Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
lesson_1-20_9_3.doc
Скачиваний:
55
Добавлен:
07.02.2015
Размер:
2.23 Mб
Скачать

Basic security and licensing terms

Encryption is putting data into a secret code so it is unreadable except by authorized users.

Private key encryption is a form of cryptography in which sender and receiver have the same key or similar keys.

Public-key encryption is a way of encrypting messages in which each user has a public key and a private key.

Messages are sent encrypted with the receiver's public key; the receiver decrypts them using the private key.

Virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

Most viruses can also replicate themselves. All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is quite easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.

Since 1987, when a virus infected ARPANET, a large network used by the Defense Department and many universities, many antivirus programs have become available. These programs periodically check your computer system for the best-known types of viruses.

Some people distinguish between general viruses and worms. A worm is a special type of virus that can replicate itself and use memory, but cannot attach itself to other programs.

Authentication (logon validation) is the process of giving someone permission to do or have something. In multi-user computer systems, a system administrator defines for the system which users are allowedaccess to the system and what privileges of use (such as access to which file directories, hours of access, amount of allocated storage space, and so forth).

Authorization. After authentication, a user must get authorization for doing certain tasks. After logging into a system, for example, the user may try to run commands. The authorization process determines whether the user has the authority to run such commands. Simply put, authorization is the process of determining what types or amount of activities, resources, or services a user is permitted.

License agreement is a legal statement which indicates the terms under which a user may make use of a software product.

Software licensing is allowing an individual or group to use a piece of software. There are a variety of different types of software licenses. Some are based on the number of machines on which the licensed program can run and others are based on the number of users that can use the program. Most personal computer software licenses allow you to run the program on only one machine and to make copies of the software only for backup purposes. Some licenses also allow you to run the program on different computers as long as you don't use the copies simultaneously.

Ex.4 Complete the following abbreviation:

  1. PC/XT (Personal Computer ______ Technology) – персональный компьютер с расширенной технологией.

  2. PC/AT (Personal Computer _______Technology) – персональный компьютер с усовершенствованной технологией.

  3. USB (Universal ______ Bus) – универсальная последовательная магистраль (шина).

  4. DMA (______ Memory Access) – прямой доступ к памяти

  5. RISC(_______InstructionSetComputer) – компьютер с сокращенным набором команд

  6. EPIC( ________ParallelInstructionComputer) – компьютер с истинно-параллельным выполнением команд

  7. FAT (File _______Table) – таблица размещения файлов

  8. DVD (Digital _______ Disk) - цифровой универсальный диск

  9. DDE (Dynamic Data ________) – динамический обмен данными

  10. OLE (Object Linking and ________) - связь и внедрение объектов

  11. IRQ (________ Request) – запрос на прерывание

  12. SQL (Structured ______ Language) – структурированный язык запросов

  13. HTML (HyperText _______ Language) - гипертекстовый язык меток/язык разметки гипертекста

  14. HTTP (HyperText _______ Protocol) - гипертекстовый протокол передачи/протокол передачи гипертекста

  15. PCI (_______ Component Interconnect) – соединение внешних устройств.

Ex.5 Give the full form of the following abbreviation:

  1. ISA

  2. EISA

  3. DOS

  4. SCSI

  5. IBM

  6. DBMS

  7. IEEE

  8. FTP

  9. WWW

Ex.6 Read the following proper names correctly:

AMD(Advanced Micro Device) [Ə´dva:nst ´maıkrƏu dı´vaıs]

Internet [´ıntƏnƏt]

Intranet [´ıtrƏnƏt]

Intel [´ınt(Ə)l]

Microsoft Excel [´maıkrƏsɔft ık´sel]

Microsoft Access [´maıkrƏsɔft ´æksƏs]

Microsoft Technet [´maıkrƏsɔft ´teknƏt]

Home Page [´hƏum ´peıʤ]

E-mail [´i: ´meıl]

POWER [´pauƏ]

Paint [peınt]

Sun [sʌn]

Digital [´dıʤıt(Ə)l]

Hewlett-Packard [´hju:lıt ´pækƏd (´pʌkƏd)]

Compaq [´kɔmpƏk]

Packard Bell [´pækƏd (´pʌkƏd) ´bel]

Acer [´eısƏ]

Wiener [´wi:nƏ]

R-Style [´a: ´staıl]

Borland [´bɔlƏnd]

Oracle [´ɔrƏkl]

Ex.7 Memorize the following cliches:

In my opinion… По моему мнению…

To my mind… По моему мнению…

It seems to me … Мне кажется …

If I am not mistaken… Если я не ошибаюсь…

I think… Я думаю…

I don’t think (that)… Я не думаю что…

I agree with you. Я согласен с вами.

You’re right. Вы правы.

I don’t agree/ disagree with you. Я не согласен с вами.

You are not right. Вы не правы.

You are mistaken. Вы ошибаетесь.

That’swrong. Это неверно/неправильно.

I’m sorry to say (but)

(к сожалению (но))

Idon’tknow(я не знаю)

I don’t remember (exactly) (я (точно) не помню)

Ican’t(cannot)answeryouquestion(не могу ответить на ваш вопрос)

Ihavenoidea(не имею представления)

I’m afraid

(боюсь)

Sorry, will/would/could you please repeat your question? Простите, не могли бы вы, пожалуйста, повторить ваш вопрос?

Sorry, will/would/could you please repeat it? Простите, не могли бы вы, пожалуйста, повторить это?

Part II

TEXTS FOR SUPPLEMENTARY READING

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]