КАТЕГОРИИ: Архитектура-(3434)Астрономия-(809)Биология-(7483)Биотехнологии-(1457)Военное дело-(14632)Высокие технологии-(1363)География-(913)Геология-(1438)Государство-(451)Демография-(1065)Дом-(47672)Журналистика и СМИ-(912)Изобретательство-(14524)Иностранные языки-(4268)Информатика-(17799)Искусство-(1338)История-(13644)Компьютеры-(11121)Косметика-(55)Кулинария-(373)Культура-(8427)Лингвистика-(374)Литература-(1642)Маркетинг-(23702)Математика-(16968)Машиностроение-(1700)Медицина-(12668)Менеджмент-(24684)Механика-(15423)Науковедение-(506)Образование-(11852)Охрана труда-(3308)Педагогика-(5571)Полиграфия-(1312)Политика-(7869)Право-(5454)Приборостроение-(1369)Программирование-(2801)Производство-(97182)Промышленность-(8706)Психология-(18388)Религия-(3217)Связь-(10668)Сельское хозяйство-(299)Социология-(6455)Спорт-(42831)Строительство-(4793)Торговля-(5050)Транспорт-(2929)Туризм-(1568)Физика-(3942)Философия-(17015)Финансы-(26596)Химия-(22929)Экология-(12095)Экономика-(9961)Электроника-(8441)Электротехника-(4623)Энергетика-(12629)Юриспруденция-(1492)Ядерная техника-(1748) |
The writing Module. Exercise 1. Read and memorize using a dictionary: authority, key concern, simultaneous, application
THE SPEAKING MODULE After text activity I. Reading Exercises: Exercise 1. Read and memorize using a dictionary:
Exercise 2. Answer the questions: 1) What do many of new applications involve? 2) What examples of protection of information are there in the text? 3) What do all these examples have in common? 4) What words are frequently used in connection with information-storing systems? 5) What does the term “privacy” denote?
Exercise 4. Match the left part with the right:
II. Speaking Exercises: Exercise 1. Define the terms using the suggested words and expressionsas in example:
EXAMPLE: Information science is a discipline that deals with the processes of storing and transferring information. Exercise 2. Ask questions to the given answers: 1) Question: ___________________________________________? Answer: Of course, in some applications no special provisions in the computer system are necessary.
2) Question: ___________________________________________? Answer: An externally administered code of ethics or a lack of knowledge about computers adequately protects the stored information.
3) Question: ___________________________________________? Answer: Although there are situations in which the computer need provide no aids to ensure protection of information, often it is appropriate to have the computer enforce a desired authority structure.
Writing exercises: Exercise 1. Fill in the gaps with the suggested words:
As computers_______ better understood and more economical, every day brings _____applications. Many of these new applications________ both storing information and simultaneous use by________ individuals. The key concern in this paper is multiple use. For those applications in_______ all users should not have identical authority, some scheme is needed to__________ that the computer system implements the desired________ structure.
Exercise 2. Compose a story on one of the topics (up to 100 words): 1. Principles of information protection 2. Concept of “Privacy”
Lesson 2
Дата добавления: 2015-08-31; Просмотров: 215; Нарушение авторских прав?; Мы поможем в написании вашей работы! Нам важно ваше мнение! Был ли полезен опубликованный материал? Да | Нет |