in just the last 20 years?
productivity. Edutainment software and computer games degrade
the literacy of children. On the other hand, only a few use PCs on II. If you were to bury a time capsule to be opened in 2100 what would
network to share information and ideas. In most cases IT is used to you put into it?
speed routine tasks, to automate manual processes rather than to
change work patterns and business practices. Most managers use III. Explain the buzzwords in the text.
98 99
IV. Define the following terms: 7. ... brings together different types of visual devices: texts, pictures,
sounds, animations, speech.
e.g. Buffer an area of storage used to temporarily hold data being 8. Each person handles ...
differently.
transferred from one device to another. 9. Good .
.. on the Net tends to be clear, vigorous, witty and above all
e-mail, byte, browser, zoom, bug, cursor, buffer, download, gateway, brief: short paragraphs, bulleted lists, one-liners the units of
drive, router, hypertext, protocol, graphics, modem, freenet. thought.
VI. What do these acronyms stand for: (1) E-mail is the simplest and most immediate function of the Internet
for many people. Run through a list of questions that new e-mail
CAD, CAM, ROM, RAM, CDI, LAN, Y2K, ALGOL, BASIC, CO- users ask most and some snappy answers to them.
BOL, FORTRAN. (2) What is electronic mail? Electronic mail, or e-mail as its normally
shortened to, is just a message that is composed, sent and read
VII. Translate some computer terms: electronically (hence the name). With regular mail you write out
Simple terms: anchor, wizard, versioning, relink, cipher, containment. your message (letter, postcard, whatever) and drop it off at the
Compounds: clipboard, multithreaded, client-pull, design-time, run- post office. The postal service then delivers the message and the
time, polyline, turnkey, bitmapping, bandwidth. reci pient reads it. E-mail operates basically the same-way except
Term collocations: frame-based layout, active template library, active that everything happens electronically. You compose your message
server pages, asynchronous moniker, active data objects, connectable ob- using e-mail software, send it over the lines that connect the In-
ject, frequently asked question, hypertext markup language, hypertext transfer ternets networks and the reci pient uses an e-mail program to read
protocol, integrated development environment, interface definition language, the message.
Internet service provider, object linking and embedding, remote procedure (3) How does e-mail know how to get where its going? Everybody
call, software development kit, uniform data transfer. whos connected to the Internet is assigned a unique e-mail address.
In a way, this address is a lot like the address of your house or
VIII. Put the proper words into sentences: apartment because it tells everyone else your exact location on the
Net. So anyone who wants to send you an e-mail message just tells
multimedia, dominant, spider, netizen, flame, writing, foolproof, tech- the e-mail program the appropriate address and runs the Send
nostress, zoom. command. The Internet takes over from there and makes sure the
1. Please, dont .
.. me if you disagree with this. missive arrives safely.
2. The person who develops a ...
lock for computer data will make (4) Whats this netiquette stuff I keep hearing about? The Net is a huge,
a fortune. unwieldy mass with no powers-that-be that can dictate content
3. ... a person or computer program that searches the web for new links or standards. This is, for the most part, a good thing because it
and link them to search engines. means theres no censorshi p and no one can wield authority arbi-
4. ... spends an excessive amount of time on the Internet. trarily. To prevent this organized chaos from descending into mere
5. Windows and Unix operating systems are going to be on the desk- anarchy, however, a set of guidelines has been put together over
tops and on servers in .
.. numbers (B. Gates). the years. These guidelines are known collectively as netiquette (net-
6. Hit a video button and ...
for a closer look. work etiquette) and they offer suggestions on the correct way to
100 101
IV. Define the following terms: 7. ... brings together different types of visual devices: texts, pictures,
sounds, animations, speech.
e.g. Buffer an area of storage used to temporarily hold data being 8. Each person handles ...
differently.
transferred from one device to another. 9. Good .
.. on the Net tends to be clear, vigorous, witty and above all
e-mail, byte, browser, zoom, bug, cursor, buffer, download, gateway, brief: short paragraphs, bulleted lists, one-liners the units of
drive, router, hypertext, protocol, graphics, modem, freenet. thought.
VI. What do these acronyms stand for: (1) E-mail is the simplest and most immediate function of the Internet
for many people. Run through a list of questions that new e-mail
CAD, CAM, ROM, RAM, CDI, LAN, Y2K, ALGOL, BASIC, CO- users ask most and some snappy answers to them.
BOL, FORTRAN. (2) What is electronic mail? Electronic mail, or e-mail as its normally
shortened to, is just a message that is composed, sent and read
VII. Translate some computer terms: electronically (hence the name). With regular mail you write out
Simple terms: anchor, wizard, versioning, relink, cipher, containment. your message (letter, postcard, whatever) and drop it off at the
Compounds: clipboard, multithreaded, client-pull, design-time, run- post office. The postal service then delivers the message and the
time, polyline, turnkey, bitmapping, bandwidth. reci pient reads it. E-mail operates basically the same-way except
Term collocations: frame-based layout, active template library, active that everything happens electronically. You compose your message
server pages, asynchronous moniker, active data objects, connectable ob- using e-mail software, send it over the lines that connect the In-
ject, frequently asked question, hypertext markup language, hypertext transfer ternets networks and the reci pient uses an e-mail program to read
protocol, integrated development environment, interface definition language, the message.
Internet service provider, object linking and embedding, remote procedure (3) How does e-mail know how to get where its going? Everybody
call, software development kit, uniform data transfer. whos connected to the Internet is assigned a unique e-mail address.
In a way, this address is a lot like the address of your house or
VIII. Put the proper words into sentences: apartment because it tells everyone else your exact location on the
Net. So anyone who wants to send you an e-mail message just tells
multimedia, dominant, spider, netizen, flame, writing, foolproof, tech- the e-mail program the appropriate address and runs the Send
nostress, zoom. command. The Internet takes over from there and makes sure the
1. Please, dont .
.. me if you disagree with this. missive arrives safely.
2. The person who develops a ...
lock for computer data will make (4) Whats this netiquette stuff I keep hearing about? The Net is a huge,
a fortune. unwieldy mass with no powers-that-be that can dictate content
3. ... a person or computer program that searches the web for new links or standards. This is, for the most part, a good thing because it
and link them to search engines. means theres no censorshi p and no one can wield authority arbi-
4. ... spends an excessive amount of time on the Internet. trarily. To prevent this organized chaos from descending into mere
5. Windows and Unix operating systems are going to be on the desk- anarchy, however, a set of guidelines has been put together over
tops and on servers in .
.. numbers (B. Gates). the years. These guidelines are known collectively as netiquette (net-
6. Hit a video button and ...
for a closer look. work etiquette) and they offer suggestions on the correct way to
100 101
interact with the Internets denizens. To give you a taste of neti- 3. Find at least 5 examples of a very colloquial and chatty style used in
quette, here are some highlights to consider. the text. Why are they used?
4. For which of the following types of writing is it necessary to be
• Keep your message brief and to the point and make sure you
brief?
clear up any spelling sli ps or grammatical gaffes before shi p-
ping it out. Instructions, love letters, news reports, business proposals, faxes, ad-
• Make sure the Subject lines of your message are detailed enough verts, insurance claims, curriculum vitae, short stories, scientific reports,
so they explain what your message is all about. e-mail, poems.
• Dont SHOUT by writing your missives entirely in upper-
5. Write a summary of the text. Include only the information, ignore
case letters.
any extra remarks. Write in a neutral rather than an informal style.
• Dont bother other people by sending them test messages. If
you must test a program, send a message to yourself. II. E-mailers also keep their message brief by abbreviating frequently
(5) Whats a flame? The vast majority of e-mail correspondence is civil used phrases. Complete these common phrases:
and courteous, but with millions of partici pants all over the world,
AAMOF as a m... of f...
its inevitable that some folks will rub each other the wrong way.
AFAIK as f
... as I k...
When this happens, the combatants may exchange emotionally
FYI for your i
...
charged, caustic, often obscene messages called flames. When
FYA f...
y...
am...
enough of these messages exchange hands, an out-and-out flame
IMO in my o...
war develops. These usually burn themselves out after a while, and
IOW in o...
words
then the partici pants can get back to more interesting things.
NRN not r...
necessary
(6) Is e-mail secure? In a word, no. The Nets open architecture allows
TTYL talk to y...
l
...
programmers to write interesting and useful new Internet services,
FAQ f
... a...
question(s)
but it also allows unscrupulous snoops to lurk where they dont
BTW by t
... w...
belong. In particular, the e-mail system has two problems: its not
LOL la...
o...
loud
that hard for someone else to read your e-mail, and its fairly easy
KHYF k...
ho...
y...
fe...
to forge an e-mail address. If security is a must for you, then youll
IMHO in my h...
o...
want to create an industrial strength password for your home di-
WYSIWYG what y...
see is w...
y...
g...
rectory, use encryption for your most sensitive messages, and use
RTFM read the f...
m...
an anonymous remailer when you want to send something incog-
nito. III. E-mail messages usually have the following format:
To: (Name and e-mail address of reci pient)
EXERCISES From: (Name and e-mail address of sender)
Subject: (Identification of main point of message)
I. Answer the questions: Here is an example of an e-mail address:
1. What major problems are there with the e-mail? Are they opinions smith@cup.ac.uk
or facts? Would it be a problem for you? Note that the symbol @ in e-mail address is read at and that the
2. What do you think is the reason for the various bits of netiquette full stops are read as dot. Thus the example address would be read as
which are mentioned? Smith at C U P dot A C dot U K.
102 103
interact with the Internets denizens. To give you a taste of neti- 3. Find at least 5 examples of a very colloquial and chatty style used in
quette, here are some highlights to consider. the text. Why are they used?
4. For which of the following types of writing is it necessary to be
• Keep your message brief and to the point and make sure you
brief?
clear up any spelling sli ps or grammatical gaffes before shi p-
ping it out. Instructions, love letters, news reports, business proposals, faxes, ad-
• Make sure the Subject lines of your message are detailed enough verts, insurance claims, curriculum vitae, short stories, scientific reports,
so they explain what your message is all about. e-mail, poems.
• Dont SHOUT by writing your missives entirely in upper-
5. Write a summary of the text. Include only the information, ignore
case letters.
any extra remarks. Write in a neutral rather than an informal style.
• Dont bother other people by sending them test messages. If
you must test a program, send a message to yourself. II. E-mailers also keep their message brief by abbreviating frequently
(5) Whats a flame? The vast majority of e-mail correspondence is civil used phrases. Complete these common phrases:
and courteous, but with millions of partici pants all over the world,
AAMOF as a m... of f...
its inevitable that some folks will rub each other the wrong way.
AFAIK as f
... as I k...
When this happens, the combatants may exchange emotionally
FYI for your i
...
charged, caustic, often obscene messages called flames. When
FYA f...
y...
am...
enough of these messages exchange hands, an out-and-out flame
IMO in my o...
war develops. These usually burn themselves out after a while, and
IOW in o...
words
then the partici pants can get back to more interesting things.
NRN not r...
necessary
(6) Is e-mail secure? In a word, no. The Nets open architecture allows
TTYL talk to y...
l
...
programmers to write interesting and useful new Internet services,
FAQ f
... a...
question(s)
but it also allows unscrupulous snoops to lurk where they dont
BTW by t
... w...
belong. In particular, the e-mail system has two problems: its not
LOL la...
o...
loud
that hard for someone else to read your e-mail, and its fairly easy
KHYF k...
ho...
y...
fe...
to forge an e-mail address. If security is a must for you, then youll
IMHO in my h...
o...
want to create an industrial strength password for your home di-
WYSIWYG what y...
see is w...
y...
g...
rectory, use encryption for your most sensitive messages, and use
RTFM read the f...
m...
an anonymous remailer when you want to send something incog-
nito. III. E-mail messages usually have the following format:
To: (Name and e-mail address of reci pient)
EXERCISES From: (Name and e-mail address of sender)
Subject: (Identification of main point of message)
I. Answer the questions: Here is an example of an e-mail address:
1. What major problems are there with the e-mail? Are they opinions smith@cup.ac.uk
or facts? Would it be a problem for you? Note that the symbol @ in e-mail address is read at and that the
2. What do you think is the reason for the various bits of netiquette full stops are read as dot. Thus the example address would be read as
which are mentioned? Smith at C U P dot A C dot U K.
102 103
The ac.uk in the example address tells you that the address is based 3. How can we balance the use of technology and real-life conversa-
at a university in the United Kingdom. tion?
Do you know anyone with an e-mail address? If so, dictate it to
other students in the class. If not, then your teacher will give you VII. Write an e-mail message to your friend (on paper). Use an appro-
some addresses for dictation. priate format and a chatty style. Try to use at least one smiley and
some abbreviations.
IV. E-mailers make use of symbols called smileys (or emoticons) which
can be written using standard letters and signs.
VIII. Translate into English:
:-) Your basic smiley. This is used to mean Im happy.
;-) Winking smiley. Im flirting or being ironic.
