COMPUTER vs EVERYDAY TERMS SUPPLEMENT TO p.87of ENGLISH GRAMMAR & STRUCTURE REVIEW 32. host-one who entertains guests vs computer providing service. 33.client-customer vs a single user of a network application. 34. bulk- anything that comes in masses as bulk mail vs information processing in large quantities. 35.backbone-vertebrae, spinal column vs 36. hole-an opening vs allowing non-authorized access to system. 37.boot-a type of shoe vs to start-up a system. (cold boot, warm boot). 38. nibble-a small bite of food vs ½ a byte=4 bits. 39. cookie-a biscuit vs file of info. Sent by WEB server to a browser that relays bk to WEB server. 40.browser-one who is just looking through a magazine, book, etc. vs application that enables user to display and interact (navigate) with web pages. 41.finger of one's hand vs Unix command that provides info. About user logged into system. 42. navigate- travel by ship vs to 'surf' the Internet. 43.Daemon devil or devil-like vs process in operating system that runs in the background without anyone being aware of it—'like the devil'. 44.nerd-the student that is obsessed with studying vs the comp. person who is obsessed with computing. 45.Trojan horse-Greek Mythology vs malicious program that is disguised as legitimate. 46.worm-wiggly soft bodied animal vs type of comp. virus that copies itself to everyone in the comp.e-mail address bk. 47.snail-mail vs E-mail, Land phone vs cell/mobile phone. 49. hits-times that someone has gotten to see your profile e.g. on FACEBOOK., or TWEETER. (HOW MANY HITS?) COMPUTER TERMS SUPPLEMENT-SEMESTER I 12. A record of events or info. kept in chronological order. __________________________ DIRECTIONS: FILL-IN BLANKS WITH VOC. FROM LIST BELOW 13. The user who has enough computer knowledge to get into system by LIST: BLOG, ATM, SPAM, GOOGLE, breaking security codes. BLOG HOPPING, LOG, BLOB, CYBER ___________________________ JUNKIE, CRIPPLE WARE, SMS, MMS, ROAMING, VLOG, PLOG, PHOTOBLOG, 14. A computer specialist who has the HITS, HOT LINK, HACKER, GURU, 'know-how' to solve any computer GEEK, WIZARD, TECKIE, LURKING, problem. _______________________ WIRED, GRONKED OUT, VIRTUAL 15. A common term for a highly RELATIONSHIP, BOUNCED MESSAGE proficient individual in regard to comp. 1. Friendship through the internet without actual technical support. _________________________ contact with other person. 16. One who does 'magic' with computers _____________________ especially in creation. 2.Automatic Teller Machine. Bank services ____________________ outside bank. ___________________ 17. ________________________ is for on3.Web Log. Site with on-line diaries or line picture displaying, information._______________________ 100 ____________________ for political issue 4.Misspelling for Googol meaning 100 (1 displays, _____________________ for with one hundred zeros). Big USA based video display, and _________________ search engine.________________________ ____________________ relates to going 5.Binary Large Object. Database field that from BLOG to BLOG. can hold images, audio, etc. A soft moist 18. "Today I spent 2 hrs. just shapeless _________________________ at my E-mail mass.______________________________ messages—I was too lazy to respond to 6.Number of accesses/visits /retrievals any of them". from a Web page. 19. Text messaging. __________ __________________________ (_____________ __________________ 7.The hyperlink from where we can get _____________). quick just off the press/'________' 20. Messaging with various news.______________________ media.__________ (________ ____________ 8.Huge amount of meaningless messages _____________). entering one's E-mail. 21. "Make sure to get the _______________________ _____________________ service activated 9.An E-mail that fails to be otherwise you wont be able to use your delivered.__________________________ cell/mobile when you travel abroad." 10. "I start out telling myself that I'll 22. "He's a real hook-on for half an hour then I get ______________________________ carried away, for endless hrs.—by the addicted to computers and the WEB. end I'm _______________ __________. " 23. A demo of a comp. program, game, etc., 11. After spending many hrs. in front of my PC—writing up the report, editing it, to entice a prospective buyer. ____________________________ making printouts, etc., I was really __________________. SUPPLEMENT SEM.1.Comp.Eng. & Informatics A) Comp. Terms used as verbs in Greek: sort ___________________________ boot __________________________ mark __________________________ bin ____________________________ click ___________________________ serf ____________________________ post ___________________________ scan_ __________________________ *park __________________________ *stress._________________________ *intrigue _______________________ ________________________________ ________________________________ _________________________________ B) Greek terms used in English Computing: _____________________________________ _____________________________________ _____________________________________ _____________________________________ _____________________________________ _____________________________________ _____________________________________ _____________________________________ C) English terms used in Greek with Greek verb: ΚΑΝΩ___________, ______________, ______________, _____________, ______________, ________________, _________________, ____________________, _________________, _______________, ____________, _______________, ____________, ___________, _________, _________________, __________________, _____________, ________________, ____________, ____________, _______________, __________________, __________________, _____________. D) Others:1. English terms borrowed into Greek as is but adopted Greek pronunciation. 