- •Unit I Programming languages Words and expressions to be remembered:
- •Exercise 1
- •Read and translate the text
- •History of programming languages
- •Text II Words and word combinations to be learnt:
- •Programming languages
- •Glossary
- •Computer programming
- •Programming languages
- •Fortran IV
- •2. Pascal
- •3. Rpg II Programming language
- •1. Running the computer program
- •2. The conversion of symbolic languages
- •3. Testing the computer program
- •Unit II Operational systems
- •Unit III Radio waves
- •Radio waves
- •In the picture you can see the way that original sound passes before it becomes reproduced sound. Describe this way in your own words.
- •Brief history of the radio
- •Uses of radio
- •Unit IV Frequency converters
- •Frequency converters
- •Am broadcast radio and fm broadcast radio
- •Unit V Amplifiers
- •Amplifiers
- •Unit VI Feeders
- •Altitudinal Meteorological Mast (amm)
- •Unit VII Computer crimes
- •Computer crimes
- •Computer crimes – cyberterrorism, hacking
- •What is “Firewall?”
- •Text 3 Are Wireless Networks Secure?
- •Unit VIII
- •Viruses
- •Text 1 Computer viruses
- •Text 2 Anti-virus software and other preventative countermeasures
- •Unit IX Mobile phones and sms
- •What is sms?
- •How do you send and receive messages?
- •The future of mobile phones
- •Why people use mobile phones
- •Help always at hand: a mobile is a girl’s best friend
- •Unit X smart stuff
- •Smart stuff
- •Insert the missing information into the sentences
- •Is technology always best?
- •Unit 11
- •Internet
- •What exactly is the Internet?
- •What is cyberspace?
- •How did it begin?
- •The Internet can be divided into five broad areas:
- •Electronic mail
- •Information sites
- •The World Wide Web
- •4. Usenet
- •5. Telnet
- •Supplementary reading
- •Bluetooth
- •What is in a name? (the history of Bluetooth)
- •Sic (Special Interest Croup)
- •Used frequencies
- •Bluetooth ability
- •How is connection established?
- •Discoverable mode
- •Limited discoverable mode
- •Protection technology
- •Digital house
- •Text 5 the language of e-mail
- •1. Basic protocols in Internet and search in them
- •Tools of search in www
- •2. Tools of search
- •2.1 Thematic catalogues
- •Magellan
- •Virtual Library
- •Russia-On-Line Subject Guide
- •2.2. Automatic indexes
- •Alta Vista
- •Info seek
- •WebCrawler
- •Glossary
Text 3 Are Wireless Networks Secure?
No computer network is truly secure, but how does wireless network security stack up to that of traditional wired networks?
Unfortunately, no computer network is truly secure. It's always theoretically possible for eavesdroppers to view or "snoop" the traffic on any network, and it's often possible to add or "inject" unwelcome traffic as well. However, some networks are built and managed much more securely than others. For both wired and wireless networks alike, the real question to answer becomes - is it secure enough?
Wireless networks add an extra level of security complexity compared to wired networks. Whereas wired networks send electrical signals or pulses of light through cable, wireless radio signals propogate through the air and are naturally easier to intercept. Signals from most wireless LANs (WLANs) pass through exterior walls and into nearby streets or parking lots.
Network engineers and other technology experts have closely scrutinized wireless network security because of the open-air nature of wireless communications.
The practice of wardriving, for example, exposed the vulnerabilities of home WLANs and accelerated the pace of security technology advances in home wireless equipment.
Overall, conventional wisdom holds that wireless networks are now "secure enough" to use in the vast majority of homes, and many businesses. Security features like 128-bit WEP and WPA can scramble or "encrypt" network traffic so that its contents can not easily be deciphered by snoopers. Likewise, wireless routers and access points (APs) incorporate access control features such as MAC address filtering that deny network requests from unwanted clients.
Obviously every home or business must determine for themselves the level of risk they are comfortable in taking when implementing a wireless network. The better a wireless network is administered, the more secure it becomes. However, the only truly secure network is the one never built!
EXERCISE EXERCISE 10
Give missing forms of the words.
VERB |
NOUN |
ADJECTIVE/ADVERB |
*** |
security |
*** |
wire |
*** |
*** |
*** |
*** |
communicational |
*** |
pulse |
*** |
signal |
*** |
*** |
*** |
administration |
*** |
minimize |
*** |
*** |
*** |
*** |
encrypted |
*** |
inplementation |
*** |
propogate |
*** |
*** |
*** |
*** |
intercepted |
EXERCISE EXERCISE 11
Make antonyms with the help of prefixes and suffixes and translate the words.
Fortunately, truly, wireless, possible, welcome, real, naturally, ciphered, wanted, encrypted, authorized access, outside, internal, to minimize.
EXERCISE EXERCISE 12
Find in the text sentences containing following adverbs and translate them. Use these adverbs in your own sentences about security systems.
Truly, unfortunately, as well, however, enough, compared to, overall, easily, likewise, obviously.
EXERCISE EXERCISE 13
Speak about computer crimes and security systems, using information from the texts