I. ÑËÎÂÀÐÈÊ ÞÍÎÃÎ ÈÍÒÅÐÍÅÒ×ÈÊÀ.
;-( Frowning smiley. I did not like something. ÒÎ×ÊÀ, ÒÎ×ÊÀ, ÇÀÏßÒÀß
:-| Im indifferent. ÂÎÒ È ÐÎÆÈÖÀ ÊÐÈÂÀß
8-) I wear glasses. Èñòîðèÿ ïîÿâëåíèÿ â Èíòåðíåòå çàáàâíûõ ðîæèö, ñîñòàâëåí-
:-{) I have a moustache. íûõ èç òî÷å÷åê, ñêîáî÷åê è çàïÿòûõ, âïîëíå îáúÿñíèìà. Âñåì õî-
:-~) I have a cold. ðîøè ýëåêòðîííûå ïèñüìà è ñîñòàâëÿòü èõ ëåãêî, è äîõîäÿò äî
C=:^) Head cook, chef-de-cuisine. àäðåñàòà îíè áûñòðî, âîò òîëüêî õðàíÿò îíè ëèøü ñóõèå êîìïüþ-
Q:^) Soldier, man with beret, boy scout. òåðíûå áóêâû, äàæå ïî÷åðê, ïî êîòîðîìó ìîæíî áûëî áû ñóäèòü
*:O) Clown face; Im feeling like a buffoon. îá ýìîöèÿõ ïèøóùåãî ÷åëîâåêà, èñ÷åçàåò. À æàëü. Âîò è ïðèäóìàëè
:^9 Licking the li ps; very tasty or delicious. õèòðîóìíûå êîìïüþòåðíûå ôàíàòû öåëûé ÿçûê, èñïîëüçóþùèé
/\/\/\/\/\/\O:>~ Snake (or to rake someone over the coals) ÷åëîâå÷åñêóþ ìèìèêó. Ðîæèöû, èëè, êàê èõ åùå íàçûâàþò, ñìàé-
ëèêè (îò àíãëèéñêîãî óëûáàþùèéñÿ), êîíñòðóèðóþò èç çíàêîâ ïðå-
V. Match these smileys to their meanings listed below:
ïèíàíèÿ. Òîëüêî ðàçãëÿäûâàòü èõ íàäî ïîä óãëîì 90 ãðàäóñîâ.
%-) (-: |-| :-Q :-@ :-D <:-| (:) [:-) Èòàê:
:( õìóðûé
1. Im a dunce. :-| ñåðüåçíûé
2. Im an egghead. :-) óëûáàþùèéñÿ
3. Im asleep. :-))) ðàäîñòíûé
4. Im laughing. ;-) ïîäìèãèâàþùèé
5. Im left-handed. ;( ïëà÷óùèé
6. Im screaming. ;.(.. ðûäàþùèé
7. Im wearing a Walkman. :^) ñ÷àñòëèâûé
8. Im sticking my tongue out at you. :| ñóðîâûé
9. Ive been staring at this screen for too long. :^( ïå÷àëüíûé
:@) ñ÷àñòëèâûé, êàê ïîðîñåíîê
VI. Discuss:
|-( óñòàëûé è íåäîâîëüíûé
1. Do faxes, electronic mail and papers offer an escape from human 8) áîëüøèå ãëàçà
interaction? |-0 ñîííûé (çåâàþùèé)
2. Could all these topography symbols such as e-smiles supplant the 8O âîïÿùèé
more emotive ingredients of two-way communication? |-| ñïÿùèé
104 105
The ac.uk in the example address tells you that the address is based 3. How can we balance the use of technology and real-life conversa-
at a university in the United Kingdom. tion?
Do you know anyone with an e-mail address? If so, dictate it to
other students in the class. If not, then your teacher will give you VII. Write an e-mail message to your friend (on paper). Use an appro-
some addresses for dictation. priate format and a chatty style. Try to use at least one smiley and
some abbreviations.
IV. E-mailers make use of symbols called smileys (or emoticons) which
can be written using standard letters and signs.
VIII. Translate into English:
:-) Your basic smiley. This is used to mean Im happy.
;-) Winking smiley. Im flirting or being ironic.
I. ÑËÎÂÀÐÈÊ ÞÍÎÃÎ ÈÍÒÅÐÍÅÒ×ÈÊÀ.
;-( Frowning smiley. I did not like something. ÒÎ×ÊÀ, ÒÎ×ÊÀ, ÇÀÏßÒÀß
:-| Im indifferent. ÂÎÒ È ÐÎÆÈÖÀ ÊÐÈÂÀß
8-) I wear glasses. Èñòîðèÿ ïîÿâëåíèÿ â Èíòåðíåòå çàáàâíûõ ðîæèö, ñîñòàâëåí-
:-{) I have a moustache. íûõ èç òî÷å÷åê, ñêîáî÷åê è çàïÿòûõ, âïîëíå îáúÿñíèìà. Âñåì õî-
:-~) I have a cold. ðîøè ýëåêòðîííûå ïèñüìà è ñîñòàâëÿòü èõ ëåãêî, è äîõîäÿò äî
C=:^) Head cook, chef-de-cuisine. àäðåñàòà îíè áûñòðî, âîò òîëüêî õðàíÿò îíè ëèøü ñóõèå êîìïüþ-
Q:^) Soldier, man with beret, boy scout. òåðíûå áóêâû, äàæå ïî÷åðê, ïî êîòîðîìó ìîæíî áûëî áû ñóäèòü
*:O) Clown face; Im feeling like a buffoon. îá ýìîöèÿõ ïèøóùåãî ÷åëîâåêà, èñ÷åçàåò. À æàëü. Âîò è ïðèäóìàëè
:^9 Licking the li ps; very tasty or delicious. õèòðîóìíûå êîìïüþòåðíûå ôàíàòû öåëûé ÿçûê, èñïîëüçóþùèé
/\/\/\/\/\/\O:>~ Snake (or to rake someone over the coals) ÷åëîâå÷åñêóþ ìèìèêó. Ðîæèöû, èëè, êàê èõ åùå íàçûâàþò, ñìàé-
ëèêè (îò àíãëèéñêîãî óëûáàþùèéñÿ), êîíñòðóèðóþò èç çíàêîâ ïðå-
V. Match these smileys to their meanings listed below:
ïèíàíèÿ. Òîëüêî ðàçãëÿäûâàòü èõ íàäî ïîä óãëîì 90 ãðàäóñîâ.
%-) (-: |-| :-Q :-@ :-D <:-| (:) [:-) Èòàê:
:( õìóðûé
1. Im a dunce. :-| ñåðüåçíûé
2. Im an egghead. :-) óëûáàþùèéñÿ
3. Im asleep. :-))) ðàäîñòíûé
4. Im laughing. ;-) ïîäìèãèâàþùèé
5. Im left-handed. ;( ïëà÷óùèé
6. Im screaming. ;.(.. ðûäàþùèé
7. Im wearing a Walkman. :^) ñ÷àñòëèâûé
8. Im sticking my tongue out at you. :| ñóðîâûé
9. Ive been staring at this screen for too long. :^( ïå÷àëüíûé
:@) ñ÷àñòëèâûé, êàê ïîðîñåíîê
VI. Discuss:
|-( óñòàëûé è íåäîâîëüíûé
1. Do faxes, electronic mail and papers offer an escape from human 8) áîëüøèå ãëàçà
interaction? |-0 ñîííûé (çåâàþùèé)
2. Could all these topography symbols such as e-smiles supplant the 8O âîïÿùèé
more emotive ingredients of two-way communication? |-| ñïÿùèé
104 105
:-0 îøàðàøåííûé II. WWW
|-Ð îáëèçûâàþùèé
:-D èëè 8-D ñìåþùèéñÿ Âñå íà÷àëîñü ñ òîãî, ÷òî â 1948 ãîäó âûøëè êíèãè Ê. Øåííîíà
8-( çàïóãàííûé «Ìàòåìàòè÷åñêàÿ òåîðèÿ ñâÿçè» è Í. Âèíåðà «Êèáåðíåòèêà, èëè
:-Ð äðàçíèëêà (ñ âûñóíóòûì ÿçûêîì) óïðàâëåíèå è ñâÿçü â æèâîòíîì è ìàøèíå». Îíè è îïðåäåëèëè
8-) óäèâëåííûé (ñ øèðîêî îòêðûòûìè ãëàçàìè) íîâûé âåêòîð ðàçâèòèÿ íàóêè, â ðåçóëüòàòå ÷åãî ïîÿâèëñÿ êîìïü-
:-( ðàññòðîåííûé þòåð: âíà÷àëå ëàìïîâûé ãèãàíò, çàòåì òðàíçèñòîðíûé è íà èí-
8-| ñîñðåäîòî÷åííûé òåãðàëüíûõ ñõåìàõ, íà ìèêðîïðîöåññîðàõ. È âîò â 1981 ãîäó ïî-
:-( ðåâóùèé ÿâèëñÿ ïåðñîíàëüíûé êîìïüþòåð (IBM). Â òîì æå ãîäó âûøëà ïðî-
8-|| ðàññåðæåííûé ãðàììà MS-DOS, à â 1990 Windows-3.0, à äàëåå ïîøëî
:-/ íàñóïëåííûé ñòðåìèòåëüíîå ñîâåðøåíñòâîâàíèå «æåëåçà» è ïðîãðàììíîãî îáåñ-
9-0 èñïóãàííûé ïå÷åíèÿ. Ê êîíöó ñòîëåòèÿ ÷åëîâå÷åñòâî ïîëó÷èëî ïîòðÿñàþùóþ
:-[ ] îøåëîìëåííûé ìèíèàòþðèçàöèþ êîìïüþòåðíîé òåõíèêè, ñîêðàùåíèå «ðàññòîÿ-
:-> ñàðêàñòè÷íûé íèÿ» ìåæäó êîìïüþòåðîì è ÷åëîâåêîì, òîòàëüíîå ïðîíèêíîâå-
:-[ âàìïèð íèå êîìïüþòåðíûõ òåõíîëîãèé â áûòîâóþ ñôåðó. 1986 ãîä ðîæ-
:-Å êëûêàñòûé âàìïèð äåíèå Èíòåðíåòà, ãëîáàëüíîé ñåòè, îõâàòèâøåé ïðàêòè÷åñêè âñå
:-7 êðèâàÿ óëûáêà ñòðàíû ìèðà, ïîñòàâëÿþùåé êàæäîìó ïîëüçîâàòåëþ òåêóùóþ
:-* óãðþìûé èíôîðìàöèþ, îòêðûâàþùåé äîñòóï ê êíèãàì áîëüøèíñòâà êðóï-
:-@ îðóùèé íûõ áèáëèîòåê ìèðà, ïîçâîëÿþùåé êàæäîìó æèòåëþ ïëàíåòû
:-Q êóðÿùèé ïîãîâîðèòü ñ ëþáûì äðóãèì çåìëÿíèíîì. Êðîìå òîãî, Èíòåðíåò
:-? êóðÿùèé òðóáêó îáåñïå÷èâàåò åäèíóþ ôèíàíñîâóþ ñèñòåìó, ïîêóïêè, áûòîâûå
:-S íåïîñëåäîâàòåëüíûé, áåññâÿçíûé óñëóãè, ñëóæáó çíàêîìñòâ...
:-D ãðîìêî õîõî÷óùèé Íåñêîëüêî ñëîâ îá Èíòåðíåòå â Ðîññèè. Â 1990 ãîäó ê ñåòè
:-X ðîò íà çàìêå áûëè ïîäêëþ÷åíû îêîëî òðèäöàòè îðãàíèçàöèé, ãëàâíûì îáðà-
:-Ñ ëîäûðü çîì íàó÷íûõ öåíòðîâ. Íî òîëüêî ÷åðåç ïÿòü ëåò ñîñòîÿëîñü îôèöè-
:- ñïëåâûâàþùèé (òàáàê) àëüíîå ðàñïðîñòðàíåíèå WWW-òåõíîëîãèé.  1998 ãîäó êîëè÷å-
:-9 îáëèçûâàþùèé ãóáû ñòâî ïîëüçîâàòåëåé Èíòåðíåòà äîñòèãëî îäíîãî ìèëëèîíà, à ê 2000
:-$ ðîò ñêðåïëåí ïðîâîëîêîé ãîäó 5,4 ìëí ÷åëîâåê (Ïî ïðîãíîçàì, ê êîíöó 2001 ãîäà èõ
:-% áàíêèð ñòàíåò 7,8 ìëí) ×åòâåðòü ðåãóëÿðíûõ «ïîñåòèòåëåé» Èíòåðíåòà æè-
:-} áîðîäàòûé âóò â Ìîñêâå è Ñàíêò-Ïåòåðáóðãå, äðóãàÿ ÷åòâåðòü â Ñèáèðè è íà
:-{ óñàòûé Äàëüíåì Âîñòîêå, ïðè ýòîì áîëüøå ïîëîâèíû ïîñåòèòåëåé Èíòåð-
:*) ïüÿíûé íåòà ïðîæèâàþò â ãîðîäàõ ÷èñëåííîñòüþ ìåíåå ìèëëèîíà ÷åëîâåê.
:=) ñ ïîõìåëüÿ Êîìïüþòåðèçàöèÿ è Èíòåðíåò ñòîëáîâàÿ äîðîãà çàïàäíîé
%-) ïðîãðàììèñò öèâèëèçàöèè â XXI âåêå. Õîòèì ìû èëè íåò Ðîññèÿ ìíîãî ñòî-
8-) â ñîëíå÷íûõ î÷êàõ ëåòèé òÿãîòååò ê åâðîïåéñêîìó ïóòè ðàçâèòèÿ. Ïîýòîìó è íàøå
.-) îäíîãëàçûé áóäóùåå ñâÿçàíî íå ñ ñûðüåì, íå ñ âîîðóæåíèåì, à èñêëþ÷èòåëü-
g-) â ïåíñíå íî ñ øèðî÷àéøåé êîìïüþòåðèçàöèåé øêîë è âóçîâ, ñ âûõîäîì â
{:-) â ïàðèêå ìèðîâóþ ñåòü Èíòåðíåò, ñ ïîãîëîâíîé êîìïüþòåðíîé ãðàìîòíîñ-
-:-) ïàíê òüþ ìîëîäåæè. Äðóãîãî ïóòè íåò, åñëè ìû íå õîòèì îñòàòüñÿ ñû-
*<:-) Ñàíòà-Êëàóñ. ðüåâûì ïðèäàòêîì çàïàäíîãî ìèðà.