2. Gr. Noun suffix ________________________________________________________________________________________ ________________________________________________________________________________________ ________________________________________________________________________________________ ________________________________________________________________________________________ ________________________________________________________________________________________ ________________________________________________________________________________________ ________________________________________________________________________________________ ________________________________________________________________________________________ ________________________________________________________________________________________ ________________________________________________________________________________________ ______________________________________. E)? ________________________________________________________________________________________ ________________________________________________________________________________________ ________________________________________________________________________________________ ________________________________________________________________________________________ _______________________________________________________________________________ "SEMESTER I SUPPLEMENT-DICTATION 1."COMPUTERS" Listen to my reading. As I read write synonym from reading next to terms below. 1.MACHINE________________________________ 2. MATHEMATICAL_______________________________ 3. CARRY OUT__________________________________ 4 DIFFICULTY___________________________________ 5. GET BACK_________________________________ 6. INTERFERENCE___________________________________ 7. PARTICULAR__________________________________________ 8. SIMULTANEOUSLY__________________________________ 9. CATERING TO______________________________________ 10. USED BY MANY_________________________________________ 11. DIFFERENTIATION_______________________________________ 12. CONNECTING___________________________________________ 13. LAN__________________________________________________________ 14.ALLOWED ___________________________________ 15. JOBS_________________________________ 16.LIMITED TO__________________________________ 17. PROGRESS_______________________________________ 18. VARIETY OF USES_________________________________________ 19. MADE________________________ 20. UNSATISFACTORY (PERFORMANCE) ______________________________ "SEMESTER I SUPPLEMENT-DICTATION 2."COMPUTERS-Processing Data" A) Copy down dictation--B) Answer Questions below. Data Processing ____________________________________________________________________________ ____________________________________________________________________________________________ ____________________________________________________________________________________________ ____________________________________________________________________________________________ ____________________________________________________________________________________________ ____________________________________________________________________________________________ ____________________________________________________________________________________________ ____________________________________________________________________________________________ ____________________________________________________________________________________________ ____________________________________________________________________________________________ ____________________________________________________________________________________________ ____________________________________________________________________________________________ ____________________________________________________________________________________________ ____________________________________________________________________________________________ ____________________________________________________________________________________________ ____________________________________________________________________________________________ ____________________________________________________________________________________________ _______________________________________________________________________________ ___________________________________________________________________________________________ ____________________________________________________________________________________ ______________________________________________________________________________ ___________________________________________________________________________________ !. What is considered the 'heart ' of the computer? ______________________________________________ 2. What does it contain? _______________________________________________________________________________ _______________________________________________________________________________________________ _____________________________________________________________________________________ ____________________________________________________________________________________ 3. What are typical computer clock rates? _________________________________________ 4. What do logic circuits do? ___________________________________________________________________________ ________________________________________________________ 5. What are registers? __________________________________________________________________________ _________________________________________________________________________________________ ________________________________________________________________________________________ ________________________________________________________________________________________ ________________________________________________________________________________________ 6. What is another term for: manner-________________, rates-_________________________, stable-____________________, rapid-_______________________, by hand-______________________ decode-___________________________, 1. Give other names for flash drive: English II-Computer Engineering and Informatics. ________________ Dictation/Listening—Additional _________,______ ________________ Copy down what you hear _______,________ FLASH DRIVES: ____________, ___________________________________________________________________________________________ ________________ ______________________________________________________________________________________ _________, ______________________________________________________________________________________ ________________ ______________________________________________________________________________________ _____________. ______________________________________________________________________________________ __________________________________________________________. 