Monday, September 15, 2014

PROGRAMMING LANGUAGE: RUBY (Summary)

Haga un resumen de Ruby:

4 Reasons Why You Should Learn Ruby As Your First Programming Language
 
Learning to code has a steep learning curve. You’ll encounter foreign concepts, technical jargon, and difficult choices. One of the very first choices you’ll have to make is which programming language you should start with.
Programming languages are similar to spoken languages. Each programming language falls into one or more categories. A few categories you might have heard of include imperative, object oriented, functional, or logic-based. Fortunately, once you learn one language it’s much easier to learn a second language in the same category. Unfortunately, that first language is going to be tough to learn.
Ruby is a general purpose programming language created in the 1990s by Yukihiro “Matz” Matsumoto. It’s also one of the best languages to start with when you’re first learning to code.

Ruby is one of the easier languages to learn

I remember when I first started learning to code. It was an introductory Computer Science class and the course curriculum used C++. In the world of programming, everyone’s first computer program is one that displays the message “Hello, world!”. It’s known as the “Hello World Program”.

Here’s what that looks like using C++:



C++ is complex

To display “Hello, world!” to a computer screen, you’ll have to learn multiple C++ functions and keywords. 

Ruby is considered a higher level programming language than C++. A high-level language features strong abstractions from computer details. Whereas low-level languages are closer to machine details (like memory addresses or CPU registers), high-level languages are closer to a naturally spoken language.
When you’re first learning to code, a high-level programming language like Ruby is much easier to use.

 Available at:   http://www.skilledup.com/learn/programming/4-reasons-learn-ruby-first-programming-language/ (Access in June, 2014)

Friday, September 5, 2014

8 VAIO NOTEBOOK (IMPERATIVE)

Traduzca las primera instrucciones de la PC del texto:

8 VAIO 505 SuperSlim Notebook User Guide
Connecting a Power Source
You can use either AC power or a rechargeable battery pack as a power
source.

Using the AC Adapter

1- Plug the cable attached to the AC adapter into the DC In connector on the computer.
2- Pull the prong on the AC adapter upwards and plug it into an AC outlet.

To remove the AC adapter

1- Unplug the AC adapter from the AC outlet and the adapter cable from the DC In connector on the computer.
2- Align the adapter cable with the groove on the AC adapter and wrap the cable around the AC adapter.

Using Battery Power

You can use a battery pack as a source of power. The PCGA-BP51 battery pack that comes with your computer is not fully charged at the time of purchase. Follow the steps below to insert and charge the battery pack.

To insert the battery pack

1- Move the lock lever on the bottom of the computer to the UNLOCK position.

2- Align the grooves and tabs on the battery with the tabs and notches on the back of the computer, and then slide the battery towards the computer until it clicks into place.

3- Slide the lock lever into the LOCK position to secure the battery on the computer.
- You can also purchase the high-capacity PCGA-BP52 battery pack as a separate option.

See “Using Power Saving Modes” on page 31 for power management information.

Wednesday, May 28, 2014

WIRELESS NETWORKS (READING COMPREHENSION- Present Perfect)

A) Please read this text:

WIRELESS NETWORKS LEAVE COMPUTERS OPEN TO "DRIVE-BY" HACKING by Will Knigh



A weakness with the security infrastructure protecting wireless computer networks have been highlighted by researchers at a computer security conference in the US.
The problems have been identified with the 802.11 set of specifications created by the Institute of Electrical and Electronics Engineers for wireless local area networks.
Wireless networks are growing in popularity. However, experts have described ways to "listen" to wireless traffic, intercept communications and even gain full access to that network.
"As 802.11 wireless networks become more common, companies' intranets are increasingly being exposed to hacking," said Dave Safford, manager of network security research at IBM.
Information on these vulnerabilities was presented on Friday at the Black Hat Conference in Las Vegas. This is the most important US meeting of computer security experts and underground computer hackers.
The wireless specification known as 802.11 is protected with a system called Wired Equivalent Privacy (WEP). Communications are encrypted with a stream code, meaning that each bit is altered according to a secretly held key during transmission. There are a number of rules designed to ensure that keys are used securely and no one can eavesdrop on messages.
But Ian Goldberg, chief technical officer for Canada's Zero Knowledge systems, presented fundamental flaws with the implementation of the encrypting rules that leave 802.11 communications vulnerable.
He described ways to monitor wireless network traffic in order to gather information about how messages are encrypted. Given this, he says it is possible to modify and even decrypt communications altogether.
Multiple guessAnother conference delegate built on these vulnerabilities to describe practical methods of attacking 802.11 networks. Tim Newsham, a consultant with US security firm @Stake, outlined a technique for decoding messages by testing out a series of cryptographic keys at high speed. Further research indicates that networks using encryption that cannot be cracked in this way may still be vulnerable to automated password guessing.
"WEP is inherently insecure," Newsham said. "So using WEP is essentially just throwing another barrier in front of the attacker."
Another computer security expert, Mandy Andress of ArcSec Technologies, described how unprotected wireless networks can be attacked in many real situations by roaming hackers.
Ollie Whitehouse, a computer security expert with @Stake in the UK says that research in this area is likely to increase investment in wireless security. "There are flaws that require modification and I think you will also see people investing in larger encryption keys and incurring the computational overhead," he told New Scientist. The first industry steps to secure the standard have already taken place. IBM has developed software for a wireless handheld computer that will automatically alert a user to potential vulnerabilities in a particular 802.11 network.

Now say if these statements on the text are True or False:
1. Researchers at the conference said wireless networks are not safe ................ True - False
2. The 802.11 specifications were written by wireless networks users ............... True - False
3. A lot of people are using wireless networks .................................................. True - False
4. Legitimate experts and illegal hackers meet at the Black Hat Conference ....... True - False
5. Communications encrypted with a stream cipher are supposed to be safe ...... True - False
6. Ian Goldberg thinks 802.11 communications are vulnerable ........................... True - False
7. Newsham contradicted Goldberg ................................................................. True - False
8. Encryptions that are cracked in the way Newsham explained are vulnerable ... True - False
9. Mandy Andress is a real roaming hacker ....................................................... True - False
10. IBM has developed software to protect users from hackers ........................ True - False



Now answer:
1) The word "highlighted" (line 2) suggests that .................
a) the speakers were using colour pencils.
b) researchers put special emphasis on this idea.
c) researchers were the stars at this congress.

2) When we hear other people's conversations, we ................
a) intercept their conversation.
b) drive-by.
c) listen.
3) The Black Hat conference has a high profile. In other words, it is ...................
a) very expensive.
b) prestigious and famous.
c) broadcast by TV.

4) "... secretly held... "in line 21 means that ...................
a) nobody knows that this key exists.
b) it is difficult to find this key.
c) a person presses this key during the operation, but nobody knows about it.
5) "... in order to ... " in line 28 is used to express ...........
a) condition.
b) purpose.
c) opposition.
6) "Further .... " in line 36 means ....
a) later research.
b) more complex research.
c) more research.
7) In ".... by testing out .... " in line 35, the preposition "by" is used to express ....
a) the method they used.
b) what they were doing at the moment.
c) the author.
8) In "...a computer security expert with @Stake...", the preposition "with" denotes that...
a) this man is the owner of the company.
b) he works for that company.
c) he uses @Stake.
9) The word "flaws" in line 46 refers to ..........
a) problems with the security experts.
b) changes to the encryption process.
c) problems with wireless networks.

10) A handheld computer is one which ..........
a) is user-friendly.
b) is very handy, good for many jobs.
c) is small enough to be rested on one’s hand.