Video surveillance device, a monitor is a device designed for visual control of the quality of images on the control screens at the broadcast points (the output of the transmitting camera, etc.) during the preparation and tuning of the program tract before the telecasts, and during the broadcasts. Both on black-and-white television and on color television V. q. These common nodes are typical for: kinescope, image signal amplifier, line and frame spreading unit, sync pulse selector and node power supply. Unlike a normal television receiver, V. q. does not have intermediate and high image and sound frequency amplification cascades. V.q. dir. while several broadcasting cameras are working in the telecentre. helps to select one of several images, to manage TV shows in general. Some manufactured monitors, such as Artel and Samsung monitors, have two optimal sizes: 19-inch monitors - 1366x768, and 22-inch monitors - 1920x1080. That is, a 22-inch monitor has 1920 by 1080 pixels. A pixel is a single point, more precisely, a point on the display. A pixel, in turn, consists of 3 subpixels. As we can see, 3 subpixels are 3 colors: red, green and blue. (RGB) These 3 colors can express several million different colors. A pixel, in turn, consists of 3 subpixels. As we can see, 3 subpixels are 3 colors: red, green and blue. (RGB) These 3 colors can express several million different colors. A pixel, in turn, consists of 3 subpixels. As we can see, 3 subpixels are 3 colors: red, green and blue. (RGB) These 3 colors can express several million different colors. A keyboard is a lever button located in a certain order, designed for entering information or controlling a device. Usually, the keys are pressed with the fingers. But there will also be touch keyboards.
Keyboard (Latin clavis - key) -1) a set of keys (lever) located in a certain order in musical instruments, one of the main parts of the keyboard mechanism (system of levers that generate and suppress sound). From the 12th century, the organ was first used, and then other keyboard instruments. Instruments such as harpsichord, accordion, electric organ may have keyboards with several handles. In addition to keyboards designed for the hand, the organ also has a foot keyboard (pedal), a source of extremely low (high) sounds; 2) a set of keys on mechanisms such as a typewriter, computer. [1]
There are basically two types of keyboards: musical and alphanumeric .
Today, there are spectrum galagram types of keyboards.
There are two types of keyboard:
1. Windows keyboard (there are 104 keys);
2. Standard keyboard (there are 101 keys).
The system block contains the important parts necessary for the operation of the computer (disk drive, Winchester - hard disk, microcircuits that perform logical operations), and the rest of the devices are connected to it. The monitor (display) displays information on the screen in the form of text and various images. The keyboard enters commands and various information into the computer. Often, a computer includes a "mouse" manipulator and a printer. A "mouse" is a device with two or three knobs (buttons) that facilitate computer work. The printer serves to print information on paper. Modern computers mainly consist of four devices: control, processor, memory and input-output devices. The controller coordinates and controls the operation of all the computer's devices. The processor is the main device of the computer, which processes information, that is, performs arithmetic and logical operations such as calculation operations, comparison and transfer. The actions performed by this device are determined by programs. A memory device serves to store information during processing. The used programs are stored in the internal memory, and long-term information is stored in the external memory (diskettes). Information exchange in internal and external memories is carried out using input - output devices. The actions performed by this device are determined by programs. A memory device serves to store information during processing. The used programs are stored in the internal memory, and long-term information is stored in the external memory (diskettes). Information exchange in internal and external memories is carried out using input - output devices. The actions performed by this device are determined by programs. A memory device serves to store information during processing. The used programs are stored in the internal memory, and long-term information is stored in the external memory (diskettes). Information exchange in internal and external memories is carried out using input - output devices.
Computer games are also popular. There are more than a thousand of them; with their help, many things can be learned practically and practical experiences can be gained (see: Computer games ). The universality of the computer makes it possible to process information for a specific purpose, to radically change production in various areas of human activity, and to facilitate people's work. Weather forecasting collects and analyzes information from meteors and satellites , performs enormous computing tasks and presents it in a human-friendly form (see: Intranet , Internet , Computer network ).
Basic terms in IT. 7. IT sohasidagi asosiy atamalar.
Note: IT (pronounced Ay-ti) is an abbreviation of the English phrase "information technologies". This abbreviation is accepted as such in many languages. In particular, I prefer to use it in the Uzbek language as it is.
