(substitutions). In the replacement ciphers, the letters change to other letters from the same alphabet, when encoding letters change to something completely different - pictures, symbols of other alphabets, sequences of various signs, etc. The table of unique compliance of the source text and code symbols is compiled, and in accordance with this table, one to one encoding occurs. To decode, you need to know the code table.
There are a large number of codes used in different fields of human life. Well-known codes are used for the most part for the convenience of transmitting information in one way or another. If the code table is known only to the transmitter and receiving, then a pretty primitive cipher is obtained, which is easily led by frequency analysis. But if a person is far from the theory of coding and not familiar with the frequency analysis of the text, then such ciphers are pretty problematic.
A1Z26.
The simplest cipher. Called A1Z26 or in the Russian version A1Y33. The letters of the alphabet are replaced with their sequence numbers.
"Nozdr" can be encrypted as 14-15-26-4-18 or 1415260418.
ABC Morse
Letters, numbers and some signs are associated with a set of points and dashes, which can be transmitted on the radio, sound, knock, light telegraph and dishlable flags. Since the appropriate flag is associated with each letter, the corresponding flag is associated with each letter, you can send a message to flags.
Braille
Brill is a tactile reading system for blind, consisting of six-point signs called cells. The cell consists of three points in height and of two points in width.
Various braille signs are formed by placing points into different positions inside the cell.
For convenience, the point is described when reading as follows: 1, 2, 3 on the left from top to bottom and 4, 5, 6 to the right from top to bottom.
When drawing up text, the following rules are drawn:
between words is passed one cell (space);
after the semicolons and the point with the semicolons is not skipped;
a dash is written in a punk with the previous word;
before the number is made of a digital sign.
Code Pages
In computer quests and mgars, you can encode letters in accordance with their codes in various code pages - tables used on computers. For Cyrillic texts, it is best to use the most common encodings: Windows-1251, Koi8, CP866, MacCyrillic. Although for complex encryptions, you can choose something more exotic.
You can encode hexadecimal numbers, and you can translate them into decimal. For example, the letter in KOI8-R has code B3 (179), in CP866 - F0 (240), and in Windows-1251 - A8 (168). And you can give letters in the right tables to seek compliance in the left, then the text will be dialed by the "krakoyabram" type èαᬫº∩íαδ (866 → 437) or Êðàêîçÿáðû (1251 → Latin-1).
And you can change the upper half of the characters to the lower one inside the same table. Then for Windows-1251, instead of "Krakozyabry", the JP JNG AP (", instead of the" helicopter "-" BEPRNK (R ". Such a shift in the code page is the classic loss of a senior bit in case of failures on mail servers. Latin characters at the same time You can encode down to 128 characters. And such an encoding will be an encipher option - Rot128, only not for a conventional alphabet, but for the selected code page.
The exact time of the origin of the cipher is unknown, but some of the records found this system are dated XVIII century. Variations of this cipher were used by the Order of Rosenkrayers and Masons. The latter used it in their secret documents and correspondence quite often, so the cipher and began to call the media cipher. Even on the tombstones of Masons, you can see the inscriptions using this cipher. A similar encryption system was used during the US Civil War in the US Army George Washington, as well as prisoners in the Federal Converations of Confederations of the United States.
Below are two (blue and red) options for filling the grid of such ciphers. The letters are arranged in pairs, the second letter from the pair is drawn by the symbol with the point:
Copyright
Enciphers, where one symbol of the alphabet (letter, digital, the punctuation) corresponds to one (less often more) a graphic sign, a great set is invented. Most of them are invented for use in fantastic films, cartoons and computer games. Here is some of them:
Dacificent men
One of the most famous author's substitution ciphers is "". He was invented and described by the English writer Arthur Conan Doyle in one of his works about Sherlock Holmes. The letters of the alphabet are replaced with symbols similar to men in different poses. In the book, the little men were invented not for all the letters of the alphabet, so the fans were creatively finalized and the symbols were reworked, and it turned out such a cipher:
Thomas Mora alphabet
But such an alphabet described in his treatise "Utopia" Thomas Mor in 1516:
Ciphers from the animated series "Gravity Falls"
Bill Schifra
Stanford Pineza (author of diaries)
Jedician alphabet from "Star Wars"
Alphabet Alphabet from Futurama
Krypton Alphabet Superman
Bionic alphabets
The semantics of the HTML code is always a hot question. Some developers try to always write semantic code. Others criticize dogmatic adherents. And some not even have no idea what it is and why it is necessary. Semantics is defined in HTML in tags, classes, IDs, and attributes that describe the purpose, but do not specify exactly the content that is concluded. That is, it is about separating the content and its format.