2. Write each COMPONENTS: component as you ___________________________________________________________________________________________ hear it in the blank ______________________________________________________________________________________ corresponding to ______________________________________________________________________________________ the figure. ______________________________________________________________________________________ ______________________________________________________________________________________ 1._________________ ______________________________________________________________________________________ ___________________ ______________________________________________________________________________________ 2.______________ ______________________________________________________________________________________ ___________________ ______________________________________________________________________________________ ______ _________________________________________________________. 3._________________ ___________________ Essential Components: 4.______________ ___________________________________________________________________________________________ ___________________ ______________________________________________________________________________________ ______ ______________________________________________________________________________________ 5._________________ ______________________________________________________________________________________ ___________________ ______________________________________________________________________________________ 6.______________ ______________________________________________________________________________________ ___________________ ______________________________________________________________________________________ ______ ______________________________________________________________________________________ ______________________________________________________________________________________ 3. Additional _________________________________________________________________________. Notes/Vocabulary/A Additional Information cronyms ___________________________________________________________________________________________ USB=______________ ______________________________________________________________________________________ ___________________ ______________________________________________________________________________________ ___,LED=___________ ______________________________________________________________________________________ ___________________ ______________________________________________________________________________________ ___________________ ______________________________________________________________________________________ ,_NAND____________ ______________________________________________________________________________________ ___________________ ______________________________________________________________________________________ ___________________ ________________________________. ___________________ ___________________ ___________________ ___________________ ___________________ ___________________________________________________________________________________________ ___________________________________________________________________________________________ __________________________________ I P ENGLISH & TECHNICAL TERMINOLOGY SEM. 2 Telling Humans and Computers Apart Automatically A CAPTCHA is a program that can generate and grade tests that humans can pass but current computer programs cannot. For example, humans can read distorted text as the one shown below, but current computer programs can't: a d d r e s s e s o f The term CAPTCHA (for Completely Automated Public *Turing Test To Tell Computers and Humans Apart) was coined in 2000 by Luis von Ahn, Manuel Blum, Nicholas Hopper and John Langford of Carnegie Mellon University. At the time, they developed the first CAPTCHA to be used by Yahoo. *Alan Turing was a British pioneer in Computer Science (1912-1954)-hence the term in the Acronym-CAPTCHA Applications of CAPTCHAs CAPTCHAs have several applications for practical security, including (but not limited to): Preventing Comment Spam in Blogs. Most bloggers are familiar with programs that submit bogus comments, usually for the purpose of raising search engine ranks of some website (e.g., "buy penny stocks here"). This is called comment spam. By using a CAPTCHA, only humans can enter comments on a blog. There is no need to make users sign up before they enter a comment, and no legitimate comments are ever lost! Protecting Website Registration. Several companies (Yahoo!, Microsoft, etc.) offer free email services. Up until a few years ago, most of these services suffered from a specific type of attack: "bots" that would sign up for thousands of email accounts every minute. The solution to this problem was to use CAPTCHAs to ensure that only humans obtain free accounts. In general, free services should be protected with a CAPTCHA in order to prevent abuse by automated programs. Online Polls. In November 1999, http://www.slashdot.org released an online poll asking which was the best graduate school in computer science (a dangerous question to ask over the web!). As is the case with most online polls, v o t e r s w e r e r e c o r d e d i n o r d e r t o p revent single users from voting more than once. However, students at Carnegie Mellon University (CMU) found a way to stuff the ballots using programs that voted for CMU thousands of times. CMU's score started growing rapidly. The next day, students at MIT wrote their own program and the poll became a contest between voting "bots." MIT finished with 21,156 votes, Carnegie Mellon with 21,032 and every other school with less than 1,000. Can the result of any online poll be