Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
англ яз в сфере комп.технологий.doc
Скачиваний:
13
Добавлен:
16.11.2019
Размер:
874.5 Кб
Скачать

Supplementary reading

Text 1

RUSSIA'S TELECOMMUNICATIONS ROADS GET WIDER, MORE EXPENSIVE

In the last days of 2000 the government approved "in principle" of a draft concept for developing the market of telecommunications services, extending till the year 2010. What are the likely implications of that decision?

Under the approved project further efforts in the telecommunications market must be geared to meet the growing demand for communications services. According to the Ministry of Communications, 54,000 communities in Russia have not a single telephone. Communications networks development has been and still is the job of traditional operators. Bills paid by retail subscribers cover a mere 77 percent of local telephone communications costs.

According to the most conservative estimates, the development of the national telephone infrastructure will require an investment of $33 billion over a period of ten years. The number of ordinary telephones will grow from 31.2 million in 2000 to 47.7 million in 2010, and of mobile telephones, from 2.9 million to 22.2 million. The army of Internet users by 2010 will go up from 2.5 million to 26.1 million.

For communications operators to be effective control will be established of the fair access of one operator to the other operator's network. No operator will be allowed to refuse access to its infrastructure to another operator. And tariffs for all market participants should be the same.

Having examined the concept the Ministry of Communication, the Ministry of Economic Development and Trade and the Anti-Monopoly Policies Ministry ordered finalizing the document within a two-month deadline and present it in one package with a plan for implementation measures to the Cabinet of Ministers. In the meantime, the Russian communications market is booming. Investments in 2000 exceeded by far those witnessed by pre-crisis 1997. National industrial operators are in the growth phase.

For the past few years the telecommunications divisions of several giants (such as the Ministry of Railways, Gazprom and others companies) have stormed the domestic market, but none has gained full access to this day. The possibility remains, though, that these companies next year may gain the status of a full-fledged operator. However, before they can count on the right to provide communications services in the domestic market, the operators of corporate telecommunications networks must settle their debts to the government, Communications Minister Leonid Reiman told Vek. He believes that these operators may settle their liabilities by transferring part of their shares to the State Property Ministry.

The Communications Ministry has conducted negotiations with the Defense Ministry on using certain frequencies for civilian purposes. Reiman said four percent of the radio frequencies were used by civil services, 20 percent, jointly by military and civil services, and the others were exempt from conversion. The Communications Ministry does not dismiss the possibility of operators' financial participation in the conversion of frequency ranges to civilian uses altogether. The issue of licenses to use vacant frequencies through contests may prove a means to raise funds for the mobile communication sector. The government has approved of issuing contested licenses for frequency ranges above 1800 MHz, and for third generation cellular systems.

Of the main methods the government uses to control the telecommunications market, alongside technological policies and perfection of service provision principles, one should point to the control of tariffs, minimization of cross subsidies, optimization of tariffs structure by consumer and regional sectors, transition as of 2002 to limit pricing-based tariffs, and the introduction of a system of universal services. The effective control and operation of the industry should provide support for domestic producers and safeguard national interests during the restructuring of companies, including Svyazinvest.

Svyazinvest is in the process of enlargement and reorganization. Instead of the 89 regional operators it is creating a new structure uniting seven to fifteen communications operators. This measure is expected to make the company easier to control and increase its shareholder value. The General Director of OAO Nizhegorodsvyazinform Vladimir Lyulin and Managing Director of the investment bank Group Gamma Timur Khusainov in December signed a contract on the provision of information and consulting services within the framework of the unification of eleven regional communications operators in the Volga river area.

Nizhegorodsyavinform will be the base company in the Volga area, taking over ten other regional communications operators - OAO Kirovelektrosvyaz, OAO Martelkom of the Republic of Mari El,

OAO Svyazinform of the Republic of Mordovia, OAO Elektrosvyaz of the Orenburg Region, OAO Svyazinform of the Penza Region, OAO Svyazinform of the Samara Region, Saratovelektrosvyaz, Telecommunications Networks of the Udmurt Republic, Elektrosvyaz of the Ulyanovsk Region, and Svyazinform of the Chuvash Republic. The unification process is due to be completed by the beginning of 2003.

