COMPUTER vs EVERYDAY TERMS SUPPLEMENT TO p

advertisement
COMPUTER vs EVERYDAY TERMS
SUPPLEMENT TO p.87of
ENGLISH GRAMMAR &
STRUCTURE REVIEW
32. host-one who entertains guests vs computer providing
service.
33.client-customer vs a single user of a network
application.
34. bulk- anything that comes in masses as bulk mail vs
information processing in large quantities.
35.backbone-vertebrae, spinal column vs
36. hole-an opening vs allowing non-authorized access to
system.
37.boot-a type of shoe vs to start-up a system. (cold
boot, warm boot).
38. nibble-a small bite of food vs ½ a byte=4 bits.
39. cookie-a biscuit vs file of info. Sent by WEB server to
a browser that relays bk to WEB server.
40.browser-one who is just looking through a magazine,
book, etc. vs application that enables user to display and
interact (navigate) with web pages.
41.finger of one's hand vs Unix command that provides
info. About user logged into system.
42. navigate- travel by ship vs to 'surf' the Internet.
43.Daemon devil or devil-like vs process in operating
system that runs in the background without anyone being
aware of it—'like the devil'.
44.nerd-the student that is obsessed with studying vs the
comp. person who is obsessed with computing.
45.Trojan horse-Greek Mythology vs malicious program
that is disguised as legitimate.
46.worm-wiggly soft bodied animal vs type of comp. virus
that copies itself to everyone in the comp.e-mail address
bk.
47.snail-mail vs E-mail, Land phone vs cell/mobile
phone.
49. hits-times that someone has gotten to see your profile
e.g. on FACEBOOK., or TWEETER. (HOW MANY
HITS?)
COMPUTER TERMS
SUPPLEMENT-SEMESTER I
12. A record of events or info. kept in
chronological order.
__________________________
DIRECTIONS: FILL-IN BLANKS WITH VOC. FROM LIST BELOW
13. The user who has enough computer
knowledge to get into system by
LIST: BLOG, ATM, SPAM, GOOGLE,
breaking security codes.
BLOG HOPPING, LOG, BLOB, CYBER
___________________________
JUNKIE, CRIPPLE WARE, SMS, MMS,
ROAMING, VLOG, PLOG, PHOTOBLOG, 14. A computer specialist who has the
HITS, HOT LINK, HACKER, GURU,
'know-how' to solve any computer
GEEK, WIZARD, TECKIE, LURKING,
problem. _______________________
WIRED, GRONKED OUT, VIRTUAL
15. A common term for a highly
RELATIONSHIP, BOUNCED MESSAGE
proficient individual in regard to comp.
1. Friendship through the internet without actual technical support.
_________________________
contact with other person.
16. One who does 'magic' with computers
_____________________
especially in creation.
2.Automatic Teller Machine. Bank services
____________________
outside bank. ___________________
17. ________________________ is for on3.Web Log. Site with on-line diaries or
line picture displaying,
information._______________________
100
____________________ for political issue
4.Misspelling for Googol meaning 100 (1
displays, _____________________ for
with one hundred zeros). Big USA based
video display, and _________________
search engine.________________________
____________________ relates to going
5.Binary Large Object. Database field that
from BLOG to BLOG.
can hold images, audio, etc. A soft moist
18. "Today I spent 2 hrs. just
shapeless
_________________________ at my E-mail
mass.______________________________
messages—I was too lazy to respond to
6.Number of accesses/visits /retrievals
any of them".
from a Web page.
19. Text messaging. __________
__________________________
(_____________ __________________
7.The hyperlink from where we can get
_____________).
quick just off the press/'________'
20. Messaging with various
news.______________________
media.__________ (________ ____________
8.Huge amount of meaningless messages
_____________).
entering one's E-mail.
21. "Make sure to get the
_______________________
_____________________ service activated
9.An E-mail that fails to be
otherwise you wont be able to use your
delivered.__________________________
cell/mobile when you travel abroad."
10. "I start out telling myself that I'll
22. "He's a real
hook-on for half an hour then I get
______________________________
carried away, for endless hrs.—by the
addicted to computers and the WEB.
end I'm _______________ __________. "
23. A demo of a comp. program, game, etc.,
11. After spending many hrs. in front of
my PC—writing up the report, editing it, to entice a prospective buyer.
