- •М.Г. Иксанова English for Students of Programming
- •Введение
- •1. Read the text, try to understand it, define what programming is.
- •2. Look through the text and find equivalents to the following terms.
- •3. Choose the definitions to the following terms.
- •4. Answer the questions.
- •Introduction to Computer Languages
- •2.Look through the text and find equivalents to the following terms.
- •3.Choose the definitions to the following terms.
- •4. Translate the following questions and answer them.
- •5. Express your opinion of Machine Language.
- •1. Read the text, try to understand it.
- •2. Look through the text and find equivalents to the following terms.
- •3.Match the words on the left with the correct definition on the right.
- •4. Answer the questions.
- •5. Discuss these questions with a partner. Then tell your ideas.
- •1. Read the text, translate it and try to understand what compiling programs are.
- •2. Look through the text and find equivalents to the following terms.
- •3.Match the words on the left with the correct definition on the right.
- •4. Answer the questions.
- •1. Read the text, try to understand it.
- •Visual Basic
- •File Type Description
- •2. Look through the text and find equivalents to the following terms.
- •3. Choose the definitions to the following terms.
- •4. Answer the questions.
- •5. Draw your conclusion of the text.
- •1. Match the Russian terms on the left with the English equivalents on the right.
- •3. Match the English terms on the left with the Russian ones on the right.
- •2.Complete the sentences with a proper word.
- •4. Translate into English.
- •1. Read the text and try to understand it.
- •Virtual Pascal
- •Visual FoxPro
- •2. Look through the text and find equivalents to the following terms.
- •3.Match the words on the left with the correct definition on the right.
- •4. Answer the questions.
- •4. Tell your ideas of the following:
- •1. Read the text, try to understand it. A Brief History of the Java Language
- •2. Look through the text and find equivalents to the following terms.
- •3. Choose the definitions to the terms.
- •4. Answer the questions.
- •5. Draw your own conclusion of the text.
- •1. Read the text.
- •2. Look through the text and equivalents to the terms.
- •3. Choose the definitions to the following terms.
- •4. Try to answer the following questions.
- •5. Write a few words about the main idea of the text.
- •1. Translate the following text, try to understand it.
- •2. Look through the text and find equivalents to the terms.
- •3. Choose the definitions to the terms.
- •4. Translate the questions and answer them.
- •1. Read the text, try to understand it.
- •2. Look through the text and find equivalents to the terms.
- •3. Choose the definitions to the following terms.
- •4. Try to answer the questions.
- •5. Try to define what a Database is.
- •1. Read the text, try to understand it.
- •Xml Basics
- •2.Look through the text and find equivalents to the following terms.
- •3.Choose the definitions to the following terms.
- •4. Answer the questions.
- •5. After reading the text write down the disadvantages of html (from the author‘s point of view).
- •1. Match the Russian terms with the English ones.
- •2. Match the pairs of words.
- •3. Complete the sentences with a proper word.
- •4. Translate into English.
- •Unit 12
- •1.Read the text, try to express its main idea.
- •2. Look through the text and equivalents to the terms.
- •3. Match the terms on the left with the explanations on the right.
- •4. Answer the questions.
- •1. Read the following text and try to understand it.
- •2. Look through the text and find equivalents to the following terms.
- •3. Choose the definitions to the following terms.
- •4. Translate the questions and answer them.
- •5. Draw your conclusion of the text.
- •1. Read the text, try to define what cryptography is.
- •2. Look through the text and find equivalents to the following terms.
- •3. Choose the definitions to the following terms.
- •4. Answer the questions.
- •1. Read the text and try to understand it.
- •2. Look through the text and find equivalents to the following terms.
- •3. Choose the definitions to the following terms.
- •4. Write the questions which could cover the content of the text.
- •5. Express your own point of view of the text.
- •1. Match the Russian terms on the left with the English ones on the right.
- •2. Match the English terms with the Russian ones.
- •3. Complete the text with proper words.
- •4. Translate into English.
- •Reading Comprehension Practice Programming languages
- •1. Programming languages
- •2. The authoring system Software
- •Correctness and robustness
- •1. What is e-Commerce?
