Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
4/2 English_book.doc
Скачиваний:
65
Добавлен:
23.02.2016
Размер:
1.36 Mб
Скачать

14. Find English equivalents in the text:

Ключова швидкість, практично здійсненний, незбагненне вивчення, нелогічний, шифрувальна справа, досяжний, волоконна оптика, криогенне охолодження, розповсюджувати ключі, зашифрована інформація, невизначеність, вислів, без можливості відновлення, хакерство, марний, прилад для виявлення, ослаблений лазер, напівпровідникові лавинні фотодіоди, приманка протоколу, витік конфіденційної інформації.

15. What words from the text are defined? Choose them from the databank:

Databank: cryogenic, a detector, a setup, encryption, erroneous, quantum mechanics, fibre optics, the leaking of sensitive information, distribution, a protocol.

1) any device that receives a signal or stimulus (as heat or pressure or light or motion etc.) and responds to it in a distinctive manner; 2) of or relating to low temperatures; 3) quantum theory, especially the quantum theory of the structure and behavior of atoms and molecules; 4) the procedures and methods of making and using secret languages, as codes or ciphers; 5) the transmission of information modulated on light carried down very thin flexible fibres of glass; 6) problems of privacy when confidential information is lost or intercepted, lawfully or otherwise; 7) the way something is organized or arranged; 8) a standard procedure for regulating data transmission between computers; 9) containing or derived from error; mistaken; 10) the act of distributing or spreading or apportioning.

16. Make up word combinations:

1. to emerge

a) against intruder attacks

2. the fundamental nature

b) of hacking futile

3. gold standard

c) transmission of data

4. to enable highly secure

d) with erroneous information

5. to be achievable

e) of matter

6. to make the act

f) on practical components

7. to offer

g) from advances

8. to guard

h) by classical encryption

9. to rely

i) in secure communications

10. to confuse

j) a key rate

17. Insert the words in bold type into appropriate places:

(To) adjust – adjustment (s) – adjustable

  1. His hands were making minor ______ on the deck.

  2. We want them to learn how to take a situation and _____ to it.

  3. An _____ keyboard tray is a tool that facilitates the placement of the computer keyboard and mouse.

Encrypted – (to) encrypt – encryption – decryption

  1. The photons themselves are used to distribute keys that enable access to _____ information.

  2. In cryptography, _____ is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge.

  3. “Software for encryption” can typically also perform _____.

  4. This article will reveal you how to ______ an exe file.

Viral – (a) virus – antivirus

  1. A computer _____ can cause a lot of damage.

  2. Behind him, _____ subprograms peeled off, meshing with the gate' s code fabric.

  3. It's essential that you keep your computer current with the latest updates and _____ tools.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]