Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

focus_on_informatics

.pdf
Скачиваний:
20
Добавлен:
16.04.2015
Размер:
938.9 Кб
Скачать

1. Look back at the article. Find wordswhich mean:

1)a set of pages of information on the Internet about a particular subject (paragraph 1)

2)to include something as part ofsomething larger (paragraph 2)

3)the ideas that are contained in a piece of writing, a speech or a film (paragraph 3)

4)an amount of money that you pay regularly to receive a product or service or to be a member of an organization (paragraph 6)

5)a central computer from which other computers get information (paragraph8)

6)to open a computer file (= a collection of information stored on a com-

puter)inordertolookatorchangeinformationinit(paragraph11)

2. Topics for discussion:

1)What is a website?

2)How can a website be accessed?

3)What is a web page?

4)What does HTTP provide for users?

5)When is subscription necessary?

6)What are the differences between static and dynamic websites?

7)Who and when announced that the WWW would be free for use?

3. Whichof these statements are true?Correct the falseones:

1)A web site is hosted only on oneweb server.

2)HTTP Secure provides security and privacy for the user of the web page content.

3)The World Wide Web is publicly accessible websites.

4)Business sites, news sites, academic journal sites require a subscription to access.

5)The World Wide Webwas created in 1993.

6)Nowadays file transfer protocol and the gopher protocol are used to retrieve individual files from a server.

7)Web pages can be viewed or accessed only from desktopcomputers.

8)Static websites present pre-defined, static information for an ex-

tended period of time.

Text 21. Website

Part 2

Software systems

There are a wide range of software systems, such as Java Server Pages (JSP), the PHP and Perl programming languages, Active Server Pages (ASP) and Cold Fusion (CFM) that are available to generate dynamic web systems and dynamic sites. Sites may also include content that is retrieved from one or more databases or by using XML-basedtechnologies such as RSS.

Static content may also be dynamically generated either periodically, or if certain conditions for regeneration occur.

Plug ins are available to expand the features and abilities of web browsers, which use them to show active content, such as Microsoft Silverlight, Adobe Flash, Adobe Shockwave or applets written in Java. Dynamic HTML also provides for user interactivity and realtime element updating within web pages (i.e., pages don't have to be loaded or reloaded to effect any changes), mainly using the Document Object Model (DOM) and JavaScript, support which is built-in to most modernweb browsers.

Turning a website into an income source is a common practice for web developers and website owners.

Spelling

The forms website and web site are the most commonly used forms, the former especially in British English. Reuters, Microsoft, academia, book publishing and dictionaries such as Merriam-Webster use the two-word, initially capitalized spelling Web site. This is because "Web" is not a general term but a short form of World Wide Web. As with many newly created terms, it may take some time before a common spelling is finalized. This controversy also applies to derivative terms such as webpage, web master, and webcam.

The Canadian Oxford Dictionary and the Canadian Press Style book list "website" and "web page" as the preferred spellings. The Oxford English Dictionary began using "website" as its standardized form in 2004.

Bill Walsh, the copy chief of The Washington Post's national desk, and one of American English's foremost grammarians, argues for the two-word spelling with capital W in his books “Lapsing into a Comma” and “The Elephants of Style”, and on his site, the Slot.

Types of websites

There are many varieties of websites, each specializing in a particular type of content or use, and they may be arbitrarily classified in any number of ways. A few such classifications might include:

1.Blog (web log): sites generally used to post online diaries which may include discussion forums (e.g., blogger, Xanga).

2.Brand building site: a site with the purpose of creating an experience of a brand online. These sites usually do not sell anything, but focus on building the brand. Brand building sites are most common for low-value, high-volume fast moving consumer goods (FMCG).

3.Corporate website: used to provide background information about a business, organization, or service.

4.Electronic commerce (e-commerce) site: a site offering goods and services for online sale and enabling online transactions for such sales.

5.Community site: a site where persons with similar interests communicate with each other, usually by chat or message boards, such as MySpace or Facebook.

6.City Site: A site that shows information about a certain city or town and events that takes place in that town. Usually created by the city council or other "movers and shakers".

7.Gripe site: a site devoted to the critique of a person, place, corporation, government, or institution.

8.Forum: a site where people discuss various topics.

9.Humor site: satirizes, parodies or otherwise exists solely to amuse.

