Главная страница
Навигация по странице:

  • LESSON 17 SEARCH ENGINE OPTIMIZATION (SEO) Task 1. Match the meaning of the following English words and their Russian equivalents.

  • Task 2. Read the text and try to guess the meaning of the words in bold. Check your variants in the dictionary .

  • Internet resources

  • root directory

  • Task 3. Answer the following questions

  • Task 4. Match the beginnings of the sentences in the first column with the endings in the second

  • Task 5. Fill in the blanks in the sentences with the necessary word(s); all the letters of the word(s) are given on the right.

  • Task 6. Fill in the blanks choosing from the variants given. Задание 6. Выберите правильный вариант .

  • Task 7. Match the beginnings and the endings of the description given and put them into correct order.

  • Task 8. Fill in the gaps in the text. Задание8.Заполните пропущенные места в тексте по смыслу.

  • Ресурсы информационно-телекоммуникационной сети «Интернет»

  • LESSON 18 HOW TO PROTECT AGAINST SHADOW DATA SECURITY RISKS Task 1. Read and translate the text

  • 110302_мет._проф_2018.docx1. Методические указания к практическим занятиям по дисциплине Иностранный язык в профессиональной сфере для студентов направления подготовки


    Скачать 381.32 Kb.
    НазваниеМетодические указания к практическим занятиям по дисциплине Иностранный язык в профессиональной сфере для студентов направления подготовки
    Анкорbyukbi
    Дата30.10.2022
    Размер381.32 Kb.
    Формат файлаdocx
    Имя файла110302_мет._проф_2018.docx1.docx
    ТипМетодические указания
    #762910
    страница12 из 14
    1   ...   6   7   8   9   10   11   12   13   14

    Ресурсы информационно-телекоммуникационной сети «Интернет»

          1. http://www.sil.org/linguistics/GlossaryOfLinguisticTerms/   глоссарий.содержащий более 950 лингвистических терминов с перекрестными ссылками и списком источников (SIL International). Ред. Е. Е. Loos, S.Anderson. D.H.Day Jr., P.C.Jourdan, J.D.Wingate.

          2. http:// biblioclub.ru – Университетская библиотека онлайн/

          3. http://www.ldc.upenn.edu/   LinguisticDataConsortium: лингвистический сайт университета Пенсильвании;

          4. http://orlapubs.org/ORLAPTJBS-L/L81.html  электронные учебные материалы по отдельным вопросам лингвистики и грамматики.

          5. http://www.cal.org/ericcll/faqs/RGOs/linguistics.html   сайт Центра прикладной лингвистики (the ERIC Clearinghouse on Languages and Lingu-stics, the Center for Applied Linguistics). Предоставляет материалы для изучающих иностранные языки и теорию языка.

          6. http://www.rsl.ru – Российская государственная библиотека.


    LESSON 17

    SEARCH ENGINE OPTIMIZATION (SEO)

    Task 1. Match the meaning of the following English words and their Russian equivalents.

    Задание 1.Соотнесите значения следующих английских слов с их русскими эквивалентами.


    1. search engine;

    2. content;

    3. SEO (search engine optimization);

    4. marketing;

    5. database;

    6. relevance;

    7. indexing;

    8. root directory;

    9. web masters;

    10. domain;

    11. (to) parse;

    12. spam.

      1. маркетинг, торговля;

      2. степень соответствия;

      3. база данных;

      4. индексация;

      5. корневой каталог;

      6. практически бесполезная; информация;

      7. содержание, информационное наполнение;

      8. разбор;

      9. домен;

      10. оптимизация поисковых систем;

      11. поисковая программа;

      12. разработчик Web-страниц;


    Task 2. Read the text and try to guess the meaning of the words in bold. Check your variants in the dictionary.

    Задание 2.Прочтите текст и постарайтесь понять значение выделенных слов.
    SEARCH ENGINE OPTIMIZATION
    To find information on the Web, you may need to use a search engine. A search engine is a piece of software that gives you the ability to search for Internet resources. Search engines are usually accessed through Web browser software. Each search engine provides different searching options and has its own look. Search engines also differ greatly in the number of resources they allow you to search. Some search engines have both searching and browsing capabilities. The major search engines are Google, Yahoo and Yandex.

