
- •Unit 1. Website definition
- •I. Test yourself
- •II. Match the word to its explanation
- •III. Match the English and Ukrainian equivalents
- •IV. Read and translate the following text Website definition
- •V. Find answers to the questions that follow
- •VI. Look at these phrases from the text and explain the underlined parts in your own words
- •VII. Define the following terms
- •VIII. Make sentences using the following phrases
- •IX. Use an appropriate word from the list below to fill in the gaps
- •X. Translate in written form the passage «Instead of running executable code on a local computer, users are… … about a business, organization or service» into Ukrainian using your active vocabulary
- •XI. Write an abstract (100-120 words) of the text «Website definition» (see Appendix b) unit 2. Webpage creator
- •I. Test yourself
- •II. Match the word to its explanation
- •III. Match the English and Ukrainian equivalents
- •IV. Read and translate the following text Webpage creator
- •V. Find answers to the questions that follow
- •VI. Look at these phrases from the text and explain the underlined parts in your own words
- •VII. Define the following terms
- •VIII. Make sentences using the following phrases
- •IX. Use an appropriate word from the list below to fill in the gaps
- •X. Translate in written form the passage «Typical website consists of text and images. … to replace standard html elements (headers or menu links)» into Ukrainian using your active vocabulary
- •XI. Edit the English translation of the following passage
- •Unit 3. Communications systems
- •I. Test yourself
- •II. Match the word to its explanation
- •9) Communication
- •III. Match the English and Ukrainian equivalents
- •IV. Read and translate the following text Communications systems
- •V. Find answers to the following questions
- •VI. Look at these phrases from the text and explain the underlined parts in your own words
- •VII. Define the following terms
- •VIII. Make sentences using the following phrases
- •IX. Use an appropriate word from the list below to fill in the gaps
- •X. Translate in written form the passage «Voice over Internet protocol enables the voice signals to travel over …. …. Send their links to other readers» into Ukrainian using your active vocabulary
- •XI. Write an abstract (100-120 words) of the text «Communications systems» (see Appendix b) unit 4. Computing support
- •I. Test yourself
- •II. Match the word to its explanation
- •III. Match the English and Ukrainian equivalents
- •IV. Read and translate the following text Computing support
- •V. Find answers to the questions that follow
- •VI. Look at these phrases from the text and explain the underlined parts in your own words
- •VII. Define the following terms
- •VIII. Make sentences using the following phrases
- •IX. Use an appropriate word from the list below to fill in the gaps
- •X. Translate in written form the passage «When making changes to the source code …. …. Problems that may occur with their programs» into Ukrainian using your active vocabulary
- •Unit 5. Data security
- •I. Test yourself
- •II. Match the word to its explanation
- •III. Match the English and Ukrainian equivalents
- •IV. Read and translate the following text Data security
- •V. Find answers to the following questions
- •VI. Look at these phrases from the text and explain the underlined parts in your own words
- •VII. Define the following terms
- •VIII. Make sentences using the following phrases
- •IX. Use an appropriate word from the list below to fill in the gaps
- •X. Translate in written form the passage «An analogy for public-key encryption is similar to …. .... To check that the message has not been tampered with» into Ukrainian using your active vocabulary
- •XI. Write an abstract (100-120 words) of the text «Data security» (see Appendix b) unit 6. Information security
- •I. Test yourself
- •II. Match the word to its explanation
- •III. Match the English and Ukrainian equivalents
- •IV. Read and translate the following text
- •Information security
- •V. Find answers to the questions that follow
- •VI. Look at these phrases from the text and explain the underlined parts in your own words
- •VII. Define the following terms
- •VIII. Make sentences using the following phrases
- •IX. Use an appropriate word from the list below to fill in the gaps
- •The wireless
- •V. Answer the questions to check your understanding of the text:
- •VI. Consider the following statements whether they are true or false. Find the part of the text that gives the correct information:
- •VII. Use the text to find the English equivalents for the following word combinations:
- •IX. Give verbs corresponding to the following nouns. Choose five verbs and make sentences:
- •X. Match the two halves and make sentences:
- •Unit 8. The telephone
- •The telephone
- •V. Answer the questions to check your understanding of the text:
- •VI. Decide whether the following statements are true or false. If they are false correct them:
- •VII. Make your own sentences using the given phrases:
- •VIII. Use the text to find the English equivalents for the following word combinations:
- •IX. Put down the terms listed below next to their definitions:
- •X. Complete the sentences using the appropriate words listed below:
- •Appendix a List of irregular verbs
- •Appendix b basic requirements for an abstract writing
V. Find answers to the following questions
1) What is asymmetric cryptography called?
2) What is the principal difference between public and private key?
3) What is the main difference between symmetric and asymmetric cryptography?
4) What are the main branches of the public key?
5) How can the central problem for public key cryptography be solved?
6) How can you break an algorithm?
7) Why do we use digital signatures?
8) How can you achieve authentication?
9) Do all asymmetric key algorithms operate the same way?
VI. Look at these phrases from the text and explain the underlined parts in your own words
1) The private key is kept in secret, while the public key may be widely distributed.
2) ... a message encrypted with a recipient’s public key can be decrypted…
3) This is used to ensure confidentiality.
4) If another user can successfully decrypt it using the corresponding public key…
5) Then she sends the box to Bob through regular mail.
6) … which he has obtained previously, maybe by a face-to-face meeting …
7) The critical advantage in an asymmetric key system is …
8) This prevents a third party from copying a key while…
VII. Define the following terms
infrastructure, host, protocol, vendors, access restrictions, private, registration, circuit switching, duration, release, intermediate, node
VIII. Make sentences using the following phrases
1) to lose sensitive reports
2) there is always a chance that
3) a reliable backup solution
4) is also implemented
5) the combination is often referred to
6) to protect hardware mechanisms
7) personal or corporate data
IX. Use an appropriate word from the list below to fill in the gaps
a) user f) important k) authority p) encrypted
b) replace g) advantage l) multi-user q) certification
c) cryptosystems h) vulnerable m) secure r) primary
d) adversary i) techniques n) cryptography s) necessary
e) secret-key j) password j) private t) algorithm
Public-key cryptography may be 1) _____ to impersonation, however, even if users’ 2) _____ keys are not available. A successful attack on a 3) _____ authority will allow an adversary to impersonate whomever the 4) _____ chooses to by using public-key certificate from the compromised authority to bind a key of the adversary’s choice to the name of another 5) _____.
In some situations, public-key cryptography is not 6) _____ and secret-key cryptography alone is sufficient. This includes environments where secure
7) _____ agreement can take place. It also includes environments where a single 8) _____ knows and manages all the keys. Since the authority knows everyone’s keys already, there is not much 9) _____ for some to be “public” and others “private”. Also, public-key 10) _____ is usually not necessary in a single-user environment. For example, if you want to keep your personal files 11) _____ , you can do so with any secret-key encryption 12) _____ using, say, your personal 13) _____ as the secret key. In general, public-key cryptography is best suited for an open 14) _____ environment.
Public-key cryptography is not meant to 15) _____ secret-key cryptography, but rather to supplement it, to make it more 16) _____. The first use of public-key 17) _____ was for secure key exchange in an otherwise secret-key system; this is still one of its 18) _____ functions. Secret-key cryptography remains extremely 19) _____ and is the subject of ongoing study and research. Some secret-key 20) _____ are discussed in the sections on Block Ciphers and Stream Ciphers.