It must be admitted that 5-6 years ago it was impossible to see the Uzbek language on a mobile phone or a software product developed for a computer. However, today this situation has changed for the better. Of course, with 80-85% of Uzbekistan's population of 31 million speaking Uzbek, this number represents a huge new market for many foreign companies.
So, what software products and documents are currently being translated into Uzbek?
In accordance with the legislation of the Republic of Uzbekistan, instructions for use and labels of any medicinal products produced within the country and imported from abroad must be in the Uzbek language. That's probably why translations in this field started a long time ago, and translators specializing in it have a lot of experience. It should also be mentioned that since medical terms are often international terms, their complete Uzbekization is not recommended. That is why our people "Uzbekize" this Russian pronunciation without difficulty.
If I'm not mistaken, since last year, the user manuals of electrical equipment imported from abroad have also been made mandatory in Uzbek. In this regard, I personally participated in many translations. In particular, companies such as Samsung and LG offer their mobile phones, smartphones and tablets, televisions, home appliances user manuals and warranty cards to consumers in two languages - Russian and Uzbek. But, one interesting thing is that in the warranty card of some product of Samsung company, I saw a place where it says "In case of disputes, the Russian text is taken as the basis."
Last year, for almost a month, I participated in the project of translating user manuals of Bosch-Siemens washing machines into Uzbek. An interesting thing happened then. If we translate "Washing Machine" in the manuals, the customer insisted that "machine" is originally a Russian word, please translate it into Uzbek. After that, we used it as "Washing Machine". During that month, we witnessed many wonderful translations of laundry equipment, in particular: wash, rinse, spin, detergent, detergent drawer, compartment softener, dryer, bleacher,
The Nokia company was one of the first to introduce the Uzbek language in the interface of mobile phones. Some of its models sold in the market of Uzbekistan have an Uzbek menu. Since this happened a long time ago, around 2005, Nokia used the Uzbek Cyrillic script in their mobile phones. The translations were really well done and this work has continued till recent days. I have been involved in translating the interface for Nokia's simple phones into Uzbek for the past year. However, after Nokia was acquired by Microsoft, production of its feature phones was discontinued. With this, the Uzbek translations in this regard also came to an end. However, his smartphones - Windows Phone-based Lumia smartphones have an Uzbek interface. This time the Uzbek Latin script was used. Even after the company was acquired by Microsoft, these translations continued. Microsoft also started translating its Windows Phone platform interface into Uzbek. Now these two projects should be merged, I think.
Samsung is another company that introduced the Uzbek interface to its smartphones. The company is doing great work in this direction. However, the quality of his Uzbek translations is not very commendable. I recently had a conversation with a Samsung employee working on the editing of these Uzbek translations. God willing, there will definitely be progress in the Uzbek translations of Samsung products. But let me tell you in advance that I am not involved in this project yet.
By the way, LG has also started adding an Uzbek interface to its mobile devices. I witnessed this myself in the case of the LG G2 smartphone. The quality of translations is average.
Microsoft, which is considered a software giant, managed to Uzbekize several of its software products. If you want to get acquainted with its Uzbek translations, go to the Microsoft Language Portal through this link. I'll say one thing frankly, I don't like most of the Uzbek translations made by Microsoft. I don't even know which translators are working on it. There have been many discussions about their funny Uzbek translations in the Professional and amateur translators group on Facebook.
Microsoft started introducing the Uzbek language to its software products 5-6 years ago. In particular, one of its main products - Microsoft Office 2007 (2010 and 2013) office software package is Uzbekized . But, as far as I know, no one uses its Uzbek version. At one time, if I'm not mistaken, a certain part of the Windows Vista operating system was Uzbekized. But it was also one of the failed translations.
I think the image below is enough to get an initial idea about the translations made by Microsoft :). Skype is also owned by Microsoft Corporation.
At this point, I would like to say a few words about the methods and translations used by Microsoft translators, which I think are considered errors. One of them - the names of buttons indicating the execution of an action are translated in the Uzbek language in the infinitive form (-moq): Delete - Add - Add, Cancel - Cancel, etc.
Secondly, when adding Uzbek possessive and agreement suffixes to English company or product, brand names, they add a hyphen (-) after those names: Microsoft's, Microsoft Office's, etc. On the one hand, they I'm trying to understand, because in Uzbek there is a rule that when writing the names of foreign companies and products, brands must be enclosed in quotation marks. However, how long has this rule been in place?! Information technologies are constantly developing, and the rules of our Uzbek language remain the same as they were 20 years ago. God willing, when I reach the finals of the blogger championship, I want to write a big article about these problems.
Returning to the topic, the question of including foreign company and product, brand names in quotation marks. I personally do not approve of this today. Quotation marks make the interface ugly, 2-3 requests in one sentence will be quoted. Especially if it happens on the screen of a mobile device, the interface becomes a mess. Let's not go too far, the Russians drew their own conclusions from this and started writing such names without quotation marks.
I think that one of the biggest steps in the development of Uzbek translations related to the IT industry was undoubtedly taken by the Internet giant Google. Google started Uzbekization of one of its main products, Google Web Search, with the help of volunteer translators 7-8 years ago. However, by 2014, Google also considered Uzbekistan as a potential market, added the Uzbek language to the list of languages of developing countries, and officially began Uzbekization of its main products. This was definitely a huge achievement for us!
At the same time, its services such as Google Web Search (Google Web Search), Google Maps (Google Maps) and Google Translator (Google Translator) are among the products that have been fully or partially launched in the Uzbek language. Uzbekization of other popular products is also in progress, but I can't reveal any information about them yet. I can say that soon, God willing, another popular Google product will be launched in Uzbek.
I want to say two words about Google Translate. Uzbek language was added to this service only 5-6 months ago. He's still very young, so don't blame the translations he's doing. The addition of the Uzbek language to it at the current stage is a great achievement for us. Without blaming his translations, if you can, join the Google Translate community and help improve Uzbek translations.
If you want to use the Uzbek version of the above-mentioned products, you need to perform the following small steps to change the interface language to Uzbek. To do this, add /?hl=en after the website name of that service . This action sets the site interface to the Uzbek language and does not need to be done next time, it is enough to enter it once.
For example, to use the Google Search service in Uzbek , it is enough to enter google.com/?hl=uz in the address bar of the browser once . The next time, the Google Search interface will automatically appear in Uzbek.
In conclusion, I would like to say that Uzbek translations in the field of IT are just emerging. Therefore, it is natural to have various misunderstandings at the beginning. Even the British did not understand the words "Sign in" (Log in), "Sign up" (Registration) well when the Internet was new.
Currently, we have a relatively high share of the Russian language in the use of terms in the field of IT. In the last 1-2 years, English terms are also widely used - login, market, app, share, like, etc. We, IT translators, are not in favor of Uzbekization of all such words. However, we are against using the Uzbek version of a term and using its Russian or English version.
Man is inclined to learn. When we first entered the school, we called female teachers "aya" and male teachers "domla". Today, young children are taught to call their teachers "teacher". You have probably heard this word from your child or the school kids in your neighborhood. What do I mean by that? If we translate an English term into Uzbek and put it into circulation today, people will definitely learn it. Unsuccessful translations will not be accepted by the people and will automatically go out of circulation.
PS We are using Alisher, Babur and Temur names in places where a person's name should be used in the Uzbekization of Google's various products and services. This also means the realization of a national identity, national pride!
Internet security. 8. Internet xavfsizligi.
The discovery of the Internet has caused great changes in human life. The world's population now exceeds seven billion, of which more than three billion are connected to the Internet. According to 2014 statistics, more than 40 percent of the population uses the Internet in Uzbekistan, and this number is growing year by year. Therefore, there is a need to learn more about the advantages and disadvantages of the Internet. Especially in the Uzbek language, there are very few sources on this topic. Therefore, we intend to give you a practical training on the topic of safe use of the Internet through the "Sahar" school.
Why is the Internet necessary and what are its benefits?
Many people use the Internet mainly for entertainment purposes, such as reading news, listening to music, and using social networks. But the convenience and benefits that the Internet provides to people are not the only ones.
Let's take a simple email service. You can write a letter in a few seconds and send it anywhere in the world in a second with the click of a button on your computer or phone. Was this possible before the internet? Of course not. It used to be necessary to use traditional postal or telegraphic services for this. Now there is no need for it. Or try shopping online. Now you can sit at home, buy anything you want online and order it to be delivered to your home. Internet trade is gradually developing in Uzbekistan. Sites like Asaxiy.uz, Udobno.uz can be said to be the first steps on this path.
The Internet is widely used not only by ordinary users like you and us, but also by private and public companies. Almost all large companies now communicate with their employees and customers entirely via the Internet. Introduces new products to the public via the Internet, sells them and provides various other services. The Internet has also made the work of governments easier. Almost all citizen appeals are now done electronically in many countries. This will reduce inconveniences such as red tape, citizens having to go to the office to meet officials face to face, and waiting in line for a long time. We can say that the launch of the my.gov.uz project for the same purpose in Uzbekistan is a positive and gratifying situation.
What are the negative aspects of the Internet?
When this form of mass communication first appeared, there were concerns that many jobs would be lost as most jobs went electronic. Because before the Internet, these things were done through papers or by the hands of workers in offices. But the enormous benefits of the Internet for the economy and for companies have dispelled these concerns. A major concern and threat now is how secure it is to share personal and business information online. Concerns have grown to such an extent that even governments are devoting more attention and resources to preventing cyber threats. The terms cyber attack and cyber warfare have been coined.
What is privacy and internet security?
The biggest threat to users on the Internet is the risk of their personal information falling into the hands of others or being disclosed.
When we use online services, communicate through social media or email, we put a lot of personal information online. These can be personal photos, banking or financial information, health information, private correspondence with friends or email, and logins and passwords used to access certain sites. Usually, this information is kept safe by online service providers, but there are also cases where your information falls into the hands of an unwanted third party and they use it for malicious purposes. can use.
Therefore, all information that belongs only to us and is not given to others without our consent is our personal property and we have the right to privacy over it.
Disclosure of personal information may occur through your own fault or as a result of the actions of an individual or individuals who conduct a special attack, such as hackers. Disclosure of personal information may cause you material and moral damage.
Let's give one example. For example, you posted some private photo or information in a public place, believing that you are only sending it to a friend, without understanding the rules of using a social network. Or you clicked on suspicious links to some sites on social networks, thinking that no one will see them; because you unknowingly shared it on your page or carelessly opened a questionable site, information about this site appeared on your public page without your consent. Disclosure of such personal information to others may damage your reputation or create a negative impression of you. this is is moral damage. Also, as a result of such carelessness, they can visit various banned sites under your name.
An example of material damage. If you click on a link in a suspicious e-mail and open it, and as a result, a piece of malware that aims to steal personal information gets installed on your computer, it will copy all the personal information on your computer and in your e-mail, and the person behind it can send to individuals. Stolen information can include bank and credit card details, and cybercriminals can use them to steal your money.
Who is behind cyber attacks?
Cyber attacks that target ordinary people are mostly driven by criminal individuals or groups seeking to gain material wealth. They steal personal information by hacking into people's e-mails, computers or other electronic devices, finding their bank or credit card details and extorting money from them. They can also blackmail people and demand money by stealing personal information, photos and videos and threatening to share them.
Government agencies are also making extensive use of the Internet to track down individuals involved in illegal activities. If you use dubious or questionable sites and online resources and do not know how to use them safely, you may come to the attention of security agencies, even if you have not committed any crime, and this may cause unwanted inconvenience for you.
Why Internet Security?
In order to avoid the unpleasant situations mentioned above, it is necessary to know the guidelines for safe use of the Internet.
Special protection programs are usually used to avoid virus and malware attacks. But the best protection against such threats is to observe internet hygiene. That is, if you know the rules of the correct use of the Internet and if you can distinguish dubious sources from reliable sites and know what to do when you come across them, you are much less likely to become a victim of cyber attacks.
Ways to use email safely
E-mail is the most convenient, the most necessary and the communication tool used by all Internet users. In order to use any other service of the Internet, for example, for activities such as joining a social network, conducting online sales, you must first have an e-mail address.
Types of dangers that come with e-mail
Email threats can be divided into several types:
Spam – Any email that arrives in your email that you do not want to receive is called "spam". Usually, groups that collect people's e-mail addresses in various ways send mass letters to huge e-mail pools. Spam emails can be harmless and contain information that is just a simple advertisement for a product. But since you didn't want to receive an advertisement about this company's product, and they're sending you this information without your consent, these emails are considered "spam".
For example, you received a letter from a pharmaceutical company with a list of drugs and their prices. You have no affiliation with this company or are not their customer. So, they got your email address from somewhere and sent you a mail advertising their products as an advertisement. In fact, this email does not contain any harmless information, but as unwanted information, such an email is also considered "spam".
