Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Контрольна робота 6 ІЗДН.doc
Скачиваний:
15
Добавлен:
19.02.2016
Размер:
581.63 Кб
Скачать

Варіант 2

Exercise 1. Read the following words and word combinations, memorize them.

incredible

неймовірний

невероятный

growth

ріст, розвиток

рост, развитие

excite

хвилювати

волновать

consumer

споживач

потребитель

promise

обіцянка

обещание

way

спосіб, шлях

способ, путь

major

головний

главный

concern

турбота, хвилювання

забота, беспокойство

sensitive

чутливий, точний

чувствительный, точный

provide

забезпечувати

обеспечивать

variety

різноманітність

разнообразие

straightforward

простий, прямий

простой, прямой

storage media

носій інформації

носитель информации

encryption

кодування шифрування

кодирование, шифрование

encoding

кодування шифрування

кодирование, шифрование

government

уряд, органи управління

правительство, органы управления

particularly

особливо

особенно

crack

ламати

взламывать

authentication

ідентифікація

идентификация

verify

перевіряти

проверять

trusted source

надійне джерело

надежный источник

basically

в основному

в основном

create

створювати

создавать

alter

змінювати

изменять

hand-in-hand

разом

рука об руку

environment

середовище

среда

password

пароль

пароль

signature

підпис

подпись

Exercise 2. Read and translate the text in writing.

Information Security

The incredible growth of the Internet has excited businesses and consumers with its promise of changing the way we live and work. But a major concern has been just how secure the Internet is especially when you are sending sensitive information through it.

Information security is provided on computers and over the Internet by a variety of methods. A simple but straightforward security method is to only keep sensitive information on storage media. But the most popular forms of security all rely on encryption in such a way that only the person (or computer) with the key can decode it.

Computer encryption is based on the science of cryptography. Before the digital age, the biggest users of cryptography were governments, particularly for military purposes. But most recent forms of cryptography rely on computers, simply because a human-based code is too easy for a computer to crack.

Another process is authentication used to verify that the information comes from a trusted source. Basically, if information is “authentic”, you know who created it and you know that it has not been altered in any way since that person created it. These two processes, encryption and authentication, work hand-in-hand to create a secure environment.

There are several ways to authenticate a person or information on a computer: passwords, pass cards and digital signatures.

Exercise 3. Translate the following word combinations.

The incredible growth, the way we live and work, to secure the Internet, to send through, to be provided on, straightforward security method, the most popular forms of security, computer encryption, the digital age, a human-based code, to work hand-in-hand.

Exercise 4. Write English equivalents to the following words and word combinations.

- підприємства та споживачі

  • предприятия и потребители

  • обіцянка змінити те, як ми живемо та працюємо

  • обещание изменить то, как мы живём и работаем

  • головна турбота

  • главная забота

  • точна (чутлива) інформація

  • точная (чувствительная) информация

  • безпека інформації

  • безопасность информации

  • різноманітність методів

  • разнообразие методов

  • зберігати інформацію

  • сохранять информацию

  • носій інформації

  • носитель информации

  • процес кодування інформації

  • процесс кодирования информации

  • базуватися на

  • базироваться на

  • криптографія

  • криптография

  • особливо у військових цілях

  • особенно в военных целях

  • легко зламати

  • легко взломать

  • використовуватися для перевірки

  • использоваться для проверки

  • створювати безпечне середовище

  • создавать безопасную среду

Exercise 5. Put questions to the underlined words.

1. Information security is provided on computers and over the Internet by a variety of methods.

2. The most popular forms of security rely on encryption.

3. Authentication is used to verify that the information comes from a trusted source.

4. There are several ways to authenticate a person or information on a computer.

Exercise 6. Write out all Non-Finite forms of the verb (Infinitives, Participles and Gerunds) from the text. Identify their forms and functions.

Exercise 7. Translate the following sentences. Define the forms and functions of the Participles.

1. What do you think of the method being used? 2. Having several essays to write, John decided not to go to the party. 3. When informed of new repression’s, the workers went on strike. 4. In some countries there is a tax on things sold in the shops. 5. Having been invited to the party, she decided not to go. 6. The article, being typed now will be published tomorrow. 7. When asked to justify his belief, the scientist said that science is becoming an essential part of our everyday life.

Exercise 8. Point out the Objective Participial Constructions, the Subjective Participial Constructions and the Absolute Participle Constructions. Translate the sentences.

1. I found them watching TV. 2. Why did you leave the door unlocked? 3. You need to have your suit cleaned and ironed. 4. She was kept waiting for a long time. 5. The question being settled, we went home. 6. He had his papers stolen last year. 7. We saw them leaving the house. 8. She left her work unfinished. 9. The window frames were heard rattling in the wind. 10. The art of glass blowing was considered forgotten.

Exercise 9. Answer the following questions.

1. What has excited businesses and consumers?

2. What is a major concern when you are sending sensitive information?

3. What is a simple but straightforward security method?

4. What is encryption based on?

5. What is authentication?

6. What do two processes, encryption and authentication, work hand-in hand for?

7. What are the ways to authenticate a person or information?