Part 1 basic vocabulary


Скачать 1.24 Mb.
Название Part 1 basic vocabulary
страница 14/20
Тип Документы
rykovodstvo.ru > Руководство эксплуатация > Документы
1   ...   10   11   12   13   14   15   16   17   ...   20

  1. piggyback v – размещаться поверх, вторым ярусом

  2. attach to v – прикреплять(ся) к

  3. spreadsheet – электронная таблица

  4. wreak havoc v – причинять вред, вызывать разрушение

  5. replicate v – воспроизводить

  6. victim – жертва

  7. worm – червь (тип вируса)

  8. security hole – дыра в системе безопасности

  9. scan smth for v… – просматривать что-то в поисках…

  10. take advantage of v – воспользоваться

  11. vulnerability - уязвимость

  12. ISAPI (Internet Server Application Program Interface) - интерфейс прикладного программирования

  13. approximately – приблизительно

  14. slammer – (слэнг) тюрьма

  15. cause mayhem v - нанести увечье

  16. SQL [si:kwBl] (Structured Query Language) - язык структурированных запросов

  17. Trojan horse - "Троянский конь", троянец (тип вируса)

  18. claim v – претендовать

  19. do damage v – наносить ущерб

  20. erase v – стереть

  21. spectacular – впечатляющий, эффектный

  22. via – через, посредством

  23. trigger the virus v – приводить в действие вирус

  24. recipient – получатель

  25. attachment – приложение

  26. corrupt v – портить

  27. VBA (Visual Basic for Applications) - язык программирования visual Basic для прикладных программ

  28. create a huge mess – создать большой беспорядок

When you listen to the news, you hear about many different forms of electronic infection. The most common are:

The latest thing in the world of computer viruses is the e-mail virus, and the Melissa virus in March 1999 was spectacular. Melissa spread in Microsoft Word documents sent via e-mail, and it worked like this:
Someone created the virus as a Word document uploaded to an Internet newsgroup. Anyone who downloaded the document and opened it would trigger the virus. The virus would then send the document (and therefore itself) in an e-mail message to the first 50 people in the person's address book. The e-mail message contained a friendly note that included the person's name, so the recipient would open the document thinking it was harmless. The virus would then create 50 new messages from the recipient's machine. As a result, the Melissa virus was the fastest-spreading virus ever seen! It forced a number of large companies to shut down their e-mail systems.
The ILOVEYOU virus, which appeared on May 4, 2000, was even simpler. It contained a piece of code as an attachment. People who double clicked on the attachment allowed the code to execute. The code sent copies of itself to everyone in the victim's address book and then started corrupting files on the victim's machine. This is as simple as a virus can get. It is really more of a Trojan horse distributed by e-mail than it is a virus.
The Melissa virus took advantage of the programming language built into Microsoft Word called VBA, or Visual Basic for Applications. It is a complete programming language and it can be programmed to do things like modify files and send e-mail messages. It also has a useful but dangerous auto-execute feature. A programmer can insert a program into a document that runs instantly whenever the document is opened. This is how the Melissa virus was programmed. Anyone who opened a document infected with Melissa would immediately activate the virus. It would send the 50 e-mails, and then infect a central file called NORMAL.DOT so that any file saved later would also contain the virus! It created a huge mess.
Ex. 2. Which of the following statements are true and which are false?

  1. A virus can piggyback on a spreadsheet document. T/F

  2. An e-mail virus replicates itself a dozen times in the victim’s address book. T/F

  3. A worm takes advantage of a security hole in a recipient’s computer. T/F

  4. The aim of a worm is to wreak havoc on a specific computer. T/F

  5. Trojan horse pretends to be something that it is not and it can’t replicate itself. T/F

  6. E-mail viruses were among the earliest known types of electronic infection. T/F

  7. The Melissa virus was one of the most harmless. T/F

  8. The ILOVEYOU virus was triggered off as soon as you single clicked on the attachment of an e-mail message. T/F

  9. The auto-execute feature of VBA is useful and harmless. T/F

  10. You don’t have to open a document to make Melissa work. T/F


Ex. 3. Translate from Russian into English

  1. Вирус может размножиться, прикрепляясь к другим программам, или нанести ущерб.

  2. Вирус Красный код (Code Red) использовал уязвимость интерфейса прикладного программирования в Майкрософт офисе.

  3. Кто-то создал и загрузил вирус как документ Word на сайт новостей Интернет.

  4. Вирус Мелисса вынудил ряд Интернет компаний закрыть свои почтовые серверы.

  5. ЯЛЮБЛЮТЕБЯ более похож на троянца, распространяемого через электронную почту, чем на обычный почтовый вирус.



16 Flash Basics (after Jeff Tyson)
Ex.1 Study the active vocabulary

  1. console – пульт управления

  2. solid state storage device – твердотельное устройство запоминания

  3. EEPROM (Electrically Erasable Programmable Read-Only Memory) - электрически стираемое программируемое постоянное запоминающее устройство, ЭСППЗУ

  4. grid – решетка

  5. column – вертикальная шина

  6. row – горизонтальная шина

  7. cell – ячейка

  8. intersection - пересечение

  9. oxide layer – слой окислов

  10. floating gate – плавающий затвор

  11. control gate – затвор полевого транзистора

  12. word line - числовая шина

  13. tunneling - туннельный эффект

  14. alter v - изменить

  15. placement – расположение

  16. electric charge – электрический заряд

  17. bit line - разрядная шина

  18. drain to a ground v – стекать на землю, заземляться

  19. electron gun – электронная пушка

  20. excited electrons – возбужденные электроны

  21. trap v– захватывать в ловушку

  22. cell sensor – чувствительный датчик ячейки

  23. monitor v - контролировать

  24. threshold [`IreGhBLld] - порог

  25. blank – чистый, без записанной информации

  26. in-circuit wiring – внутрисхемная разводка

  27. predetermined section – заданный сектор

  28. block – блок, одна физическая запись данных на носителе

  29. targeted – намеченный, заданный

  30. preset - предварительная установка

  31. maintain v – поддерживать

  32. pull current – забирать электричество


Electronic memory comes in a variety of forms to serve a variety of purposes. Flash memory is used for easy and fast information storage in such devices as digital cameras and home video game consoles. It is used more as a hard drive than as RAM. In fact, Flash memory is considered a solid state storage device. Solid state means that there are no moving parts -- everything is electronic instead of mechanical.

Flash memory is a type of EEPROM chip. It has a grid of columns and rows with a cell that has two transistors at each intersection. The two transistors are separated from each other by a thin oxide layer. One of the transistors is known as a floating gate, and the other one is the control gate. The floating gate's only link to the row, or wordline, is through the control gate. As long as this link is in place, the cell has a value of 1. To change the value to a 0 requires a curious process called Fowler-Nordheim tunneling.

Tunneling is used to alter the placement of electrons in the floating gate. An electrical charge, usually 10 to 13 volts, is applied to the floating gate. The charge comes from the column, or bitline, enters the floating gate and drains to a ground.

This charge causes the floating-gate transistor to act like an electron gun. The excited electrons are pushed through and trapped on other side of the thin oxide layer, giving it a negative charge. These negatively charged electrons act as a barrier between the control gate and the floating gate. A special device called a cell sensor monitors the level of the charge passing through the floating gate. If the flow through the gate is greater than 50 percent of the charge, it has a value of 1. When the charge passing through drops below the 50-percent threshold, the value changes to 0. A blank EEPROM has all of the gates fully open, giving each cell a value of 1.

The electrons in the cells of a Flash-memory chip can be returned to normal ("1") by the application of an electric field, a higher-voltage charge. Flash memory uses in-circuit wiring to apply the electric field either to the entire chip or to predetermined sections known as blocks. This erases the targeted area of the chip, which can then be rewritten. Flash memory works much faster than traditional EEPROMs because instead of erasing one byte at a time, it erases a block or the entire chip, and then rewrites it.

You may think that your car radio has Flash memory, since you are able to program the presets and the radio remembers them. But it is actually using Flash RAM. The difference is that Flash RAM has to have some power to maintain its contents, while Flash memory will maintain its data without any external source of power. Even though you have turned the power off, the car radio is pulling a tiny amount of current to preserve the data in the Flash RAM. That is why the radio will lose its presets if your car battery dies or the wires are disconnected.

Capacitive switches are considered to be non-mechanical because they do not simply complete a circuit like the other keyboard technologies. Instead, current is constantly flowing through all parts of the key matrix. Each key is spring-loaded, and has a tiny plate attached to the bottom of the plunger. When a key is pressed, this plate is brought very close to another plate just below it. As the two plates are brought closer together, it affects the amount of current flowing through the matrix at that point. The processor detects the change and interprets it as a keypress for that location. Capacitive switch keyboards are expensive, but do not suffer from corrosion and have a longer life than any other keyboard. Also, they do not have problems with bounce since the two surfaces never come into actual contact.

Metal contact and foam element keyboards are not as common as they used to be. Metal contact switches simply have a spring-loaded key with a strip of metal on the bottom of the plunger. When the key is pressed, the metal strip connects the two parts of the circuit. The foam element switch is basically the same design but with a small piece of spongy foam between the bottom of the plunger and the metal strip, providing for a better tactile response. Both technologies have good tactile response, make satisfyingly audible "clicks" and are inexpensive to produce. The problem is that the contacts tend to wear out or corrode faster than on keyboards that use other technologies. Also, there is no barrier that prevents dust or liquids from coming in direct contact with the circuitry of the key matrix.

Ex. 2. Which of the following statements are true and which are false?

  1. All keyboards use basically one and the same technology. T/F

  2. A rubber dome switch breaks the circuit in a certain location of a key matrix when a key is pressed. T/F

  3. Rubber dome switch keyboards are rather cheap. T/F

  4. Membrane switch keyboards have no rubber parts. T/F

  5. Membrane keyboards are not general purpose keyboards. T/F

  6. Rubber dome, metal contact and foam element keyboards are mechanical. T/F

  7. Capacitive switch keyboard is non-mechanical. T/F

  8. Any small change in current in capacitive switch keyboards detected by a keyboard processor is interpreted as a keypress. T/F

  9. Foam key element keyboards do not have “clicks”. T/F

  10. Metal contact and foam element keyboards are not resistant to spills. T/F


Ex. 3. Translate from Russian into English


  1. Мы любим слышать щелканье клавиш при наборе текстов.

  2. Когда клавишу отпускают, резиновый купол возвращается в обычное состояние.

  3. Ток постоянно проходит по всем участкам переключающей матрицы.

  4. Металло-контактные клавиатуры сейчас уже не так распространены, как прежде.

  5. Пористая пена обеспечивает лучшую осязательную реакцию.



15 Types of Infection: E-mail viruses (after Marshall Brain)
Ex.1 Study the active vocabulary
1   ...   10   11   12   13   14   15   16   17   ...   20

Похожие:

Part 1 basic vocabulary icon Инструкция по эксплуатации парогенератора «basic auto»
Поздравляем Вас с приобретением парогенератора «Basic Auto» – надежного помощника с уникальными возможностями
Part 1 basic vocabulary icon А. Н. Небаба использование ms visual basic для разработки windows-приложений
Использование ms visual Basic для разработки windows-приложений : учеб пособие. Ч. I / А. Н. Небаба; Рост гос ун-т путей сообщения....
Part 1 basic vocabulary icon 2010 (EН81-1/2: 1998) Лифты. Общие требования безопасности к устройству...
Цели и принципы стандартизации в Российской Федерации установлены Федеральным законом от 27 декабря 2002г. №184 фз «О техническом...
Part 1 basic vocabulary icon Инструкция по эксплуатации (Basic Manual) Инструкция по эксплуатации...
Таким образом, базовая инструкция по эксплуатации информирует вас о часто используемых функциях. Кроме этого, имеется еще одна часть...
Part 1 basic vocabulary icon Hereinafter referred to as the «Seller», on the one part

Part 1 basic vocabulary icon Руководство пользователя h ydronix Part no: hd0193 Version 0

Part 1 basic vocabulary icon Руководство по работе и обслуживанию Пересмотр: март 2001
Предосторожности по безопасности part-1: intro-1
Part 1 basic vocabulary icon I. Правила ведения журнала (Section 1: How to use the Record Book). 4
Начальная практическая подготовка (Basic Practical training)
Part 1 basic vocabulary icon Subject: Exported From Confluence mime-version: 0 Content-Type: multipart/related;...

Part 1 basic vocabulary icon Subject: Exported From Confluence mime-version: 0 Content-Type: multipart/related;...

Part 1 basic vocabulary icon Можливості sql-запитів у Microsoft Access
Формирование и выполнение запросов в реальном времени (инструментарий Visual Basic For Applications)
Part 1 basic vocabulary icon Guide to Country Studies
Учебного пособия «Grammar and Vocabulary. Pre-intermediate to intermediate.», «Guide to Country Studies»
Part 1 basic vocabulary icon Type="text/html" x-mimeole: Produced By Mht File Maker 0 beta This...

Part 1 basic vocabulary icon Type="text/html" x-mimeole: Produced By Mht File Maker 0 beta This...

Part 1 basic vocabulary icon Языки программирования. Создание программы в языке Visual Basic
Экспериментальное исследование тест работы программы выявление ошибок 16
Part 1 basic vocabulary icon Внимание
Перед выполнением любых работ внутри панели управления устройства Pool Basic Evo убедитесь в том, что оно отключено от источника...

Руководство, инструкция по применению




При копировании материала укажите ссылку © 2024
контакты
rykovodstvo.ru
Поиск