trusted? Not unless the poll ensures that only humans can vote. Preventing Dictionary Attacks. CAPTCHAs can also be used to prevent dictionary attacks in password systems. The idea is simple: prevent a computer from being able to iterate through the entire space of passwords by requiring it to solve a CAPTCHA after a certain number of unsuccessful logins. Search Engine Bots. It is sometimes desirable to keep webpages unindexed to prevent others from finding them easily. There is an html tag to prevent search engine bots from reading web pages. The tag, however, doesn't guarantee that bots won't read a web page; it only serves to say "no bots, please." Search engine bots, since they usually belong to large companies, respect web pages that don't want to allow them in. However, in order to truly guarantee that bots won't enter a web site, CAPTCHAs are needed. Worms and Spam. CAPTCHAs also offer a plausible solution against e-mail worms and spam: "I will only accept an e-mail if I know there is a human behind the other computer." A few companies are already marketing this idea. Guidelines If your website needs protection from abuse, it is recommended that you use a CAPTCHA. There are many CAPTCHA implementations, some better than others. The following guidelines are strongly recommended for any CAPTCHA: Accessibility. CAPTCHAs must be accessible. CAPTCHAs based solely on reading text — or other visual-perception tasks — prevent visually impaired users from accessing the protected resource. Such CAPTCHAs may make a site incompatible with Section 508 in the United States. Any implementation of a CAPTCHA should allow blind users to get around the barrier, for example, by permitting users to opt for an audio CAPTCHA. Image Security. Images of text should be distorted randomly before being presented to the user. Many implementations of CAPTCHAs use undistorted text, or text with only minor distortions. These implementations are vulnerable to simple automated attacks. For example, the CAPTCHAs shown below can all be broken using image processing techniques, mainly because they use a consistent font. S c r i p t S e c u r i t y . B u i l d i n g a s e c u r e C A P T C HA is not easy. In addition to making the images unreadable by computers, the But system should ensure that there are no easy ways around it at the script level. if a Common examples of insecurities in this respect include: (1) Systems that pass comp the answer to the CAPTCHA in plain text as part of the web form. (2) Systems uter where a solution to the same CAPTCHA can be used multiple times (this makes can't the CAPTCHA vulnerable to so-called "replay attacks"). read Security Even After Wide-Spread Adoption. There are various such "CAPTCHAs" that would be insecure if a significant number of sites start using a them. An example of such a puzzle is asking text-based questions, such as a CAP mathematical question ("what is 1+1"). Since a parser could easily be written TCH that would allow bots to bypass this test, such "CAPTCHAs" rely on the fact A, that few sites use them, and thus that a bot author has no incentive to program how their bot to solve that challenge. True CAPTCHAs should be secure even after a does significant number of websites adopt them. the syste m know the reCAPTCHA is a free CAPTCHA service that helps to digitize books, newspapers and corre ct old time radio shows. answ About 200 million CAPTCHAs are solved by humans around the world every day. In er to each case, roughly ten seconds of human time are being spent. Individually, that's not a the lot of time, but in aggregate these little puzzles consume more than 150,000 hours of puzzl work each day. What if we could make positive use of this human effort? reCAPTCHA e? Here' does exactly that by channeling the effort spent solving CAPTCHAs online into s "reading" books. how: To archive human knowledge and to make information more accessible to the world, Each new multiple projects are currently digitizing physical books that were written before the word computer age. The book pages are being photographically scanned, and then transformed into text using "Optical Character Recognition" (OCR). The transformation that into text is useful because scanning a book produces images, which are difficult to store cann on small devices, expensive to download, and cannot be searched. The problem is that ot be read OCR is not perfect. corre ctly by OCR is given to a user reCAPTCHA improves the process of digitizing books by sending words that cannot be in read by computers to the Web in the form of CAPTCHAs for humans to decipher. conju More specifically, each word that cannot be read correctly by OCR is placed on an nctio image and used as a CAPTCHA. This is possible because most OCR programs alert n you when a word cannot be read correctly. with anoth er Digitizing Books One Word at a Time word for which the answer is already known. The user is then asked to read both words. If they solve the one for which the answer is known, the system assumes their answer is correct for the new one. The system then gives the new image to a number of other people to determine, with higher confidence, whether the original answer was correct. Currently, we are helping to digitize old editions of the New York Times and books from Google Books. TERMS IN ITALICS IN TEXT ABOVE :Define briefly or give synonyms …but not limited to______________________________, bogus_______________________________________,comment spam_________________________________ Bots____________________________________, iterate____________________________________, plausible _______________________________________, Visual-perception _____________________________________________, solely ________________________________ visually impaired___________________________, to opt for_____________________________________________, distorted_____________________________, vulnerable_________________________________________,incentive_________ _________________________, channeling the effort_________________________ ________________________________________, decipher__________________________________________,