
- •Unit 1. Website definition
- •I. Test yourself
- •II. Match the word to its explanation
- •III. Match the English and Ukrainian equivalents
- •IV. Read and translate the following text Website definition
- •V. Find answers to the questions that follow
- •VI. Look at these phrases from the text and explain the underlined parts in your own words
- •VII. Define the following terms
- •VIII. Make sentences using the following phrases
- •IX. Use an appropriate word from the list below to fill in the gaps
- •X. Translate in written form the passage «Instead of running executable code on a local computer, users are… … about a business, organization or service» into Ukrainian using your active vocabulary
- •XI. Write an abstract (100-120 words) of the text «Website definition» (see Appendix b) unit 2. Webpage creator
- •I. Test yourself
- •II. Match the word to its explanation
- •III. Match the English and Ukrainian equivalents
- •IV. Read and translate the following text Webpage creator
- •V. Find answers to the questions that follow
- •VI. Look at these phrases from the text and explain the underlined parts in your own words
- •VII. Define the following terms
- •VIII. Make sentences using the following phrases
- •IX. Use an appropriate word from the list below to fill in the gaps
- •X. Translate in written form the passage «Typical website consists of text and images. … to replace standard html elements (headers or menu links)» into Ukrainian using your active vocabulary
- •XI. Edit the English translation of the following passage
- •Unit 3. Communications systems
- •I. Test yourself
- •II. Match the word to its explanation
- •9) Communication
- •III. Match the English and Ukrainian equivalents
- •IV. Read and translate the following text Communications systems
- •V. Find answers to the following questions
- •VI. Look at these phrases from the text and explain the underlined parts in your own words
- •VII. Define the following terms
- •VIII. Make sentences using the following phrases
- •IX. Use an appropriate word from the list below to fill in the gaps
- •X. Translate in written form the passage «Voice over Internet protocol enables the voice signals to travel over …. …. Send their links to other readers» into Ukrainian using your active vocabulary
- •XI. Write an abstract (100-120 words) of the text «Communications systems» (see Appendix b) unit 4. Computing support
- •I. Test yourself
- •II. Match the word to its explanation
- •III. Match the English and Ukrainian equivalents
- •IV. Read and translate the following text Computing support
- •V. Find answers to the questions that follow
- •VI. Look at these phrases from the text and explain the underlined parts in your own words
- •VII. Define the following terms
- •VIII. Make sentences using the following phrases
- •IX. Use an appropriate word from the list below to fill in the gaps
- •X. Translate in written form the passage «When making changes to the source code …. …. Problems that may occur with their programs» into Ukrainian using your active vocabulary
- •Unit 5. Data security
- •I. Test yourself
- •II. Match the word to its explanation
- •III. Match the English and Ukrainian equivalents
- •IV. Read and translate the following text Data security
- •V. Find answers to the following questions
- •VI. Look at these phrases from the text and explain the underlined parts in your own words
- •VII. Define the following terms
- •VIII. Make sentences using the following phrases
- •IX. Use an appropriate word from the list below to fill in the gaps
- •X. Translate in written form the passage «An analogy for public-key encryption is similar to …. .... To check that the message has not been tampered with» into Ukrainian using your active vocabulary
- •XI. Write an abstract (100-120 words) of the text «Data security» (see Appendix b) unit 6. Information security
- •I. Test yourself
- •II. Match the word to its explanation
- •III. Match the English and Ukrainian equivalents
- •IV. Read and translate the following text
- •Information security
- •V. Find answers to the questions that follow
- •VI. Look at these phrases from the text and explain the underlined parts in your own words
- •VII. Define the following terms
- •VIII. Make sentences using the following phrases
- •IX. Use an appropriate word from the list below to fill in the gaps
- •The wireless
- •V. Answer the questions to check your understanding of the text:
- •VI. Consider the following statements whether they are true or false. Find the part of the text that gives the correct information:
- •VII. Use the text to find the English equivalents for the following word combinations:
- •IX. Give verbs corresponding to the following nouns. Choose five verbs and make sentences:
- •X. Match the two halves and make sentences:
- •Unit 8. The telephone
- •The telephone
- •V. Answer the questions to check your understanding of the text:
- •VI. Decide whether the following statements are true or false. If they are false correct them:
- •VII. Make your own sentences using the given phrases:
- •VIII. Use the text to find the English equivalents for the following word combinations:
- •IX. Put down the terms listed below next to their definitions:
- •X. Complete the sentences using the appropriate words listed below:
- •Appendix a List of irregular verbs
- •Appendix b basic requirements for an abstract writing
V. Find answers to the questions that follow
1) What is the role of information security?
