Скачать 1.09 Mb.
|
Unit 18Ex.1. Read the text.XML takes on HTML Standard Generalized Markup Language (SGML) is the language that spawned both HTML (HyperText Markup Language) and XML (extensible Markup Language). SGML is not a true language, it is a metalanguage, which is a language from which you can create other languages. In this case, it is the creation of a markup language (a system of encoded instructions for structuring and formatting electronic document elements). HTML is an application-specific derivation of SGML. It is a set of codes, generally used for webpages, that creates electronic documents according to rules established by SGML. HTML is a language that is all about the presentation of your information, not what the actual data is. You can, therefore, say that HTML is a presentation language. XML is a subset of SGML, but it is also, like SGML, a metalanguage. XML defines a specific method for creating text formats for data so that files are program independent, platform independent, and support internationalisation (able to read different languages, etc.). In fact, because XML is an extensible language, you don’t even have to have a browser to interpret the page. Applications can parse the XML document and read the information without any human intervention. XML, unlike HTML, is concerned with the identity, meaning and structure of data. XML is extensible because it lets website developers create their own set of customised tags for documents. This ability to define your own tags is the main feature of XML, and it is what gives developers more flexibility. By defining your own markup tags, you can explicitly define the content in the document. This makes XML a more intelligent markup language than HTML. For example, in HTML, you could have a paragraph tag preceding a paragraph about baseball. Your Web browser sees this tag and knows to present the following text as a paragraph. All your browser knows about the text, however, is that it is text; it doesn’t know that it is specifically about baseball. In an XML document, you could define a XML, by design, does not deal with how the data is displayed to the end user. Because HTML is a presentation language, XML documents use HTML tags to help handle the visual formatting of the document. Also, you can use XML in your HTML documents to provide metadata, which is data about data in the document. XML will do to the Web and e-commerce what HTML originally did to the Internet. XML and its associated applications have the potential to blow the roof off the Internet and how we do business. Vocabulary: XML (Extensible Markup Language) – расширяемый язык разметки (гипертекста), язык XML; HTML (Hypertext Markup Language) – язык гипертекстовой разметки, язык разметки гипертекста, язык HTML; SGML (Standard Generalized Markup Language) – стандартный язык обобщенной разметки (описания документов), язык и формат SGML; to spawn – порождать; application-specific – связанный с (конкретным) применением, специализированный; subset – подмножество; to parse – анализировать, разбирать; customised – сделанный на заказ; tag – тег, управляющий код; search engine – поисковый механизм, поисковая машина, поисковая служба. Ex.2. Read the following international words and translate them. Document, code, electronic, information, method, format, file, program, platform, internationalisation, browser, structure, website, tag, paragraph, baseball, visual, Internet, business. Ex.3. Give the English equivalents for the following word combinations. 1) создавать другие языки; 2) система кодированных инструкций; 3) элементы электронного документа; 4) создание текстовых форматов; 5) интерпретировать страницу; 6) подробно определять содержание документа; 7) интеллектуальный язык разметки; 8) тег абзаца; 9) использовать данные языка XML; 10) нахождение страниц, которые вы ищете; 11) управлять визуальным форматированием; 12) предоставлять метаданные. Ex.4 Match the terms in A with the statements in B.
Ex.5 Answer the questions. 1. What languages were derived from SGML? 2. What type of language is used to structure and format elements of a document? 3. Name two metalanguages. 4. What elements of data is XML (but not HTML) concerned with? 5. What is meant by the term “extensible”? 6. What makes XML a more intelligent language than HTML? 7. What does the HTML markup tag indicate? 8. Why are search engines able to do a better job with XML documents? 9. What type of website is particularly likely to benefit from XML? Ex.6. Agree or disagree with the following statements. 1. HTML is no longer useful for creating webpages. 2. SGML is more complex than XML. 3. XML files can only be used on Unix systems. 4. XML files can only be read by browser programs. 5. HTML is a markup language. 6. Internet searches will be better with XML files. Ex.7. Find the sentences where the Infinitives and the Complex Object Construction are used. Explain the omission of the particle to in some of the sentences. Ex.8. Fill in the blanks with the Gerunds from the box.
1. It is the creation of a markup language (a system of encoded instructions for … and … electronic document elements). 2. XML defines a specific method for … text formats for data. 3. Search engines can do a better job of … the pages you are looking for. 4. XML documents use HTML tags to help handle the visual … of the document. Ex.9. Fill in the table with Participles.