The number of trunk communication lines over the past two years grew noticeably. Rostelecom and Transtelecom have been discussing the possibilities of Asia-Europe traffic. Companies in the West have turned an attentive ear to this news. Some are drawing plans for doing business in Russia. The main conclusion is that the economy's drift from material production to information technologies implies the growing role of telecommunications . Those companies which fail to reorganize their policies and development priorities in time, will fail in market competition. A shift of the emphasis from the transmission of voice to the transmission of data is the mainstream trend in the telecommunications business.

Market economy development will give Russia convenient and high quality telecommunications roads. However, only those companies that have opted for new development models will make a rapid headway.

DEVELOPING OF TELECOMMUNICATIONS

Late in the nineteenth century communications facilities were augmented by a new invention – telephone. In the USA its use slowly expanded, and by 1900 the American Telephone and Telegraph Company controlled 855,000 telephones; but elsewhere the telephone made little headway until the twentieth century. After 1900, however, telephone installations extended much more rapidly in all the wealthier countries. The number of telephones in use in the world grew at almost 100 per cent per decade. But long-distance telephone services gradually developed and began to compete with telegraphic business. A greater contribution to long-range communication came with the development of wireless. Before the outbreak of the First World War wireless telegraphy was established as a means of regular communication with ships at sea, and provided a valuable supplement to existing telegraph lines and cables. In the next few years the telephone systems of all the chief countries were connected with each other by radio. Far more immediate was the influence that radio had through broadcasting and by television, which followed it at an interval of about twenty-five years.

Telephones are as much a form of infrastructure as roads or electricity, and competition will make them cheaper. Losses from lower prices will be countered by higher usage, and tax revenues will benefit from the faster economic growth that telephones bring about. Most important of all, by cutting out the need to install costly cables and microwave transmitters, the new telephones could be a boon to the remote and poor regions of the earth. Even today, half the world’s population lives more than two hours away from a telephone, and that is one reason why they find it hard to break out of their poverty. A farmer’s call for advice could save a whole crop; access to a handset could help a small rural business sell its wares. And in rich places with reasonable telephone systems already in place, the effect of new entrants – the replacement of bad, overpriced services with clever, cheaper ones – is less dramatic but still considerable.

Global phones are not going to deliver all these benefits at once, or easily. Indeed, if the market fails to develop, it could prove too small to support the costs of launching satellites. Still, that is a risk worth taking. And these new global telephones reflect a wider trend. Lots of other new communication services – on-line film libraries, personal computers that can send video-clips and sound-bites as easily as they can be used for writing letters, terrestrial mobile-telephone systems cheap enough to replace hard-wired family sets – are already technically possible. What they all need is deregulation. Then any of them could bring about changes just as unexpected and just as magical as anything that Alexander Graham Bell’s telephone has already achieved.

SATTELITE SIRVICES

Our world has become an increasingly complex place in which, as individuals, we are very dependent on other people and on organizations. An event in some distant part of the globe can rapidly and significantly affect the quality of life in our home country.

This increasing independence, on both a national and international scale, has led us to create systems that can respond immediately to dangers, enabling appropriate defensive or offensive actions to be taken. These systems are operating all around us in military, civil, commercial and industrial fields.

A worldwide system of satellites has been created, and it is possible to transmit signals around the globe by bouncing them from on satellite to an earth station and thence to another satellite.

Originally designed to carry voice traffic, they are able to carry hundreds of thousands of separate simultaneous calls. These systems are being increasingly adopted to provide for business communications, including the transmission of traffic for voice, facsimile, data and vision.

It is probable that future satellite services will enable a great variety of information services to transmit directly into the home, possibly including personalized electronic mail. The electronic computer is at the heart of many such systems, but the role of telecommunications is not less important. There will be a further convergence between the technologies of computing and telecommunications. The change will be dramatic: the database culture, the cashless society, the office at home, the gigabit-per-second data network.

We cannot doubt that the economic and social impact of these concepts will be very significant. Already, advanced systems of communication are affecting both the layman and the technician . Complex functions are being performed by people using advanced terminals which are intended to be as easy to use as the conventional telephone.

The new global satellite-communications systems will offer three kinds of service, which may overlap in many different kinds of receivers:

Voice. Satellite telephones will be able to make calls from anywhere on earth to anywhere else. That could make them especially useful to remote, third-world villages (some of which already use stationary satellite telephones), explorers and disaster-relief teams. Today’s mobile phones depend on earth-bound transmitters, whose technical standards vary from country to country. So business travelers cannot use their mobile phones on international trips. Satellite telephones would make that possible.

Massaging. Satellite messagers have the same global coverage as satellite telephones, but carry text alone, which could be useful for those with laptop computers. Equipped with a small screen like today’s pagers, satellite messagers will also receive short messages.

Tracking. Voice and messaging systems will also tell their users where they are to within a few hundred metres. Combined with the messaging service, the location service could help rescue teams to find stranded adventurers, the police to find stolen cars, exporters to follow the progress of cargoes, and haulage companies to check that drivers are not detouring to the pub. Satellite systems will provide better positioning information to anyone who has a receiver for their signals.

Text 2

What is computer virus?

1. What is computer virus?

A virus is a piece of software designed and written to adversely affect your computer by altering the way it works without your knowledge or permission. In more technical terms, a virus is a segment of program code that implants itself to one of your executable files and spreads systematically from one file to another. Computer viruses do not spontaneously generate: They must be written and have a specific purpose.

Usually a virus has two distinct functions:

  • Spreads itself from one file to another without your input or knowledge. Technically, this is known as self-replication and propagation.

  • Implements the symptom or damage planned by the perpetrator. This could include erasing a disk, corrupting your programs or just creating havoc on your computer. Technically, this is known as the virus payload, which can be benign or malignant at the whim of the virus creator.

A benign virus is one that is designed to do no real damage to your computer. For example, a virus that conceals itself until some predetermined date or time and then does nothing more than display some sort of message is considered benign.

A malignant virus is one that attempts to inflict malicious damage to your computer, although the damage may not be intentional. There are a significant number of viruses that cause damage due to poor programming and outright bugs in the viral code. A malicious virus might alter one or more of your programs so that it does not work, as it should. The infected program might terminate abnormally, write incorrect information into your documents. Or, the virus might alter the directory information on one of your system area. This might prevent the partition from mounting, or you might not be able to launch one or more programs, or programs might not be able to locate the documents you want to open.

Some of the viruses identified are benign; however, a high percentage of them are very malignant. Some of the more malignant viruses will erase your entire hard disk, or delete files.

What Viruses Do

Some viruses are programmed specifically to damage the data on your computer by corrupting programs, deleting files, or erasing your entire hard disk. Many of the currently known Macintosh viruses are not designed to do any damage. However, because of bugs (programming errors) within the virus, an infected system may behave erratically.

What Viruses Don't Do

Computer viruses don't infect files on write-protected disks and don't infect documents, except in the case of Word macro viruses, which infect only documents and templates written in Word 6.0 or higher. They don't infect compressed files either. However, applications within a compressed file could have been infected before they were compressed. Viruses also don't infect computer hardware, such as monitors or computer chips; they only infect software.

In addition, Macintosh viruses don't infect DOS-based computer software and vice versa. For example, the infamous Michelangelo virus does not infect Macintosh applications. Again, exceptions to this rule are the Word and Excel macro viruses, which infect spreadsheets, documents and templates, which can be opened by either Windows or Macintosh computers.

Finally, viruses don't necessarily let you know that they are there - even after they do something destructive. [1]

2. Types of Computer Viruses

Nowadays number of viruses is about 55000. It increases constantly. New unknown types of viruses appear. To classify them becomes more and more difficult. In common they can be divided by three basic signs: a place of situating, used operation system and work algorithms. For example according these three classifications virus Chernobyl can be classified as file infector and resident Windows virus. Further it will be explained what it means.

2.1 A place of existence

2.1.1 File Infectors

These are viruses that attach themselves to (or replace) .COM and .EXE files, although in some cases they can infect files with extensions .SYS,

.DRV, .BIN, .OVL and .OVY. With this type of virus, uninfected programs usually become infected when they are executed with the virus in memory. In other cases they are infected when they are opened (such as using the DOS DIR command) or the virus simply infects all of the files in the directory is run from (a direct infector).There are three groups of file infectors.