In many countries, it is even forbidden to send such letters without the consent of the people. But in a borderless world like the Internet, you'd better not expect people to follow those rules.
Remember, "spam" emails can also contain programs that aim to steal personal information.
Ways to protect yourself from spam:
Never put your personal e-mail address in public places - social networks, websites and public forums.
When using Internet services, subscribe only to sites that you are sure are necessary and safe for you. That is, do not enter your email address anywhere on the Internet where you are asked to enter your email address. Because there are many fake sites and services that collect emails to send "spam" letters.
Do not open links with Internet addresses in "spam" letters. Through them, data-intensive programs can be installed on your computer. Don't even click on links that say "Unsubscribe". They write such words to trick you into thinking that you may actually be visiting a link to a malware site.
Phishing – This type of threat is one of the biggest threats from email and aims to steal people's personal information. "Phishing" emails make you think they are coming from an organization or institution you know. For example, if you work with a bank or financial institution, they may write you a letter on behalf of this bank and ask for your personal bank information, or they may ask you to give or receive additional information by visiting their site through a link. If you click on the link in the email, it's not out of the question that information-stealing malware will be installed on your computer. Such letters should be professionally written and include logos and physical addresses of real organizations.
Ways to protect against Phishing:
Never click on links in suspicious emails that appear to be "phishing".
Do not respond to such emails and do not send any information they ask for (such as bank and credit card details, passwords, etc.).
Check the structure of the letter: is it written professionally and without spelling mistakes? Does the content and format match the style of your organization or company? Remember, writing without spelling mistakes does not mean that it is a valid and reliable letter.
If you are not sure of the authenticity of a letter, before replying to it or opening a link in it, contact the organization or company that sent the letter by phone or otherwise to verify that the letter really came from them.
Check that the mailing address matches the name and domain of the company website you know. For example, a valid email for www.saharschool.org would come from an address such as info@saharschool.org or admin@saharschool.org . The first part can be any word, but focus on the part that comes after the email sign (@). "Phishing" emails may use an email address based on fake sites, such as saharschol.org or saharschool.com , which are close to but not exactly the original address. The same can be followed when checking the authenticity of sites.
If a link is hidden under a word in the letter, if you want to know where it leads, without clicking the link, move the mouse pointer over the word in which the link is hidden. Then the address with the link will appear on the left side under the browser. You can tell if a site is real or not by looking at its address. Remember, don't open a site until you're absolutely sure it's real.
Spoofing – Emails that appear to be from someone you know but were not actually sent by that person are called "spoofing". Hackers or malware may be taking control of your friend's email address and sending you malicious emails on their behalf. Or, on the contrary, your e-mail address may become available to malicious programs, and such letters may be sent to others on your behalf. This can happen not only through e-mail, but also through social media mailing or message publishing services.
Ways to protect against "spoofing":
If a letter sent by a friend or acquaintance looks suspicious, do not reply to it or open the address of the site.
To check the authenticity of this letter, ask your friend by phone or other means of communication.
If you notice that a spoofing e-mail has been or is being sent to other people without your knowledge, change your e-mail password immediately and contact the recipient again to warn them that you did not send the e-mail.
Additional recommendations for email security
Set a strong password for your email address. Do not use simple words or numbers for the password. According to SplashData, the most used passwords last year were 12345, 12345678 and qwerty. You don't need to be a hacker to crack or get these passwords. Whenever possible, use a combination of capital letters, numbers and special characters in your password. For example, a password consisting of the simple word "goodness" and letters "YakhshiliK1!" you can turn it into a complex password consisting of various characters.
Do not use your email password on any other site or online service. We recommend that you choose a separate password for each site.
Do not store passwords on your computer or other online and electronic devices for easy reference. Write them down on a piece of paper and keep them in a safe place.
When using public computers, always remember to log out of the site or email after use. To do this, you need to press the "Exit", "Log out" or "Vikhod" buttons. If you close the window (browser) without logging out, all your information will be saved and when someone opens the page again, your information will come out. Public computers are libraries, computers in internet cafes or owned by someone can be understood.
