Task VI. Translate the following text into Russian

In the fight against illegal migration, law enforcement agencies are taking measures to strengthen Border, Customs, Migration Services and improve their legislative framework.

It’s very important to define what differences between smuggling and trafficking are.

Migrant smuggling and trafficking in persons are different legal concepts. However, they do overlap. According to the UN definitions, differences between the two include the following. (Note that national definitions may vary.):

Smuggling involves moving someone across an international border for profit, while trafficking can occur within or across borders and is always for the purpose of exploitation.

In contrast to trafficked persons, migrants in smuggling situations are not necessarily victims of crime. They may have suffered no harm or injury in the migration process. However, like any other migrant or indeed any other person, they can still become a victim of crime. Migrants can face a number of risks in the smuggling process, including theft, extortion, rape, assault and even death at the hands of smugglers. As noted above, some smuggling situations descend into becoming trafficking situations.

ВАРИАНТ 12

Task I. Read the following text and answer some questions in writing:

1. What innovations have been done lately?

2. What advantages does the Password method have?

3. What is Biometrics?

Text

Advantages and Disadvantages of Technologies

When a new technology is implanted, it is essential to remember about simplicity, price and efficiency, as well as social acceptability.

The Password method is the cheapest and simplest technology, because it only requires elementary software resources.

On the other hand, this system is easily attackable, since it is quite simple to obtain the data from a person, either extracting the information to the person itself using deceits, or attacking the software of the system.

It can be easily installed in the computer, a program that simulates the “user name and password” window, so that when the user introduces his data in that window, that will be collected by the “Spy” program.

The Smart Cards are very useful since they can be easily combined with other systems, serving as storage system and they are resistant to attack. But their small size and bend requirements (which are designed to protect the card physically), limits the memory and processing resources.

Biometrics is unique method for each individual, very effective and safe. The advantages of e-learning security are: authentication, privacy (data confidentiality), access control, data integrity and non-repudiation.

Although biometrics is very difficult to falsify, we have to bear in mind its disadvantages, for example, that since it is a relative new technology, it is not still integrated in PC, so IT departments need to make a conscious decision before making the purchase and change its structure.

Task II. Find the words synonymous to:

Integrity, privacy, security, unique, storage, requirement, resistant, advantage, innovation, simplicity, price, efficiency, acceptability, elementary, purchase, authentication.

Task III. Translate the sentences from English into Russian.

1. Modern Customs technologies, electronic and Internet-based declaring, as well as preliminary informing are also actively developing.

2. Development of efficient and transparent Customs Services are among the important tools for reducing barriers to doing business.

3. There is one more technology to be introduced into the work of the Customs officers.

4. The electronic data to be analyzed involve knowledge of PC.

5. To be a success a Customs organization needs well-trained personnel, simplified Customs procedures and up-to-date Customs technology.

6. Governments around the world are increasingly turning to biometrics in an attempt to increase security at airports and border crossings, and to produce more secure identity documents.

Task IV. Match left and right.

 

1. электронное удостоверение личности biometrics technology
2. упрощенные таможенные процедуры access control
3. модернизация таможни border crossing
4. хорошо обученный персонал (the) Password method
5. контроль доступа simplified Customs procedures
6. пункт пересечения границы electronic identity card
7. биометрическая технология Customs modernization
8. метод использования пароля well-trained personnel

Task V. Translate the following text into English using the word-combinations from the previous tasks.

Перспективные технологии таможни

Электронное декларирование товаров упрощает работу и предприятий-участников внешнеэкономической деятельности (ВЭД). Оно в первую очередь нацелено на повышение эффективности таможенного контроля.

Внедрение и совершенствование электронного декларирования требует внедрение комплекса технологических мероприятий основными задачами, которых являются сокращение бумажного документооборота и времени на проведение таможенных процедур. Продолжением развития электронного декларирования является внедрение технологии удаленного выпуска. Это – удобный рабочий инструмент, в основе которого заложен принцип разделения таможенных процедур на документальный и фактический контроль.

Перспективные технологии таможенного оформления и контроля активно внедряются в жизнь. С 2014 года на таможенных постах России используется только электронное декларирование для подачи деклараций на товары, письменная форма применяется в исключительных случаях. Для ускорения процедур на границе участники ВЭД всё чаще подают предварительную информацию о товаре через специальный портал электронного представления сведений ФТС России.


Понравилась статья? Добавь ее в закладку (CTRL+D) и не забудь поделиться с друзьями:  



double arrow
Сейчас читают про: