КАТЕГОРИИ: Архитектура-(3434)Астрономия-(809)Биология-(7483)Биотехнологии-(1457)Военное дело-(14632)Высокие технологии-(1363)География-(913)Геология-(1438)Государство-(451)Демография-(1065)Дом-(47672)Журналистика и СМИ-(912)Изобретательство-(14524)Иностранные языки-(4268)Информатика-(17799)Искусство-(1338)История-(13644)Компьютеры-(11121)Косметика-(55)Кулинария-(373)Культура-(8427)Лингвистика-(374)Литература-(1642)Маркетинг-(23702)Математика-(16968)Машиностроение-(1700)Медицина-(12668)Менеджмент-(24684)Механика-(15423)Науковедение-(506)Образование-(11852)Охрана труда-(3308)Педагогика-(5571)Полиграфия-(1312)Политика-(7869)Право-(5454)Приборостроение-(1369)Программирование-(2801)Производство-(97182)Промышленность-(8706)Психология-(18388)Религия-(3217)Связь-(10668)Сельское хозяйство-(299)Социология-(6455)Спорт-(42831)Строительство-(4793)Торговля-(5050)Транспорт-(2929)Туризм-(1568)Физика-(3942)Философия-(17015)Финансы-(26596)Химия-(22929)Экология-(12095)Экономика-(9961)Электроника-(8441)Электротехника-(4623)Энергетика-(12629)Юриспруденция-(1492)Ядерная техника-(1748) |
The writing Module. Exercise 1. Read and memorize using a dictionary: Insight, multiuser system, access control list system
THE SPEAKING MODULE After text activity V. Reading Exercises: Exercise 1. Read and memorize using a dictionary:
Exercise 2. Answer the questions: 1) What does a multiuser system do? 2) What does a model of protected subsystems allow? 3) What is information divided into? 4) What are the fundamental objects to be protected? 5) How authority check is usually implemented?
Exercise 4. Match the left part with the right:
II. Speaking Exercises: Exercise 1. Define the terms using the suggested words and expressionsas in example:
EXAMPLE: Information science is a discipline that deals with the processes of storing and transferring information. Exercise 2. Ask questions to the given answers: 1) Question: ___________________________________________? Answer: Conceptually, then, it is necessary to build an impenetrable wall around each distinct object that warrants separate protection, construct a door in the wall through which access can be obtained, and post a guard at the door to control its use. 2) Question: ___________________________________________? Answer: Control of use, however, requires that the guard have some way of knowing which users are authorized to have access, and that each user have some reliable way of identifying himself to the guard. 3) Question: ___________________________________________? Answer: Both protection and authentication mechanisms can be viewed in terms of this general model.
Writing exercises: Exercise 1. Fill in the gaps with the suggested words:
At this point we _____a development of the technical basis of information________ in modern computer systems. There are two____ to approach the subject: from the top down, emphasizing the abstract _______involved, or from the bottom up, identifying insights by, studying example systems. We shall follow the bottom-up____, introducing a series of models of systems as they are, (or could be) built in_____ life.
Exercise 2. Compose a story on one of the topics (up to 100 words): 1) The Essentials of Information Protection 2) Technical basis of information protection in modern computer systems
Lesson 6
Дата добавления: 2015-08-31; Просмотров: 203; Нарушение авторских прав?; Мы поможем в написании вашей работы! Нам важно ваше мнение! Был ли полезен опубликованный материал? Да | Нет |