Viruses of the first group are called overwriting viruses because they overwrite their code into infected file erasing contents. But these viruses are primitive and they can be found very quickly.

Other group is called parasitic or cavity viruses. Infected file is capable of work fully or partly but contents of last one are changed.

Viruses can copy itself into begin, middle or end of a file. They record their code in data known not to be used.

Third group is called companion viruses. They don’t change files. They make double of infected file so when infected file is being started a double file becomes managing, it means virus. For example companion viruses working with DOS use that DOS firstly runs COM. file and after if this file is not found runs EXE. file. Viruses make double file with a same name and with extension COM and copies itself in this file. During start of infected file DOS runs a COM. file with a virus firstly and then a virus starts an EXE. file.

Sometime companion viruses rename file will be infected and record their code in a double file with old name. For example the file XCOPY.EXE is renamed into XCOPY.EXD and virus record itself in file XCOPY.EXE. When this file is started computer runs a virus code firstly and after virus starts original XCOPY, saved as XCOPY.EXD. Viruses like this were found not only in DOS. They were found in Windows and OS/2.

It is not only one way to make double files. For example there is subgroup of companion viruses called path-companion viruses. They use special feature of DOS - PATH: hierarchical record of file location. Virus copies itself in file with the same name but situated one level higher. In this case DOS will find file with virus. [2]

2.1.2 Boot viruses

Boot Sector Infectors

Every logical drive, both hard disk and floppy, contains a boot sector.This is true even of disks that are not bootable. This boot sector contains specific information relating to the formatting of the disk, the data stored there and also contains a small program called the boot program(which loads the DOS system files). The boot program displays the familiar "Non-system Disk or Disk Error" message if the DOS system files are not present. It is also the program that gets infected by viruses. You get a boot sector virus by leaving an infected diskette in a drive and rebooting the machine. When the boot sector program is read and executed, the virus goes into memory and infects your hard drive. Remember, because every disk has a boot sector, it is possible (and common) to infect a machine from a data disk. NOTE: Both floppy diskettes and hard drives contain boot sectors.

Master Boot Record Infectors

The first physical sector of every hard disk (Side III, Track III, Sector)

1) contains the disk's Master Boot Record and Partition Table. The Master Boot Record has a small program within it called the Master Boot Program, which looks up the values in the partition table for the starting location of the bootable partition, and then tells the system to go there and execute any code it finds. Assuming your disk is set up properly, what it finds in that location (Side 1, Track Ш, Sector 1) is a valid boot sector.

On floppy disks, these same viruses infect the boot sectors. You get a Master Boot Record virus in exactly the same manner you get a boot sector virus -- by leaving an infected diskette in a drive and rebooting the machine. When the boot sector program is read and executed, the virus goes into memory and infects the MBR of your hard drive. Again, because every disk has a boot sector, it is possible (and common) to infect a machine from a data disk. [3]

2.1.3 Multi-partite Viruses

Multi-partite viruses are a combination of the viruses listed above.They will infect both files and MBRs or both files and boot sectors. These types of viruses are currently rare, but the number of cases is growing steadily.

2.1.4 Macro Viruses

Until recently, the macro languages included with most applications were not powerful or robust enough to support writing an effective virus. However, many of the more advanced applications that are being developed today include built-in programming capabilities that rival some of the larger development packages. This has recently been demonstrated by the various strains of Microsoft Word viruses, including the so-called Word Concept and Word Nuclear viruses. These viruses transport themselves through Microsoft Word documents. When opened in Word, they perform various actions, including spreading themselves into the user's installation of Word, thus preparing to infect all future documents on the system. An additional concern is that macro viruses can be cross-platform. The Word Concept virus has the claim to fame of being the first prominent cross- platform virus, because it can infect both Windows and Macintosh systems. Because most application macro languages support passing execution to an external shell, such as COMMAND.COM or CMD.EXE, the power of the macro virus is not limited to the constraints of the macro language itself[4].

2.2 Used operation system

Any computer or net virus can infect files of one or more operation systems: DOS, Windows, OS/2, Linux, MacOS and others. It is a base of this way of classification. For example virus BOZA working with Windows only is classified as Windows virus, virus BLISS – as Linux virus.

