IV. Match (21-30) with their definitions (A-L). There are two definitions that you do not need to use.

Supplementary Tasks :

I. For statements (1-10) choose the best alternative (A, B or C) to replace the expressions in italics:

1.…forensic techniques are increasingly being applied to a broad range… (line 3)

A. judicial B. illegal C. courteous

2.… thus posing many challenges for experts…(line 5)

A. telling B. offeringC. questioning

3.…identify, collect, examine, and preserve evidence… (line 7)

A. store B. saveC. hold

4.Because of the particular care that must be taken…(line 11)

A. universal B. particleC. special

5.… making mirror copies of digital information…(line 13)

A. looking-glass B. point-in-timeC. reflective

6.…maintaining any data that resides in "free space"…(line 14)

A.keepingB. restoringC. considering

7.…beyond the contents of the data itself…(line 17)

A. behind B. withC. outside

8.… include alterations to the digital media… (line 19)

A. alternatives B. changesC. challenges

9.… Trojan horse or time-bomb malware… (line 21)

A. virus B. hardwareC. shareware

10.… packages that provide turnkey assistance… (line 25)

A. turned B. completedC. key

 

II. Determine the key message of the text. Choose the best alternative (A, B, C, D or E):

A.Forensic computing involves different techniques to analyse digital devices.

B.Forensics is used in many ranks of digital media and equipment.

C.The authorities in forensic investigation analyse and investigate digital media.

D.Forensic computing investigates computer-based devices involved in a crime or dispute.

E.Digital media is analysed applying different techniques to present the evidence.

TEXT 9

INFORMATION TECHNOLOGY

                          (1) Information technology is the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware; the capability to electronically input, process, store, output, transmit, and receive data and information as well as the ability to control machines of all kinds electronically. (2)The term information technology evolved in the 1970s. Its basic concept, however, can be traced to the World War II alliance of the military and industry in the development of electronics, computers, and information theory. After the 1940s, the military remained the major source of research and development funding for the expansion of automation to replace manpower with machine power. (3)Since the 1950s, four generations of computers have evolved. Each generation reflected a change to hardware of decreased size but increased capabilities to control computer operations. The first generation used vacuum tubes, the second used transistors, the third used integrated circuits, and the fourth used integrated circuits on a single computer chip. Advances in artificial intelligence that will minimize the need for complex programming characterize the fifth generation of computers. (4)The first commercial computer was the UNIVAC I developed in 1951. For the next twenty-five years mainframe computers were used in large corporations to do calculations and manipulate large amounts of information stored in databases. Supercomputers were used in science and engineering, for designing aircraft and nuclear reactors, and for predicting worldwide weather patterns. Minicomputers came onto the scene in the early 1980s in small businesses, manufacturing plants, and factories. The Apple microcomputer was introduced in 1977. The market for microcomputers increased dramatically when IBM introduced the first personal computer in the autumn of 1981. Because of dramatic improvements in computer components and manufacturing, personal computers today do more than the largest computers of the mid-1960s at about a thousandth of the cost. (5)Computers today are divided into four categories by size, cost, and processing ability. They are supercomputer, mainframe, minicomputer, and microcomputer, more commonly known as a personal computer. Personal computer categories include desktop, network, laptop, and handheld.