106 107
:-0 îøàðàøåííûé II. WWW
|-Ð îáëèçûâàþùèé
:-D èëè 8-D ñìåþùèéñÿ Âñå íà÷àëîñü ñ òîãî, ÷òî â 1948 ãîäó âûøëè êíèãè Ê. Øåííîíà
8-( çàïóãàííûé «Ìàòåìàòè÷åñêàÿ òåîðèÿ ñâÿçè» è Í. Âèíåðà «Êèáåðíåòèêà, èëè
:-Ð äðàçíèëêà (ñ âûñóíóòûì ÿçûêîì) óïðàâëåíèå è ñâÿçü â æèâîòíîì è ìàøèíå». Îíè è îïðåäåëèëè
8-) óäèâëåííûé (ñ øèðîêî îòêðûòûìè ãëàçàìè) íîâûé âåêòîð ðàçâèòèÿ íàóêè, â ðåçóëüòàòå ÷åãî ïîÿâèëñÿ êîìïü-
:-( ðàññòðîåííûé þòåð: âíà÷àëå ëàìïîâûé ãèãàíò, çàòåì òðàíçèñòîðíûé è íà èí-
8-| ñîñðåäîòî÷åííûé òåãðàëüíûõ ñõåìàõ, íà ìèêðîïðîöåññîðàõ. È âîò â 1981 ãîäó ïî-
:-( ðåâóùèé ÿâèëñÿ ïåðñîíàëüíûé êîìïüþòåð (IBM). Â òîì æå ãîäó âûøëà ïðî-
8-|| ðàññåðæåííûé ãðàììà MS-DOS, à â 1990 Windows-3.0, à äàëåå ïîøëî
:-/ íàñóïëåííûé ñòðåìèòåëüíîå ñîâåðøåíñòâîâàíèå «æåëåçà» è ïðîãðàììíîãî îáåñ-
9-0 èñïóãàííûé ïå÷åíèÿ. Ê êîíöó ñòîëåòèÿ ÷åëîâå÷åñòâî ïîëó÷èëî ïîòðÿñàþùóþ
:-[ ] îøåëîìëåííûé ìèíèàòþðèçàöèþ êîìïüþòåðíîé òåõíèêè, ñîêðàùåíèå «ðàññòîÿ-
:-> ñàðêàñòè÷íûé íèÿ» ìåæäó êîìïüþòåðîì è ÷åëîâåêîì, òîòàëüíîå ïðîíèêíîâå-
:-[ âàìïèð íèå êîìïüþòåðíûõ òåõíîëîãèé â áûòîâóþ ñôåðó. 1986 ãîä ðîæ-
:-Å êëûêàñòûé âàìïèð äåíèå Èíòåðíåòà, ãëîáàëüíîé ñåòè, îõâàòèâøåé ïðàêòè÷åñêè âñå
:-7 êðèâàÿ óëûáêà ñòðàíû ìèðà, ïîñòàâëÿþùåé êàæäîìó ïîëüçîâàòåëþ òåêóùóþ
:-* óãðþìûé èíôîðìàöèþ, îòêðûâàþùåé äîñòóï ê êíèãàì áîëüøèíñòâà êðóï-
:-@ îðóùèé íûõ áèáëèîòåê ìèðà, ïîçâîëÿþùåé êàæäîìó æèòåëþ ïëàíåòû
:-Q êóðÿùèé ïîãîâîðèòü ñ ëþáûì äðóãèì çåìëÿíèíîì. Êðîìå òîãî, Èíòåðíåò
:-? êóðÿùèé òðóáêó îáåñïå÷èâàåò åäèíóþ ôèíàíñîâóþ ñèñòåìó, ïîêóïêè, áûòîâûå
:-S íåïîñëåäîâàòåëüíûé, áåññâÿçíûé óñëóãè, ñëóæáó çíàêîìñòâ...
:-D ãðîìêî õîõî÷óùèé Íåñêîëüêî ñëîâ îá Èíòåðíåòå â Ðîññèè. Â 1990 ãîäó ê ñåòè
:-X ðîò íà çàìêå áûëè ïîäêëþ÷åíû îêîëî òðèäöàòè îðãàíèçàöèé, ãëàâíûì îáðà-
:-Ñ ëîäûðü çîì íàó÷íûõ öåíòðîâ. Íî òîëüêî ÷åðåç ïÿòü ëåò ñîñòîÿëîñü îôèöè-
:- ñïëåâûâàþùèé (òàáàê) àëüíîå ðàñïðîñòðàíåíèå WWW-òåõíîëîãèé.  1998 ãîäó êîëè÷å-
:-9 îáëèçûâàþùèé ãóáû ñòâî ïîëüçîâàòåëåé Èíòåðíåòà äîñòèãëî îäíîãî ìèëëèîíà, à ê 2000
:-$ ðîò ñêðåïëåí ïðîâîëîêîé ãîäó 5,4 ìëí ÷åëîâåê (Ïî ïðîãíîçàì, ê êîíöó 2001 ãîäà èõ
:-% áàíêèð ñòàíåò 7,8 ìëí) ×åòâåðòü ðåãóëÿðíûõ «ïîñåòèòåëåé» Èíòåðíåòà æè-
:-} áîðîäàòûé âóò â Ìîñêâå è Ñàíêò-Ïåòåðáóðãå, äðóãàÿ ÷åòâåðòü â Ñèáèðè è íà
:-{ óñàòûé Äàëüíåì Âîñòîêå, ïðè ýòîì áîëüøå ïîëîâèíû ïîñåòèòåëåé Èíòåð-
:*) ïüÿíûé íåòà ïðîæèâàþò â ãîðîäàõ ÷èñëåííîñòüþ ìåíåå ìèëëèîíà ÷åëîâåê.
:=) ñ ïîõìåëüÿ Êîìïüþòåðèçàöèÿ è Èíòåðíåò ñòîëáîâàÿ äîðîãà çàïàäíîé
%-) ïðîãðàììèñò öèâèëèçàöèè â XXI âåêå. Õîòèì ìû èëè íåò Ðîññèÿ ìíîãî ñòî-
8-) â ñîëíå÷íûõ î÷êàõ ëåòèé òÿãîòååò ê åâðîïåéñêîìó ïóòè ðàçâèòèÿ. Ïîýòîìó è íàøå
.-) îäíîãëàçûé áóäóùåå ñâÿçàíî íå ñ ñûðüåì, íå ñ âîîðóæåíèåì, à èñêëþ÷èòåëü-
g-) â ïåíñíå íî ñ øèðî÷àéøåé êîìïüþòåðèçàöèåé øêîë è âóçîâ, ñ âûõîäîì â
{:-) â ïàðèêå ìèðîâóþ ñåòü Èíòåðíåò, ñ ïîãîëîâíîé êîìïüþòåðíîé ãðàìîòíîñ-
-:-) ïàíê òüþ ìîëîäåæè. Äðóãîãî ïóòè íåò, åñëè ìû íå õîòèì îñòàòüñÿ ñû-
*<:-) Ñàíòà-Êëàóñ. ðüåâûì ïðèäàòêîì çàïàäíîãî ìèðà.
106 107
III. ÁÈÎÊÎÌÏÜÞÒÅÐÛ Îäíàêî ïðåæäå ÷åì îïòè÷åñêèå êîìïüþòåðû ñòàíóò ìàññîâûì
ïðîäóêòîì, íà îïòè÷åñêèå êîìïîíåíòû, âåðîÿòíî, ïåðåéäåò âñÿ
Ïðèìåíåíèå â âû÷èñëèòåëüíîé òåõíèêå áèîëîãè÷åñêèõ ìàòå- ñèñòåìà ñâÿçè âïëîòü äî «ïîñëåäíåé ìèëè» íà ó÷àñòêå äî äîìà
ðèàëîâ ïîçâîëèò ñî âðåìåíåì óìåíüøèòü êîìïüþòåðû äî ðàçìå- èëè îôèñà.  áëèæàéøèå 15 ëåò îïòè÷åñêèå êîììóòàòîðû, ïîâòî-
ðîâ æèâîé êëåòêè. Ïîêà ýòî ÷àøêà Ïåòðè, íàïîëíåííàÿ ñïèðàëÿ- ðèòåëè, óñèëèòåëè è êàáåëè çàìåíÿò ýëåêòðè÷åñêèå êîìïîíåíòû.
ìè ÄÍÊ, èëè íåéðîíû, âçÿòûå ó ïèÿâêè è ïîäñîåäèíåííûå ê
ýëåêòðè÷åñêèì ïðîâîäàì. Ïî ñóùåñòâó, íàøè ñîáñòâåííûå êëåò-
êè ýòî íå ÷òî èíîå, êàê áèîìàøèíû ìîëåêóëÿðíîãî ðàçìåðà, à
ïðèìåðîì áèîêîìïüþòåðà, êîíå÷íî, ñëóæèò íàø ìîçã.
Topics for Essays,
Èõóä Øàïèðî èç Âåéöìàíîâñêîãî èíñòèòóòà åñòåñòâåííûõ íàóê Oral or Written Reports
ñîîðóäèë ïëàñòìàññîâóþ ìîäåëü áèîëîãè÷åñêîãî êîìïüþòåðà âû-
ñîòîé 30 ñì. Åñëè áû ýòî óñòðîéñòâî ñîñòîÿëî èç íàñòîÿùèõ áèîëî- 1. The most interesting places you have explored on the Internet.
ãè÷åñêèõ ìîëåêóë, åãî ðàçìåð áûë áû ðàâåí ðàçìåðó îäíîãî èç 2. Next generation Internet.
êîìïîíåíòîâ êëåòêè 0,000 025 ìì. 3. My media.
Áèëë Äèòòî èç Òåõíîëîãè÷åñêîãî èíñòèòóòà øòàòà Äæîðäæèÿ 4. The place of computer technology in our culture.
ïðîâåë èíòåðåñíûé ýêñïåðèìåíò, ïîäñîåäèíèâ ìèêðîäàò÷èêè ê
íåñêîëüêèì íåéðîíàì ïèÿâêè. Îí îáíàðóæèë, ÷òî â çàâèñèìîñòè
îò âõîäíîãî ñèãíàëà íåéðîíû îáðàçóþò íîâûå âçàèìîñâÿçè. Âåðî-
ÿòíî, áèîëîãè÷åñêèå êîìïüþòåðû, ñîñòîÿùèå èç íåéðîïîäîáíûõ
ýëåìåíòîâ, â îòëè÷èå îò êðåìíèåâûõ óñòðîéñòâ, ñìîãóò èñêàòü
íóæíûå ðåøåíèÿ ïîñðåäñòâîì ñàìîïðîãðàììèðîâàíèÿ. Äèòòî íà-
ìåðåí èñïîëüçîâàòü ðåçóëüòàòû ñâîåé ðàáîòû äëÿ ñîçäàíèÿ ìîçãà
ðîáîòîâ.
108 109
III. ÁÈÎÊÎÌÏÜÞÒÅÐÛ Îäíàêî ïðåæäå ÷åì îïòè÷åñêèå êîìïüþòåðû ñòàíóò ìàññîâûì
ïðîäóêòîì, íà îïòè÷åñêèå êîìïîíåíòû, âåðîÿòíî, ïåðåéäåò âñÿ
Ïðèìåíåíèå â âû÷èñëèòåëüíîé òåõíèêå áèîëîãè÷åñêèõ ìàòå- ñèñòåìà ñâÿçè âïëîòü äî «ïîñëåäíåé ìèëè» íà ó÷àñòêå äî äîìà
ðèàëîâ ïîçâîëèò ñî âðåìåíåì óìåíüøèòü êîìïüþòåðû äî ðàçìå- èëè îôèñà.  áëèæàéøèå 15 ëåò îïòè÷åñêèå êîììóòàòîðû, ïîâòî-
ðîâ æèâîé êëåòêè. Ïîêà ýòî ÷àøêà Ïåòðè, íàïîëíåííàÿ ñïèðàëÿ- ðèòåëè, óñèëèòåëè è êàáåëè çàìåíÿò ýëåêòðè÷åñêèå êîìïîíåíòû.
ìè ÄÍÊ, èëè íåéðîíû, âçÿòûå ó ïèÿâêè è ïîäñîåäèíåííûå ê
ýëåêòðè÷åñêèì ïðîâîäàì. Ïî ñóùåñòâó, íàøè ñîáñòâåííûå êëåò-
êè ýòî íå ÷òî èíîå, êàê áèîìàøèíû ìîëåêóëÿðíîãî ðàçìåðà, à
ïðèìåðîì áèîêîìïüþòåðà, êîíå÷íî, ñëóæèò íàø ìîçã.
Topics for Essays,
Èõóä Øàïèðî èç Âåéöìàíîâñêîãî èíñòèòóòà åñòåñòâåííûõ íàóê Oral or Written Reports
ñîîðóäèë ïëàñòìàññîâóþ ìîäåëü áèîëîãè÷åñêîãî êîìïüþòåðà âû-
ñîòîé 30 ñì. Åñëè áû ýòî óñòðîéñòâî ñîñòîÿëî èç íàñòîÿùèõ áèîëî- 1. The most interesting places you have explored on the Internet.
ãè÷åñêèõ ìîëåêóë, åãî ðàçìåð áûë áû ðàâåí ðàçìåðó îäíîãî èç 2. Next generation Internet.
êîìïîíåíòîâ êëåòêè 0,000 025 ìì. 3. My media.
Áèëë Äèòòî èç Òåõíîëîãè÷åñêîãî èíñòèòóòà øòàòà Äæîðäæèÿ 4. The place of computer technology in our culture.
