Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
English-book.doc
Скачиваний:
198
Добавлен:
01.06.2015
Размер:
6.25 Mб
Скачать

15. Grammar. The Participle. See Grammar Reference.

Grammar tasks

Тask A. Translate the sentences into Russian. State the function of the participle.

The unpolarized photons are blocked by polarization filters. While testing the equipment you should put down the results. Having been discovered many years ago, this method was put to practical use only last year. When included, the elements of the risk assessment project help to avoid confusion and misunderstanding. The fuzzy matching of biometrics cannot be performed in the encrypted domain. The security of this method is dependent on the security of the key being hidden and retrieval algorithms. The described biometrics-based keys allow both performing user authentication by biometric component and handling secure communications by a generic cryptographic system.

Task B. Find the Participle and the Complex Participial Constructions. Translate the sentences into Russian.

Sometimes a user doesn't want engineered authentication systems to be used. Data can be recovered from cipher only by using exactly the same key used to encipher it. When implemented in accordance with FIPS 140-1 other FIPS approved cryptographic algorithms may be used in addition to this standard. When correctly implemented and properly used, this standard will provide a high level of cryptographic protection to computer data. The protection provided, this algorithm will be reviewed within 5 years to assess its adequacy. The cryptographic algorithm specified in this standard transforms a 64-bit binary value in to a unique 64-bit binary value based on a 56-bit variable. Authentication being done the biometrics matching would be carried out in the transformed space. The scientist working at this problem is well-known.

Task C. Translate into English.

1. Мы не видели, как наш коллега готовился к выступлению.

2. Описанный метод имеет ряд недостатков.

3. Это самый надежный из известных способов защиты информации.

4. Когда я готовился к конференции, мне пришлось просмотреть все мои записи.

5. Когда моему отцу предложили работу за границей, он отказался уезжать из своей страны.

6. После того как контракт был подписан, мы отправились домой.

7. Я хотел бы, чтобы эта статья была написана Вами.

8. После того как межсетевой экран был установлен, атаки извне стали блокироваться.

9. При выборе криптографического протокола обратите свое внимание на наиболее часто используемые.

10. Будучи широко распространенными, многоразовые пароли способствуют нарушению безопасности.

16. Communication

Project work. Imagine that you are a senior manager responsible for Intranet security of an enterprise. Work out a set of corporate rules aimed at information protection. Think of all possible risks and security solutions.

Make a presentation and be ready to discuss the problem you’re going to solve in your project.

17. Writing.

Write an abstract of your project.

Unit 10. WIRELESS COMMUNICATION

Pronunciation

Make sure you pronounce the following words properly:

overlap (n) ['əuvəlæp] 

circuit ['sə:kɪt]

overlap (v) [əuvə'læp] 

issue ['ɪʃu:] 

nomadic [nəu'mædɪk] 

knot [nɔt]

scheme [ski:m] 

malicious [mə'lɪʃəs] 

Memorize the terms.

1. Read the following terms and their definitions and memorize them:

security compromise – security failure, breech of protection system

assets of an enterprise – amount of property, tangible and intangible like stocks, physical capital, buildings, equipment, documents, developments and all information connected with the work of an enterprise

two-way radio – receiver-transmitter, send-receive set

PDA – Personal Digital Assistant, electronic device used as electronic organizer/secretary

data rate – rate of information exchange

inbound traffic – incoming information

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]