Let's start with the obvious example.
Bad semantics code
Good semantics code
The text of the article that is written by someone. Inco Gnito - her author.Title Articles
Regardless of whether you consider HTML5 ready for use or not, for sure the use of the tag But not everything is so clearly represented by HTML5 tags. Let's look at the set of class names and understand whether they meet the requirements of semantics. Not semantic code. This is a classic example. Each CSS working environment for a modular grid uses this type of classes names to determine the grid items. Will it be "yui-b", "grid-4", or "spanhalf" - such names closer to the markup task than to the content description. However, their use in most cases is inevitable when working with modular grids templates. Semantic code. The footer has acquired a steady value in web design. This is the lower part of the page that contains elements such as repetitive navigation, the rights of use, information about the author and so on. This class determines the group for all these elements without their description. If you switched to the use of HTML5, then it is better to apply an item Not semantic code. It defines the content. But why should the text be big? To stand out among the other smaller text? "Standout" (selection) is more suitable in this case. You can decide to change the style for the released text, but do nothing with its size, and in this case, the name of the class can lead you into confusion. Semantic code. In this case, we are talking about determining the level of importance of the element in the application interface (for example, a paragraph or buttons). An element with a higher level may have bright colors and a larger size, and low-level elements may contain more content. But the exact definition of styles in this case is not, therefore the code is semantic. This situation is very similar to the use of tags Semantic code. If each class name could be so clearly defined! In this case, we have a description of the partition that has content, the purpose of which is easy to describe, as well as "Tweets", "Pagination" or "Admin-NAV". Not semantic code. In this case, we are talking about setting style for the first paragraph on the page. This technique is used to attract the attention of readers to the material. It is better to use the name "Intro", in which there is no mention of the element. But it is even better to use a selector for such paragraphs, for example, article P: first-of-type or h1 + p. Not semantic code. This is a very generalized class name, which is used to organize the formatting of elements. But there is nothing in it to concern the description of the content. Different semantics theorists are recommended in such cases to use the class name like "Group". It is likely that they are right. Since this element undoubtedly serves to group several other elements, and the recommended name will better describe its purpose without immersion in the part. Not semantic code. Too detailed description of the content format. It is better to choose another name that will describe the content, and not its format. Semantic code. The class describes the content status very well. For example, a successful completion message may have a completely different style from an error message. Not semantic code. In this example, there is an attempt to set the determination of the content format, and not its purpose. "Plain-Jane" is very similar to "Normal" or "Regular". The ideal CSS code must be written in such a way that there is no need for class names like "regular", which describe the content format. Not semantic code. This type of classes are commonly used to determine the elements of the site that should not be included in the link chain. In this case, it is better to use something like REL \u003d NOFOLLOW for references, but not a class for all content. Not semantic code. There is an attempt to describe the content format, and not its purpose. Suppose you have two articles on your site. And you wish to ask them different styles. "Film Reviews" will have a blue background, and "hot news" - a red background and a larger font. One way to solve the problem is: Another way is this: Surely, if you interview several developers about which code more complies with the requirements of semantics, most will indicate the first option. It perfectly corresponds to the material of this lesson: a description of the appointment without references to formatting. And the second option indicates the format ("BlueBG" - the name of the class, which is formed from two English words meaning "blue background"). If suddenly it is decided to change the design of films reviews - for example, make a green background, then the name of the class "BlueBG" will turn into a nightmare of the developer. And the name "Movie-Review" will allow you to absolutely calmly change the design styles while maintaining an excellent level of code support. But no one claims that the first example is better in all cases without exception. Suppose that a certain shade of blue is used in many places on the site. For example, it is a background for some part of the footer and areas in the sidebar. You can use the following selector: Movie-Review, Footer\u003e Div: NTH-OF-Type (2), Aside\u003e Div: NTH-OF-Type (4) (Background: # C2FBFF;) Effective solution, as the color is determined only in one place. But this code becomes difficult to support, as it has a long selector, complex for visual perception. Other selectors will also need to determine unique styles, which will lead to the repetition of the code. Or you can use another approach and leave them separated: Movie-Review (Background: # C2FBFF; / * Color definition * /) Footer\u003e div: nth-of-type (2) (Background: # C2FBFF; / * And one more * /) Aside\u003e Div: NTH-OF- Type (4) (Background: # C2FBFF; / * And one more * /) This style helps to save CSS file more organized (different areas are defined in different sections). But the board is the repetition of definitions. For large sites, the definition of the same color can reach up to several thousand times. Hornly! The solution option may be the use of a "BlueBG" type to determine the color once and insert it into HTML code when you want to use this design. Of course, it is better to call it "MainbrandColor" or "SecondaryFont" to get out of the formatting description. You can sacrifice the semantic code in favor of saving resources. 4.1. Basics of encryption The essence of encryption by the replacement method is as follows. Let the messages in Russian and the replacement are subject to each letter of these messages. Then, the letter BUT The initial alphabet is compared some set of characters (ciphotenamant) M a, b - m b, ..., I - m i. Siprosmen are chosen in such a way that any two sets ( M I. and M J., i ≠ J.) did not contain the same elements ( M i ∩ m j \u003d Ø). The table shown in Fig. 4.1 is the key cipher key. Knowing it, you can implement both encryption and decryption. Fig.4.1. Table Schifrozamement When encrypted each letter BUT open message is replaced by any symbol of set M A.. If the message contains several letters. BUT, each of them is replaced by any character from M A.. Due to this, with the help of one key, you can get different options for cipherograms for the same open message. Since the set M a, m b, ..., m i In pairs do not intersect, then for each symbol of the cipherogram, you can uniquely determine which set it belongs, and, therefore, what the letter of the open message it replaces. Therefore, decryption is possible and open message is determined singly. The above description of the substitution of replacement ciffers belongs to all their varieties except in which the same encryptions can be used to encrypt various symbols of the original alphabet (i.e. M i ∩ M j ≠ Ø, i ≠ J.). The replacement method is often implemented by many users when working on a computer. If you do not switch the character set from Latin to Cyrillic on the keyboard on the keyboard, then instead of the letters of the Russian alphabet when entering the text, the letters of the Latin alphabet will be printed ("Schifrozames"). Strictly defined alphabets are used to record source and encrypted messages. Alphabets for recording source and encrypted messages may differ. The symbols of both alphabets can be represented by letters, their combinations, numbers, drawings, sounds, gestures, etc. As an example, the dancing men from the story of A. Konan Doyla () and the manuscript of the Runic Lettter () from Roman J. Verne "Journey to the Center for the Earth". Replacement ciphers can be divided into the following subclasses (varieties). Fig.4.2. Classification of replacement ciphers I. Regular ciphers. Schifrozates consist of the same number of characters or separated from each other by the separator (space, point, dash, etc.). Slogan cipher. For this cipher, the construction of the cipher table is based on the slogan (key) - easily memorized Word. The second line of the ciphirosamet table is first filled with a word-slogan (and the repeated letters are discarded), and then the other letters not included in the word-slogan, alphabetical order. For example, if the word-slogan "Dzydin" is selected, the table has the following form. Fig.4.4. Table SIIFROZATED for slogan cipher When encrypting the source message "Abramov" according to the above key, the cipherogram will look like "Dyepdkmi". Polybianny square. The cipher is invented by the Greek statesman, the commander and historian Polybia (203-120. BC). With regard to the Russian alphabet and Indian (Arabic), the essence of encryption was as follows. The letters (optional in alphabetical order) are discharged into the square 6x6. Fig.4.5. Table Siproshed for Polybian Square The encrypted letter is replaced by the square coordinates (string column) in which it is recorded. For example, if the initial message "Abramov", then the cipherogram - "11 12 36 11 32 34 13". In ancient Greece, the messages were transmitted using an optical telegraph (using torches). For each letter of the message, the number of torches corresponding to the lines number of the letter was raised, and then the column number. Table 4.1. The frequency of the appearance of the letters of the Russian language in the texts There are similar tables for pairs of letters (biograms). For example, often occurring bigramms are "that", "but", "st", "software", "en", etc. Another reception of opening cipherograms is based on the exception of possible combinations of letters. For example, in texts (if they are written without spelling errors), it is impossible to meet the combinations of "key", "Sche", "B", etc. To complicate the task of opening the encryptions of unambiguous replacement in antiquity before encryption from the source messages, spaces and / or vowel letters were excluded. Another way that makes the opening, is encryption. bigrammy (pairs of letters). 4.3. Polygraphmam ciphers Polygraph ciphers of replacement - These are ciffers in which one shifrozana corresponds to several source text symbols at once. Bigmamine cipher ports . The cipher ports represented by it in the form of a table is the first known biogram cipher. The size of its table was 20 x 20 cells; Upstairs horizontally and on the left, the standard alphabet was recorded vertically (it did not have the letters J, K, U, W, X and Z). In the cells of the table, any numbers, letters or symbols - Giovanni port himself used the symbols - provided that the contents of any cells were repeated. In relation to the Russian language, the ciphirosate table may look as follows. Fig.4.10. Table SIIFROZATED for cipher ports Encryption is performed by pairs of the starting message letters. The first letter of a pair indicates a string of cipherozames, the second - to the column. In the event of an odd number of letters, an auxiliary symbol ("blank sign") is added to it. For example, the initial message "AB RA MO B", encrypted - "002 466 355 093". The letter "I" is used as an auxiliary symbol. Cipher Playfair (English. "Honest game"). In the early 1850s. Charles Whitstone came up with the so-called "rectangular cipher". Leon Plaifer, a close friend of Whitstone, spoke about this cipher during the official dinner in 1854. The Minister of Internal Affairs Lord Palmerston and Prince Albert. And since the player was well known in the military and diplomatic circles, then the name "Plaifer" the name "SIFRER" was fixed for the creation of Whitston. This cipher became the first alphabetic cipher (in the Bigammaya Table ports used symbols, and not letters). It was intended to ensure the secrecy of the telegraph communications and was applied by British troops in the Anglo-Board and First World War. They also used the Australian Coast Guard Service during World War II. The cipher provides encryption pairs of characters (Biggram). Thus, this cipher is more resistant to a breaking compared to a simple replacement cipher, since frequency analysis is hampered. It can be carried out, but not for 26 possible characters (Latin alphabet), and for 26 x 26 \u003d 676 possible biograms. Analysis of the frequency of biograms is possible, but is much more difficult and requires a much larger volume of encrypted text. To encrypt the message, it is necessary to split it on the bills (groups of two characters), while if two identical symbols are emerging in the bill, then a predetermined auxiliary symbol is added between them (in the original - X., for the Russian alphabet - I). For example, the "encrypted message" becomes "for SHI FR ANB EU I either I" To form a key table, the slogan is selected and then it is filled by the rules of the encryption system of the Trishemus. For example, for the "Dzydine" slogan, the key table is as follows. Fig.4.11. Key table for Playfair cipher Then, guided by the following rules, the source text symbols are encrypted: 1. If the initial text bigram characters are found in one line, then these characters are replaced with the characters located in the nearest columns to the right of the corresponding characters. If the character is the last in the string, it is replaced with the first character of the same line. 2. If the symbols of the initial text bigram are found in the same column, then they are converted into the symbols of the same column that are directly under them. If the character is the bottom in the column, it is replaced with the first character of the same column. 