ïðîâåë èíòåðåñíûé ýêñïåðèìåíò, ïîäñîåäèíèâ ìèêðîäàò÷èêè ê
íåñêîëüêèì íåéðîíàì ïèÿâêè. Îí îáíàðóæèë, ÷òî â çàâèñèìîñòè
îò âõîäíîãî ñèãíàëà íåéðîíû îáðàçóþò íîâûå âçàèìîñâÿçè. Âåðî-
ÿòíî, áèîëîãè÷åñêèå êîìïüþòåðû, ñîñòîÿùèå èç íåéðîïîäîáíûõ
ýëåìåíòîâ, â îòëè÷èå îò êðåìíèåâûõ óñòðîéñòâ, ñìîãóò èñêàòü
íóæíûå ðåøåíèÿ ïîñðåäñòâîì ñàìîïðîãðàììèðîâàíèÿ. Äèòòî íà-
ìåðåí èñïîëüçîâàòü ðåçóëüòàòû ñâîåé ðàáîòû äëÿ ñîçäàíèÿ ìîçãà
ðîáîòîâ.
108 109
Unit IX. Accountant closes all the doors and windows, looks around care-
fully, then asks, What do you want the answer to be?
Elementary school teacher from Columbus, Georgia, USA: 4
Humor the Computer
B. Electrical engineering vs. Computer science
Once upon a time, in a kingdom not far from here, a king sum-
moned two of his advisors for a test. He showed them both a shiny metal
box with two slots in the top, a control knob, and a lever. What do you
think this is?
One advisor, an engineer, answered first. It is a toaster, he said.
The king asked, How would you design an embedded computer for
it? The engineer replied, Using a four-bit microcontroller, I would
write a simple program that reads the darkness knob and quantizes its
position to one of 16 shades of darkness, from snow white to coal black.
The program would use that darkness level as the index to a 16-element
Computer was given to man to complete him for what he is not; table of initial timer values. Then it would turn on the heating elements
science jokes to console him for what he is. So keep smiling! and start the timer with the initial value selected from the table. At the
end of the time delay, it would turn off the heat and pop up the toast.
Come back next week, and Ill show you a working prototype.
Reading and Discussion The second advisor, a computer scientist, immediately recognized
the danger of such shortsighted thinking. He said, Toasters dont just
A. Is there humor in the workplace? Perhaps, engineer- turn bread into toast, they are also used to warm frozen waffles. What
ing is too serious to be funny or is it not? Do you you see before you is really a breakfast food cooker. As the subjects of
know any science jokes? Read one below and get ready your kingdom become more sophisticated, they will demand more
to tell your favorite jokes. capabilities. They will need a breakfast food cooker that can also cook
sausage, fry bacon, and make scrambled eggs. A toaster that only makes
An assemblage of the most gifted minds in the world were all posed toast will soon be obsolete. If we dont look to the future, we will have
the following question: to completely redesign the toaster in just a few years.
What is 2 x 2? With this in mind, we can formulate a more intelligent solution to
The engineer whi ps out his slide rule (so its old) and shuffles it the problem. First, create a class of breakfast foods. Specialize this class
back and forth, and finally announces 3.99. into subclasses: grains, pork, and poultry. The specialization process
The physicist consults his technical references, sets up the problem should be repeated with grains divided into toast, muffins, pancakes,
on his computer, and announces, It lies between 3.98 and 4.02. and waffles; pork divided into sausage, links, and bacon; and poultry
The mathematician cogitates for a while, oblivious to the rest of the divided into scrambled eggs, hard-boiled eggs, poached eggs, fried
world, then announces, I dont know what the answer is, but I can eggs, and various omelet classes.
tell you, an answer exists! The ham and cheese omelet class is worth special attention because
Philosopher, But what do you mean by 2 x 2? Logician: Please it must inherit characteristics from the pork, dairy, and poultry classes.
define 2 x 2 more precisely. Thus, we see that the problem cannot be properly solved without mul-
110 111
Unit IX. Accountant closes all the doors and windows, looks around care-
fully, then asks, What do you want the answer to be?
Elementary school teacher from Columbus, Georgia, USA: 4
Humor the Computer
B. Electrical engineering vs. Computer science
Once upon a time, in a kingdom not far from here, a king sum-
moned two of his advisors for a test. He showed them both a shiny metal
box with two slots in the top, a control knob, and a lever. What do you
think this is?
One advisor, an engineer, answered first. It is a toaster, he said.
The king asked, How would you design an embedded computer for
it? The engineer replied, Using a four-bit microcontroller, I would
write a simple program that reads the darkness knob and quantizes its
position to one of 16 shades of darkness, from snow white to coal black.
The program would use that darkness level as the index to a 16-element
Computer was given to man to complete him for what he is not; table of initial timer values. Then it would turn on the heating elements
science jokes to console him for what he is. So keep smiling! and start the timer with the initial value selected from the table. At the
end of the time delay, it would turn off the heat and pop up the toast.
Come back next week, and Ill show you a working prototype.
Reading and Discussion The second advisor, a computer scientist, immediately recognized
the danger of such shortsighted thinking. He said, Toasters dont just
A. Is there humor in the workplace? Perhaps, engineer- turn bread into toast, they are also used to warm frozen waffles. What
ing is too serious to be funny or is it not? Do you you see before you is really a breakfast food cooker. As the subjects of
know any science jokes? Read one below and get ready your kingdom become more sophisticated, they will demand more
to tell your favorite jokes. capabilities. They will need a breakfast food cooker that can also cook
sausage, fry bacon, and make scrambled eggs. A toaster that only makes
An assemblage of the most gifted minds in the world were all posed toast will soon be obsolete. If we dont look to the future, we will have
the following question: to completely redesign the toaster in just a few years.
What is 2 x 2? With this in mind, we can formulate a more intelligent solution to
The engineer whi ps out his slide rule (so its old) and shuffles it the problem. First, create a class of breakfast foods. Specialize this class
back and forth, and finally announces 3.99. into subclasses: grains, pork, and poultry. The specialization process
The physicist consults his technical references, sets up the problem should be repeated with grains divided into toast, muffins, pancakes,
on his computer, and announces, It lies between 3.98 and 4.02. and waffles; pork divided into sausage, links, and bacon; and poultry
The mathematician cogitates for a while, oblivious to the rest of the divided into scrambled eggs, hard-boiled eggs, poached eggs, fried
world, then announces, I dont know what the answer is, but I can eggs, and various omelet classes.
tell you, an answer exists! The ham and cheese omelet class is worth special attention because
Philosopher, But what do you mean by 2 x 2? Logician: Please it must inherit characteristics from the pork, dairy, and poultry classes.
define 2 x 2 more precisely. Thus, we see that the problem cannot be properly solved without mul-
110 111
ti ple inheritance. At run time, the program must create, the proper II. What do these acronyms and abbreviations stand for:
object and send a message to the object that says, Cook yourself. The
semantics of this message depend, of course, on the kind of object, so GUI, MB, vs., VGA, UNIX, v.8.3.
they have a different meaning to a piece of toast than to scrambled eggs.
III. Translate the text.
Reviewing the process so far, we see that the analysis phase has
revealed that the primary requirement is to cook any kind of breakfast IV. Compare other types of engineering with computer engineering.
food. In the design phase, we have discovered some derived
requirements. Specifically, we need an object-oriented language with
multi ple inheritance. Of course, users dont want the eggs to get cold
C. Natural upgrade path
while the bacon is frying, so concurrent processing is required, too.
Come on people: you are all missing the most obvious upgrade
We must not forget the user interface. The lever that lowers the
path to the most powerful and satisfying computer of all. The upgrade
food lacks versatility, and the darkness knob is confusing. Users wont
path goes:
buy the product unless it has a user-friendly, graphical interface. When
the breakfast cooker is plugged in, users should see a cowboy boot on • Pocket calculator
the screen. Users click on it, and the message Booting UNIX v.8.3 • Commodore Pet / Apple II / TRS 80 / Commodore 64 /
appears on the screen. (UNIX 8.3 should be out by the time the product Timex Sinclair (Choose any of the above)
gets to the market). Users can pull down a menu and click on the foods • IBM PC
they want to cook. • Apple Macintosh
Having made the wise decision of specifying the software first in • Fastest workstation of the time (HP, DEC, IBM, SGI: your
the design phase, all that remains is to pick an adequate hardware choice)
platform for the implementation phase. An Intel 80386 with 8 MB of • Minicomputer (HP, DEC, IBM, SGI: your choice)
memory, a 30 MB hard disk, and a VGA monitor should be sufficient. If • Mainframe (IBM, Cray, DEC: your choice)
you select a multitasking, object oriented language that supports multi-
And then you reach the pinnacle of modern computing facilities:
ple inheritance and has a built-in GUI, writing the program will be
Graduate students. Yes, you just sit back and do all of your comput-
a snap. (Imagine the difficulty we would have had if we had foolishly
ing through lowly graduate students. Imagine the advantages.
allowed a hardware-first design strategy to lock us into a four-bit micro-
Multi-processing, with as many processes as you have students. You
controller!).
can easily add more power by promising more desperate undergrads
The king wisely had the computer scientist beheaded, and they all
lived happily ever after. that they can indeed escape college through your guidance. Special
student units can even handle several tasks on their own!
Full voice recognition interface. Never touch a keyboard or mouse
EXERCISES again. Just mumble commands and they will be understood (or else!).
No hardware upgrades and no installation required. Every student
I. Find the equivalents to: comes complete with all hardware necessary. Never again fry a chi p
or $10,000 board by improper installation!
ïðèçâàòü; ñîâåòíèê; ñíåæíî-áåëûé; óãîëüíî-÷åðíûé; âñòðîåííûé; Just sit that sniveling student at a desk, give it writing utensils (mak-
áëèçîðóêèé; ìíîæåñòâåííîå íàñëåäîâàíèå; ãëàâíîå òðåáîâàíèå; ïà- ing sure to point out which is the dangerous end) and off it goes.
ðàëëåëüíàÿ îáðàáîòêà; çàãðóçêà; íèñïàäàþùåå ìåíþ; â ñòàäèè ðàç- Low maintenance. Remember when that hard disk crashed in your
ðàáîòêè; ìíîãîçàäà÷íûé ðåæèì; ñòàäèÿ âíåäðåíèÿ; ëåãêîå äåëî; îáåç- Beta 9900, causing all of our work to go the great bit bucket in the sky?
ãëàâèòü. This wont happen with grad. students. All that is required is that you
112 113
ti ple inheritance. At run time, the program must create, the proper II. What do these acronyms and abbreviations stand for:
object and send a message to the object that says, Cook yourself. The
semantics of this message depend, of course, on the kind of object, so GUI, MB, vs., VGA, UNIX, v.8.3.
they have a different meaning to a piece of toast than to scrambled eggs.
III. Translate the text.
Reviewing the process so far, we see that the analysis phase has
revealed that the primary requirement is to cook any kind of breakfast IV. Compare other types of engineering with computer engineering.
food. In the design phase, we have discovered some derived
requirements. Specifically, we need an object-oriented language with
multi ple inheritance. Of course, users dont want the eggs to get cold
C. Natural upgrade path
while the bacon is frying, so concurrent processing is required, too.
Come on people: you are all missing the most obvious upgrade
We must not forget the user interface. The lever that lowers the
path to the most powerful and satisfying computer of all. The upgrade
food lacks versatility, and the darkness knob is confusing. Users wont
path goes:
buy the product unless it has a user-friendly, graphical interface. When
the breakfast cooker is plugged in, users should see a cowboy boot on • Pocket calculator
the screen. Users click on it, and the message Booting UNIX v.8.3 • Commodore Pet / Apple II / TRS 80 / Commodore 64 /
appears on the screen. (UNIX 8.3 should be out by the time the product Timex Sinclair (Choose any of the above)
gets to the market). Users can pull down a menu and click on the foods • IBM PC
they want to cook. • Apple Macintosh
Having made the wise decision of specifying the software first in • Fastest workstation of the time (HP, DEC, IBM, SGI: your
the design phase, all that remains is to pick an adequate hardware choice)
platform for the implementation phase. An Intel 80386 with 8 MB of • Minicomputer (HP, DEC, IBM, SGI: your choice)
memory, a 30 MB hard disk, and a VGA monitor should be sufficient. If • Mainframe (IBM, Cray, DEC: your choice)
you select a multitasking, object oriented language that supports multi-
And then you reach the pinnacle of modern computing facilities:
ple inheritance and has a built-in GUI, writing the program will be
Graduate students. Yes, you just sit back and do all of your comput-
a snap. (Imagine the difficulty we would have had if we had foolishly
ing through lowly graduate students. Imagine the advantages.
allowed a hardware-first design strategy to lock us into a four-bit micro-
Multi-processing, with as many processes as you have students. You
controller!).
can easily add more power by promising more desperate undergrads
The king wisely had the computer scientist beheaded, and they all
lived happily ever after. that they can indeed escape college through your guidance. Special
student units can even handle several tasks on their own!
Full voice recognition interface. Never touch a keyboard or mouse
EXERCISES again. Just mumble commands and they will be understood (or else!).
No hardware upgrades and no installation required. Every student
I. Find the equivalents to: comes complete with all hardware necessary. Never again fry a chi p
or $10,000 board by improper installation!
ïðèçâàòü; ñîâåòíèê; ñíåæíî-áåëûé; óãîëüíî-÷åðíûé; âñòðîåííûé; Just sit that sniveling student at a desk, give it writing utensils (mak-
áëèçîðóêèé; ìíîæåñòâåííîå íàñëåäîâàíèå; ãëàâíîå òðåáîâàíèå; ïà- ing sure to point out which is the dangerous end) and off it goes.
