- •Методическое пособие
- •Contents
- •UnitI Quantum systems Word List
- •Quantum Mechanics
- •Quantum Information
- •Unit II Nanotechnologies and nanomaterials in electronics Word List
- •What Is Nanotechnology?
- •UnitIii Microfabrication Word List
- •Microfabrication
- •Micro Electro Mechanical Systems
- •Unit IV
- •Information protection Word List
- •Basic Principle of Information Protection
- •Descriptor-Based Protection Systems
- •The Personal Information Protection and Electronic Documents Act
- •Unit V Computer security Word list
- •Computer Security
- •Secure Coding
- •Hardware Mechanisms that Protect Computers and Data
- •Unit VI Cryptography Word List
- •Symmetric Key Algorithm
- •From the History of Cryptography
- •Unit VII New electronics: research and development Word List
- •Ferreting out Contraband
- •Spintronics Technology May Cool the Laptop
- •Unit VIII
- •Integrated circuits Word List
- •Integrated Circuits
- •The ic Manufacturing Process
- •Unit IX Semiconductors Word List
- •Semiconductors
- •Return of the Vacuum Valve
- •Appendix Supplementary Reading
- •What are Potential Harmful Effects of Nanoparticles?
- •Information Security
- •Security Classification for Information
- •Методическое пособие
Unit IV
Information protection Word List
access |
/ 'xkses / |
доступ |
authority |
/ O:'TPrItI / |
власть; полномочия |
available |
/ q'veIlqbl / |
доступный |
cancel |
/ 'kxnsql / |
отменить |
capability |
/ "keIpq'bIlItI / |
способность |
consent |
/ kqn'sent / |
согласие |
contribution |
/ "kPntrI'bju:Sqn / |
вклад |
disclose |
/ dIs'klquz / |
раскрыть |
design |
/ dI'zaIn / |
проект |
distinct |
/ dIs'tINkt / |
отдельный, отличный |
evaluate |
/ I'vxljueIt / |
оценить |
facilitate |
/ fq'sIlIteIt / |
облегчить |
flaw |
/ flO: / |
недостаток |
govern |
/ 'gAvqn / |
управлять |
hardware |
/ 'hQ:dweq / |
аппаратные средства |
implement |
/ 'ImplImqnt / |
прибор; выполнять |
label |
/ 'leIbl / |
маркировать |
mandatory |
/ 'mxndqtqrI / |
принудительный |
moderate |
/ 'mPd(q)reIt / |
умерять, ослаблять |
overflow |
/ 'quvqflqu / |
выходить за пределы |
process |
/ 'prquses / |
обрабатывать |
protect |
/ prq'tekt / |
защищать |
reassure |
/ "ri:q'Suq / |
заверить |
scheme |
/ ski:m / |
схема |
storage |
/ 'stO:rIdZ / |
хранение |
Part A
Define the following words as parts of speech and give the initial words of the following derivatives.
Accession, application, cancellation, capability, contribution, disclose, evaluating, government, moderation, processing, protection, storage, reassure.
Translate the following words paying attention to the suffixes and the prefixes.
Economical, application, identical, additional, responsible, self-protection, functional, categorization, unprotected, widely, commonly, acceptability, impossible.
Study the following words and choose:
a) nouns:
1) apply, application, applied, applicant, appliance;
2) processing, process, processor, procession;
3) protection, protect, protectioning, protectional;
4) information, inform, informative, informer;
b) adjectives:
1) differ, differently, difference, different;
2) availability, avail, available;
3) accessibility, access, accession, accessible;
4) direct, direction, directly, directness.
Match the words with their definitions.
1) apply |
a) electronic device for storing and processing data |
2) access |
b) to carry out a process on data for a particular purpose, may be carried by a person or by a computer |
3) process |
c) to use something such as a method, idea, or law in a particular situation, activity, etc. |
4) computer |
d) the right to enter a place, use something, see someone |
5) design |
e) able to be used or can easily be bought or found |
6) available |
f) construct or manufacture |
7) hardware |
g) to make information known |
8) scheme |
h) a systematic plan for a course of action |
9) disclose |
i) the physical equipment used in a computer system, such as the central processing unit, peripheral devices, and memory |
Fill in the gaps with the words derived from the words in brackets.
1. Many of these new (applicant) involve both storing information and simultaneous use by several individuals.
2. A flight boarding agent might have the (addition) authority to print out the list of all passengers.
3. The airline example is one of (protect) of corporate information for corporate self-protection.
4. It is convenient to divide protection schemes according to their (function) properties.
5. These are systems that provide (isolate) of users, sometimes (moderate) by total sharing of some pieces of information.
Translate the following sentences paying attention to the words in bold type. What part of speech do they belong to?
1. It is not always easy to separate hardware and software and this fact has been demonstrated on several occasions in the courts.
2. We like fast computers, the latest operating system, neat software and expensive peripherals as much as anyone.
3. In addition, many companies make contributions to employee retirement plans at the start of the year.
4. A scheme to share the costs between insurers and taxpayers has been agreed to, but Parliament has yet to approve it.
5. Security is maintained by terminal operators using unique identification and password codes to gain access to the system.
6. Internet Explorer and Netscape, for example, can restrict access according to a rating system.
7. A computer has a wide range of applications for businesses.
8. The new network will enable data to be processed more speedily.
Fill in the gaps with one of the following words: reservation, protection, understood, schemes, sharing, library.
1. As computers become better … and more economical, every day brings new applications.
2. In an airline seat reservation system, a … agent might have authority to make reservations.
3. The airline example is one of … of corporate information for corporate self-protection.
4. It is convenient to divide protection … according to their functional properties.
5. These are systems that provide isolation of users, sometimes moderated by total … of some pieces of information.
6. In some cases the public … mechanism may be extended to accept user contributions.
Read the text and name the key points raised in it.