- •Categories of e-Commerce
- •Advantages of e-Commerce
- •Disadvantages of e-Commerce
- •Building an e-Commerce Site
- •Implementing an e-Commerce Site
- •Calculating
- •Information Retrieval
- •Data-Base Management
- •Intended Viruses
- •Virus Construction Sets
- •Polymorphic Generators
- •Цели курса
- •Иксанова м.Г. Рабочая программа
3. Choose the definitions to the following terms.
file to transfer data, or program instructions, into the computer;
output a collection of records(in a database); a section of information stored
on disk – a document or an application;
byte the act of identifying yourself when entering a network; you usually
type your user name and password;
virus to transfer information from a CPU to an output device;
input a unit of information which consists of a fixed number of bits;
login a piece of software which attaches itself to an application or file; once
you run an infected application, it quickly spreads to the system
files and other software;
4. Translate the questions and answer them.
1.Что может сократить «стоимость» байта памяти?
2. На чем основано сжатие информации?
3. Почему мы говорим, что естественный язык избыточен?
4. Должен ли входной файл быть точно восстанавливаемым?
5. В каких случаях программе-источнику нет необходимости иметь то же расположение, что и в оригинале?
6. Когда и почему сжатый файл может быть больше, чем в оригинале?
7. Как вообще осуществляется техника сжатия?
8. Как мы можем классифицировать технику сжатия?
9. Каковы недостатки сжатия?
5. Draw your conclusion of the text.
UNIT 14
1. Read the text, try to define what cryptography is.
Cryptography
Cryptography is no longer a military thing that should not be messed with. It is time to demystify cryptography and make full use of the advantages it provides for the modern society. In the following, basic terminology and the main methods of cryptography are presented. Any options and evaluations presented here are speculative, and the author cannot be held responsible for their correctness.
1.Basic Terminology
Suppose that someone wants to send a message to a receive, and wants to be sure that no-one else can read the message. However, there is the possibility that someone else opens the letter or hears the electronic communication. In cryptographic terminology, the message is called plaintext or cleartext. Encoding the contents of the message in such a way that hides its contents from outsiders is called encryption. The encrypted message is called the ciphertext. The process of retrieving the plaintext from the ciphertext is called decryption. Encryption and decryption usually make use of a key, and the coding method is such that decryption can be performed only by knowing the proper key.
Cryptography is the art or science of keeping messages secret. Cryptanalysis is the art of breaking ciphers, i.e. retrieving the plaintext without knowing the proper key. People who do cryptography are cryptographers, and practitioners of cryptanalysis are cryptanalysts.
Cryptography deals with all aspects of secure messaging, authentication, digital signatures, electronic money, and other applications. Cryptology is the branch of mathematics that studies the mathematical foundations of cryptographic methods.
2. Basic Cryptographic Algorithms
A method of encryption and decryption is called a cipher. Some cryptographic methods rely on the secrecy of the algorithms; such algorithms are only of historical interest and are not adequate for real-world needs. All modern algorithms use a key to control encryption and decryption; a message can be decrypted only if the key matches the encryption key. The key used for decryption can be different from the encryption key, but for most algorithms they are the same. There are two classes of key-based algorithms, symmetric (or secret-key) and asymmetric (or public-key) algorithms. The difference is that symmetric algorithms use the same key for encryption and decryption (or the decryption key is easily derived from the encryption key), whereas asymmetric algorithms use a different key for encryption and encryption, and the decryption key cannot be derived from the encryption key.
Symmetric algorithms can be divided into stream ciphers and block ciphers. Stream ciphers can encrypt a single bit of plaintext at a time, whereas block ciphers take a number of bits (typically 64 bits in modern ciphers), and encrypt them as a single unit.
Asymmetric ciphers (also called public-key algorithms or generally public-key cryptography) permit the encryption key to be public (it can be published in a newspaper), allowing anyone to encrypt with the key, whereas only the proper recipient (who knows the decryption key) can decrypt the message. The encryption key is also called the public key and the decryption key – the private key or secret key.
Modern cryptographic algorithms cannot really be executed by humans. Strong cryptographic algorithms are designed to be executed by computers or specialized hardware devices. In most applications, cryptography is done in computer software.
Generally, symmetric algorithms are much faster to execute on a computer than asymmetric ones. In practice they are often used together, so that a public-key algorithm is used to encrypt a randomly generated encryption key, and the random key is used to encrypt the actual message using a symmetric algorithm.
The words to the text:
to mess with иметь дело
evaluation оценка, оценивание
responsible ответственный
to retrieve восстанавливать, исправлять
tosupposeпредполагать
messageпослание, сообщение
tohideпрятать
tomatchсоответствовать, подбирать пару
branchветвь, отрасль, отделение
toderiveполучать, извлекать, производить (от чего-л.)
secrecyсекретность
publicобщественный, открытый, доступный
topermitпозволять, разрешать, допускать
recipientполучатель
toexecuteвыполнять, осуществлять
randomнаугад, беспорядочный