3. If the symbols of the initial text bigram are located in different columns and different lines, they are replaced with the characters in the same lines, but corresponding to other corners of the rectangle. An example of encryption. The Bigram "For" forms a rectangle - is replaced by "ZBB"; Bigram "Shi" are in the same column - replaced on the "Yui"; The "FR" bigram is in one line - is replaced by "xs"; Bigram "s" forms a rectangle - replaced by "yzh"; Bigram "An" are in one line - is replaced by "BA"; Bigram "But" forms a rectangle - is replaced by "AM"; Bigram "EU" forms a rectangle - replaced by "GT"; Bigram "OA" forms a rectangle - replaced by "ka"; The Bigram "O" forms a rectangle - is replaced by "Pa"; The Bigramma "So-shaped" forms a rectangle - is replaced by "Shay"; The "ne" bigram forms a rectangle - replaced by "An"; The Bigram "Eya" forms a rectangle - is replaced by "gi". The cipherogram - "ZhB Yui Xs Yuzh Ba AM GT Ca Paja." To decryption, it is necessary to use the inversion of these rules, folding out the characters I (or H.) If they do not make sense in the source message. It consisted of two disks - external fixed and inner moving disks, which were applied to the letters of the alphabet. The encryption process was in finding the letter of the open text on the external disk and replacing it with the letter from the inner disk under it. After that, the inner disk was shifted to one position and the encryption of the second letter was performed on a new ciffinal. The key of this cipher was the order of layout of letters on the disks and the initial position of the internal disk relative to the external. Trecemus table. One of the ciphers invented by the German Abbot Tristmom became a multipliable cipher based on the so-called "Treismus Table" - a table with a side of equal n.where n. - Number of characters in the alphabet. In the first line of the matrix, letters are recorded in order of their order in the alphabet, in the second - the same sequence of letters, but with a cyclic shift to one position to the left, in the third - with a cyclic shift into two positions left, etc. Fig.4.17. Table of Trishemus The first line is simultaneously the alphabet for the letters of the open text. The first letter of text is encrypted on the first line, the second letter on the second and so on. After using the last row, return to the first. So the message "Abramov" will acquire the type of "AUTGRUZ". The encryption system of the virus. In 1586, the French diplomat Blaise Vizhenin presented before the Henry Commission III description of a simple, but rather persistent cipher, which is based on the TRISEMUS table. Before encryption, the key of the alphabet symbols is selected. The encryption procedure itself is as follows. According to the i-th open message symbol in the first line, a column is determined, and according to the i-th key symbol in the extreme left column - the string. At the intersection of the string and column there will be an i-th symbol placed in a cipherogram. If the key length is smaller, then it is used again. For example, the original message "Abramov", the key is "Dzydin", the cipherogram - "Dafyo". For example, it should be noted that the authorship of this cipher belongs to the Italian Giovanni Batista Bellazo, who described it in 1553. The story "ignored an important fact and called the cipher with the name of the Wizenin, despite the fact that he did nothing to create it." Bellazo offered to call a secret word or phrase password (IT. Password; FR. Parole - word). In 1863, Friedrich Kasiska published an attack algorithm to this cipher, although there are cases of his breaking of cipher with some experienced cryptanalytics and earlier. In particular, in 1854, the cipher was hacked by the inventor of the first analytical computing machine by Charles Babbird, although this fact became known only in the XX century, when a group of scientists disassembled the calculations and personal notes of Babbja. Despite this, the cipher of the vibrant had a reputation as extremely resistant to the "manual" hacking for a long time. So, the well-known writer and mathematician Charles Lutvijd Dodzhson (Lewis Carroll) in his article "Alphabetical cipher", published in the