Иностранный язык в профессиональной деятельности | IT security and safety | ВШП 3 семестр

Выполняем все задания ВШП качественно не дорого и в срок. Данное задание наши авторы уже выполняли неоднократно. Для заказа необходимо обратиться к нашим менеджерам. Все контакты указаны на сайте

 

Внимание!

Задание должно быть оформлено в файле doc, docx (Word).

Название файла должно содержать ФИО учащегося, название дисциплины, курс обучения. Например: «Иванова Анастасия. История, 1 курс».

Нажмите на кнопку «Загрузить», чтобы отправить выполненное задание на проверку.

Задание 1

Translate the combinations of words. Переведите профессиональные словосочетания:

computer-dependent language; computer-independent language; conversational language; declarative language; defining language; descriptive language; end-user language; control language; human language; human-oriented language; machine-dependent language; machine-independent language; multidimensional language;  one-dimensional language; synthetic  language; self-contained language; source language; super-high-level language; interactive language.

Задание 2

Match the words to the definitions. Сопоставьте названия языков программирования и определения к ним. Можно проговаривать вслух: “The high-level language is…”

1. High level language а) a programming language, such as COBOL, designed to describe the steps necessary to solve certain types certain
2. Low-level language б) a programming language, such as RPG, designed to describe more readily the problems to be solved, rather than to specify
3. Procedure-oriented language в) a programming language, using symbolic code, that is based on the machine language of a particular computer and requires an assembler to translate it into actual machine language.
4. Problem-oriented language г) a programming language that corresponds closely to the machine language of a computer, such as an assembly language.
5. Machine language д) a programming language, such as BASIC or COBOL or…, that is not dependent upon the machine language of a computer, requires a compiler to translate it into machine language and has been designed to allow the use of words similar to those in the English language.
6. Machine-oriented language е) the programming language comprised of a set of unique machine codes that can be directly executed  by a given computer.

Задание 3

Read the descriptions 1-8. Match the words in the box to the descriptions.

adware Trojan hacker virus browser hijacker worm malware attack spyware

Malicious software that can copy itself and infect the system. (1) ___________

Affects privacy. It does not take control of a computer system, but sends information about the use of a computer system. (2) ___________

Spreads without the user taking action and usually acts in operation system. (3) ___________

A person who on purpose attempts to break into a computer system and use it without the knowledge of the owner. (4) ___________

Software that replaces the user's search engine with its own. (5) ___________

An effort to gain unathorised access to a computer. (6) ___________

A program that automatically plays commercials on a computer. (7) ___________

A program which is usually free but contains malicious files. (8) ___________

Задание 4

Match the security solution 1-5 to its purpose a-e.

1. a firewall a) prevents damage that viruses might cause
2. antivirus software b) make sure only authorised people access the network
3. authentication c) checks the user is allowed to use system
4. username, password and biometric scanning d) blocks unathorised access codes
5. encryption e) protects the system from public access

Задание 5

Read this text on security and match the headings in the box with the paragraphs 1-5.

Data transfer and backup Password recommendations Safety security requirements Email and network usage Reporting IT security incidents

Systems and network security

All employees must follow security and safety procedures approved by the management.

1. _____________________________________

Only install and use software that the management has approved. Install the latest antivirus and antispyware tools.

Keep current with security software updates and patches.

Follow office health and safety standards.

2. _____________________________________

Choose a password that is diffucult to guess: use between 6 and 8 characters, have letters in upper and lower case and intermix letters, numbers, and punctuation marks. Keep your password private. Change your password every 9 weeks.

3. _____________________________________

Configure your email software to use secure protocols. Use company official e-mail software only. Always double check that you are sending your message to the right recipient. Do not send sensitive data over the network. Use mail encryption to send sensitive data. Do not download unknown files or files for private use, such as movies and music.

4. _____________________________________

Transfer files via a secure connection. Back up files regularly on the server in your homefolder. Do not use external drives.

5. _____________________________________

Employees must notify their supervisor or IT help desk about any damage, misuse, irregularities or security breaches.

Задание 6

Match the verb 1-6 with the noun a-f.

1. transfer a) protocols
2. install b) software
3. follow c) procedures
4. use d) files
5. notify e) an incident
6. report f) a supervisor

Задание 7

Translate the phrases.

  1. There should be clearance under the work surface.
  2. You should have your feet flat on the floor.
  3. Make sure your forearms and hands are in a straight line.
  4. Your lower back should be supported.
  5. Your screen should be positioned to avoid reflected glare.
  6. Keep your shoulders relaxed.
  7. You should have your thighs tilted slightly.
  8. Make sure the top of the screen is at or slightly below eye level.

 

Ещё