ðàëëåëüíàÿ îáðàáîòêà; çàãðóçêà; íèñïàäàþùåå ìåíþ; â ñòàäèè ðàç- Low maintenance. Remember when that hard disk crashed in your
ðàáîòêè; ìíîãîçàäà÷íûé ðåæèì; ñòàäèÿ âíåäðåíèÿ; ëåãêîå äåëî; îáåç- Beta 9900, causing all of our work to go the great bit bucket in the sky?
ãëàâèòü. This wont happen with grad. students. All that is required is that you
112 113
give them a good whack on the head when they are acting up, and they II. Give antonyms to:
will run good as new.
Abuse module. Imagine yelling expletives at your computer. Doesnt desperate, undergrads, powerful, proper, to consume, necessary, per-
work too well, because your machine just sits there and ignores you. manent, in particular, occasionally, natural, on ones own.
Through the grad. student abuse module you can put the fear of god in
III. Answer the questions:
them, and get results to boot!
Built-in lifetime. Remember that awful feeling two years after you 1. What are computing facilities?
bought your GigaPlutz mainframe when the new faculty member on 2. What are the advantages of computing through undergraduate stu-
the block sneered at you because his FeelyWup workstation could com- dents?
pute rings around your dinosaur? This doesnt happen with grad. stu- 3. What is wetware?
dents. When they start wearing out and losing productivity, simply give 4. What can be called silicon garbage?
them the Ph.D. and boot them out onto the street to fend for them- 5. What paths would you choose to upgrade your computer?
selves. Out of sight, out of mind!
Cheap fuel: students run on Coca-Cola (or the high-octane equiva- D. Mother should have warned you!
lent Jolt Cola) and typically consume hot spicy Chinese dishes,
cheap taco substitutes, or completely synthetic macaroni replacements. If you can count on one person in this life, its your mother. Par-
It is entirely unnecessary to plug the student into the wall socket (al- ticularly, you can rely on any mom anywhere to find the perils inher-
though this does get them going a little faster from time to time). ent in any situation. Indeed, no self-respecting mom ever missed an
Expansion options. If your grad. students dont seem to be perform- opportunity to caution her children about the dangers of everything
ing too well, consider adding a handy system manager or software from comic books to pool halls, to public restrooms.
engineer upgrade. These guys are guaranteed to require even less than Still, unless your mom was a real visionary, she probably didnt get
a student, and typically establish permanent residence in the computer much chance to warn you about PCs. Back when she was in peak nag-
room. Youll never know they are around! Note however that the engi- ging form, she probably hadnt even heard of the cursed things.
neering department still hasnt worked out some of the idiosyncratic You may think thats just as well. We dont agree. The PC jungle is
bugs in these expansion options, such as incessant muttering at nobody too scary to explore without knowing the answer to that comforting
in particular, occasionally screaming at your grad. students, and post- question, What would mom say about this?
ing ridiculous messages on worldwide bulletin boards. So, after months of exhaustive polling of computer savvy moms
So, forget your Babbage Engines, abacuses (abaci?), PortaBooks, around the country (there are more than you think), weve assembled
DEK 666-3Ds, and all that other silicon garbage. The wave of the the following list of ten PC perils your mom should have warned you
future is in wetware, so invest in graduate students today! Youll never about, if shed only known. Take them seriously. Mom knows what she
go back! is talking about.
1. Playing too much Tetris will make you go blind. Go outside, get some
EXERCISES fresh air. Do you want to look like a ghost all your life?
2. Never dial into strange bulletin board systems. Who knows what kind
I. Give synonyms to: of riff-raff youll find there? Just last week, 1 saw a show about the
kind of trash that hangs out on these systems. Modem bums,
to upgrade, come on, choice, pinnacle, escape, built-in, to require, to theyre called.
yell, expletives, to abuse, to boot, to wear out, substitute, to work out, 3. If theyre so interested in information, why dont they go to the
idiosyncratic, garbage, guidance. library?
114 115
give them a good whack on the head when they are acting up, and they II. Give antonyms to:
will run good as new.
Abuse module. Imagine yelling expletives at your computer. Doesnt desperate, undergrads, powerful, proper, to consume, necessary, per-
work too well, because your machine just sits there and ignores you. manent, in particular, occasionally, natural, on ones own.
Through the grad. student abuse module you can put the fear of god in
III. Answer the questions:
them, and get results to boot!
Built-in lifetime. Remember that awful feeling two years after you 1. What are computing facilities?
bought your GigaPlutz mainframe when the new faculty member on 2. What are the advantages of computing through undergraduate stu-
the block sneered at you because his FeelyWup workstation could com- dents?
pute rings around your dinosaur? This doesnt happen with grad. stu- 3. What is wetware?
dents. When they start wearing out and losing productivity, simply give 4. What can be called silicon garbage?
them the Ph.D. and boot them out onto the street to fend for them- 5. What paths would you choose to upgrade your computer?
selves. Out of sight, out of mind!
Cheap fuel: students run on Coca-Cola (or the high-octane equiva- D. Mother should have warned you!
lent Jolt Cola) and typically consume hot spicy Chinese dishes,
cheap taco substitutes, or completely synthetic macaroni replacements. If you can count on one person in this life, its your mother. Par-
It is entirely unnecessary to plug the student into the wall socket (al- ticularly, you can rely on any mom anywhere to find the perils inher-
though this does get them going a little faster from time to time). ent in any situation. Indeed, no self-respecting mom ever missed an
Expansion options. If your grad. students dont seem to be perform- opportunity to caution her children about the dangers of everything
ing too well, consider adding a handy system manager or software from comic books to pool halls, to public restrooms.
engineer upgrade. These guys are guaranteed to require even less than Still, unless your mom was a real visionary, she probably didnt get
a student, and typically establish permanent residence in the computer much chance to warn you about PCs. Back when she was in peak nag-
room. Youll never know they are around! Note however that the engi- ging form, she probably hadnt even heard of the cursed things.
neering department still hasnt worked out some of the idiosyncratic You may think thats just as well. We dont agree. The PC jungle is
bugs in these expansion options, such as incessant muttering at nobody too scary to explore without knowing the answer to that comforting
in particular, occasionally screaming at your grad. students, and post- question, What would mom say about this?
ing ridiculous messages on worldwide bulletin boards. So, after months of exhaustive polling of computer savvy moms
So, forget your Babbage Engines, abacuses (abaci?), PortaBooks, around the country (there are more than you think), weve assembled
DEK 666-3Ds, and all that other silicon garbage. The wave of the the following list of ten PC perils your mom should have warned you
future is in wetware, so invest in graduate students today! Youll never about, if shed only known. Take them seriously. Mom knows what she
go back! is talking about.
1. Playing too much Tetris will make you go blind. Go outside, get some
EXERCISES fresh air. Do you want to look like a ghost all your life?
2. Never dial into strange bulletin board systems. Who knows what kind
I. Give synonyms to: of riff-raff youll find there? Just last week, 1 saw a show about the
kind of trash that hangs out on these systems. Modem bums,
to upgrade, come on, choice, pinnacle, escape, built-in, to require, to theyre called.
yell, expletives, to abuse, to boot, to wear out, substitute, to work out, 3. If theyre so interested in information, why dont they go to the
idiosyncratic, garbage, guidance. library?
114 115
4. Dont talk on the phone and debut spreadsheet macros at the same 2. What were you warned about when a child?
time. Its very rude, and frankly, I dont like your language when 3. What advice did you take seriously?
the macro doesnt work the way you think it should. 4. What are the Top Ten PC Perils in your opinion?
5. Clean up your hard disk. God forbid you should be in an accident 5. What of them would you warn your children about?
and someone should see how sloppy your directories are.
6. You dont have to rush out and buy every trendy new product. So
what if all your friends are buying it and the word is itll be the BILL GATES IN HEAVEN
next standard? You wouldnt jump off a bridge just because every-
one else did, would you? Bill Gates died and, much to everyones surprise, went to Heaven.
7. Be sure to write your name and phone number on all your floppy disk When he got there, he had to wait in the reception area.
sleeves. That way, if they ever get mixed up with someone elses, Heavens reception area was the size of Massachusetts. There were
you can tell which ones are yours. literally millions of people milling about, living in tents with nothing to
8. Never put a disk into your drive if you dont know where its been. do all day. Food and water were being distributed from the backs of
Your computer might catch a disease or something. Dont laugh, trucks, while staffers with cli pboards slowly worked their way through
its not funny. Thats what happened to the Kelly boy, and his PC the crowd. Booze and drugs were being passed around. Fights were com-
hasnt been the same since. monplace. Sanitation conditions were appalling. All in all, the scene
9. Sit up straight, and for heavens sake, not so close to that monitor looked like Woodstock gone metastatic.
screen. What do you want to do, go blind and look like a pretzel? Bill lived in a tent for three weeks until finally, one of the staffers
10. Always keep your icons and windows neatly arranged. A cluttered approached him. The staffer was a young man in his late teens, face
desktop metaphor is the sign of a cluttered mind. scarred with acne. He was wearing a blue T-shirt with the words TEAM
11. Always eat your vegetables. Okay, so it doesnt have anything to do PETER emblazoned on it in large yellow lettering.
with computers, its good advice anyway. And who said mothers Hello, said the staffer in a bored voice that could have been the
had to be consistent? voice of any clerk in any overgrown bureaucracy. My name is Gabriel
and Ill be your induction coordinator. Bill started to ask a question,
but Gabriel interrupted him. No, Im not the Archangel Gabriel. Im
EXERCISES just a guy from Philadelphia named Gabriel who died in a car wreck at
the age of 17. Now give me your name, last name first, unless you were
I. Find the equivalents to:
Chinese in which case its first name first
óïóñòèòü âîçìîæíîñòü; ïðèñóùèé; ôàíòàçåð; ïîëó÷èòü øàíñ; Gates, Bill. Gabriel started searching through the sheaf of papers
óòîìèòåëüíûé; êóìåêàþùèå â êîìïüþòåðàõ (æàðã.); îñëåïíóòü; on his cli pboard, looking for Bills Record of Earthly Works. Whats
ìóñîð; ýëåêòðîííàÿ äîñêà îáúÿâëåíèé; î÷èñòèòü; íàêëåéêà íà äèñêå- going on here? asked Bill. Why are all these people here? Wheres
òå; õîðîøèé ñîâåò; â ëþáîì ñëó÷àå; ïîñëåäîâàòåëüíûé. Saint Peter? Where are the Pearly Gates?
Gabriel ignored the questions until he located Bills records. Then
II. Give synonyms to: Gabriel looked up in surprise, It says here that you were the presi-
dent of a large software company. Is that right?
to caution, danger, public restrooms, to nag, peak, to curse, riff-raff, Yes.
bums, debut, sloppy, trendy, cluttered, consistent. Well then, do the math chi p-head! When this Saint Peter busi-
ness started, it was an easy gig. Only a hundred or so people died every
III. Answer the questions:
day, and Peter could handle it all by himself, no problem. But now
1. What do all mums usually warn their children about? there are over five billion people on earth. Come on, when God said to
116 117
4. Dont talk on the phone and debut spreadsheet macros at the same 2. What were you warned about when a child?
time. Its very rude, and frankly, I dont like your language when 3. What advice did you take seriously?
the macro doesnt work the way you think it should. 4. What are the Top Ten PC Perils in your opinion?
5. Clean up your hard disk. God forbid you should be in an accident 5. What of them would you warn your children about?
and someone should see how sloppy your directories are.
6. You dont have to rush out and buy every trendy new product. So
what if all your friends are buying it and the word is itll be the BILL GATES IN HEAVEN
next standard? You wouldnt jump off a bridge just because every-
one else did, would you? Bill Gates died and, much to everyones surprise, went to Heaven.
7. Be sure to write your name and phone number on all your floppy disk When he got there, he had to wait in the reception area.
sleeves. That way, if they ever get mixed up with someone elses, Heavens reception area was the size of Massachusetts. There were
you can tell which ones are yours. literally millions of people milling about, living in tents with nothing to
8. Never put a disk into your drive if you dont know where its been. do all day. Food and water were being distributed from the backs of
Your computer might catch a disease or something. Dont laugh, trucks, while staffers with cli pboards slowly worked their way through
its not funny. Thats what happened to the Kelly boy, and his PC the crowd. Booze and drugs were being passed around. Fights were com-
hasnt been the same since. monplace. Sanitation conditions were appalling. All in all, the scene
9. Sit up straight, and for heavens sake, not so close to that monitor looked like Woodstock gone metastatic.
screen. What do you want to do, go blind and look like a pretzel? Bill lived in a tent for three weeks until finally, one of the staffers
10. Always keep your icons and windows neatly arranged. A cluttered approached him. The staffer was a young man in his late teens, face
desktop metaphor is the sign of a cluttered mind. scarred with acne. He was wearing a blue T-shirt with the words TEAM
11. Always eat your vegetables. Okay, so it doesnt have anything to do PETER emblazoned on it in large yellow lettering.
with computers, its good advice anyway. And who said mothers Hello, said the staffer in a bored voice that could have been the
had to be consistent? voice of any clerk in any overgrown bureaucracy. My name is Gabriel
and Ill be your induction coordinator. Bill started to ask a question,
but Gabriel interrupted him. No, Im not the Archangel Gabriel. Im
EXERCISES just a guy from Philadelphia named Gabriel who died in a car wreck at
the age of 17. Now give me your name, last name first, unless you were
I. Find the equivalents to:
Chinese in which case its first name first
óïóñòèòü âîçìîæíîñòü; ïðèñóùèé; ôàíòàçåð; ïîëó÷èòü øàíñ; Gates, Bill. Gabriel started searching through the sheaf of papers
óòîìèòåëüíûé; êóìåêàþùèå â êîìïüþòåðàõ (æàðã.); îñëåïíóòü; on his cli pboard, looking for Bills Record of Earthly Works. Whats
ìóñîð; ýëåêòðîííàÿ äîñêà îáúÿâëåíèé; î÷èñòèòü; íàêëåéêà íà äèñêå- going on here? asked Bill. Why are all these people here? Wheres
òå; õîðîøèé ñîâåò; â ëþáîì ñëó÷àå; ïîñëåäîâàòåëüíûé. Saint Peter? Where are the Pearly Gates?