    If you want to promote your website in the search results of the major search engines, you should use SEO (search engine optimization). Search engine optimization is the process of improving the volume and quality of traffic to a web site from search engines via “natural” (“organic” or “algorithmic”) search results. Usually, the earlier a site is presented in the search results, or the higher it “ranks,” the more searchers will visit that site. SEO can also target different kinds of search, including image search, local search, and industry-specific vertical search engines.

    As an Internet marketing strategy, SEO considers how search engines work and what people search for. Optimizing a website primarily involves editing its content and HTMLcoding to both increase its relevance to specific keywords and to remove barriers to the indexing activities of search engines.

    The acronym “SEO” can also refer to “search engine optimizers”, a term adopted by an industry of consultants who carry out optimization projects on behalf of clients, and by employees who perform SEO services in-house. Search engine optimizers may offer SEO as a stand-alone service or as a part of a broader marketing campaign. Because effective SEO may require changes to the HTML source code of a site, SEO tactics may be incorporated into web site development and design. The term “search engine friendly” may be used to describe web site designs, menus, content management systems and shopping carts that are easy to optimize.

    The leading search engines use crawlers to find pages for their algorithmic search results. Pages that are linked from other search engine indexed pages do not need to be submitted because they are found automatically. Some search engines operate a paid submission service that guarantee crawling for either a set fee or cost per click. Search engine crawlers may look at a number of different factors when crawling a site. Not every page is indexed by the search engines. Distance of pages from the root directory of a site may also be a factor in whether or not pages get crawled.

    To avoid undesirable content in the search indexes, webmasters can instruct spiders not to crawl certain files or directories through the standard robots.txt file in the root directory of the domain. Additionally, a page can be explicitly excluded from a search engine’s database by using a meta tag specific to robots. When a search engine visits a site, the robots.txt located in the root directory is the first file crawled. The robots.txt file is then parsed, and will instruct the robot as to which pages are not to be crawled. As a search engine crawler may keep a cached copy of this file, it may on occasion crawl pages a webmaster does not wish crawled. Pages typically prevented from being crawled include login specific pages such as shopping carts and user-specific content such as search results from internal searches. In March 2007, Google warned webmasters that they should prevent indexing of internal search results because those pages are considered search spam.

    SEO techniques can be classified into two broad categories: techniques that search engines recommend as part of good design, and those techniques of which search engines do not approve. The search engines attempt to minimize the effect of the latter, among them spamdexing. Industry commentators have classified these methods, and the practitioners who employ them, as either white hat SEO, or black hat SEO. White hats tend to produce results that last a long time, whereas black hats anticipate that their sites may eventually be banned either temporarily or permanently once the search engines discover what they are doing.

    An SEO technique is considered white hat if it conforms to the search engines’ guidelines and involves no deception. As the search engine guidelines are not written as a series of rules or commandments, this is an important distinction to note. White hat SEO is not just about following guidelines, but is about ensuring that the content a search engine indexes and subsequently ranks is the same content a user will see. White hat advice is generally summed up as creating content for users, not for search engines, and then making that content easily accessible to the spiders, rather than attempting to trick the algorithm from its intended purpose. White hat SEO is in many ways similar to web development that promotes accessibility, although the two are not identical.

    Black hat SEO attempts to improve rankings in ways that are disapproved of by the search engines, or involve deception. One black hat technique uses a text that is hidden, either as a text colored similar to the background or positioned off screen. Another method gives a different page depending on whether the page is being requested by a human visitor or a search engine, a technique known as cloaking.

    Search engines may penalize sites they discover using black hat methods, either by reducing their rankings or eliminating their listings from their databases altogether. Such penalties can be applied either automatically by the search engines’ algorithms, or by a manual site review.
    Task 3. Answer the following questions.

    Задание 3. Ответьте на следующие вопросы.