____________________________
making printouts, etc., I was really
__________________.
SUPPLEMENT SEM.1.Comp.Eng. & Informatics
A) Comp. Terms used as verbs in Greek:
sort ___________________________
boot __________________________
mark __________________________
bin ____________________________
click ___________________________
serf ____________________________
post ___________________________
scan_ __________________________
*park __________________________
*stress._________________________
*intrigue _______________________
________________________________
________________________________
_________________________________
B) Greek terms used in English Computing:
_____________________________________
_____________________________________
_____________________________________
_____________________________________
_____________________________________
_____________________________________
_____________________________________
_____________________________________
C) English terms used in Greek with Greek verb:
ΚΑΝΩ___________, ______________, ______________, _____________, ______________,
________________, _________________, ____________________, _________________,
_______________, ____________, _______________, ____________, ___________, _________,
_________________, __________________, _____________, ________________, ____________,
____________, _______________, __________________, __________________, _____________.
D) Others:1. English terms borrowed into Greek as is but adopted Greek pronunciation. 2. Gr. Noun suffix
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
______________________________________.
E)?
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
_______________________________________________________________________________
"SEMESTER I SUPPLEMENT-DICTATION 1."COMPUTERS"
Listen to my reading. As I read write synonym from reading next to terms below.
1.MACHINE________________________________
2. MATHEMATICAL_______________________________
3. CARRY OUT__________________________________
4 DIFFICULTY___________________________________
5. GET BACK_________________________________
6. INTERFERENCE___________________________________
7. PARTICULAR__________________________________________
8. SIMULTANEOUSLY__________________________________
9. CATERING TO______________________________________
10. USED BY MANY_________________________________________
11. DIFFERENTIATION_______________________________________
12. CONNECTING___________________________________________
13. LAN__________________________________________________________
14.ALLOWED ___________________________________
15. JOBS_________________________________
16.LIMITED TO__________________________________
17. PROGRESS_______________________________________
18. VARIETY OF USES_________________________________________
19. MADE________________________
20. UNSATISFACTORY (PERFORMANCE) ______________________________
"SEMESTER I SUPPLEMENT-DICTATION 2."COMPUTERS-Processing Data"
A) Copy down dictation--B) Answer Questions below.
Data Processing
____________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
____________________________________________________________________________________________
_______________________________________________________________________________
___________________________________________________________________________________________
____________________________________________________________________________________
______________________________________________________________________________
___________________________________________________________________________________
!. What is considered the 'heart ' of the computer? ______________________________________________
2. What does it contain? _______________________________________________________________________________
_______________________________________________________________________________________________
_____________________________________________________________________________________
____________________________________________________________________________________
3. What are typical computer clock rates? _________________________________________
4. What do logic circuits do? ___________________________________________________________________________
________________________________________________________
5. What are registers? __________________________________________________________________________
_________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
6. What is another term for: manner-________________, rates-_________________________,
stable-____________________, rapid-_______________________, by hand-______________________
decode-___________________________,
1. Give other names
for flash drive:
English II-Computer Engineering and Informatics.
________________
Dictation/Listening—Additional
_________,______
________________
Copy down what you hear
_______,________
FLASH DRIVES:
____________,
___________________________________________________________________________________________
________________
______________________________________________________________________________________
_________,
______________________________________________________________________________________
________________
______________________________________________________________________________________
_____________.
______________________________________________________________________________________
__________________________________________________________.
2. Write each
COMPONENTS:
component as you
___________________________________________________________________________________________
hear it in the blank
______________________________________________________________________________________
corresponding to
______________________________________________________________________________________
the figure.
______________________________________________________________________________________
______________________________________________________________________________________
1._________________
______________________________________________________________________________________
___________________
______________________________________________________________________________________
2.______________
______________________________________________________________________________________
___________________
______________________________________________________________________________________
______
_________________________________________________________.
3._________________
___________________
Essential Components:
4.______________
___________________________________________________________________________________________
___________________
______________________________________________________________________________________
______
______________________________________________________________________________________
5._________________
______________________________________________________________________________________
___________________
______________________________________________________________________________________
6.______________
______________________________________________________________________________________
___________________
______________________________________________________________________________________
______
______________________________________________________________________________________
______________________________________________________________________________________
3. Additional
_________________________________________________________________________.
Notes/Vocabulary/A
Additional Information
cronyms
___________________________________________________________________________________________
USB=______________
______________________________________________________________________________________
___________________
______________________________________________________________________________________
___,LED=___________
______________________________________________________________________________________
___________________
______________________________________________________________________________________
___________________
______________________________________________________________________________________
,_NAND____________
______________________________________________________________________________________
___________________
______________________________________________________________________________________
___________________
________________________________.
___________________
___________________
___________________
___________________
___________________
___________________________________________________________________________________________
___________________________________________________________________________________________
__________________________________
I
P
ENGLISH & TECHNICAL TERMINOLOGY SEM. 2
Telling Humans and Computers Apart
Automatically
A CAPTCHA is a program that can generate and grade tests that humans can pass but
current computer programs cannot. For example, humans can read distorted text as the
one shown below, but current computer programs can't:
a
d
d
r
e
s
s
e
s
o
f
The term CAPTCHA (for Completely Automated Public *Turing Test To Tell
Computers and Humans Apart) was coined in 2000 by Luis von Ahn, Manuel Blum,
Nicholas Hopper and John Langford of Carnegie Mellon University. At the time, they
developed the first CAPTCHA to be used by Yahoo.
*Alan Turing was a British pioneer in Computer Science
(1912-1954)-hence the term in the Acronym-CAPTCHA
Applications of CAPTCHAs
CAPTCHAs have several applications for practical security, including (but not limited
to):



Preventing Comment Spam in Blogs. Most bloggers are familiar with
programs that submit bogus comments, usually for the purpose of raising search
engine ranks of some website (e.g., "buy penny stocks here"). This is called
comment spam. By using a CAPTCHA, only humans can enter comments on a
blog. There is no need to make users sign up before they enter a comment, and
no legitimate comments are ever lost!
Protecting Website Registration. Several companies (Yahoo!, Microsoft, etc.)
offer free email services. Up until a few years ago, most of these services
suffered from a specific type of attack: "bots" that would sign up for thousands
of email accounts every minute. The solution to this problem was to use
CAPTCHAs to ensure that only humans obtain free accounts. In general, free
services should be protected with a CAPTCHA in order to prevent abuse by
automated programs.
Online Polls. In November 1999, http://www.slashdot.org released an online
poll asking which was the best graduate school in computer science (a
dangerous question to ask over the web!). As is the case with most online polls,
v
o
t
e
r
s
w
e
r
e
r
e
c
o
r
d
e
d
i
n
o
r
d
e
r
t
o
p



revent single users from voting more than once. However, students at Carnegie
Mellon University (CMU) found a way to stuff the ballots using programs that
voted for CMU thousands of times. CMU's score started growing rapidly. The
next day, students at MIT wrote their own program and the poll became a
contest between voting "bots." MIT finished with 21,156 votes, Carnegie
Mellon with 21,032 and every other school with less than 1,000. Can the result
of any online poll be trusted? Not unless the poll ensures that only humans can
vote.
Preventing Dictionary Attacks. CAPTCHAs can also be used to prevent
dictionary attacks in password systems. The idea is simple: prevent a computer
from being able to iterate through the entire space of passwords by requiring it
to solve a CAPTCHA after a certain number of unsuccessful logins.
Search Engine Bots. It is sometimes desirable to keep webpages unindexed to
prevent others from finding them easily. There is an html tag to prevent search
engine bots from reading web pages. The tag, however, doesn't guarantee that
bots won't read a web page; it only serves to say "no bots, please." Search
engine bots, since they usually belong to large companies, respect web pages
that don't want to allow them in. However, in order to truly guarantee that bots
won't enter a web site, CAPTCHAs are needed.
Worms and Spam. CAPTCHAs also offer a plausible solution against e-mail
worms and spam: "I will only accept an e-mail if I know there is a human
behind the other computer." A few companies are already marketing this idea.
