- •Англійська мова
- •Контрольна робота 6 Computer Security. Modern Airport Варіант 1
- •Computer Security
- •Варіант 2
- •Information Security
- •Варіант 3
- •Internet Security
- •Варіант 4
- •Airport Security
- •Варіант 5
- •Seсurity in Aviation
- •Варіант 6
- •Modern Airport
- •Варіант 7
- •The Airport
- •Варіант 8
- •Categories of Passengers
- •Варіант 9
- •Airport Structures
- •Варіант 10
- •Security Procedures at the Airport
Варіант 2
Exercise 1. Read the following words and word combinations, memorize them.
incredible |
неймовірний |
невероятный |
growth |
ріст, розвиток |
рост, развитие |
excite |
хвилювати |
волновать |
consumer |
споживач |
потребитель |
promise |
обіцянка |
обещание |
way |
спосіб, шлях |
способ, путь |
major |
головний |
главный |
concern |
турбота, хвилювання |
забота, беспокойство |
sensitive |
чутливий, точний |
чувствительный, точный |
provide |
забезпечувати |
обеспечивать |
variety |
різноманітність |
разнообразие |
straightforward |
простий, прямий |
простой, прямой |
|
|
|
storage media |
носій інформації |
носитель информации |
encryption |
кодування шифрування |
кодирование, шифрование |
encoding |
кодування шифрування |
кодирование, шифрование |
government |
уряд, органи управління |
правительство, органы управления |
particularly |
особливо |
особенно |
crack |
ламати |
взламывать |
authentication |
ідентифікація |
идентификация |
verify |
перевіряти |
проверять |
trusted source |
надійне джерело |
надежный источник |
basically |
в основному |
в основном |
create |
створювати |
создавать |
alter |
змінювати |
изменять |
hand-in-hand |
разом |
рука об руку |
environment |
середовище |
среда |
password |
пароль |
пароль |
signature |
підпис |
подпись |
Exercise 2. Read and translate the text in writing.
Information Security
The incredible growth of the Internet has excited businesses and consumers with its promise of changing the way we live and work. But a major concern has been just how secure the Internet is especially when you are sending sensitive information through it.
Information security is provided on computers and over the Internet by a variety of methods. A simple but straightforward security method is to only keep sensitive information on storage media. But the most popular forms of security all rely on encryption in such a way that only the person (or computer) with the key can decode it.
Computer encryption is based on the science of cryptography. Before the digital age, the biggest users of cryptography were governments, particularly for military purposes. But most recent forms of cryptography rely on computers, simply because a human-based code is too easy for a computer to crack.
Another process is authentication used to verify that the information comes from a trusted source. Basically, if information is “authentic”, you know who created it and you know that it has not been altered in any way since that person created it. These two processes, encryption and authentication, work hand-in-hand to create a secure environment.
There are several ways to authenticate a person or information on a computer: passwords, pass cards and digital signatures.
Exercise 3. Translate the following word combinations.
The incredible growth, the way we live and work, to secure the Internet, to send through, to be provided on, straightforward security method, the most popular forms of security, computer encryption, the digital age, a human-based code, to work hand-in-hand.
Exercise 4. Write English equivalents to the following words and word combinations.
- підприємства та споживачі |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Exercise 5. Put questions to the underlined words.
1. Information security is provided on computers and over the Internet by a variety of methods.
2. The most popular forms of security rely on encryption.
3. Authentication is used to verify that the information comes from a trusted source.
4. There are several ways to authenticate a person or information on a computer.
Exercise 6. Write out all Non-Finite forms of the verb (Infinitives, Participles and Gerunds) from the text. Identify their forms and functions.
Exercise 7. Translate the following sentences. Define the forms and functions of the Participles.
1. What do you think of the method being used? 2. Having several essays to write, John decided not to go to the party. 3. When informed of new repression’s, the workers went on strike. 4. In some countries there is a tax on things sold in the shops. 5. Having been invited to the party, she decided not to go. 6. The article, being typed now will be published tomorrow. 7. When asked to justify his belief, the scientist said that science is becoming an essential part of our everyday life.
Exercise 8. Point out the Objective Participial Constructions, the Subjective Participial Constructions and the Absolute Participle Constructions. Translate the sentences.
1. I found them watching TV. 2. Why did you leave the door unlocked? 3. You need to have your suit cleaned and ironed. 4. She was kept waiting for a long time. 5. The question being settled, we went home. 6. He had his papers stolen last year. 7. We saw them leaving the house. 8. She left her work unfinished. 9. The window frames were heard rattling in the wind. 10. The art of glass blowing was considered forgotten.
Exercise 9. Answer the following questions.
1. What has excited businesses and consumers?
2. What is a major concern when you are sending sensitive information?
3. What is a simple but straightforward security method?
4. What is encryption based on?
5. What is authentication?
6. What do two processes, encryption and authentication, work hand-in hand for?
7. What are the ways to authenticate a person or information?