Ex.10. State questions to the underlined words. 1. In fact, because XML is an extensible language, you don’t even have to have a browser to interpret the page. 2. Applications can parse the XML document and read the information without any human intervention. 3. XML is concerned with the identity, meaning and structure of data. Ex.11. Talking point.
Unit 19 Ex.1. Study the following words before reading the text.
Ex.2. Read and translate the text. Cybercrimes: Spam E-mail has spawned one of the most significant forms of cybercrime – spam, or unsolicited advertisements for products and services, which experts estimate to comprise roughly 50 percent of the e-mail circulating on the Internet. Spam is a crime against all users of the Internet since it wastes both the storage and network capacities of ISPs, as well as often simply being offensive. Yet, despite various attempts to legislate it out of existence, it remains unclear how spam can be eliminated without violating the freedom of speech in a liberal democratic polity. Unlike junk mail, which has a postage cost associated with it, spam is nearly free for perpetrator … it typically costs the same to send 10 messages as it does to send 10 million – and some of the most prolific originating states for spammers (particularly China) have been slow to act. E-mail also serves as an instrument for both criminals and terrorists. While libertarians laud the use of cryptography to ensure privacy in communications, criminals and terrorists may also use cryptographic means to conceal their plans. Law-enforcement officials report that some terrorist groups embed instructions and information in images via a process known as steganography, a sophisticated method of hiding information in plain sight. Even recognizing that something is concealed in this fashion often requires considerable amounts of computing power; actually decoding the information is nearly impossible if one does not have the key to separate the hidden data. Ex.3. Read the text again. Find the sentences containing the word combinations given below and translate them. e-mail circulating on the Internet; storage and network capacities; legislate spam out of existence; eliminate spam; ensure privacy in communications; cryptographic means; embed instructions and information in images; a sophisticated method of hiding information; considerable amounts of computing power; decode information; hidden data. Ex.4. Find in the text the English equivalents for the following sentences. 1. Спам – одна из самых значительных форм компьютерных преступлений. 2. Спам – добровольно рассылаемая реклама товаров и услуг. 3. Спам – это правонарушение против всех пользователей Интернета. 4. Спам почти ничего не стоит, (бесплатный) для правонарушителей. Ex.5. Say whether these sentences are true or false. 1. Spam wastes the Internet resources. 2. Spam can be eliminated without violating the freedom of speech in a liberal democratic polity. 3. Spam has been spawned by e-mail. 4. Spam has a postage cost. 5. Spam is offensive only for criminals and terrorists. Ex.6. Find in the text two sentences with the conjunction “both … and” and translate them. Ex.7. Read the text again and write 5 or 6 sentences about the features of spam. Unit 20 Ex.1. Read and translate these international words. Virus, character, system, computer, program, effect, disk, active, form, problem. Ex.2. Read and translate the text. Computer viruses. The Maltese Amoeba may sound like a cartoon character, but if it attacked your computer, you wouldn’t be laughing. The Maltese Amoeba is a computer virus. It is a form of software which can «infect» your system and destroy your data. Making computer viruses is only one type of computer crime. Others include hacking (changing data in a computer without permission) and pirating (illegally copying software programs). Viruses are programs which are written deliberately to damage data. Viruses can hide themselves in a computer system. Some viruses are fairly harmless. They may flash a message on screen, such as «Gotcha! Bet you don’t know how I crept in.» The Yankee Doodle virus plays this American tune on the computer’s small internal speaker every eight days at 5 p.m. Others have serious effects. They attach themselves to the operating system and can wipe out all data or turn it into gobbledegook. When the Cascade virus attacks, all the letters in a file fall into a heap at the bottom of the screen. This looks spectacular but it’s hard to see the funny side when it’s your document. Most viruses remain dormant until activated by something. For example, the Jerusalem B virus is activated every Friday the 13th and erases any file you try to load from your disk. The Michelangelo virus was programmed to become active on March 6th 1992, the 517th birthday of Michelangelo. It attacked computer systems throughout the world, turning data on hard disks into nonsense. Viruses are most commonly passed via discs but they can also spread through bulletin boards, local area networks and email attachments. The best form of treatment is prevention. Use an antivirus program to check a disk before using it. Always download email attachments onto a disk and check for viruses. If you do catch a virus, there are antivirus programs to hunt down and eradicate the virus. The problem is that around 150 new viruses appear every month and you must constantly update your antivirus package to deal with these new forms. The word combination to the text
Ex.3. Fill in the chart according to the contents of the text.
Ex.4. Answer the following questions.
Ex.5. Find the proper terms for the following definitions.
Ex.6. Points to ponder.
Ex.7. Learn these synonyms.
|