Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Metodichka_Fakultety.doc
Скачиваний:
32
Добавлен:
08.11.2018
Размер:
814.08 Кб
Скачать

2.12 Answer the following questions

  1. What machines for calculating have been known since antiquity?

  2. Who was the first to have built the mechanical calculator?

  3. When were punch-card machines introduced?

  4. Where was the first computer science programme formed?

  5. Could computers perform many tasks?

  6. When did computer science become a distinct academic discipline?

  7. What companies participated in computer revolution?

Speaking

2.13 Make a report on history of computer science Unit 3

Before you read

3.1 Work in pairs or small groups. What do you know about the complex protection of information objects ?

3.2 Read the text, compare your ideas with the information given, and write some questions as a plan to summarise this text. Complex protection of information objects

Computers, computer networks of information systems, telecommunications are information objects. These objects need the complex protection.

Complex protection includes all methods of information protection, organizational, legal and technical protection, including program and hardware methods.

The specialists of complex protection need to know well information technologies. Therefore students learn programming, computer hardware, administration of computer networks and information systems.

Information systems include big operation systems, for example, Windows, Linux and UNIX.

Software and hardware methods are used to support the confidentiality and authenticity of the data in computer networks, databases, the telecommunication and mobile systems. These systems are based on the cryptographic algorithms.

The students also study architecture of the basic families of microcontrollers, programming languages and means of programs debugging.

The questions of creation and application protection systems occupy a special place in the training of students. The intellectual protection systems use algorithms of person biometric identification, based on finger prints, human voice and on the graphic image.

Specialists of complex protection can deal with such issues as:

1) Experimental - research activity:

a) The investigation of physical influence on the information processes in the protected objects.

b) The study of canals of informational leakage.

c) Carrying out contrastive information analyses received after researches and tests.

2) Operational activity

The graduates work as engineers in various spheres, for example, in security firms.

Vocabulary

1. legal

правовой

2. micro nuclear

микроядерный

3. confidentiality

конфиденциальность

4. authenticity

подлинность

5. database

база данных

6. debugging

отладка

7. application program

приложение, прикладная программа

8. occupy

занимать место

9. microcontrollers

микроконтроллеры

10. probability

вероятность

11. news leak

утечка информации

12. contrastive

сопоставительный

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]