Guidelines
If your website needs protection from abuse, it is recommended that you use a
CAPTCHA. There are many CAPTCHA implementations, some better than others. The
following guidelines are strongly recommended for any CAPTCHA:


Accessibility. CAPTCHAs must be accessible. CAPTCHAs based solely on
reading text — or other visual-perception tasks — prevent visually impaired
users from accessing the protected resource. Such CAPTCHAs may make a site
incompatible with Section 508 in the United States. Any implementation of a
CAPTCHA should allow blind users to get around the barrier, for example, by
permitting users to opt for an audio CAPTCHA.
Image Security. Images of text should be distorted randomly before being
presented to the user. Many implementations of CAPTCHAs use undistorted
text, or text with only minor distortions. These implementations are vulnerable
to simple automated attacks. For example, the CAPTCHAs shown below can all
be broken using image processing techniques, mainly because they use a
consistent font.

S
c
r
i
p
t
S
e
c
u
r
i
t
y
.
B
u
i
l
d
i
n
g
a
s
e
c
u
r
e
C
A
P
T
C
HA is not easy. In addition to making the images unreadable by computers, the But
system should ensure that there are no easy ways around it at the script level. if a
Common examples of insecurities in this respect include: (1) Systems that pass comp
the answer to the CAPTCHA in plain text as part of the web form. (2) Systems uter
where a solution to the same CAPTCHA can be used multiple times (this makes can't
the CAPTCHA vulnerable to so-called "replay attacks").
read
 Security Even After Wide-Spread Adoption. There are various
such
"CAPTCHAs" that would be insecure if a significant number of sites start using a
them. An example of such a puzzle is asking text-based questions, such as a
CAP
mathematical question ("what is 1+1"). Since a parser could easily be written TCH
that would allow bots to bypass this test, such "CAPTCHAs" rely on the fact
A,
that few sites use them, and thus that a bot author has no incentive to program how
their bot to solve that challenge. True CAPTCHAs should be secure even after a does
significant number of websites adopt them.
the
syste
m
know
the
reCAPTCHA is a free CAPTCHA service that helps to digitize books, newspapers and corre
ct
old time radio shows.
answ
About 200 million CAPTCHAs are solved by humans around the world every day. In er to
each case, roughly ten seconds of human time are being spent. Individually, that's not a the
lot of time, but in aggregate these little puzzles consume more than 150,000 hours of puzzl
work each day. What if we could make positive use of this human effort? reCAPTCHA e?
Here'
does exactly that by channeling the effort spent solving CAPTCHAs online into
s
"reading" books.
how:
To archive human knowledge and to make information more accessible to the world, Each
new
multiple projects are currently digitizing physical books that were written before the
word
computer age. The book pages are being photographically scanned, and then
transformed into text using "Optical Character Recognition" (OCR). The transformation that
into text is useful because scanning a book produces images, which are difficult to store cann
on small devices, expensive to download, and cannot be searched. The problem is that ot be
read
OCR is not perfect.
corre
ctly
by
OCR
is
given
to a
user
reCAPTCHA improves the process of digitizing books by sending words that cannot be in
read by computers to the Web in the form of CAPTCHAs for humans to decipher.
conju
More specifically, each word that cannot be read correctly by OCR is placed on an
nctio
image and used as a CAPTCHA. This is possible because most OCR programs alert
n
you when a word cannot be read correctly.
with
anoth
er
Digitizing Books One Word at a Time
word for which the answer is already known. The user is then asked to read both words.
If they solve the one for which the answer is known, the system assumes their answer is
correct for the new one. The system then gives the new image to a number of other
people to determine, with higher confidence, whether the original answer was correct.
Currently, we are helping to digitize old editions of the New York Times and books
from Google Books.
TERMS IN ITALICS IN TEXT ABOVE :Define briefly or give synonyms
…but not limited to______________________________,
bogus_______________________________________,comment
spam_________________________________
Bots____________________________________,
iterate____________________________________, plausible
_______________________________________,
Visual-perception _____________________________________________, solely
________________________________
visually impaired___________________________, to opt
for_____________________________________________,
distorted_____________________________,
vulnerable_________________________________________,incentive_________
_________________________, channeling the effort_________________________
________________________________________,
decipher__________________________________________,
Download