Gabriel ignored the questions until he located Bills records. Then
II. Give synonyms to: Gabriel looked up in surprise, It says here that you were the presi-
dent of a large software company. Is that right?
to caution, danger, public restrooms, to nag, peak, to curse, riff-raff, Yes.
bums, debut, sloppy, trendy, cluttered, consistent. Well then, do the math chi p-head! When this Saint Peter busi-
ness started, it was an easy gig. Only a hundred or so people died every
III. Answer the questions:
day, and Peter could handle it all by himself, no problem. But now
1. What do all mums usually warn their children about? there are over five billion people on earth. Come on, when God said to
116 117
go forth and multi ply, he didnt say like rabbits. With that large a Abraham and Bill caught the shuttle bus and went to Heavens new
population, ten thousand people die every hour. Over a quarter-million data processing center. It was a truly huge facility, a hundred times bigger
people a day. Do you think Peter can meet them all personally? than the Astrodome. Workmen were crawling all over the place, getting
I guess not. the miles of fiber optic cables properly installed. But the center was
You guess right. So Peter had to franchise the operation. Now, dominated by the computers. Half à million computers, arranged neatly
Peter is the CEO of Team Peter Enterprises, Inc. He just sits in the row-by-row, half a million....
corporate headquarters and sets policy. Franchisees like me handle the .... Power PCs....
actual inductions. Gabriel looked through his paperwork some more, .... all running Mac/OS? Not an Intel PC in sight! Not a single byte
and then continued, Your paperwork seems to be in order. And with of Microsoft code!
a background like yours, youll be getting a plum job assignment The thought of spending the rest of eternity using products that he
Job assignment? had spent his whole life working to destroy was too much for Bill. -
Of course. Did you expect to spend the rest of eternity sitting and What about PCs??? he exclaimed. What about Windows??? What
drinking ambrosia? Heaven is a big operation. You have to put your about Excel??? What about Word???
weight around here! Gabriel took out a tri plicate form, had Bill sign at Youre forgetting something, said Abraham.
the bottom, and then tore out the middle copy and handed it to Bill. Whats that? asked Bill plaintively.
Take this down to induction center #23 and meet up with your This is Heaven, explained Abraham. We need an operating sys-
occupational orientator. His name is Abraham. Bill started to ask a tem thats heavenly to use. If you want to build a data processing center
question, but Gabriel interrupted him, No, hes not that Abraham. based on PCs running Windows, then ....
.............. .... GO TO HELL!
Bill walked down a muddy trail for ten miles until he came to
induction center #23. He met with Abraham after a mere six-hour E. Can you do a better translation?
wait.
Heaven is centuries behind in building its data processing infra- a) 0A programmers
structure, explained Abraham. As youve seen, were still doing 0À young programmers began to work online,
everything on paper. It takes us a week just to process new entries. One didnt pay for Internet, and then there were 9.
I had to wait three weeks? said Bill. Abraham stared at Bill angri-
9 young programmers used copies that they made,
ly, and Bill realized that hed made a mistake. Even in Heaven, its best
But one was caught by FBI, and then there were 8.
not to contradict a bureaucrat. Well, Bill offered, maybe that Bosnia
thing has you, guys, backed up. 8 young programmers discussed about heaven,
Abrahams look of anger faded to mere annoyance. Your job will One said, Its Windows 95!, and then there were 7,
be to supervise Heavens new data processing center. Were building the
7 young programmers found bugs they want to fix,
largest computing facility in creation. Half a million computers connect-
But one was fixed by the bug, and then there were 6.
ed by a multi-segment fiber optic network, all running into a back-end
server network with a thousand CPUs on a gigabit channel. Fully fault 6 young programmers were testing the hard drive,
tolerant. Fully distributed processing. The works. One got the string Format complete, and then there were 5,
Bill could barely contain his excitement Wow! What a great job!
5 young programmers were running the FrontDoor,
This is really Heaven!
The BBS of one was hacked, and then there were 4.
Were just finishing construction, and well be starting operations
soon. Would you like to go to the center now? 4 young programmers worked using only C,
You bet! One said some good about Pascal, and then there were 3.
118 119
go forth and multi ply, he didnt say like rabbits. With that large a Abraham and Bill caught the shuttle bus and went to Heavens new
population, ten thousand people die every hour. Over a quarter-million data processing center. It was a truly huge facility, a hundred times bigger
people a day. Do you think Peter can meet them all personally? than the Astrodome. Workmen were crawling all over the place, getting
I guess not. the miles of fiber optic cables properly installed. But the center was
You guess right. So Peter had to franchise the operation. Now, dominated by the computers. Half à million computers, arranged neatly
Peter is the CEO of Team Peter Enterprises, Inc. He just sits in the row-by-row, half a million....
corporate headquarters and sets policy. Franchisees like me handle the .... Power PCs....
actual inductions. Gabriel looked through his paperwork some more, .... all running Mac/OS? Not an Intel PC in sight! Not a single byte
and then continued, Your paperwork seems to be in order. And with of Microsoft code!
a background like yours, youll be getting a plum job assignment The thought of spending the rest of eternity using products that he
Job assignment? had spent his whole life working to destroy was too much for Bill. -
Of course. Did you expect to spend the rest of eternity sitting and What about PCs??? he exclaimed. What about Windows??? What
drinking ambrosia? Heaven is a big operation. You have to put your about Excel??? What about Word???
weight around here! Gabriel took out a tri plicate form, had Bill sign at Youre forgetting something, said Abraham.
the bottom, and then tore out the middle copy and handed it to Bill. Whats that? asked Bill plaintively.
Take this down to induction center #23 and meet up with your This is Heaven, explained Abraham. We need an operating sys-
occupational orientator. His name is Abraham. Bill started to ask a tem thats heavenly to use. If you want to build a data processing center
question, but Gabriel interrupted him, No, hes not that Abraham. based on PCs running Windows, then ....
.............. .... GO TO HELL!
Bill walked down a muddy trail for ten miles until he came to
induction center #23. He met with Abraham after a mere six-hour E. Can you do a better translation?
wait.
Heaven is centuries behind in building its data processing infra- a) 0A programmers
structure, explained Abraham. As youve seen, were still doing 0À young programmers began to work online,
everything on paper. It takes us a week just to process new entries. One didnt pay for Internet, and then there were 9.
I had to wait three weeks? said Bill. Abraham stared at Bill angri-
9 young programmers used copies that they made,
ly, and Bill realized that hed made a mistake. Even in Heaven, its best
But one was caught by FBI, and then there were 8.
not to contradict a bureaucrat. Well, Bill offered, maybe that Bosnia
thing has you, guys, backed up. 8 young programmers discussed about heaven,
Abrahams look of anger faded to mere annoyance. Your job will One said, Its Windows 95!, and then there were 7,
be to supervise Heavens new data processing center. Were building the
7 young programmers found bugs they want to fix,
largest computing facility in creation. Half a million computers connect-
But one was fixed by the bug, and then there were 6.
ed by a multi-segment fiber optic network, all running into a back-end
server network with a thousand CPUs on a gigabit channel. Fully fault 6 young programmers were testing the hard drive,
tolerant. Fully distributed processing. The works. One got the string Format complete, and then there were 5,
Bill could barely contain his excitement Wow! What a great job!
5 young programmers were running the FrontDoor,
This is really Heaven!
The BBS of one was hacked, and then there were 4.
Were just finishing construction, and well be starting operations
soon. Would you like to go to the center now? 4 young programmers worked using only C,
You bet! One said some good about Pascal, and then there were 3.
118 119
3 young programmers didnt know what to do, b) What if Dr. Suess wrote a manual?
One tried to call the on-line help, and then there were 2, If a packet hits a pocket on a socket on a port,
And the bus is interrupted as a very last resort,
2 young programmers were testing what they done,
And the address of the memory makes your floppy disk abort,
One got a virus in his brain, and then there was 1.
Then the socket packet pocket has an error to report.
1 young programmer was as mighty as a hero,
If your cursor finds a menu item followed by a dash,
But tried to speak with user, and then there was 0.
And the double-clicking icon puts your window in the trash,
Boss cried: Oh, where is the program we must have?! And your data is corrupted cause the index doesnt hash,
And fired one programmer, and then there were FF. Then your situations hopeless and your systems gonna crash!
If the label on the cable on the table at your house,
Says the network is connected to the button on your mouse,
0À ïðîãðàììèñòîâ
But your packets want to tunnel on another protocol,
0À ïðîãðàììèñòîâ ïðîäóêò ðåøèëè ñäåëàòü. Thats repeatedly rejected by the printer down the hall,
1 ñïðîñèë: «À äåíüãè ãäå?» è èõ îñòàëîñü äåâÿòü.
And your screen is all distorted by the side effect of Gauss,
9 ïðîãðàììèñòîâ ïðåäñòàëè ïåðåä áîññîì So your icons in the window are as wavy as a souse,
1 èç íèõ íå çíàë foxpro è èõ îñòàëîñü âîñåìü. Then you may as well reboot and go out with a bang,
8 ïðîãðàììèñòîâ êóïèëè IBM. Cause as sure as Im a poet, the suckers gonna hang!
1 èç íèõ ñêàçàë «Mac êëàññ!» è èõ îñòàëîñü ñåìü. When the copy of your floppys getting sloppy on the disk,
7 ïðîãðàììèñòîâ ðåøèëè help ïðî÷åñòü. And the microcode instructions cause unnecessary risk,
Ó îäíîãî íàêðûëñÿ âèíò è èõ îñòàëîñü øåñòü. Then you have to flash your memory and youll want to RAM
your ROM.
6 ïðîãðàììèñòîâ ïûòàëèñü êîä ïîíÿòü. Quickly turn off the computer and be sure to tell your mom.
1 èç íèõ ñîø¸ë ñ óìà è èõ îñòàëîñü ïÿòü.
5 ïðîãðàììèñòîâ êóïèëè CD-ROM.
1 ïðèí¸ñ êèòàéñêèé äèñê îñòàëèñü â÷åòâåðîì. À åñëè áû äîêòîð Ñóýç íàïèñàë èíñòðóêöèþ?
Åñëè âäðóã ïàêåò ïðîãðàììíûé âàñ ðåøèòñÿ îáîáðàòü,
4 ïðîãðàììèñòà ðàáîòàëè íà «Ñ». È îò ïðåðûâàíèé øèíà ñòàíåò âäðóã îçîðíè÷àòü,
1 èç íèõ õâàëèë PASCAL è èõ îñòàëîñü òðè. Åñëè ïàìÿòü ñ äèñêîâîäîì ñòàíóò ëþòî âîåâàòü,
3 ïðîãðàììèñòà èãðàëè â ñåòêå â «DOOM». Âàì íè äåíåã, íè æåëåçà, íè ïîêîÿ íå âèäàòü.
1 ÷óòü-÷óòü çàìåøêàëñÿ è ñ÷¸ò ñòàë ðàâåí äâóì. Åñëè âäðóã â ìåíþ ñòàíäàðòíîì âàø êóðñîð íà÷íåò øàëèòü,
2 ïðîãðàììèñòà íàáðàëè äðóæíî «WIN». È äâîéíîé ùåë÷îê èêîíêó ñðàçó ìîæåò óäàëèòü,
1 óñòàë çàãðóçêè æäàòü îñòàëñÿ ëèøü îäèí. È ìîçãè ó áàçû äàííûõ ïåðåñòàíóò âäðóã âàðèòü,
Ýòî çíà÷èò, âñå ïðîïàëî, áåçâîçâðàòíî, ìîæåò áûòü.
1 ïðîãðàììèñò âñ¸ âçÿë ïîä ñâîé êîíòðîëü,
Íî âñòðåòèëñÿ ñ çàêàç÷èêîì è èõ îñòàëîñü íîëü. Åñëè íàäïèñü íà êîðîáêå ìîæåò äåëüíûé äàòü ñîâåò,
È ìûøèíûé êîâðèê äàæå ïîäêëþ÷èòüñÿ â Internet,
0 ïðîãðàììèñòîâ ðóãàë ñåðäèòûé øåô, À íåñíîñíûå ïðîãðàììû âàì îòêàæóò äåëîâî,
ïîòîì óâîëèë îäíîãî è ñòàëî èõ FF!!! Âèäèòå ëè, ïðîòîêîë èì íå ïîäõîäèò. Êàêîâî?
120 121
3 young programmers didnt know what to do, b) What if Dr. Suess wrote a manual?
One tried to call the on-line help, and then there were 2, If a packet hits a pocket on a socket on a port,
And the bus is interrupted as a very last resort,
2 young programmers were testing what they done,
And the address of the memory makes your floppy disk abort,
One got a virus in his brain, and then there was 1.
Then the socket packet pocket has an error to report.
1 young programmer was as mighty as a hero,
If your cursor finds a menu item followed by a dash,
But tried to speak with user, and then there was 0.
And the double-clicking icon puts your window in the trash,
Boss cried: Oh, where is the program we must have?! And your data is corrupted cause the index doesnt hash,
And fired one programmer, and then there were FF. Then your situations hopeless and your systems gonna crash!
If the label on the cable on the table at your house,
Says the network is connected to the button on your mouse,
0À ïðîãðàììèñòîâ
But your packets want to tunnel on another protocol,
0À ïðîãðàììèñòîâ ïðîäóêò ðåøèëè ñäåëàòü. Thats repeatedly rejected by the printer down the hall,
1 ñïðîñèë: «À äåíüãè ãäå?» è èõ îñòàëîñü äåâÿòü.