children's journal in 1868, called the cipher of the vibrant was notvilled. In 1917, the Scientific and Popular Journal of SCIENTFIC AMERICAN also responded about the cipher of the Wizenaner as a poor hacking. Rotary machines. The ideas of Alberti and Bellazo were used when creating electromechanical rotary machines of the first half of the twentieth century. Some of them were used in different countries until the 1980s. In most of them, rotors were used (mechanical wheels), the mutual location of which was determined by the current alphabet of the enciphirosamement used to perform substitution. The most famous of the rotary machines is the German machine of the Second World War "Enigma". The output pins of one rotor are connected to the input pins of the next rotor and when the symbol of the original message on the keyboard closed the electrical circuit, resulting in a light bulb with a symbol of the encipostenama. Fig.4.19. Enigma Rotary System [www.cryptomuseum.com] The Enigma encryption action is shown for two sequentially pressed keys - the current flows through the rotors, "reflected" from the reflector, then again through the rotors. Fig.4.20. Encryption scheme Note. The gray lines show other possible electrical circuits inside each rotor. Letter A. encrypted differently with sequential press of one key, first in G., then B. C.. The signal comes on another route due to the rotation of one of the rotors after pressing the previous letter of the source message. 3. Give the characteristic varieties of replacement ciphers. Semantics (Fr. Sémantique from Dr. Greek. Σημαντικός - denoting) - Science of understanding certain signs, symbol sequences and other conventional designations. This science is used in many industries: linguistics, proxy, pragmatics, etymology, etc. I will not know what these words mean and what all these sciences are engaged. And it does not matter, I am interested in the question of the use of semantics when layouting sites. Here I will not affect the term semantic web. At first glance, it may seem that the themes semantic web and semantic HTML code is almost the same. But in fact, the semantic web concept, pretty philosophical and with the current reality has not so much in common. In the language, each word has a certain meaning, purpose. When you say "sausage", you mean the food product, which is mince (usually meat) in an oblong shell. In short, you have in mind sausage, not milk or green peas. HTML is also a language, his "words", referred to as tags, also have a certain logical meaning and purpose. Therefore, first of all semantic HTML code is a layout with the right use of HTML tags, using them for their intended purpose, since they were conceived by the developers of the HTML language and web standards. microformats.org - a community that is working on the embodiment of the idealistic ideas of the semantic web in life by approaching the posting of pages to those semantic ideals. If the information on my site is displayed in the same way as on design, why should you break the brain and think about some semantics?! This is an additional work! Who needs it?! Who will appreciate it except for another vestist? I had to often hear such questions. Let's figure it out. Enhances the availability of information on the site. First of all it matters for alternative agents such as: Search engines are constantly improving the search methods so that the results be the information that really looking user. Semantic HTML contributes to this, because It gives care of a much better analysis - the code is cleaner, the code is logical (clearly seen where the headers, where navigation, where the contents). Good content plus high-quality semantic layout - this is a serious application for good positions in search engines. ,
,
, and so on, but to other elements of the interface.
But...
BUT B. ...
I
M A. M B. ...
M I.
BUT B. IN G. D. E. E. J. Z. AND J. TO L. M. N. ABOUT P R FROM T. W. F. H. C. C. Sh Sh Kommersant S B E. YU I
D. I AND N. BUT B. IN G. E. E. J. Z. J. TO L. M. ABOUT P R FROM T. W. F. H. C. C. Sh Sh Kommersant S B E. YU
1
2
3
4
5
6
1
BUT B. IN G. D. E.
2
E. J. Z. AND J. TO
3
L. M. N. ABOUT P R
4
FROM T. W. F. H. C.
5
C. Sh Sh Kommersant S B
6
E. YU I -
-
-
No. p / p Letter Frequency,% No. p / p Letter Frequency,%
1
ABOUT 10.97
18
B 1.74
2
E. 8.45
19
G. 1.70
3
BUT 8.01
20
Z. 1.65
4
AND 7.35
21
B. 1.59
5
N. 6.70
22
C. 1.44
6
T. 6.26
23
J. 1.21
7
FROM 5.47
24
H. 0.97
8
R 4.73
25
J. 0.94
9
IN 4.54
26
Sh 0.73
10
L. 4.40
27
YU 0.64
11
TO 3.49
28
C. 0.48
12
M. 3.21
29
Sh 0.36
13
D. 2.98
30
E. 0.32
14
P 2.81
31
F. 0.26
15
W. 2.62
32
Kommersant 0.04
16
I 2.01
33
E. 0.04
17
S 1.90
BUT B. IN G. D. E.
