Студопедия

КАТЕГОРИИ:


Архитектура-(3434)Астрономия-(809)Биология-(7483)Биотехнологии-(1457)Военное дело-(14632)Высокие технологии-(1363)География-(913)Геология-(1438)Государство-(451)Демография-(1065)Дом-(47672)Журналистика и СМИ-(912)Изобретательство-(14524)Иностранные языки-(4268)Информатика-(17799)Искусство-(1338)История-(13644)Компьютеры-(11121)Косметика-(55)Кулинария-(373)Культура-(8427)Лингвистика-(374)Литература-(1642)Маркетинг-(23702)Математика-(16968)Машиностроение-(1700)Медицина-(12668)Менеджмент-(24684)Механика-(15423)Науковедение-(506)Образование-(11852)Охрана труда-(3308)Педагогика-(5571)Полиграфия-(1312)Политика-(7869)Право-(5454)Приборостроение-(1369)Программирование-(2801)Производство-(97182)Промышленность-(8706)Психология-(18388)Религия-(3217)Связь-(10668)Сельское хозяйство-(299)Социология-(6455)Спорт-(42831)Строительство-(4793)Торговля-(5050)Транспорт-(2929)Туризм-(1568)Физика-(3942)Философия-(17015)Финансы-(26596)Химия-(22929)Экология-(12095)Экономика-(9961)Электроника-(8441)Электротехника-(4623)Энергетика-(12629)Юриспруденция-(1492)Ядерная техника-(1748)

The writing Module. Exercise 1. Read and memorize using a dictionary: authority, key concern, simultaneous, application




THE SPEAKING MODULE

After text activity

I. Reading Exercises:

Exercise 1. Read and memorize using a dictionary:

authority, key concern, simultaneous, application, multiple use, to implement, to withhold, to preserve, privacy, security, to restrict the access, processing systems, provision, to denote, to encounter

Exercise 2. Answer the questions:

1) What do many of new applications involve?

2) What examples of protection of information are there in the text?

3) What do all these examples have in common?

4) What words are frequently used in connection with information-storing systems?

5) What does the term “privacy” denote?

 

Exercise 4. Match the left part with the right:

1 The words "privacy," "security," and "protection" are frequently   a) a socially defined ability of an individual (or organization) to determine whether, when, and to whom personal (or organizational) information is to be released.
2. The term "privacy" denotes     b) definitions commonly encountered in computer science literature.
3. This paper uses   c) used in connection with information-storing systems.
4. Not all authors use these terms d) in the same way.

 

II. Speaking Exercises:

Exercise 1. Define the terms using the suggested words and expressionsas in example:

Information science Privacy   Application   Information
discipline, deals with, processes, storing, transferring, information denote, socially, defined, ability, individual, organization. Determine, whether, when, whom, information, to be, released. piece, software, designed, to carry out, particular task data, processed, stored, transmitted, by, computer

 

EXAMPLE: Information science is a discipline that deals with the processes of storing and transferring information.

Exercise 2. Ask questions to the given answers:

1) Question: ___________________________________________?

Answer: Of course, in some applications no special provisions in the computer system are necessary.

 

 

2) Question: ___________________________________________?

Answer: An externally administered code of ethics or a lack of knowledge about computers adequately protects the stored information.

 

3) Question: ___________________________________________?

Answer: Although there are situations in which the computer need provide no aids to ensure protection of information, often it is appropriate to have the computer enforce a desired authority structure.

 

 

 

Writing exercises:

Exercise 1. Fill in the gaps with the suggested words:

authority, ensure, which, several, involve, become, new

As computers_______ better understood and more economical, every day brings _____applications. Many of these new applications________ both storing information and simultaneous use by________ individuals. The key concern in this paper is multiple use. For those applications in_______ all users should not have identical authority, some scheme is needed to__________ that the computer system implements the desired________ structure.

 

Exercise 2. Compose a story on one of the topics (up to 100 words):

1. Principles of information protection

2. Concept of “Privacy”

 

Lesson 2




Поделиться с друзьями:


Дата добавления: 2015-08-31; Просмотров: 197; Нарушение авторских прав?; Мы поможем в написании вашей работы!


Нам важно ваше мнение! Был ли полезен опубликованный материал? Да | Нет



studopedia.su - Студопедия (2013 - 2024) год. Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав! Последнее добавление




Генерация страницы за: 0.007 сек.