2.3 Work algorithms

Viruses can be differed by used algorithms making them danger and hard for catching. Firstly viruses can be divided on resident and nonresident. Resident virus having come in operation memory of computer doesn’t infect memory. They are capable of copying when they are started only. We can call any macro virus resident. They present in memory during application infected by them works. Second viruses are visible and invisible. To be invisible means that users and antivirus programs can’t notice changes of infected file done by virus. Invisible virus catches all requires of operation system to read file and to record in file and shows uninfected version of file. So we can see only ‘clear’ programs during virus works. One of first invisible file infectors was FRODO and boot infector – BRAIN. Almost any virus uses methods of self-coding or polymorphism to escape antivirus programs. It means that they can change itself. Changing itself helps virus to be able work [5].

3. Conclusion

In conclusion a few words about future of this classification. Nowadays computer technologies and all software develop very quickly. It helps new types of computer viruses to appear. Viruses are becoming more and more dangerous and ‘cleverer’. It means that viruses can be found more and more hard. But this classification can be saved a long time thank for principles of work of computer. It means that this classification will be changed when computers work by principles that differ from principles of von Neiman. So this classification can be change by adding new subtypes of basic types if virus makers have created something new.

Text 3

RADIO

RADIO transmission or reception of electromagnetic radiation in the radio frequency range. The term is commonly applied also to the equipment used, especially to the radio receiver.

Uses of Radio Waves

The prime purpose of radio is to convey information from one place to another through the intervening media (i.e., air, space, no conducting materials) without wires. Besides being used for transmitting sound and television signals, radio is used for the transmission of data in coded form. In the form of radar it is used also for sending out signals and picking up their reflections from objects in their path. Long-range radio signals enable astronauts to communicate with the earth from the moon and carry information from space probes as they travel to distant planets (see space exploration). For navigation of ships and aircraft the radio range, radio compass (or direction finder), and radio time signals are widely used. Radio signals sent from global positioning satellites can also be used by special receivers for a precise indication of position (see navigation satellite). Digital radio, both satellite and terrestrial provides improved audio clarity and volume. Various remote-control devices, including rocket and artificial satellite operations systems and automatic valves in pipelines, are activated by radio signals. The development of the transistor and other microelectronic devices (see microelectronics) led to the development of portable transmitters and receivers. Cellular and cordless telephones are actually radio transceivers. Many telephone calls routinely are relayed by radio rather than by wires; some are sent via radio to relay satellites. Some celestial bodies and interstellar gases emit relatively strong radio waves that are observed with radio telescopes composed of very sensitive receivers and large directional antennas (see radio astronomy).

Transmission and Reception of Radio Waves

For the propagation and interception of radio waves, a transmitter and receiver are employed. A radio wave acts as a carrier of information-bearing signals; the information may be encoded directly on the wave by periodically interrupting its transmission (as in dot-and-dash telegraphy) or impressed on it by a process called modulation. The actual information in a modulated signal is contained in its sidebands, or frequencies added to the carrier wave, rather than in the carrier wave itself. The two most common types of modulation used in radio are amplitude modulation (AM) and frequency modulation (FM). Frequency modulation minimizes noise and provides greater fidelity than amplitude modulation, which is the older method of broadcasting. Both AM and FM are analog transmission systems, that is, they process sounds into continuously varying patterns of electrical signals which resemble sound waves. Digital radio uses a transmission system in which the signals propagate as discrete voltage pulses, that is, as patterns of numbers; before transmission, an analog audio signal is converted into a digital signal, which may be transmitted in the AM or FM frequency range. A digital radio broadcast offers compact-disc-quality reception and reproduction on the FM band and FM-quality reception and reproduction on the AM band.

