- •Содержание
- •Unit 7. A Brief History of the Java Language 38
- •Unit 11. Xml Basics 56
- •Учебное пособие
- •1. Read the text, try to understand it, define what programming is.
- •2. Look through the text and find equivalents to the following terms.
- •3. Choose the definitions to the following terms.
- •4. Answer the questions.
- •Translate the text with the help of a dictionary.
- •2. Look through the text and find equivalents to the following terms.
- •3. Choose the definitions to the following terms.
- •4. Translate the following questions and answer them.
- •5. Express your opinion of Machine Language.
- •1. Read the text, try to understand it.
- •2. Look through the text and find equivalents to the following terms.
- •3. Match the words on the left with the correct definition on the right.
- •4. Answer the questions.
- •5. Discuss these questions with a partner. Then tell your ideas.
- •1. Read the text, translate it and try to understand what compiling programs are.
- •2. Look through the text and find equivalents to the following terms.
- •3. Match the words on the left with the correct definition on the right.
- •4. Answer the questions.
- •1. Read the text, try to understand it.
- •Visual Basic
- •File Type Description
- •2. Look through the text and find equivalents to the following terms.
- •3. Choose the definitions to the following terms.
- •4. Answer the questions.
- •5. Draw your conclusion of the text.
- •1. Match the Russian terms on the left with the English equivalents on the right.
- •2. Match the English terms on the left with the Russian ones on the right.
- •3. Complete the sentences with a proper word.
- •4. Translate into English.
- •Virtual Pascal
- •1. Read the text and try to understand it.
- •Visual FoxPro
- •2. Look through the text and find equivalents to the following terms.
- •3. Match the words on the left with the correct definition on the right.
- •4. Answer the questions.
- •4. Tell your ideas of the following:
- •1. Read the text, try to understand it.
- •2. Look through the text and find equivalents to the following terms.
- •3. Choose the definitions to the terms.
- •4. Answer the questions.
- •5. Draw your own conclusion of the text.
- •1. Read the text.
- •2. Look through the text and equivalents to the terms.
- •3. Choose the definitions to the following terms.
- •4. Try to answer the following questions.
- •5. Write a few words about the main idea of the text.
- •1. Translate the following text, try to understand it.
- •2. Look through the text and find equivalents to the terms.
- •3. Choose the definitions to the terms.
- •4. Translate the questions and answer them.
- •1. Read the text, try to understand it.
- •2. Look through the text and find equivalents to the terms.
- •3. Choose the definitions to the following terms.
- •2. Look through the text and find equivalents to the following terms.
- •3. Choose the definitions to the following terms.
- •4. Answer the questions.
- •5. After reading the text write down the disadvantages of html (from the author‘s point of view).
- •1. Match the Russian terms with the English ones.
- •2. Match the pairs of words.
- •3. Complete the sentences with a proper word.
- •4. Translate into English.
- •1. Read the text, try to express its main idea.
- •2. Look through the text and equivalents to the terms.
- •3. Match the terms on the left with the explanations on the right.
- •4. Answer the questions.
- •1. Read the following text and try to understand it.
- •2. Look through the text and find equivalents to the following terms.
- •3. Choose the definitions to the following terms.
- •4. Translate the questions and answer them.
- •5. Draw your conclusion of the text.
- •1. Read the text, try to define what cryptography is.
- •2. Look through the text and find equivalents to the following terms.
- •3. Choose the definitions to the following terms.
- •4. Answer the questions.
- •1. Read the text and try to understand it.
- •2. Look through the text and find equivalents to the following terms.
- •3. Choose the definitions to the following terms.
- •4. Write the questions which could cover the content of the text.
- •5. Express your own point of view of the text.
- •1. Match the Russian terms on the left with the English ones on the right.
- •2. Match the English terms with the Russian ones.
- •3. Complete the text with proper words.
- •4. Translate into English.
- •Руководство по изучению курса
- •Практикум
- •1. Programming languages;
- •2. The authoring system.
- •1. What is e-Commerce?
- •Implementing an e-Commerce Site
- •Information Retrieval
- •Intended Viruses
- •Virus Construction Sets
- •Программа курса
Intended Viruses
They look like viruses at a glance, but not quite so; they are unable to propagate because of errors. For example, a virus, «forgetting» to place a jump command to its own code to the top of file it infects, or places a jump to incorrect address, or sets the erratic address of the intercepted interrupt (which in most cases hangs the computer) etc.
The main reason of the appearance of intended viruses is incompetent re-compilation of the already existing virus, either because of insufficient knowledge of programming language, or because of not knowing of all the technical subtleties of operating system.
Virus Construction Sets
A virus construction set is an utility program, intended for creating computer viruses. They allow generating of source code of the viruses, object modules and / or infected files themselves.
Some construction sets (VLC, NRLG) have standard windowed interface, allowing menu selection of virus type, target objects (COM and/or EXE), presence or absence of self encrypting, debugging counter measures, internal text strings, etc. Other construction sets (PS-MPC, G2) don’t have an interface and read information about the type of virus from configuration file.
Polymorphic Generators
Polymorphic generators, like virus construction sets, are not viruses in the full sense of the word, because their algorithm does not contain propagation functions, that is opening, closing and writing files, reading and writing sectors etc. The main function of programs such kind is encrypting virus body and generating the corresponding decryptor routine.
Polymorphic generators are usually distributed by their authors without restrictions in the form of an archive file. In any generator archive the main file is an object module, containing this generator.
Read the text, try to understand it and identify the basic forms of «harmful programs».
Программа курса
№ занятия |
Тема |
Количество часов |
Занятие 1, 2 |
Programming |
4
|
Занятие 3 |
Machine Language |
4
|
Занятие 4 |
Computer Languages |
4 |
Занятие 5 |
Compiling Programs |
4 |
Занятие 6 |
A Short Description of Basic |
4 |
Занятие 7 |
Virtual Pascal |
4 |
Занятие 8 |
A Brief History of the Java Lang-e |
4
|
Занятие 9 |
Delphi |
4 |
Занятие 10 |
History of C++ |
4 |
Занятие 11 |
What is a Database?
|
4 |
Занятие 12 |
XML Basics |
4 |
Занятие 13 |
Network Configuration |
4 |
Занятие 14 |
Compression |
4 |
Занятие 15 |
Cryptography |
4 |
Занятие 16 |
«Domania» Rules the World Wide Web |
4 |