(E)J. Z. AND
(S)TO L. M. N. ABOUT P R FROM T. W. F. H. C. C. Sh Sh Kommersant S B E. YU I
BUT 001
002
003
004
005
006
007
008
009
010
011
012
013
014
015
016
017
018
019
020
021
022
023
024
025
026
027
028
029
030
031
B. 032
033
034
035
036
037
038
039
040
041
042
043
044
045
046
047
048
049
050
051
052
053
054
055
056
057
058
059
060
061
062
IN 063
064
065
066
067
068
069
070
071
072
073
074
075
076
077
078
079
080
081
082
083
084
085
086
087
088
089
090
091
092
093
G. 094
095
096
097
098
099
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
D. 125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
HER) 156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
J. 187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
Z. 218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
And (s) 249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
TO 280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
L. 311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
M. 342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
N. 373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
ABOUT 404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
P 435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
R 466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
FROM 497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
T. 528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
W. 559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
F. 590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
H. 621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
C. 652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
C. 683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
Sh 714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
Sh 745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
Kommersant 776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
S 807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
B 838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
E. 869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
YU 900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
I 931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
D. I AND N. BUT B.
IN G. E. E. J. Z.
J. TO L. M. ABOUT P
R FROM T. W. F. H.
C. C. Sh Sh Kommersant S
B E. YU -
1
2
BUT B. IN G. D. E. E. J. Z. AND J. TO L. M. N. ABOUT P R FROM T. W. F. H. C. C. Sh Sh Kommersant S B E. YU I
B. IN G. D. E. E. J. Z. AND J. TO L. M. N. ABOUT P R FROM T. W. F. H. C. C. Sh Sh Kommersant S B E. YU I BUT
IN G. D. E. E. J. Z. AND J. TO L. M. N. ABOUT P R FROM T. W. F. H. C. C. Sh Sh Kommersant S B E. YU I BUT B.
G. D. E. E. J. Z. AND J. TO L. M. N. ABOUT P R FROM T. W. F. H. C. C. Sh Sh Kommersant S B E. YU I BUT B. IN
D. E. E. J. Z. AND J. TO L. M. N. ABOUT P R FROM T. W. F. H. C. C. Sh Sh Kommersant S B E. YU I BUT B. IN G.
E. E. J. Z. AND J. TO L. M. N. ABOUT P R FROM T. W. F. H. C. C. Sh Sh Kommersant S B E. YU I BUT B. IN G. D.
E. J. Z. AND J. TO L. M. N. ABOUT P R FROM T. W. F. H. C. C. Sh Sh Kommersant S B E. YU I BUT B. IN G. D. E.
J. Z. AND J. TO L. M. N. ABOUT P R FROM T. W. F. H. C. C. Sh Sh Kommersant S B E. YU I BUT B. IN G. D. E. E.
Z. AND J. TO L. M. N. ABOUT P R FROM T. W. F. H. C. C. Sh Sh Kommersant S B E. YU I BUT B. IN G. D. E. E. J.
AND J. TO L. M. N. ABOUT P R FROM T. W. F. H. C. C. Sh Sh Kommersant S B E. YU I BUT B. IN G. D. E. E. J. Z.
J. TO L. M. N. ABOUT P R FROM T. W. F. H. C. C. Sh Sh Kommersant S B E. YU I BUT B. IN G. D. E. E. J. Z. AND
TO L. M. N. ABOUT P R FROM T. W. F. H. C. C. Sh Sh Kommersant S B E. YU I BUT B. IN G. D. E. E. J. Z. AND J.