And your screen is all distorted by the side effect of Gauss,
9 ïðîãðàììèñòîâ ïðåäñòàëè ïåðåä áîññîì So your icons in the window are as wavy as a souse,
1 èç íèõ íå çíàë foxpro è èõ îñòàëîñü âîñåìü. Then you may as well reboot and go out with a bang,
8 ïðîãðàììèñòîâ êóïèëè IBM. Cause as sure as Im a poet, the suckers gonna hang!
1 èç íèõ ñêàçàë «Mac êëàññ!» è èõ îñòàëîñü ñåìü. When the copy of your floppys getting sloppy on the disk,
7 ïðîãðàììèñòîâ ðåøèëè help ïðî÷åñòü. And the microcode instructions cause unnecessary risk,
Ó îäíîãî íàêðûëñÿ âèíò è èõ îñòàëîñü øåñòü. Then you have to flash your memory and youll want to RAM
your ROM.
6 ïðîãðàììèñòîâ ïûòàëèñü êîä ïîíÿòü. Quickly turn off the computer and be sure to tell your mom.
1 èç íèõ ñîø¸ë ñ óìà è èõ îñòàëîñü ïÿòü.
5 ïðîãðàììèñòîâ êóïèëè CD-ROM.
1 ïðèí¸ñ êèòàéñêèé äèñê îñòàëèñü â÷åòâåðîì. À åñëè áû äîêòîð Ñóýç íàïèñàë èíñòðóêöèþ?
Åñëè âäðóã ïàêåò ïðîãðàììíûé âàñ ðåøèòñÿ îáîáðàòü,
4 ïðîãðàììèñòà ðàáîòàëè íà «Ñ». È îò ïðåðûâàíèé øèíà ñòàíåò âäðóã îçîðíè÷àòü,
1 èç íèõ õâàëèë PASCAL è èõ îñòàëîñü òðè. Åñëè ïàìÿòü ñ äèñêîâîäîì ñòàíóò ëþòî âîåâàòü,
3 ïðîãðàììèñòà èãðàëè â ñåòêå â «DOOM». Âàì íè äåíåã, íè æåëåçà, íè ïîêîÿ íå âèäàòü.
1 ÷óòü-÷óòü çàìåøêàëñÿ è ñ÷¸ò ñòàë ðàâåí äâóì. Åñëè âäðóã â ìåíþ ñòàíäàðòíîì âàø êóðñîð íà÷íåò øàëèòü,
2 ïðîãðàììèñòà íàáðàëè äðóæíî «WIN». È äâîéíîé ùåë÷îê èêîíêó ñðàçó ìîæåò óäàëèòü,
1 óñòàë çàãðóçêè æäàòü îñòàëñÿ ëèøü îäèí. È ìîçãè ó áàçû äàííûõ ïåðåñòàíóò âäðóã âàðèòü,
Ýòî çíà÷èò, âñå ïðîïàëî, áåçâîçâðàòíî, ìîæåò áûòü.
1 ïðîãðàììèñò âñ¸ âçÿë ïîä ñâîé êîíòðîëü,
Íî âñòðåòèëñÿ ñ çàêàç÷èêîì è èõ îñòàëîñü íîëü. Åñëè íàäïèñü íà êîðîáêå ìîæåò äåëüíûé äàòü ñîâåò,
È ìûøèíûé êîâðèê äàæå ïîäêëþ÷èòüñÿ â Internet,
0 ïðîãðàììèñòîâ ðóãàë ñåðäèòûé øåô, À íåñíîñíûå ïðîãðàììû âàì îòêàæóò äåëîâî,
ïîòîì óâîëèë îäíîãî è ñòàëî èõ FF!!! Âèäèòå ëè, ïðîòîêîë èì íå ïîäõîäèò. Êàêîâî?
120 121
Åñëè âèä ó ìîíèòîðà êàê â ðàçáèòûå î÷êè, b)
È ïî ïëîñêîñòè ýêðàíà ðàñïëûâàþòñÿ çíà÷êè, 1. Çàêîíû ìàøèííîãî ïðîãðàììèðîâàíèÿ.
Âûêëþ÷àéòå ñâîé êîìïüþòåð è èäèòå ïîãóëÿòü. a) Ëþáàÿ äåéñòâóþùàÿ ïðîãðàììà óñòàðåëà.
ß óâåðåí, îí íå ñòàíåò ëàäèòü ñ âàìè. Åãî ...
! b) Ëþáàÿ ïðîãðàììà îáõîäèòñÿ äîðîæå è òðåáóåò áîëü-
øèõ çàòðàò âðåìåíè, ÷åì ïðåäïîëàãàëîñü.
Åñëè îò ðåçåðâíûõ êîïèé ïðîõóäèòñÿ ãèáêèé äèñê,
c) Åñëè ïðîãðàììà ïîëíîñòüþ îòëàæåíà, åå íóæíî áóäåò
È àññåìáëåðíûå âñòàâêè ïîâûøàþò ðåçêî ðèñê,
ñêîððåêòèðîâàòü.
Ëó÷øå âû ñîòðèòå ïàìÿòü, îòïàÿéòå ÏÇÓ
d) Ëþáàÿ ïðîãðàììà ñòðåìèòñÿ çàíÿòü âñþ äîñòóïíóþ
Áåñïîëåçíîå æåëåçî âàì, êîíå÷íî, íè ê ÷åìó.
ïàìÿòü.
F. Render into English e) Öåííîñòü ïðîãðàììû ïðÿìî ïðîïîðöèîíàëüíà âåñó åå
«âûäà÷è».
a)
f) Ñëîæíîñòü ïðîãðàììû ðàñòåò äî òåõ ïîð, ïîêà íå ïðå-
1. Åñëè âàì óäàëîñü íàïèñàòü ïðîãðàììó, â êîòîðîé òðàíñëÿòîð
âûñèò ñïîñîáíîñòè ïðîãðàììèñòà.
íå îáíàðóæèë îøèáîê, îáðàòèòåñü ê ñèñòåìíîìó ïðîãðàììè-
2. Ïîñòóëàòû Òðóìýíà ïî ïðîãðàììèðîâàíèþ.
ñòó îí èñïðàâèò îøèáêè â òðàíñëÿòîðå.
a) Ñàìàÿ ãðóáàÿ îøèáêà áóäåò âûÿâëåíà, ëèøü êîãäà
2. Ñîçäàäèì ðåàëüíóþ âèðòóàëüíîñòü!
ïðîãðàììà ïðîáóäåò â ïðîèçâîäñòâå ïî êðàéíåé ìåðå
3. Â ïðèðîäå ïðîãðàììèðîâàíèÿ ëåæèò òî, ÷òî íåò ñîîòíîøåíèÿ
ìåæäó «ðàçìåðàìè» ñàìîé îøèáêè è ïðîáëåìàìè, êîòîðûå ïîëãîäà.
îíà ñîçäàåò. b) Êîíòðîëüíûå ïåðôîêàðòû, êîòîðûå ðåøèòåëüíî íå
4. Êîãäà ïðîãðàììèñò èñïûòûâàåò çàòðóäíåíèÿ ïðè ïîèñêå îøèá- ìîãóò ñòîÿòü â íåïðàâèëüíîì ïîðÿäêå, áóäóò ïåðåïó-
êè, ýòî çíà÷èò, ÷òî îí èùåò íå òàì, ãäå ñëåäóåò. òàíû.
5. Ìîçã ÷åëîâåêà îáû÷íî çàãðóæåí ëèøü íà 10 % ñâîåé ìîùíîñòè: c) Åñëè íàçíà÷åí ñïåöèàëüíûé ÷åëîâåê äëÿ êîíòðîëÿ çà
îñòàëüíîå ðåçåðâ äëÿ îïåðàöèîííîé ñèñòåìû. ÷èñòîòîé èñõîäíîé èíôîðìàöèè, òî íàéäåòñÿ èçîáðåòà-
6. Âû÷èñëèòåëüíàÿ ìàøèíà îáëàäàåò ïðèòÿãàòåëüíîé ñèëîé áèë- òåëüíûé èäèîò, êîòîðûé ïðèäóìàåò ñïîñîá, ÷òîáû íå-
ëèàðäà èëè ìóçûêàëüíîãî àâòîìàòà, äîâåäåííîãî äî ëîãè÷åñ- ïðàâèëüíàÿ èíôîðìàöèÿ ïðîøëà ÷åðåç ýòîò êîíòðîëü.
êîé çàâåðøåííîñòè. d) Íåïå÷àòíûé æàðãîí ýòî òîò ÿçûê, êîòîðûì ðåøè-
7. Ïðîãðàììèñò, êàê ïîýò, ðàáîòàåò ïî÷òè èñêëþ÷èòåëüíî ãîëîâîé. òåëüíî âñå ïðîãðàììèñòû âëàäåþò â ñîâåðøåíñòâå.
8. Çàêîí Áðóêñà: åñëè ïðîãðàììèñòñêèé ïðîåêò íå óêëàäûâàåòñÿ 3. Çàêîí Íåéñåðà. Ìîæíî ñäåëàòü çàùèòó îò äóðàêà, íî òîëüêî íå
â ñðîêè, òî äîáàâëåíèå ðàáî÷åé ñèëû òîëüêî çàäåðæèò åãî îò èçîáðåòàòåëüíîãî.
îêîí÷àíèå. 4. Çàêîíû íåíàäåæíîñòè Äæèëáà.
9. Ïîëüçîâàòåëü íå çíàåò, ÷åãî îí õî÷åò, ïîêà íå óâèäèò òî, ÷òî a) Êîìïüþòåðû íåíàäåæíû, íî ëþäè åùå íåíàäåæíåå.
îí ïîëó÷èë. b) Ëþáàÿ ñèñòåìà, çàâèñÿùàÿ îò ÷åëîâå÷åñêîé íàäåæíî-
10. ß ñëûøó è çàáûâàþ. ß âèæó è çàïîìèíàþ. ß äåëàþ è ïîíèìàþ. ñòè, íåíàäåæíà.
11. Íà ïóñòîì äèñêå ìîæíî èñêàòü âå÷íî. c) ×èñëî îøèáîê, êîòîðûå íåëüçÿ îáíàðóæèòü, áåñêî-
12. ß ïèøó âñå ñâîè êðèòè÷åñêèå ïðîãðàììû íà àññåìáëåðå, à íå÷íî â ïðîòèâîâåñ ÷èñëó îøèáîê, êîòîðûå ìîæíî
êîìåäèéíûå íà ôîðòðàíå. îïðåäåëèòü îíî êîíå÷íî ïî îïðåäåëåíèþ.
13. Áåñïîëåçíî ïðèäóìûâàòü çàùèòó îò äóðàêà âåäü äóðàêè òàê d) Â ïîèñêè ïîâûøåíèÿ íàäåæíîñòè áóäóò âêëàäûâàòüñÿ
ãåíèàëüíû. ñðåäñòâà äî òåõ ïîð, ïîêà îíè íå ïðåâûñÿò âåëè÷èíó
14. Åñëè îòëàäêà ïðîöåññ óäàëåíèÿ îøèáîê, òî ïðîãðàììèðîâà- óáûòêîâ îò íåèçáåæíûõ îøèáîê èëè ïîêà êòî-íèáóäü
íèå äîëæíî áûòü ïðîöåññîì èõ âíåñåíèÿ. íå ïîòðåáóåò, ÷òîáû áûëà ñäåëàíà õîòü êàêàÿ-òî ïî-
15. ×òî äëÿ îäíîãî îøèáêà, äëÿ äðóãîãî êîìïüþòåðíûå äàííûå. ëåçíàÿ ðàáîòà.
122 123
Åñëè âèä ó ìîíèòîðà êàê â ðàçáèòûå î÷êè, b)
È ïî ïëîñêîñòè ýêðàíà ðàñïëûâàþòñÿ çíà÷êè, 1. Çàêîíû ìàøèííîãî ïðîãðàììèðîâàíèÿ.
Âûêëþ÷àéòå ñâîé êîìïüþòåð è èäèòå ïîãóëÿòü. a) Ëþáàÿ äåéñòâóþùàÿ ïðîãðàììà óñòàðåëà.
ß óâåðåí, îí íå ñòàíåò ëàäèòü ñ âàìè. Åãî ...
! b) Ëþáàÿ ïðîãðàììà îáõîäèòñÿ äîðîæå è òðåáóåò áîëü-
øèõ çàòðàò âðåìåíè, ÷åì ïðåäïîëàãàëîñü.
Åñëè îò ðåçåðâíûõ êîïèé ïðîõóäèòñÿ ãèáêèé äèñê,
c) Åñëè ïðîãðàììà ïîëíîñòüþ îòëàæåíà, åå íóæíî áóäåò
È àññåìáëåðíûå âñòàâêè ïîâûøàþò ðåçêî ðèñê,
ñêîððåêòèðîâàòü.
Ëó÷øå âû ñîòðèòå ïàìÿòü, îòïàÿéòå ÏÇÓ
d) Ëþáàÿ ïðîãðàììà ñòðåìèòñÿ çàíÿòü âñþ äîñòóïíóþ
Áåñïîëåçíîå æåëåçî âàì, êîíå÷íî, íè ê ÷åìó.
ïàìÿòü.
F. Render into English e) Öåííîñòü ïðîãðàììû ïðÿìî ïðîïîðöèîíàëüíà âåñó åå
«âûäà÷è».
a)
f) Ñëîæíîñòü ïðîãðàììû ðàñòåò äî òåõ ïîð, ïîêà íå ïðå-
1. Åñëè âàì óäàëîñü íàïèñàòü ïðîãðàììó, â êîòîðîé òðàíñëÿòîð
âûñèò ñïîñîáíîñòè ïðîãðàììèñòà.
