Г. В. Царева
Скачать 1.52 Mb.
|
Letter of application 17 Princes St. Edinburgh August 3, 2020 Sales Recruitment and Training Manager W. & T. Avery Limited 21 Conduit St. London W.I. Dear Sirs, In reply to your advertisement in today's 'Daily Telegraph', I am interested in becoming a salesman for your company. As you can see from the enclosed curriculum vitae, I have selling experience in pharmaceuticals and cosmetics-a very competitive field. Your six months' training scheme should certainly help me to devote the best of my ability to your company, particularly since my educational qualifications are higher than those you require. As you request in your advertisement, I shall telephone you shortly to make an appointment for a personal meeting. Meanwhile I thank you for considering my application. Yours faithfully, Peter S. Ryder Enc. Curriculum vitae Job advertisement SO YOU’D LIKE TO BE A SALESMAN? A real professional with CAREER Prospects and Security – that is what we offer A six months' induction and field training scheme when you will be paid a salary at the rate of £3,000 p.a. PLUS a Company car and expenses. On completion of this six months, a much higher earning potential which includes a substantial salary with service increments, supplemented by generous commission and performance bonus payments. There is a pension fund – life insurance – sickness benefit scheme – generous holidays. YOU need to have a University Degree and be in the age group 21-30. If you qualify write or telephone for an application form when we can arrange to meet locally and exchange information. Sales Recruitment & Training Manager, W. & T. Avery Limited, 21 Conduit St, London W.1. Telephone 01-973-761 Curriculum Vitae Peter S. Ryder
GLOSSARY BIOS. This is the Basic Input / Output System that identifies the software or set of programs used to boot the computer (before locating the system disk). The BIOS is located in main memory, although not in the RAM (Random Access Memory) area as this would mean the information would be lost once the computer was switched off. It is therefore located in the ROM (Read Only Memory) area, in which it is stored permanently. BOOT, MASTER BOOT (Boot sector). All disks (both floppy and hard disks) have a very important section called the boot sector. This sector contains information on the characteristics and contents of the disk, and may also contain a program that makes it possible to boot the computer. When we speak of the boot sector of a floppy disk, we use the term BOOT, whereas the term MASTER BOOT (MBR – Master Boot Record) is used to refer to the same section of a hard disk. BOOT. This usually refers to the boot sector in a floppy disk. MASTER BOOT RECORD (MBR). This refers to the boot sector of a hard disk. In both cases the boot sector corresponds to the first sector of the disk, which takes up 512 Bytes. These “special areas” on the disks are the target of Boot viruses among others. Bug. A bug is a coding error in a program. Viruses are programs and consequently can have bugs. This means that the actions that the virus was initially coded to carry out might not take place if a bug is found in the viral code. Cache. This is a small section that corresponds to the computer memory. It is usually a place to store something temporarily. Its function it to increase the processing speed of the computer. To do this, a copy of the most recently accessed data is stored for fast access. Chat. This is a service that permits written conversations to take place over the Internet. Through an Internet connection and a special program it is possible to converse with an unlimited number of other computer users. Cluster. This is a physical section of a storage disk that includes one or more adjacent sectors. Additionally, it also refers to viruses that infect hard disks or floppy disks and modify the file allocation table. Cookie. A cookie is a text file that the server sends to users when they visit a web page. The purpose of these files is to identify users visiting a web site. Cookies can store information on the user: operating system, browser installed, e-mail address, etc. Cracker. A hacker is someone who breaches computer security; usually a network. They do not respect the information they obtain. Directory / Folder. Both terms are used to describe the same thing. They refer to non-physical divisions created on a disk where files are stored. They constitute a method of organizing data in much the same way as traditional paper files are stored in folders and filing cabinets. Some folders under the Windows directory. DOS (MS-DOS). This is the Disk Operating System used by Microsoft before Windows was developed. Dropper. Droppers are executable files that contain viruses. When these files are run, the “dropper” releases the viruses it might contain. It is important to note that when an antivirus program scans this type of files no viruses will be detected, as the virus code is not created until the user runs the “dropper”. File, Archive, Document. This is where information is stored in a computer storage device i.e. the actual work carried out by a user (texts, images, databases, spreadsheets, etc.). Each file or document is given a name and is assigned an extension, a three-letter code that identifies the type of file in question. Some common extensions include EXE and COM (executable