Главная | Обратная связь | Поможем написать вашу работу!
МегаЛекции

Altitudinal Meteorological Mast (AMM)




A unique scientific and technical object of Scientific and Research Institutions of Roshydromet

 

Altitudinal Meteorological Mast is supported by the Ministry of Industry, Science and Technologies of the Russian Federation as a unique installation of Russia. The registration number is 0202.

AMM-310 is commissioned in 1959. AMM-310 represents a tubular structure with a height of 310 m and diameter 2,3 m; it is installed on a spherical fulcrum, and is supported in a vertical position with the aid of multi-tier rope system. There is a lift inside a mast for realization of experiments and upkeep of equipment. There are 13 working platforms with four sliding probes with length of 6 m for the arrangement of a measuring apparatus. AMM-310 does not have analogs in Russian Federation and countries of CIS. It is distinguished by equipment and integrated approach in measurement of parameters, including meteorological magnitudes (temperature and humidity of an air, velocity and direction of a wind, pressure), turbulent characteristics, optical performances on sloping lines. The parameters of solar radiation, deposits, clouds and radio-activity of an air, and also velocity and direction of a wind near the surface are measured on the meteorological ground near AMM-310. The gathering and handling of an information obtained with the aid of the measuring complex AMM-310 is carried out on the base of computer technology. The basic virtue and advantage of AMM-310 in a comparison with the other methods of research of a boundary layer of an atmosphere is the possibility of a synchronous measurement of meteorological and other physical magnitudes in a 300-meter stratum with any time and high-altitude resolution under any weather conditions.

The major directions of scientific researches for which AMM-310 is intended are experimental researches in a boundary layer of an atmosphere of a temperature and wind conditions, turbulence, conditions of transposition and scattering of an impurity, heat and mass exchange between a spreading surface and atmosphere. The information obtained with the aid of AMM-310 can be used for a solution of a lot of tasks of scientific and applied character:

a) Improvement of local weather forecast (precipitations, advection, fogs, ice, low clouds, shifts of a wind, frontal zones);

b) Monitoring and prognosis of contamination of an atmospheric air, ecological monitoring;

c) High-altitude monitoring of a climate of cities (temperature and wind condition);

d) Operative upkeep of the airports, building organizations, rescue organizations, enterprises polluting an atmosphere;

e) Distribution of radiowaves, optical and laser radiation;

f) Wind energy and wind loads.

EXERCISE EXERCISE 11 Speak about antenna-feeder devices, using the information from the texts

UNIT VII

Computer crimes

EXERCISE 1

Read and translate the text using words and word combinations:

balance the budget – составлять бюджет, ликвидировать дефицит бюджета

a tool – инструмент

to misuse – неправильно использовать

spreadsheet - крупноформатная (электронная) таблица

distinctly different sense of humour – совершенно особое чувство юмора

to do freelance – заниматься подработкой

trespass - злоупотребление, посягательство, противоправное нарушение владения с причинением вреда

peeker – сущ. от to peek – считывать элементы данных

legitimate – настоящий, законный

interest – зд. процент

to add up – складывать, суммировать

 

Text 1

 

Computer crimes

Like most other technological advances, the computer is a tool which can be used for good or ill. You can save time with computers, write better spelled and better typed papers. You can balance budgets, from the personal to the professional; input and store and process and output all kinds of information; and send it around the world as fast as telephone lines and satellites.

But, at the same time, our computers can be misused. For example, someone with a distinctly different sense of humour infects software with a virus that causes fish to swim across the spreadsheet. Another someone changes all information in the financial aid office, and yet another uses the company computer to do a little freelance. We can use our computers to spy, to lie and cheat. To steal. To do harm. These are no jokes. These are crimes.

Electronic trespass is illegal. Peekers who gain access to a co-worker’s personal file or to a checking account records are trespassing, just as if they were physically in the bank. Business and industry have much to lose through electronic trespass. Information about new products, stock transfers, plans to acquire another company are worth millions of dollars to the company or its competitors. Electronic funds transfers take money from one account and move it to another. Banks are authorized to do so by legitimate customers. But bank employees can do it without authorization. The transfer of a million dollars will be quickly noted, but the transfer of one tenth of a cent from every customer’s monthly interest will not – and those fractional cents can quickly add up to many dollars.

Data encryption – using a code - is one way to stop electronic thieves. Encryption is the transformation of data into a form that is as close to impossible as possible to read without the appropriate knowledge. Its purpose is to ensure privacy by keeping information hidden from anyone for whom it is not intended, even those who have access to the encrypted data. Decryption is the reverse to encryption; it is the transformation of encrypted data back into an intelligible form. More recent advances offer codes based on the product of two large prime numbers and on the use of quantum theory. They are still considered unbreakable.

 

EXERCISE EXERCISE 2

Answer questions about the text:

1. Which operations can you do on your computer?

2. What harm can one get from the computer?

3. Can you explain in your own words what is electronic trespass?

4. How can companies lose millions dollars through electronic trespass?

5. How are illegal electronic funds transfers run?

6. What do we call a computer crime?

7. Are there any ways to stop unauthorized actions?

8. What is data encryption/ description?

9. Which codes are considered unbreakable nowadays?

10. Do you know any other protective devices or programmes?

11. Do you think Internet is a positive thing?

EXERCISE EXERCISE 3

The following sentences will sound more naturally if they begin with “It”. Transform each according to the model:

EXAMPLE:

 

0) Even to establish in which country he was sitting was impossible.

It was impossible even to establish in which country he was sitting.

 

1) How easy it is to hack into government computers is unbelievable.

It …

2) To try and find out where he was based was futile.

It …

3) That an outside person knows the password to our system seems likely.

It …

4) For us to find out who it was is absolutely vital.

It …

5) When you give me back that flash card doesn’t really matter.

It …

6) That the new encryption code has been developed was reported in Internet news.

It …

EXERCISE EXERCISE 4

Поделиться:





Воспользуйтесь поиском по сайту:



©2015 - 2024 megalektsii.ru Все авторские права принадлежат авторам лекционных материалов. Обратная связь с нами...