      1. What is used to find the information in the Net?

      2. What is SEO used for?

      3. What is crawler used for?

      4. In which two broad categories can SEO be classified?

      5. Every page is indexed by the search engines, isn’t it?



    Task 4. Match the beginnings of the sentences in the first column with the endings in the second.

    Задание 4. Составьте предложения.


    1. To find information on the Web

    2. Search engine optimizers may offer

    3. The term “search engine friendly” may be used

    4. One black hat technique uses text that is hidden,

    5. Search engines may penalize sites they discover using black hat methods,

    6. Distance of pages from the root directory of a site

      1. may also be a factor in whether or not pages get crawled.

      2. either by reducing their rankings or eliminating their listings from their databases altogether.

      3. either as text colored similar to the backgrounds.

      4. to describe Web site designs, menus, content management systems and shopping carts that are easy to optimize.

      5. as a stand-alone service or as a part of a broader marketing campaign.

      6. you may need to use a search engine.



    Task 5. Fill in the blanks in the sentences with the necessary word(s); all the letters of the word(s) are given on the right.

    Задание 5. Заполните пропуски в предложениях, используя слова в правом столбце.


    1. A search engine is a piece of … that gives you the ability to search for Internet resources.

    E T A O F W T R S

    2. The term “search engine friendly” may be used to describe Web site designs, menus, content … systems and shopping carts that are easy to optimize.

    A G T E E M A M N N

    3. To avoid … content in the search indexes, web-masters can instruct spiders not to crawl certain files

    E L D U E I R N S A B

    4. SEO … can be classified into two broad categories.

    Q E S T U I N H C E

    5. Black hat SEO … to improve rankings in ways that are disapproved of by the search engines, or involve deception.

    T A T S M T P E

    6. Search engines may … sites they discover using black hat methods.

    E P Z E A N L I


    Task 6. Fill in the blanks choosing from the variants given.

    Задание6.Выберите правильный вариант.
    1. If you want to promote your … in the search results of the major search engines, you should use SEO.

    a) computer b) host c) website d) disk

    2. Such programs usually guarantee inclusion in the …, but do not guarantee specific ranking within the search results.

    a) index b) database c) code d) charter

    3. To avoid undesirable content in the search indexes, … can instruct spiders net to crawl certain files or directories.

    a) workers b) admins c) customers d) webmasters

    4. Black hat SEO attempts to improve … in ways that are disapproved of by the search engines.

    a) rankings b) costs c) velocity d) quality
    Task 7. Match the beginnings and the endings of the description given and put them into correct order.

    Задание 7.Составьте соответствующие по смыслу предложения и расположите их в верном порядке.


    1. As an Internet marketing strategy, SEO considers.

    2. The leading search engines use crawlers

    3. In March 2007, Google warned webmasters that they

    4. An SEO technique is considered white hat if

    5. Black hat SEO attempts to improve rankings in ways

    6. Search engines may penalize sites they discover

      1. using black hat methods, either by reducing their rankings or eliminating their listings from their database.

      2. that are disapproved of by the search engines, or involve deception.

      3. it conforms to the search engines guidelines and involves no deception.

      4. should prevent indexing of internal search results because those pages are spam.

      5. to find pages for their algorithmic search results.

      6. how search engines work and what people search for.



    Task 8. Fill in the gaps in the text.

    Задание8.Заполните пропущенные места в тексте по смыслу.

    Webmasters and content providers began ___ sites for search engines in the mid-1990s, as the first search engines were cataloging the early Web. Initially, all a webmaster needed to do was submit a page, or URL, to the various engines which would send a spider to “crawl” that page, extract links to other pages from it, and return information found on the page to be ___. The process involves a search engine spider downloading a ___ and storing it on the search engine’s own server, where a second program, known as an indexer, extracts various information about the page, such as the words it contains and where they are located, as well as any weight for specific ___, as well as any and all links the page contains, which are then placed into a scheduler for crawling at a later date.

    Site owners started to recognize the value of having their sites highly ranked and visible in search engine ___, creating an opportUNITy for both white hat and black ___ SEO practitioners. According to industry analyst Danny Sullivan, the earliest known use of the phrase search ___ optimization was a spam message posted on Usenet on July 26, 1997.

