Computer in Use. Маркушевская Л.П - 59 стр.

UptoLike

59
Notes
privacy-invading control – контроль с нарушением права личной независимости
take advantage – воспользоваться преимуществом
COMPEHENSION CHECK
Exercise 1. Answer the questions.
1. What are the benefits for mankind connected with computers?
2. What are possible harms involved by computers using?
3. What is to be done to maximize the benefits and minimize the harms?
4. What is the best way of protecting our fundamental values?
Exercise 2. Read “Commandments of Computers Ethics” and give your reasons
"pro" or "contra" these rules.
Commandments of Computer Ethics.
1. You should not use a computer to harm other people.
2. You should not interfere with other people’s computer work.
3. You should not snoop around in the other people’s computer files.
4. You should not use a computer to bear false witness.
5. You should not copy or use proprietary software for which you have not paid.
6. You should not use other people’s computer resources without authorization or
proper compensation.
7. You should not appropriate other people’s intellectual output.
8. You should think about social consequences of the program you are writing or the
system your are designing.
9. You should always use a computer in ways that insure consideration and respect
for your fellow humans.
Notes
to snoop around - подглядывать, заглядывать
to bear false witness - собирать ложную информацию
LANGUAGE ACTIVITY
Exercise 1. Translate the sentences below, paying special attention to the
equivalents of the Modal Verbs.
1.
Old-fashioned people will have to accept the reality of the Internet world.
2. We can’t continue our work. First, we are to bring light on the cause of the
computer failure.
3. The first Internet created by Advanced Research Project Agency was to become
the world’s first indestructible defense communications network.
4. Only experienced programmers were allowed to work with the new systems.