How to set up smartphones and PCs. Informational portal
  • home
  • Reviews
  • May lead to destruction. Absence or untimely performance of maintenance and repair work

May lead to destruction. Absence or untimely performance of maintenance and repair work

In June 2011, the Spleen group, led by their leader, performed at the Rock over the Volga festival. The correspondent of Novye Izvestia asked Alexander VASILIEV why he lets his musicians go to other groups and what is more important for him - to be a poet or a citizen? - Alexander, did you have any desire to join your fellow musicians - Andrei Makarevich, Alexei Kortnev, when they met with the President of Russia in a rock cafe?

- Firstly, we were not invited there. Secondly, at that moment I did not feel in myself any strength to go to this meeting, because I could not say anything sensible, clear and useful. Now, maybe, I feel more confident, but not so much as to speak "face-to-face" with the first person of the country. If you are going to the president of the country, then you need to conduct a conversation in such a language and with such arguments that it will serve the good of the people, and not be empty chatter. For such a conversation, you have to grow up - and I am still a youth. Not a husband and not a citizen, but, I hope, a poet.

- Who is more important to you - a poet or a citizen?

- A poet who is also a citizen of the Earth. In our country, only Nekrasov is understood: a citizen of only this country, and if you love America, for example, then you are the last creature. It's horrible!

- A harsh, uncompromising tone often sounds in your songs, do you in real life look like your favorite poet Mayakovsky?

- It happens in different ways. Sometimes the lyrics are "rushing", and sometimes everything is so angular, chopped, like Mayakovsky's. Life offers us different rhythms. Everything is very changeable for me. I light up with one song, and then it fades, and a new one appears. If a person says that he loves to be shaken and knocked down, what one rhythm can we talk about?

- What is more important for you in your work - the process or the result?

- Hard to say. For example, recording an album resembles a whirlpool - you write, write, rehearse, rehearse ... And at some point you realize that you are on the edge of the whirlpool, and you begin to be drawn into the studio. And once - the album is ready. True, you always need to take a break - so that everything is settled, so that you can assess soberly - what you have written.

- What can you not admit in your work, what themes or expressions?

- We have songs with obscenities, as you know. But after the birth of my son, I began to take care of the ears of the children. You cannot sing about something that can contribute to any kind of destruction. It is better to be at zero and do nothing, but just not destroy, not participate in outrages. From zero to infinity is my way ...

- Is your son musical?

- Humming something. But he still shows interest in arithmetic and reading.

- You have the song "Son", and there you sing so sublimely and tragically about autumn ...

- And most of all I love spring. I want to sing, perform, communicate. Spring drives away the St. Petersburg spleen.

- Do you still say that "spleen - when you are alone"?

- Spleen - when you calmly let your musicians play in other bands. It is wonderful when a person rests without us, and when he is bored, he comes back, and there is always joy from the meeting. For example, Boris Grebenshchikov took our drummer to his place so that he would play three concerts with Aquarium.

- How did you meet BG?

- We rode in the same tram along the coast of the Persian Gulf.

- Are you a "complete" rocker or is it not so simple?

- It's not about rock and not about genres, but about the outer space of which you feel yourself. And if you see that some author feels about the same in his book, picture or song, then he becomes your brother. It's like with Harry Potter: when all wizards lived among people, but people did not know that they were wizards.

- "Splin" sings a lot about heroes of films and filmmakers, for example "Bonnie and Clyde", "Fellini". What is your favorite movie?

- "The Discreet Charm of the Bourgeoisie" by Luis Bunuel. I can't wait for my son to grow up to show him this masterpiece.

There are many reasons for the destruction of buildings. First of all, in earthquake-prone areas, these are earthquakes. In addition, explosions (for example, household gas), strong winds (hurricanes, tornadoes), mudflows, landslides, builders' mistakes, ground failures, dilapidated buildings.

A multi-storey building is a complex engineering structure. With its serious destruction, all life-support systems fail: pipes are destroyed, water and gas supply is disrupted, electrical wires are torn. Destruction can occur very quickly, and sometimes within a few hours - in this case, it is possible to save people and property.

What to do in case of danger of destruction of the building by an earthquake?

  • At the first jolts, chandeliers begin to swing, furniture trembles, windows rattle, and when you see the first cracks on the walls, immediately go out into the street.
  • If you live above the second floor and there is no way to leave the building, settle in the safest place - in the opening of the main wall, or in the corner formed by the main walls. Do not stand at windows, doors, stairs, do not stay in corner rooms.
  • In order to protect yourself from falling debris of structures, glass and other objects, hide under the bed, table, under the desk (at school), covering your head with your hands.
  • As soon as the tremors stop, quickly go outside. (The jolts can be repeated.) Remember: you cannot use the elevator, touch the wires, light a fire.
  • If you find yourself in the rubble, calm down. Look around carefully for voids and fresh air. Be careful not to hit the debris, as you can cause them to collapse. Help those who come to your aid: raise your voice, knock on pipes and radiators, so that you can be heard. Rescuers have a "hour of silence" when vehicles and special equipment for clearing debris stop working. At this time, rescuers begin to listen to voices for help, knocks and, with the help of trained dogs and devices, conduct an intensive search.

On a note

    If you live in a seismically dangerous area, then you need to be especially careful. People have long known that pets can sense earthquakes. On the eve, they behave unusually restlessly: rushing about, shouting for no reason, they are unexpectedly aggressive. Cats take their kittens out of the house, and if they are returned, they are taken out again. Dogs whine, huddle up to the owners, try to leave the premises. There were cases when dogs carried children out of the house. The behavior of wild animals also becomes unusual: rats and other rodents leave their hiding places, gather in flocks and leave. A few hours before the push, ants leave the nests, capturing pupae. The harbingers of an earthquake can also be other phenomena unusual for humans - columns of light, luminous balls, bluish glow in houses, etc. This happens as a result of the release of electrically charged gases from rock breaks.

Questions

  1. What natural phenomena can cause destruction of buildings?
  2. Remember what man-made accidents are. What man-made reasons can lead to the destruction of the building?
  3. What consequences and troubles can the destruction of a building lead to?
  4. How can we keep the building in which we live from destruction?

Tasks

  1. Using additional sources of information, find out in which regions of Russia earthquakes are possible. List them.
  2. Prepare a short message about the courage of the rescuers in the aftermath of earthquakes.

1. An action or event that can lead to the destruction, distortion or unauthorized use of information resources, including stored and processed information, as well as software and hardware, is:

a) malware;

b) threat to information security;

c) Trojan horse.

2. Uncontrolled exit of confidential information outside of IT or the circle of persons to whom it was entrusted in the service or became known in the course of work is:

a) disclosure of confidential information;

b) unauthorized access;

c) compromising information.

3. Non-recognition by the recipient or sender of information of the fact of its receipt or sending is:

a) refusal of information;

b) violation of information services;

c) illegal use of privileges.

4. What is the principle underlying the provision of a minimum of strictly defined powers, sufficient for the successful performance of official duties, in terms of automated processing of available confidential information?

a) completeness of control and registration of unauthorized access attempts;

b) "transparency" of the protection system;

c) separation and minimization of powers for access to processed information and processing procedures.

5. Information, the preferential right to use which belongs to one person or group of persons, is:

a) classified information;

b) confidential information;

c) information for service access.

6. The method of protecting information by means of its cryptographic closure is:

a) an obstacle;

b) regulation;

c) disguise.

7. What means of information protection are implemented in the form of all kinds of norms that have developed traditionally or are taking shape with the spread of computing technology and communications?

a) organizational;

b) moral and ethical;

c) legislative.

8. What information security mechanism provides third-party validation of the characteristics of data transferred between IT entities?

a) arbitration;

b) authentication;

c) routing management.

9. What kind of information protection turns out to be necessary when using systems and networks for processing, storing and transferring information objects containing orders and other administrative, contractual, financial documents?

a) protection against unauthorized copying and distribution of programs and valuable computer information;

b) protection of information from leakage through channels of spurious electromagnetic radiation and interference;

c) protection of the legal significance of electronic documents.

10. A program that performs, in addition to the main, that is, projected and documented actions, additional actions not described in the documentation, are:


a) Trojan horse;

b) logic bomb;

c) a password hijacker.

11. A special program designed to perform destructive actions in a computing system or network is:

a) computer virus;

c) logic bomb.

12. What viruses infect disk boot sectors and application files?

a) mutating;

b) file-boot;

c) stealth viruses.

13. What viruses change over time?

a) mutating;

b) replicator;

c) macro viruses.

14. What measures of protection against computer viruses consist in drawing up clear plans of preventive measures and plans of action in case of infections?

a) software and hardware;

b) legal;

c) administrative and organizational.

15. Some unique characteristic of a virus program that gives out the presence of a virus in a computer system is:

a) destruction;

b) viral signature;

c) reproduction.

Top related articles