files, programs), TXT (text files) and DOC (Word documents). FTP (File Transfer Protocol). This is a protocol used on the Internet to exchange files between computers on the Internet. This connection makes it possible to download files to your computer. Hacker. This is someone who attempts to gain unauthorized access computer systems. Host. This term refers to a computer that works as a source of information. This term is normally used when there are two computer systems connected by means of modems and telephone lines. The system that contains the data is the host, whereas the user's computer will be the remote terminal. A server will work as a host for its clients and we can even say that a desktop computer works as a host for its peripherals. HTTP (HyperText Transfer Protocol). This is the underlying protocol used by the Internet. This protocol makes it possible to access hypertext documents created in HTML format. This means that HTTP allows users to view web pages through a web browser. Hyperlinks also known as links, they may take on the form of text, images, buttons or sections of an HTML document (Web page). By placing the mouse pointer over them and clicking, the user will be taken to another page or a different section of the page he/she was already viewing. IP (Internet Protocol). This is the number that identifies a computer on the Internet. It is like an ID code or a passport number. It consists of a set of four numbers (form 0 to 256) separated by dots. An example of this might be the following: 168.40.25.12. Knowing this number might be enough to access other computers remotely, as long as the right tool is used. Joke. Jokes are programs designed to trick users into believing that they have been infected by a virus. These programs usually simulate the destructive effects of viruses – for instance the deletion of the files in the hard disk. Users are strongly recommended not to open any files attached to e-mail messages. Malware. This term is used to refer to any program containing malicious code such as viruses, Trojans or worms. Replication. These are terms used to describe the action by which a virus makes copies of itself in order to carry out subsequent infections. SCR files. These are what are known as Script files. They take SCR extensions and are used to determine the parameters (conditions) under which certain programs should be run. They therefore make it possible to open a program in accordance with previously established conditions. Spam. Spam is usually defined as unsolicited e-mail or junk e-mail. Although this is not a virus of any kind, it is somehow related to them in that most viruses use e-mail to propagate to other computers. It is a form of bulk mail to a list of e-mail addresses obtained from different sources. On some occasions it can also be related to Hoaxes, as these are messages are always spread via e-mail. Template (global template). A template is a file that a specific application uses to initiate a session with pre-established default values or parameters. For example, Microsoft Word uses a template called NORMAL.DOT. Trojan. Trojans are not viruses as such, as they do not replicate to make copies of themselves. They are in fact programs that are installed on remote computers and produce no damage (at least not at first), although they may be accompanied by other damaging programs. Trojans are designed to open a back door on the victim machine, which makes it vulnerable to attack from a malicious user. Tunneling. This is a technique specifically designed to prevent the correct use of the permanent (resident) antivirus protection installed on a computer. Virus. A virus is a program that can enter a computer system in many ways. These programs are special in that they can produce unwanted or damaging effects on infected machines. Once a virus has managed to enter a system, it will situate itself in places where it can be unintentionally run by the user. Virus Signature File. This is part of antivirus programs and contains each of the definitions of all viruses detected. It is in fact a database that contains the references used for detection purposes. Windows Registry. This is a file used by the Windows operating system to store configuration information on all the programs installed on the computer, as well as the definition of the operating system itself. This configuration information is made up of keys, subkeys and values, which can be consulted and modified, although most programs do this automatically at setup. Worm. A type of malicious program similar to a virus but which infects in a different manner. While viruses infect other programs by copying themselves within files, worms only make copies of themselves. Zip. There are several tools that make it possible to compress files so as to reduce their size. Files compressed by means of the tool WinZip will have ZIP extension, although there are some other compression formats such as ARJ, LZH, LHA, RAR. All compressed archives contain other files. If a compressed file is infected, it might cause another infection to take place upon when decompressing or working with the file in question. Zoo (zoo virus). A zoo virus is not in the wild. They can only be found in certain places like virus labs, where they are analysed in order to get to learn more about how they work and the techniques that they use. KEYS TO FINAL TESTS |