10.Information site: contains content that is intended to inform visitors, but not necessarily for commercial purposes, such as: Rate-

MyProfessors.com, Free Internet Lexicon and Encyclopedia. Most government, educational and non-profit institutions have an informational site.

11.News site: similar to an information site, but dedicated to dispensing news and commentary.

12.Personal homepage: run by an individual or a small group (such as a family) that contains information or any content that the individual wishes to include. These are usually uploaded using a web hosting service such as Geocities.

13.Political site: A site on which people may voice political views.

14.Rating site: A site on which people can praise or disparage what is featured.

15.School site: a site on which teachers, students, or administrators can post information about current events at or involving their school. U.S. elementary-high school websites generally use k12 in the URL, such as kearney.k12.mo.us.

16.Social networking site: a site where users could communicate with one another and share media, such as pictures, videos, music, blogs, etc. with other users. These may include games and web applications.

17.Social bookmarking site: a site where users share other content from the Internet and rate and comment on the content. StumbleUpon and Digg are examples.

18.Video sharing: A site that enables user to upload videos, such as YouTube and Google Video.

19.Search engine site: a site that provides general information and is intended as a gateway or lookup for other sites. A pure example is Google, and the most widely known extended type isYahoo!.

Some websites may be included in one or more of these categories. For example, a business website may promote the business's products, but may also host informative documents, such as white papers. There are also numerous sub-categories to the ones listed above.

Websites are constrained by architectural limits (e.g., the computing power dedicated to the website). Very large websites, such as Yahoo!, Microsoft, and Google employ many servers and load balancing equipment such as Cisco Content Services Switches to distribute visitor loads over multiple computers at multiple locations.

In February 2009, Netcraft, an Internet monitoring company that has tracked Web growth since 1995, reported that there were 215,675,903 websites with domain names and content on them in 2009, compared to just 18,000 websites in August 1995.

Glossary

academia – научное сообщество

applet – апплет (прикладная программа, запускаемая при каждом обращении к веб-странице, в исходный текст которой она встроена)

apply to derivative terms – распространяться на производные термины

arbitrarily – как угодно /сколько угодно

ASP (Active Server Pages) – активные серверные страницы

balancing equipment – устройство для балансировки нагрузки

be constrained by architectural limits – сдерживаться архитектур-

ными ограничениями

blog (web log) – блог /веб-журнал /веб-дневник

bookmarking – социальная закладка

CFM (Cold Fusion) – среда и язык для разработки интерактивных динамических документов

computing power dedicated to the website – вычислительная мощ-

ность, предназначенная для сайта

controversy – разногласие

copy chief – художественный редактор

distribute visitor loads – распределятьзагрузкипосетителей

DOM (Document Object Model) – программный интерфейс для дос-

тупа к документам

enable online transactions – делать возможным осуществление сделок в сети

experience of a brand online– восприятие бренда в сети finalize – утверждать /одобрять

FMCG(fastmovingconsumergoods)–товарыширокогопотребления /

товары массового спроса

foremost grammarians – выдающиеся филологи gripe site – сайт для выражения недовольства high-volume – массовый

initially capitalized– с заглавной буквы

JSP (Java Server Pages) – серверные страницы Java

national desk – отдел по официальным правительственным сообщениям

PHP (Personal Home Pages) – личные страницыпользователей

plug in – независимо компилируемый /интегрируемый программный модуль

praise or disparage – хвалить или порочить /относиться пренебрежительно

Reuters – Рейтер, агентство новостей

RSS (Really Simple Syndication)– семейство XML-форматов

search engine site – поисковая система track Web growth – отслеживать рост сети white papers – официальные документы

XML(Extensive Markup Language) – язык XML/расширяемый язык разметки

Exercises:

1.Without looking back at the article, how much can you remember about the following:

a.Java Script

b.e-commerce

c.community site

d.video sharing

e.personal homepage

2. In the text, find:

three words you want to use more often

three partnerships with their equivalents in your own language three longer expressions with their equivalents in your own language

3. Topics for discussion:

a.What software systems doyou know?

b.What does dynamic HTML provide for users?

c.Is “Web” a general term?

d.Is there any controversy in spelling of the word “website”?

e.Why are there so many types of websites?

f.Canyou give any examples of news sites?

g.What search engine sites doyou know?

