- •Английский язык
- •Unit 1 Text a
- •1. Read and translate the text a.
- •Information systems
- •2. Read and learn the following words and expressions.
- •3. Answer the following questions.
- •4. Fill in prepositions if necessary. Translate these sentences into Russian.
- •5. What do these abbreviations mean?
- •2. Read and learn the following words and expressions.
- •3. Answer the following questions.
- •4. Translate into English.
- •5. Point out which of these sentences do not contain information from the text. Translate these sentences into Russian.
- •6. Retell the text. Text c
- •1. Read and translate the text c.
- •Unit 2 text a
- •1. Read and translate the text a.
- •Operating system and membrane
- •Examples of operating systems
- •2. Read and learn the following words and expressions.
- •3. Answer the following questions.
- •4. What parts of speech do the following words belong to? Translate these words into Russian.
- •5. Use the following words and expressions in your own sentences.
- •6. Fill in prepositions if necessary.
- •7. Retell the text. Text b
- •1. Read and translate the text b.
- •List of Operating Systems
- •Windows 8
- •Windows xp
- •2. Speak about the operating systems given in the text.
- •2. Read and learn the following words and expressions.
- •3. Answer the following questions.
- •4. Find the English equivalents.
- •5. Fill in the blanks.
- •6. Make sentences out of the two parts.
- •7. Give the summary of the text. Text b
- •1. Read and translate the text b.
- •Major Features of a dbms
- •Interactive Query
- •Interactive Data Entry and Updating
- •Database Design
- •Hierarchical, Network & Relational
- •2. Read and learn the following words and expressions.
- •3. Discuss major features of a dbms.
- •Digital library
- •Data Warehousing
- •Data Mining
- •Unit 4 text a Building a Content Rich Website
- •1. Read and translate the text a.
- •Interactive Content
- •2. Answer the questions.
- •2. Answer the questions.
- •Information regarding website articles
- •1. Read and translate the text c.
- •Unit 5 text a
- •1. Read and translate the text a.
- •2. Read and learn the following words and expressions.
- •3. Answer the following questions.
- •2. Answer the following questions to the text.
2. Read and learn the following words and expressions.
information security |
- информационная безопасность |
preservation |
- сохранение, защита |
integrity |
- целостность, сохранность |
to breach (v) (n) |
- нарушать - нарушение |
interception |
- перехватывание, перехват (сигналов информации) |
theft |
- воровство, кража |
sabotage |
- диверсия, саботаж |
spoof |
- имитация соединения, подражание |
denial-of service |
- отказ от обслуживания (поступившего запроса) |
law-abiding |
- законопослушный |
ubiquitous |
- вездесущий, повсеместный |
intrusion |
- вторжение, (насильственное) проникновение |
password systems |
- защита с помощью паролей |
encryption |
- кодирование, шифрование |
plaintext |
- читаемый текст |
ciphertext |
- зашифрованный текст |
to withdraw |
- снять с банковского счета |
3. Answer the following questions.
How can you define “Information security”?
What five basic classes of breaches of information security do you know?
How do we call a person who breaches information security?
Do you think tools for increasing information security (passwords systems of all sorts, discs, pass cards, credit cards) are efficient enough?
What type of the preservation of secrecy is considered to be the most important?
How can you define the Cryptography process?
4. Write English equivalents for the following.
Передача информации, нарушение, перехват сообщений, раздраженные служащие, защищать свое личное пространство (уединение), проходная карта, соблазнять (искушать).
5. Insert the proper words into the following sentences.
Information security is the preservation of secrecy and integrity in the … and … of information.
Messages and secrets have been … to interception and theft ever since the invention of …
Electronic storage, … and transmission of … are now ubiquitous in the developed world, creating novel … .
Cryptography has the disadvantages of added …, higher cost, and system … .
6. Retell the text.
TEXT B
1. Read and translate the text B.
Rapid development of automation processes and the penetration of the computers in all fields of life have lead to appearance of a range of peculiar problems. One of these problems is the necessity of providing effective protection to information and means of its processing.
Personal data refers to confidential information. The collection, storage, use and distribution of private information are not allowed.
There are some categories of personal information:
secret documents;
official department rules and instructions;
information, which touches private life of a person;
information of financial institutions; and etc.
The problem of information security is relatively new. Not all problems, connected with it have been figured out and solved up to now. The fact of great number of computer systems users means the definite risk to security because not all clients will carry out the requirements of its providing.
The main purpose of information protection is preventing from the leak, theft, distortion, counterfeit of information; preventing the threat to person’s life and social safety and so on. The information is subjected to protection, when it may cause the harm for its owner, user or other person.
There are three types of information security: Physical protection, software (antivirus, system separation of powers), administrative safeguards (access to the premises, the development of security strategies). Types of data protection from copying: Protection by serial number, the use of technical differences in the machine for software protection, using the software – hardware protection.
The importance of information protection cannot be doubted. Every organization should have a high-quality protection system in order to insure its safety. However, not only companies and state institutions need information protection system but also general home users need information protection system and should maintain the security of their computers.