íå îáíàðóæèë îøèáîê, îáðàòèòåñü ê ñèñòåìíîìó ïðîãðàììè-
2. Ïîñòóëàòû Òðóìýíà ïî ïðîãðàììèðîâàíèþ.
ñòó îí èñïðàâèò îøèáêè â òðàíñëÿòîðå.
a) Ñàìàÿ ãðóáàÿ îøèáêà áóäåò âûÿâëåíà, ëèøü êîãäà
2. Ñîçäàäèì ðåàëüíóþ âèðòóàëüíîñòü!
ïðîãðàììà ïðîáóäåò â ïðîèçâîäñòâå ïî êðàéíåé ìåðå
3. Â ïðèðîäå ïðîãðàììèðîâàíèÿ ëåæèò òî, ÷òî íåò ñîîòíîøåíèÿ
ìåæäó «ðàçìåðàìè» ñàìîé îøèáêè è ïðîáëåìàìè, êîòîðûå ïîëãîäà.
îíà ñîçäàåò. b) Êîíòðîëüíûå ïåðôîêàðòû, êîòîðûå ðåøèòåëüíî íå
4. Êîãäà ïðîãðàììèñò èñïûòûâàåò çàòðóäíåíèÿ ïðè ïîèñêå îøèá- ìîãóò ñòîÿòü â íåïðàâèëüíîì ïîðÿäêå, áóäóò ïåðåïó-
êè, ýòî çíà÷èò, ÷òî îí èùåò íå òàì, ãäå ñëåäóåò. òàíû.
5. Ìîçã ÷åëîâåêà îáû÷íî çàãðóæåí ëèøü íà 10 % ñâîåé ìîùíîñòè: c) Åñëè íàçíà÷åí ñïåöèàëüíûé ÷åëîâåê äëÿ êîíòðîëÿ çà
îñòàëüíîå ðåçåðâ äëÿ îïåðàöèîííîé ñèñòåìû. ÷èñòîòîé èñõîäíîé èíôîðìàöèè, òî íàéäåòñÿ èçîáðåòà-
6. Âû÷èñëèòåëüíàÿ ìàøèíà îáëàäàåò ïðèòÿãàòåëüíîé ñèëîé áèë- òåëüíûé èäèîò, êîòîðûé ïðèäóìàåò ñïîñîá, ÷òîáû íå-
ëèàðäà èëè ìóçûêàëüíîãî àâòîìàòà, äîâåäåííîãî äî ëîãè÷åñ- ïðàâèëüíàÿ èíôîðìàöèÿ ïðîøëà ÷åðåç ýòîò êîíòðîëü.
êîé çàâåðøåííîñòè. d) Íåïå÷àòíûé æàðãîí ýòî òîò ÿçûê, êîòîðûì ðåøè-
7. Ïðîãðàììèñò, êàê ïîýò, ðàáîòàåò ïî÷òè èñêëþ÷èòåëüíî ãîëîâîé. òåëüíî âñå ïðîãðàììèñòû âëàäåþò â ñîâåðøåíñòâå.
8. Çàêîí Áðóêñà: åñëè ïðîãðàììèñòñêèé ïðîåêò íå óêëàäûâàåòñÿ 3. Çàêîí Íåéñåðà. Ìîæíî ñäåëàòü çàùèòó îò äóðàêà, íî òîëüêî íå
â ñðîêè, òî äîáàâëåíèå ðàáî÷åé ñèëû òîëüêî çàäåðæèò åãî îò èçîáðåòàòåëüíîãî.
îêîí÷àíèå. 4. Çàêîíû íåíàäåæíîñòè Äæèëáà.
9. Ïîëüçîâàòåëü íå çíàåò, ÷åãî îí õî÷åò, ïîêà íå óâèäèò òî, ÷òî a) Êîìïüþòåðû íåíàäåæíû, íî ëþäè åùå íåíàäåæíåå.
îí ïîëó÷èë. b) Ëþáàÿ ñèñòåìà, çàâèñÿùàÿ îò ÷åëîâå÷åñêîé íàäåæíî-
10. ß ñëûøó è çàáûâàþ. ß âèæó è çàïîìèíàþ. ß äåëàþ è ïîíèìàþ. ñòè, íåíàäåæíà.
11. Íà ïóñòîì äèñêå ìîæíî èñêàòü âå÷íî. c) ×èñëî îøèáîê, êîòîðûå íåëüçÿ îáíàðóæèòü, áåñêî-
12. ß ïèøó âñå ñâîè êðèòè÷åñêèå ïðîãðàììû íà àññåìáëåðå, à íå÷íî â ïðîòèâîâåñ ÷èñëó îøèáîê, êîòîðûå ìîæíî
êîìåäèéíûå íà ôîðòðàíå. îïðåäåëèòü îíî êîíå÷íî ïî îïðåäåëåíèþ.
13. Áåñïîëåçíî ïðèäóìûâàòü çàùèòó îò äóðàêà âåäü äóðàêè òàê d) Â ïîèñêè ïîâûøåíèÿ íàäåæíîñòè áóäóò âêëàäûâàòüñÿ
ãåíèàëüíû. ñðåäñòâà äî òåõ ïîð, ïîêà îíè íå ïðåâûñÿò âåëè÷èíó
14. Åñëè îòëàäêà ïðîöåññ óäàëåíèÿ îøèáîê, òî ïðîãðàììèðîâà- óáûòêîâ îò íåèçáåæíûõ îøèáîê èëè ïîêà êòî-íèáóäü
íèå äîëæíî áûòü ïðîöåññîì èõ âíåñåíèÿ. íå ïîòðåáóåò, ÷òîáû áûëà ñäåëàíà õîòü êàêàÿ-òî ïî-
15. ×òî äëÿ îäíîãî îøèáêà, äëÿ äðóãîãî êîìïüþòåðíûå äàííûå. ëåçíàÿ ðàáîòà.
122 123
5. Òðåòèé çàêîí Ãðèäà. Ìàøèííàÿ ïðîãðàììà âûïîëíÿåò òî, ÷òî
âû åé ïðèêàçàëè äåëàòü, à íå òî, ÷òî âû áû õîòåëè, ÷òîáû îíà
Ñontents
äåëàëà.
6. Ïåðâàÿ êîìïüþòåðíàÿ àêñèîìà Ëåî Áåéçåðà. Çàêëàäûâàÿ ÷òî-òî
â ïàìÿòü ÝÂÌ, ïîìíèòå, êóäà âû ýòî ïîëîæèëè. Unit I.
7. Ðóêîâîäñòâî ïî ñèñòåìíîìó ïðîãðàììèðîâàíèþ Øòåéíáàõà. Hobby, Addiction, or Future Job? ................................................ 3
Íèêîãäà íå âûÿâëÿéòå â ïðîãðàììå îøèáêè, åñëè âû íå çíà- Unit II.
åòå, ÷òî ñ íèìè äàëüøå äåëàòü. Computo, ergo sum ...................................................................... 21
8. Çàêîí Áðóêà. Óâåëè÷åíèå ÷èñëà ó÷àñòíèêîâ ïðè ïîäãîòîâêå Unit III.
îïàçäûâàþùåé ïðîãðàììû òîëüêî çàìåäëÿåò ïðîöåññ. The Development of Computers ................................................... 34
9. Çàêîíû ìèðà ÝÂÌ ïî Ãîëóáó.
Unit IV.
a) Íåòî÷íî ñïëàíèðîâàííàÿ ïðîãðàììà òðåáóåò â òðè ðàçà
áîëüøå âðåìåíè, ÷åì ïðåäïîëàãàëîñü; òùàòåëüíî ñïëà- Personal Computers ...................................................................... 51
íèðîâàííàÿ òîëüêî â äâà ðàçà. Unit V.
b) Ðàáîòàþùàÿ íàä ïðîãðàììîé ãðóïïà ïèòàåò îòâðàùå- Computer and Ñrime ................................................................... 65
íèå ê åæåíåäåëüíîé îò÷åòíîñòè î äîñòèãíóòûõ ðåçóëü- Unit VI.
òàòàõ, ïîñêîëüêó îíà ñëèøêîì ÿâíî ñâèäåòåëüñòâóåò Computer Security ....................................................................... 75
îá îòñóòñòâèè òàêîâûõ.
Unit VII.
10. Ïðèíöèï Øîó. Ñîçäàéòå ñèñòåìó, êîòîðîé ñìîæåò ïîëüçîâàòü-
ñÿ äàæå äóðàê, è òîëüêî äóðàê çàõî÷åò åþ ïîëüçîâàòüñÿ. Virtual Reality ............................................................................... 88
Unit VIII.
IT Revolution ................................................................................ 96
Unit IX.
Humor the Computer ................................................................. 110
Literature
1. C. Perron. Computers and Information Systems /T ools for an Infor-
mation Age. USA, 1993.
2. A. Burgmeier. Lexis. Academic Vocabulary Study. USA, NJ, 1991.
3. R. White. PC Computing /H ow Computer Works. USA, 1994.
4. P. Duffy. Focus on Innovators and Inventions. USA, NJ, 1994.
5. L. Latulippe. Developing Academic Reading Skills. USA, 1994.
6. F. ODell. English Panorama. UK, 1998.
7. I. Sinclair. Collins Dictionary of Personal Computers. Moscow, 1996.
8. Websters New-World Dictionary of Computer Terms. USA, NY,
1996.
9. Computer magazines: Byte, Computer, Webserver, «Äîìàøíèé
êîìïüþòåð» 19972000.
10. Readers Digest. USA; Forum, USA.; English Learners Digest,
Kiev. 19972000.
124 125
5. Òðåòèé çàêîí Ãðèäà. Ìàøèííàÿ ïðîãðàììà âûïîëíÿåò òî, ÷òî
âû åé ïðèêàçàëè äåëàòü, à íå òî, ÷òî âû áû õîòåëè, ÷òîáû îíà
Ñontents
äåëàëà.
6. Ïåðâàÿ êîìïüþòåðíàÿ àêñèîìà Ëåî Áåéçåðà. Çàêëàäûâàÿ ÷òî-òî
â ïàìÿòü ÝÂÌ, ïîìíèòå, êóäà âû ýòî ïîëîæèëè. Unit I.
7. Ðóêîâîäñòâî ïî ñèñòåìíîìó ïðîãðàììèðîâàíèþ Øòåéíáàõà. Hobby, Addiction, or Future Job? ................................................ 3
Íèêîãäà íå âûÿâëÿéòå â ïðîãðàììå îøèáêè, åñëè âû íå çíà- Unit II.
åòå, ÷òî ñ íèìè äàëüøå äåëàòü. Computo, ergo sum ...................................................................... 21
8. Çàêîí Áðóêà. Óâåëè÷åíèå ÷èñëà ó÷àñòíèêîâ ïðè ïîäãîòîâêå Unit III.
îïàçäûâàþùåé ïðîãðàììû òîëüêî çàìåäëÿåò ïðîöåññ. The Development of Computers ................................................... 34
9. Çàêîíû ìèðà ÝÂÌ ïî Ãîëóáó.
Unit IV.
a) Íåòî÷íî ñïëàíèðîâàííàÿ ïðîãðàììà òðåáóåò â òðè ðàçà
áîëüøå âðåìåíè, ÷åì ïðåäïîëàãàëîñü; òùàòåëüíî ñïëà- Personal Computers ...................................................................... 51
íèðîâàííàÿ òîëüêî â äâà ðàçà. Unit V.
b) Ðàáîòàþùàÿ íàä ïðîãðàììîé ãðóïïà ïèòàåò îòâðàùå- Computer and Ñrime ................................................................... 65
íèå ê åæåíåäåëüíîé îò÷åòíîñòè î äîñòèãíóòûõ ðåçóëü- Unit VI.
òàòàõ, ïîñêîëüêó îíà ñëèøêîì ÿâíî ñâèäåòåëüñòâóåò Computer Security ....................................................................... 75
îá îòñóòñòâèè òàêîâûõ.
Unit VII.
10. Ïðèíöèï Øîó. Ñîçäàéòå ñèñòåìó, êîòîðîé ñìîæåò ïîëüçîâàòü-
ñÿ äàæå äóðàê, è òîëüêî äóðàê çàõî÷åò åþ ïîëüçîâàòüñÿ. Virtual Reality ............................................................................... 88
Unit VIII.
IT Revolution ................................................................................ 96
Unit IX.
Humor the Computer ................................................................. 110
Literature
1. C. Perron. Computers and Information Systems /T ools for an Infor-
mation Age. USA, 1993.
2. A. Burgmeier. Lexis. Academic Vocabulary Study. USA, NJ, 1991.
3. R. White. PC Computing /H ow Computer Works. USA, 1994.
4. P. Duffy. Focus on Innovators and Inventions. USA, NJ, 1994.
5. L. Latulippe. Developing Academic Reading Skills. USA, 1994.
6. F. ODell. English Panorama. UK, 1998.
7. I. Sinclair. Collins Dictionary of Personal Computers. Moscow, 1996.
8. Websters New-World Dictionary of Computer Terms. USA, NY,
1996.
9. Computer magazines: Byte, Computer, Webserver, «Äîìàøíèé
êîìïüþòåð» 19972000.
10. Readers Digest. USA; Forum, USA.; English Learners Digest,
Kiev. 19972000.
124 125
Ó÷åáíîå èçäàíèå
Ó÷åáíîå ïîñîáèå
01.10.2012.
« », 117342, , . , . 17 ,
. 324. ./ : (495) 334-82-65; . (495)
336-03-11.
E-mail: flinta@mail.ru; WebSite: www.flinta.ru
126 127