L. M. N. ABOUT P R FROM T. W. F. H. C. C. Sh Sh Kommersant S B E. YU I BUT B. IN G. D. E. E. J. Z. AND J. TO
M. N. ABOUT P R FROM T. W. F. H. C. C. Sh Sh Kommersant S B E. YU I BUT B. IN G. D. E. E. J. Z. AND J. TO L.
N. ABOUT P R FROM T. W. F. H. C. C. Sh Sh Kommersant S B E. YU I BUT B. IN G. D. E. E. J. Z. AND J. TO L. M.
ABOUT P R FROM T. W. F. H. C. C. Sh Sh Kommersant S B E. YU I BUT B. IN G. D. E. E. J. Z. AND J. TO L. M. N.
P R FROM T. W. F. H. C. C. Sh Sh Kommersant S B E. YU I BUT B. IN G. D. E. E. J. Z. AND J. TO L. M. N. ABOUT
R FROM T. W. F. H. C. C. Sh Sh Kommersant S B E. YU I BUT B. IN G. D. E. E. J. Z. AND J. TO L. M. N. ABOUT P
FROM T. W. F. H. C. C. Sh Sh Kommersant S B E. YU I BUT B. IN G. D. E. E. J. Z. AND J. TO L. M. N. ABOUT P R
T. W. F. H. C. C. Sh Sh Kommersant S B E. YU I BUT B. IN G. D. E. E. J. Z. AND J. TO L. M. N. ABOUT P R FROM
W. F. H. C. C. Sh Sh Kommersant S B E. YU I BUT B. IN G. D. E. E. J. Z. AND J. TO L. M. N. ABOUT P R FROM T.
F. H. C. C. Sh Sh Kommersant S B E. YU I BUT B. IN G. D. E. E. J. Z. AND J. TO L. M. N. ABOUT P R FROM T. W.
H. C. C. Sh Sh Kommersant S B E. YU I BUT B. IN G. D. E. E. J. Z. AND J. TO L. M. N. ABOUT P R FROM T. W. F.
C. C. Sh Sh Kommersant S B E. YU I BUT B. IN G. D. E. E. J. Z. AND J. TO L. M. N. ABOUT P R FROM T. W. F. H.
C. Sh Sh Kommersant S B E. YU I BUT B. IN G. D. E. E. J. Z. AND J. TO L. M. N. ABOUT P R FROM T. W. F. H. C.
Sh Sh Kommersant S B E. YU I BUT B. IN G. D. E. E. J. Z. AND J. TO L. M. N. ABOUT P R FROM T. W. F. H. C. C.
Sh Kommersant S B E. YU I BUT B. IN G. D. E. E. J. Z. AND J. TO L. M. N. ABOUT P R FROM T. W. F. H. C. C. Sh
Kommersant S B E. YU I BUT B. IN G. D. E. E. J. Z. AND J. TO L. M. N. ABOUT P R FROM T. W. F. H. C. C. Sh Sh
S B E. YU I BUT B. IN G. D. E. E. J. Z. AND J. TO L. M. N. ABOUT P R FROM T. W. F. H. C. C. Sh Sh Kommersant
B E. YU I BUT B. IN G. D. E. E. J. Z. AND J. TO L. M. N. ABOUT P R FROM T. W. F. H. C. C. Sh Sh Kommersant S
E. YU I BUT B. IN G. D. E. E. J. Z. AND J. TO L. M. N. ABOUT P R FROM T. W. F. H. C. C. Sh Sh Kommersant S B
YU I BUT B. IN G. D. E. E. J. Z. AND J. TO L. M. N. ABOUT P R FROM T. W. F. H. C. C. Sh Sh Kommersant S B E.
I BUT B. IN G. D. E. E. J. Z. AND J. TO L. M. N. ABOUT P R FROM T. W. F. H. C. C. Sh Sh Kommersant S B E. YU
The note
Semantic layout - what is it?
Why and who needs a semantic layout?
Semantic HTML for web developers
Semantic code for users
Semantic HTML for cars