If you want to send one letter to several people, take into account that e-mail addresses are visible to everyone. If you do not want the recipient to see other e-mails to which this e-mail was sent, enter the e-mail addresses in the "Bcc" (in English-language mail services such as Gmail and Yahoo) or "Bcc" (in Russian-language mail services such as Mail.ru) line. Then several people who receive the same letter will not see each other's e-mail address. This is important because the parties to whom the letter is sent may not want their email address to be seen by people they do not know.aa
Safe use of the Internet browser
In this section we will talk about internet browsers. A browser is a program used to access the internet and view web pages. The most popular browsers include Internet Explorer, Firefox, Google Chrome, Opera, and Safari. Although these browsers all perform the same function, they differ from each other in the way they connect to the Internet, additional services and appearance. Below are some safety considerations when working with Internet browsers.
Every browser keeps a history of what you do there, the pages you visit and the keywords you search for. Every page you open is known to the internet service provider and the browser provider and may be permanently stored on the servers. Therefore, your visits to the sites will never be private or confidential. That's why you need to be responsible about what sites you visit.
If you don't want other people to see your browser history when they access your computer, or when you use the Internet on public computers, you can use a special browser window called "Private". All popular browsers now have the ability to open such incognito windows. All sites opened in the "Private" window, password and login information will be deleted after closing the window. Remember, a private window cannot hide your information from your ISP or browser provider. It only ensures that your data is not saved in the browser.
As we mentioned in the section on using email safely, browsers also expose you to threats such as viruses, phishing and malware sites. Follow these tips to protect yourself against them.
First of all, use common sense when determining whether a site is safe or not. Doubtful sites usually contain false information or statements that are highly unlikely to be true (for example, a claim that you won the lottery). If you accidentally visit such sites, you should close the site immediately without clicking on any of the links on it.
If a website claims to belong to an organization or company, check to see if the name is spelled correctly, with variations or misspellings. Fake sites created by stealing the name of a real organization usually have some letters in the name of the real company's site altered. For example, if the site s aharschool.org is real, it can be faked as www.saharschol.org or www.saharschool.com .
If the site starts with http://, it is more likely that the site is suspicious. Almost all trusted and big sites now open with the https:// protocol. The https symbol indicates that the site has a security certificate.
When you type the address of a site you know into the browser to access a site, double-check that you typed the address correctly before pressing ENTER. If you misspell one word, you can end up on another site that looks like the real site but is fake.
Sites that ask you to send money through money transfer services are usually fake. For example, beware of a site that promises to find you a job abroad and asks you to send money from Moneygram for the service.
Update your browser regularly. If there is a new version of it, save it and install this new one.
Safe use of computer devices
Malicious programs that come from the Internet through a browser usually try to install themselves on your computer or other electronic device, look for personal information in its memory and send it to their criminal owners. In order to prevent this, we also give some tips on how to protect devices.
Ways to protect computers and laptops:
Always keep the firewall protection program on your computer or laptop. It is the most effective weapon against attacks from the Internet and other networks. Typically, Windows and Mac operating systems have Firewall software pre-installed.
Install antivirus software on your computer/laptop. Windows 7 and higher operating systems come with anti-virus software (Windows Defender) installed, and these are usually sufficient to ward off almost all internet threats (as long as you use the internet responsibly, of course). Mac computers are also known to be resistant to Internet threats and usually do not need additional antivirus software installed either. For users using other, older versions of Windows, we recommend some free antivirus programs:
1. Avast! Free Antivirus : https://www.avast.com/
2. AVG Antivirus: http://www.avg.com/affiliate/ww-en/free-antivirus-download
Keep your system up-to-date by downloading updates to your operating system in a timely manner in order to have important protection against new threats from the Internet.
Do not download or install suspicious items or programs to your computer/laptop. They can be malware or viruses that steal data or damage your computer. Even with antivirus software installed, some viruses can get through.
Get into the habit of turning off your computer or laptop when you're not using it.
Be careful when connecting someone else's disk or USB flash drive to your computer/laptop. They may be infected with a virus.
If more than one person uses the same computer, open a separate profile (account) for each user.
Always save (backup) the data on the computer. You can copy them to separate memory drives or online storage sites. You can get up to 15-20 gigabytes of space for free on sites that provide data storage services, such as Google Drive and Dropbox.
Ways to protect mobile devices :
Representatives of the new generation are increasingly used to accessing the Internet, mainly through mobile devices. All the activities performed by computers, such as shopping, using banking services, accessing social networks, can now be done through a phone or tablet with the help of special applications. As it is Sunday, the need to protect them is also increasing. Here are some tips on how to protect your mobile devices.
Get into the habit of always locking the screen of your phone or tablet with a password. Make sure your password is complex. Have the device screen lock automatically when you're not using it.
Do not give your phone to others.
Copy the data to a computer or online storage sites. For example, on Apple mobile devices, through the iCloud service, your data can be transferred to online servers and encrypted using special codes. Android phone owners can use Google Drive or other data storage services.
Do not save text messages or e-mails containing sensitive and personal information on your phone. Delete them. You can also block senders of such emails.
Do not download suspicious applications. Do not visit suspicious sites.
With the help of a special program, you can restore data such as photos, letters, phone numbers that have been deleted from your phone using a special program.
Use only your phone number when registering in programs such as Telegram, Whatsapp or social networks such as Facebook, Odnoklassniki. Because if you use someone else's number, they can get your password through this number or enter your profile in these programs and networks without your knowledge and monitor your activity.
What to do when the phone is lost ?
If your phone or other mobile device is lost, first of all, your device should be prepared for the following measures. That is, you need to prepare in advance for the actions that need to be taken when it is lost. Special tips for Apple and Android phones:
Apple:
Start the "Find my iPhone" ( Find my iPhone ) service. With this service, you can find the location of a lost phone on the Internet. Also, by automatically locking the screen, your phone number can be displayed on the screen so that the person who finds it can contact you. Your number or email address can be made visible. You can also completely erase all data on your phone online.
Save all your data with iCloud. If your phone is lost and never found, you can copy all the data on it to another phone via iCloud.
Android:
You can find, lock or erase your lost phone using Google's Android Device Manager service or other lost phone tracking software.
Don't forget to back up the data on your Android device from time to time as well. You can transfer it to your computer or to online storage sites with the help of utilities. You can also save all the information related to your profile opened in "Google" through the internal settings (Settings) panel of Android.
Social media security
Social media has become a staple of the internet for many people today. That is, many users access the Internet today mainly to spend time on social networks: they receive news, videos and other entertainment information from these networks; talks with friends, chats, etc.
Examples of mass social networks include sites such as Facebook, Twitter, Odnoklassniki, Vkontakte, and Muloqot. The biggest threat to Internet users' privacy may now come from these networks. Because you've probably entered most of your personal information, photos, and even credit card and banking information into these sites. Therefore, social networks should be used carefully so that this information does not give a warning. Here are some tips for you:
Post as little personal information as possible on social media. It should not be forgotten that no matter how much social networks strengthen their security measures, the information you post there can never be completely safe. In the worst case, the site will be attacked by hackers and your secret photos and correspondence will be revealed to the whole world in one day.
Remember that this is a public space. Whether you have written a picture or a message there, it will now be recorded on the internet servers, and even if you delete this information from your page, it may not be deleted from the server's memory. Therefore, before writing any sentence, cut it into seven dimensions.
Before registering on the site, familiarize yourself with the rules for using the network. Most people don't read these rules, but such sites usually put full responsibility on the user in many cases to avoid responsibility. For example, there may be a condition that every photo posted on the network becomes the property of the site. If you do not agree to such terms, do not become a member of the site.
Explore the available security options from the site's settings panel. From this panel, you can choose the situation that suits you in matters such as who can see what you are writing or who can write to you.
Do not open suspicious links. They may be malicious programs trying to access your network profile. This can lead to unwanted emails and links being sent to your friends on your behalf.
Even your private chats with your friends are actually not free from surveillance. Site administrators or government agencies may disclose this information if they wish.
Summary
The benefits and opportunities of the Internet for humanity are increasing day by day. At the same time, security problems have not decreased.
Even if you have all the necessary antivirus and other information security software, your Internet activity will never be 100 percent secure. You can minimize your risk by choosing a strong password or by not accessing malicious sites, but if hackers intend to attack you personally, there is little chance that you will survive their threat. Of course, it's rare for ordinary people to experience a deliberate hacker attack. Therefore, as a conclusion, we present you with our latest recommendations for safe use of the Internet.
As much as possible, enter your personal information on websites and networks as little as possible.
Do not communicate with strangers and do not open site addresses and attached files in e-mails from them. Lately, spam and malicious emails have been coming even in Uzbek language.