In its most common form, radio is used for the transmission of sounds (voice and music) and pictures (television). The sounds and images are converted into electrical signals by a microphone (sounds) or video camera (images), amplified, and used to modulate a carrier wave that has been generated by an oscillator circuit in a transmitter. The modulated carrier is also amplified, and then applied to an antenna that converts the electrical signals to electromagnetic waves for radiation into space. Such waves radiate at the speed of light and are transmitted not only by line of sight but also by deflection from the ionosphere. Receiving antennas intercept part of this radiation, change it back to the form of electrical signals, and feed it to a receiver. The most efficient and most common circuit for radio-frequency selection and amplification used in radio receivers is the superheterodyne. In that system, incoming signals are mixed with a signal from a local oscillator to produce intermediate frequencies (IF) that are equal to the arithmetical sum and difference of the incoming and local frequencies. One of those frequencies is applied to an amplifier. Because the IF amplifier operates at a single frequency, namely the intermediate frequency, it can be built for optimum selectivity and gain. The tuning control on a radio receiver adjusts the local oscillator frequency. If the incoming signals are above the threshold of sensitivity of the receiver and if the receiver is tuned to the frequency of the signal, it will amplify the signal and feed it to circuits that demodulate it, i.e., separate the signal wave itself from the carrier wave.

There are certain differences between AM and FM receivers. In an AM transmission the carrier wave is constant in frequency and varies in amplitude (strength) according to the sounds present at the microphone; in FM the carrier is constant in amplitude and varies in frequency. Because the noise that affects radio signals is partly, but not completely, manifested in amplitude variations, wideband FM receivers are inherently less sensitive to noise. In an FM receiver, the limiter and discriminator stages are circuits that respond solely to changes in frequency. The other stages of the FM receiver are similar to those of the AM receiver but require more care in design and assembly to make full use of FM's advantages. FM is also used in television sound systems. In both radio and television receivers, once the basic signals have been separated from the carrier wave they are fed to a loudspeaker or a display device (usually a cathode-ray tube), where they are converted into sound and visual images, respectively.

Development of Radio Technology

Radio is based on the studies of James Clerk Maxwell, who developed the mathematical theory of electromagnetic waves, and Heinrich Hertz, who devised an apparatus for generating and detecting them. Guglielmo Marconi, recognizing the possibility of using these waves for a wireless communication system, gave a demonstration (1895) of the wireless telegraph, using Hertz's spark coil as a transmitter and Edouard Branly's coherer (a radio detector in which the conductance between two conductors is improved by the passage of a high-frequency current) as the first radio receiver. The effective operating distance of this system increased as the equipment was improved, and in 1901, Marconi succeeded in sending the letter S across the Atlantic Ocean using Morse code . In 1904, Sir John A. Fleming developed the first vacuum electron tube , which was able to detect radio waves electronically. Two years later, Lee de Forest invented the audion, a type of triode, or three-element tube, which not only detected radio waves but also amplified them.

Radio telephony—the transmission of music and speech—also began in 1906 with the work of Reginald Fessiden and Ernst F. W. Alexanderson, but it was not until Edwin H. Armstrong patented (1913) the circuit for the regenerative receiver that long-range radio reception became practicable. The major developments in radio initially were for ship-to-shore communications. Following the establishment (1920) of station KDKA at Pittsburgh, Pa., the first commercial broadcasting station in the United States, technical improvements in the industry increased, as did radio's popularity. In 1926 the first broadcasting network was formed, ushering in the golden age of radio. Generally credited with creating the first modern broadband FM system, Armstrong built and operated the first FM radio station, KE2XCC, in 1938 at Alpine, N.J. The least expensive form of entertainment during the Great Depression, the radio receiver became a standard household fixture, particularly in the United States. Subsequent research gave rise to countless technical improvements and to such applications as radio facsimile , radar, and television. The latter changed radio programming drastically, and the 1940s and 50s witnessed the migration of the most popular comedy and drama shows from radio to television. Radio programmings became mostly music and news and, to a lesser extent, talk shows. The turn of the century saw a potential rebirth for radio as mobile digital radio entered the market with a satellite-based subscription service in Europe (1998) and in the United States (2000). Two years later, a land-based digital radio subscription service was inaugurated in the United States.

Radios that combine transmitters and receivers are now widely used for communications. Police and military forces and various businesses commonly use such radios to maintain contact with dispersed individuals or groups. Citizens band (CB) radios, two-way radios operating at frequencies near 27 megahertz, most typically used in vehicles for communication while traveling, became popular in the 1970s. Cellular telephones, despite the name, are another popular form of radio used for communication.

Text 4