2) What problems is information security concerned with?
3) What are the basic principles of information security?
4) What problems does confidentiality contain?
5) What problems is integrity concerned with?
6) What does the term «availability» mean?
7) Why is it necessary to have access control mechanisms?
8) What are the main purposes of cryptography?
VI. Look at these phrases from the text and explain the underlined parts in your own words
1) Information security is the process of protecting data.
2) … there are some subtle differences between them.
3) … yet we are often required to provide such information in order to transact business.
4) A loss of integrity occurs when an employee accidentally, or with malicious intent, deletes important data files.
5) A loss of integrity occurs when an on-line shopper is able to change the price of the product ….
6) Access to protected information must be restricted to people who are authorized to access the information.
7) When John Doe goes into a bank to make a withdrawal, he tells the bank teller he is John Doe.
8) Usernames and passwords are slowly being replaced with more sophisticated authentication mechanisms.
VII. Define the following terms
access, security, delete, authorization, database, shut down, server, virus, to process, to control, model, program, to protect
VIII. Make sentences using the following phrases
1) must be protected
2) with useful applications
3) are main principles
4) using cryptographic keys
5) is the most common form
6) to provide such information
7) is also very important
IX. Use an appropriate word from the list below to fill in the gaps
a) easier f) loss in k) decryption p) symmetric
b) column g) purposes l) value q) problem
c) ciphertext h) password-based m) hashing r) advantages
d) hashed i) encrypting n) random s) dictionary
e) appropriate j) eliminates o) protection t) application
One-way and Two-way Encryption
There are two methods of 1) _____ data: one-way (commonly called hashing) and two-way. Technically, 2)_____ is not encryption, but because both techniques can address data 3) _____ in a similar manner - that is, by transforming plain text data into 4) _____ - I will treat them as logical counterparts.
While hashing can serve other purposes, in the area of data protection it offers certain 5) _____ over two-way encryption. First, hashing is a bit 6) _____ to use. Second, because hashing does not use encryption keys, it 7) _____ the key management problem. The main disadvantage of hashing is that it does not support 8) _____, but in a few cases this 9) _____ can be a blessing in disguise.
Password-based authentication is a typical case in which hashing is more 10) _____ than two-way encryption. If your application keeps passwords for authentication 11) _____ only, do not encrypt them with a 12) _____ or public key, but store their hashed values instead. When a user 13) _____, instead of decrypting and comparing plain text passwords, the 14) _____ can compare password hashes. To reduce the risk of 15) _____ attacks, always use salt values with hashes. A salt value is 16) _____ data that is appended to the plain text before it is 17) _____ and stored along with the hash so it can be used later when another plain text 18) _____ is compared to the hash. To see an example of using salted hashes for 19) _____ authentication, check out the Security Briefs 20) _____ in the August 2003 issue of MSDN Magazine.
X. Translate in written form the passage «Authentication is the act of …. … This is called authorization» into Ukrainian using your active vocabulary
XI. Write an abstract (100-120 words) of the text «Information security in the networks and computer systems» (see Appendix B)
UNIT 7. THE WIRELESS
Before you start
I. Practise reading and translating the following words:
contemporary, behaviour, scientist, apparatus, allowed, principle, audience, perfect, installed, oscillation, reliable, importance, experiment, recording, assistance, kilometers, achieve, wire, audible, companies, further, ranging, successfully, praised, commercial, engineering, microwaves
II. Form nouns from the following verbs by adding the suffix –er or –or and translate them:
work, receive, record, research, found, begin, create, advise, report, operate, transmit, invent, develop, engine, program, teach, speak, run
Reading
III. Before reading the text try to answer the following questions:
1. What do you know about A.S. Popov as a radio inventor?
2. What does the word ‘radar’ mean?
3. What equipment is used for detecting signals?
IV. Read the text and explain the underlined parts in your own words: