authentication | /O:ˏTentI'keISn/ | установление подлинности (документа, личности, объекта) |
consideration | /kqnˏsIdq'reISn/ | рассмотрение, обсуждение |
claim | /kleIm/ | 1) требование; 2) иск, претензия |
confirm | /kqn'fE:m/ | подтверждать, утверждать, поддерживать |
corporate | /'kO:pqrqt/ | общий, корпоративный |
default | /dI'f O:lt/ | отсутствие, недостаток; невыполнение обязательств |
encrypted | /in'krIptid/ | зашифрованный, закодированный |
firewall | /'faIqwO:l/ | межсетевой шлюз; аппаратные и программные средства |
forgery | /'fO:dZqri/ | 1) подделка, подлог; 2) фальшивый документ; подделанная подпись |
fake | /feIk/ | подделка, фальсификация |
insecurity | /ˏInsI'kjVrqti/ | несоблюдение требований безопас-ности, отсутствие безопасности |
identify | /aI'dentIfaI/ | опознавать, отожествлять |
merely | /'mIqli/ | только, просто, единственно |
outsider | /ˏaVt'saIdq(r)/ | постороннее лицо; лицо, непричастное к системе |
restrict | /rI'strIkt/ | ограничивать, заключать в пределы |
raw | /rO:/ | необработанный |
session | /'seSn/ | сеанс (связи); сессия; совещание |
share | /Seq(r)/ | делить, разделять |
signature | /'sIgnqtSq(r)/ | подпись, сигнатура, характерный признак |
I. Study the following words and choose:
|
|
a) nouns
financier, finance, financial | |
transmit, transmissible, transmission | |
provided, provider, providing | |
installation, install, installment |
b) verbs
identification, identify, identity, identical | |
confirmation, confirmative, confirmed, confirm | |
restrict, restricted, restriction, restrictive | |
creation, create, creative, creator |
c) adjectives
sensibility, sensitive, sensitize, sensitivity | |
vitality, vitalize, vital, vitals | |
security, secure, Security Council | |
globe, global, globosity |
II. Arrange the words of the two groups in pairs with:
a) similar meaning
request | a | mixture | |
secure | b | put one’s name | |
install | c | inquiry | |
select | d | defend | |
share | e | personal | |
sign | f | assemble | |
private | g | divide | |
combination | h | choose |
b) contrary meaning
outside | a | internal | |
secure | b | destroy | |
sender | c | original | |
create | d | inside | |
limit | e | insecure | |
fake | f | decoding key | |
encoding key | g | extend | |
external | h | receiver |
III. Match the words with their definitions.
request | a | to write one’s name on; | |
client | b | to take another person’s property; | |
to sign | c | a secret word allowing a person to prove authorization to pass or enter; | |
steal | d | the condition or fact of being the same as something else; | |
data processing | e | a plan of action; a secret plot; | |
password | f | a course of travel; | |
identity | g | a reply; the act of replying; | |
scheme | h | the business of handling and storing information using computers and other available machines; | |
route | i | to ask for something; | |
response | j | a person who secures the professional services of another; |
IV. Study the text and try to understand all details.