Do not assume that no one but you and the person you are communicating with knows your private letters and chats. Every word you write is going to be saved somewhere like a bullet, or maybe someone is watching it.
Use the Internet responsibly. If you can't stand behind your words, that is, if you can answer for the words you wrote or the actions you performed on the Internet without shame or fear, then only engage in such activities on the Internet. ling. For example, when you argue with others on social networks, when you criticize someone or something, you may face such situations.
Do not engage in illegal activities on the Internet. What can be classified as an illegal activity? For example, viewing pornography, reading or distributing material promoting violence or religious extremism can lead to criminal consequences. So be a law abiding citizen on the internet too.
Relative clauses. 9. Nisbatan ergash gaplar.
A conditional sentence is a complex sentence consisting of two parts: a condition and a result. There are 4 types of conditional sentences in English : zero (zero conditional), first (first conditional), second (second conditional) and third (third conditional). All types use different tenses.
Conditionals (type 0) are used to express generally accepted or scientific facts. When (when) can be used instead of if (if) in this type of conditional statement.
1 write conditional sentences
Conditionals (Type 1) are used to express real situations in the present and future time.
There are 2 types of conditional sentences
Conditionals (type 2) are used to express an imaginary and possible situation in the present and future. If, the singular verb (I, he, she, it) was used in the subordinate clause in the 1st and 3rd persons .
There are 3 types of conditional sentences
Conditionals (type 3) are used to express an unreal situation in the past (a situation could have happened in the past under certain conditions, but did not, so it is considered unreal).
Conditional adverbs are usually if (if), if (= if not) (if only), provided (provided, if only), provided (that) (provided, provided, if only), provided , until now) is entered with . , condition (that) (so), but for + -ing form/noun (if not), otherwise (otherwise) or else (otherwise), what if (what if), guess (whatever), even (even if), only if (if).
If he starts studying harder, he won't pass the exams. If a he is not If he starts studying more, he will not pass the exams.
Get up now or you'll miss your flight again. Get up or you won't make your flight.
Wear a jacket or you'll catch a cold. Put on your jacket or you'll catch a cold.
They will leave on Friday assuming the weather is good. If the weather is good, they will leave on Friday.
Reminder
If a sentence begins with Only if , the subject and predicate of the predicate are reversed: Only if he is in formal clothes will he be allowed to enter. If he is dressed formally, he is allowed.
if there is a preposition with if it precedes the main clause, the two parts of the sentence are separated by a comma: If you are tired, you must rest. If you feel tired, you should rest. BUT: If you are tired, you should rest.
Would, would, or should not be used in sentences with if : If he's late, he might get into trouble. If he sleeps late, he will face trouble. BUT: is used in sentences with if , would, or should when it comes to a request, as well as to express anger, doubt, uncertainty, determination.
Ask him to call me if he needs help. I doubt he'll need help, but tell him to call me. If you stop arguing, we will find a solution. Please stop arguing and we will find a solution.
If if can be omitted, should (condition 1), were (condition 2) and bor (condition 3) stand before the subject.
If he should pass the exam, he will apply to the university. - If he passes the exam, he will apply to the university. If he passes the exams, he will enter the university.
If there was an election tomorrow, who would you vote for? If there was an election tomorrow, who would you vote for? If there was an election tomorrow, who would you vote for?
If I had known, I would have told you. If I had known, I would have told you. If I had known, I would have told you.
Expression of wishes (desires)
If the I want/If only constructions are used to express wish and regret. The equivalent turns in Russian would be nice, if available.
verb form
|
Examples
|
Usage
|
I want/just+ past simple /past continuous
|
I wish it didn't work now (but I do).
I wish I didn't work anymore (but I do).
Only I was going to the concert tonight (but not me).
I would like to go to the concert today (but I won't).
|
expressing a desire to change the current situation
|
I would/if only+Past Perfect
|
I wish I had read harder (but I didn't).
I wish I had studied harder (but I didn't).
Only I was not very stupid (but I was).
I wish I wasn't an idiot too.
|
to express regret about something that happened or did not happen in the past
|
I want/only+subject (Subject) +would+bare infinitive (bare infinitive)
|
I wish you were very rude to your sister.
I wish you wouldn't be rude to your sister.
If only you would stop arguing.
If you stop fighting. (request)
|
imperative mood for expression politely or a desire to change a person's state or behavior
|
Dostları ilə paylaş: |