    Методическая литература

    1. Методические указания к практическим занятиям по дисциплине «Английский язык»: аннотирование и реферирование, для студентов вторых курсов технических специальностей. Ставрополь2015 г.

    2.Учебное пособие. Английский язык в сфере профессиональной коммуникации для студентов института информационных технологий и телекоммуникаций. Ставрополь 2018 г.

    3.Иностранный язык в сфере профессиональной коммуникации: методические рекомендации по организации самостоятельной работы студентов направления 11.03.02.Инфокоммуникационные технологии и системы связи. Профиль подготовки - Сети связи и системы коммутации (английский) / сост. ; ФГАОУ ВО Сев.-Кав. федер. ун-т. - Ставрополь: СКФУ, 2017. - с., экземпляров неограниченно. http://catalog.ncfu.ru/catalog/ncfu

    Ресурсы информационно-телекоммуникационной сети «Интернет»

          1. http://www.sil.org/linguistics/GlossaryOfLinguisticTerms/   глоссарий.содержащий более 950 лингвистических терминов с перекрестными ссылками и списком источников (SIL International). Ред. Е. Е. Loos, S.Anderson. D.H.Day Jr., P.C.Jourdan, J.D.Wingate.

          2. http:// biblioclub.ru – Университетская библиотека онлайн/

          3. http://www.ldc.upenn.edu/   LinguisticDataConsortium: лингвистический сайт университета Пенсильвании;

          4. http://orlapubs.org/ORLAPTJBS-L/L81.html  электронные учебные материалы по отдельным вопросам лингвистики и грамматики.

          5. http://www.cal.org/ericcll/faqs/RGOs/linguistics.html   сайт Центра прикладной лингвистики (the ERIC Clearinghouse on Languages and Lingu-stics, the Center for Applied Linguistics). Предоставляет материалы для изучающих иностранные языки и теорию языка.

          6. http://www.rsl.ru – Российская государственная библиотека.


    LESSON 18

    HOW TO PROTECT AGAINST SHADOW DATA

    SECURITY RISKS
    Task 1. Read and translate the text:

    Задание 1. Прочитайте и переведите текст:

    Probably the first ... (наиболее эффективный), step in reducing your vulnerability to shadow data leakage is knowledge that is exists (on your storage device). Knowing that shadow data potentially exists will ensure that you ... (по крайней мере) weigh the risks and make informed decisions concerning the scrubbing of data, degaussing storage devices and in managing the risks.

    U. S. government classified data handling instructions call for a certain specifications concerning the disposal of computer ... (накопительные устройства). Data scrubbing through the use of multiple overwrites is on potential solution. While this procedure is not 100% fool-proof; it does ... (значительно снижает) the likelihood of shadow data becoming a threat in your organization. Using old RLL-encoded drives, Peter Gutman of the University of Auckland speculated, in his document "Secure Deletion of Data from Magnetic Memory Devices", that overwriting a drive 35 times with varying hexadecimal values may force the write head to vary magnetic effect on the iron oxide particles to such an extent as to remove the shadow data. Still, there is ... (нет гарантий) that software solutions will effectively wipe out all this information because the process relies on the drive's controller, which is not suited for this purpose.

    High-intensity degaussing of a hard drive platter, floppy diskette, zip disks and tape is probably the ... (лучший способ) to ensure the elimination of threats associated with shadow data. This is an effective process to use when storage devices are being retired from service. Be mindful that the degaussing of a hard disk drive must be performed after the platters have been removed. Otherwise, the hard disk drive will act as a protective shield and some shadow data may survive. The complete incineration of floppy diskettes, zip disks and tapes also ... (может быть использовано) to remove any security threats associated with shadow data.

    Corporate and government policies concerning the disposal of computer storage devices should always ... (принимать во внимание) the potentials of shadow data as a potential data security risk. With knowledge and proper controls in place, shadow data should not become a security problem for most government agencies and corporations.
    1   ...   6   7   8   9   10   11   12   13   14


    написать администратору сайта