4. Whichof these statements are true?Correct the falseones:

1)A website has become an income source for web developers and website owners.

2)It takes some time before a commonspelling is finalized.

3)Websites may be classified in any number of ways.

4)Gripesitesaredevotedtothepraiseofaperson,place,corporation,etc.

5)Information site is a synonym to a news site.

6)It is possible to voice political views on a political site.

7)A pure example of a search engine site is Google.

8)One website may employ many webservers.

Section VI (Security)

Text 22.DataSecurity Technologies

Part 1

Data security is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data. There are different data security technologies such as:

Disk encryption

Disk encryption refers to encryption technology that encrypts data on a hard disk drive. Disk encryption typically takes form in either software (see disk encryption software) or hardware (see disk encryption hardware). Disk encryption is often referred to as on-the-fly encryption or transparent encryption. On-the-fly encryption (OTFE), also known as Real-time Encryption, is a method used by some encryption programs, for example, disk encryption software. "On-the-fly" refers to the fact that the files are accessible immediately after the key is provided, and the entire volume is typically mounted as if it were a physical drive, making the files just as accessible as any unencrypted ones.

Hardware based Mechanisms for Protecting Data

Software based security solutions encrypt the data to prevent data from being stolen. However, a malicious program or a hacker may corrupt the data in order to make it unrecoverable or unusable. Similarly, encrypted operating systems can be corrupted by a malicious program or a hacker, making the system unusable. Hardware-based security solutions can prevent read and write access to data and hence offers very strong protection against tampering and unauthorized access.

Hardware based or assisted computer security offers an alternative to software-only computer security. Security tokens such as those using PKCS may be more secure due to the physical access required in order to be compromised. Access is enabled only when the token is connected and correct PIN is entered (see two factor authentication). However, dongles can be used by anyone who can gain physical access to it. Newer technologies in hardware based security solves this problem offering fool proof security for data.

Working of Hardware based security: A hardware device allows a user to login, logout and to set different privilege levels by doing manual actions. The device uses biometric technology to prevent malicious users from logging in, logging out, and changing privilege levels. The current state of a user of the device is read by controllers in peripheral devices such as harddisks. Illegal access by a malicious user or a malicious program is interrupted based on the current state of a user by harddisk and DVD controllers making illegal access to data impossible. Hardware based access control is more secure than protection provided by the operating systems as operating systems are vulnerable to malicious attacks by viruses and hackers. The data on hard disks can be corrupted after a malicious access is obtained. With hardware based protection, software cannot manipulate the user privilege levels, it is impossible for a hacker or a malicious program to gain access to secure data protected by hardware or perform unauthorized privileged operations. The hardware protects the operating system image and file system privileges from being tampered. Therefore, a completely secure system can be created using a combination of hardware based security and secure system administration policies.

Newer technologies in hardware based security solves this problem offering fool proof security for data. A security token (or sometimes a hardware token, hard token, authentication token, USB token, cryptographic token, or key fob) may be a physical device that an authorized user of computer services is given to ease authentication.The term may also refer to software tokens.

Security tokens are used to prove one's identity electronically (as in the case of a customer trying to access their bank account). The token is used in addition to or in place of a password to prove that the customer is who they claim to be. The token acts like an electronic key to access something.

Hardware tokens are typically small enough to be carried in a pocket or purse and often are designed to attach to the user's keychain. Some may store cryptographic keys, such as a digital signature, or biometric data, such as a fingerprint minutiae. Some designs feature tamper resistant packaging, while others may include small keypads to allow entry of a PIN or a simple button to start a generating routine with some display capability to show a generated key number. Special designs include a USB connector, RFID functions or Bluetooth wireless interface to enable transfer of a generated key number sequence to a client system.

Glossary

biometric data – биометрические данные

biometric technology – биометрическая технология

Bluetooth – технология «Голубой зуб» (технология беспроводной ближней коротковолновой радиосвязи (до 30 м), позволяющая объединять устройства разных типов для передачи речи и данных)

controller – контроллер; устройствоуправления; регулятор

corruption – изменение, искажение (информации, текста)

cryptographic keys – криптографические ключи

data – данные, факты, сведения; информация

digital signature – цифровая подпись

disk encryption – шифрование на диске

dongles – защитная заглушка

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]