Студопедия

КАТЕГОРИИ:


Архитектура-(3434)Астрономия-(809)Биология-(7483)Биотехнологии-(1457)Военное дело-(14632)Высокие технологии-(1363)География-(913)Геология-(1438)Государство-(451)Демография-(1065)Дом-(47672)Журналистика и СМИ-(912)Изобретательство-(14524)Иностранные языки-(4268)Информатика-(17799)Искусство-(1338)История-(13644)Компьютеры-(11121)Косметика-(55)Кулинария-(373)Культура-(8427)Лингвистика-(374)Литература-(1642)Маркетинг-(23702)Математика-(16968)Машиностроение-(1700)Медицина-(12668)Менеджмент-(24684)Механика-(15423)Науковедение-(506)Образование-(11852)Охрана труда-(3308)Педагогика-(5571)Полиграфия-(1312)Политика-(7869)Право-(5454)Приборостроение-(1369)Программирование-(2801)Производство-(97182)Промышленность-(8706)Психология-(18388)Религия-(3217)Связь-(10668)Сельское хозяйство-(299)Социология-(6455)Спорт-(42831)Строительство-(4793)Торговля-(5050)Транспорт-(2929)Туризм-(1568)Физика-(3942)Философия-(17015)Финансы-(26596)Химия-(22929)Экология-(12095)Экономика-(9961)Электроника-(8441)Электротехника-(4623)Энергетика-(12629)Юриспруденция-(1492)Ядерная техника-(1748)

The writing Module. Exercise 1. Read and memorize using a dictionary: Insight, multiuser system, access control list system




THE SPEAKING MODULE

After text activity

V. Reading Exercises:

Exercise 1. Read and memorize using a dictionary:

Insight, multiuser system, access control list system, to handle the situation, to extend, superficially explored, arbitrary, to acquire information, emphasis, indirect, partition, mutually, uniformity, to demand, authority check

Exercise 2. Answer the questions:

1) What does a multiuser system do?

2) What does a model of protected subsystems allow?

3) What is information divided into?

4) What are the fundamental objects to be protected?

5) How authority check is usually implemented?

 

Exercise 4. Match the left part with the right:

1 Our first model is of a multiuser a) be lowered in a controlled way to allow limited sharing of information between users.
2. We shall then see how the logically perfect walls of that system can   b) system that completely isolates its users from one another.
3. Section II of this paper generalizes the mechanics of   c) dynamic situation in which authorizations can change under control of the programs running inside the system.
4. It then extends these two models to handle the d) sharing using two different models: the capability system and the access control list system.

II. Speaking Exercises:

Exercise 1. Define the terms using the suggested words and expressionsas in example:

Information science Database management system Operating system CPU
discipline, deals with, processes, storing, transferring, information system quick search retrieval information from database software, keeps track, files, controls, processing computer programs principal, component, composed control unit, instruction-decoding unit, arithmetic-logic unit

 

EXAMPLE: Information science is a discipline that deals with the processes of storing and transferring information.

Exercise 2. Ask questions to the given answers:

1) Question: ___________________________________________?

Answer: Conceptually, then, it is necessary to build an impenetrable wall around each distinct object that warrants separate protection, construct a door in the wall through which access can be obtained, and post a guard at the door to control its use.

2) Question: ___________________________________________?

Answer: Control of use, however, requires that the guard have some way of knowing which users are authorized to have access, and that each user have some reliable way of identifying himself to the guard.

3) Question: ___________________________________________?

Answer: Both protection and authentication mechanisms can be viewed in terms of this general model.

 

Writing exercises:

Exercise 1. Fill in the gaps with the suggested words:

Real, protection, concepts, ways, begin, approach

At this point we _____a development of the technical basis of information________ in modern computer systems. There are two____ to approach the subject: from the top down, emphasizing the abstract _______involved, or from the bottom up, identifying insights by, studying example systems. We shall follow the bottom-up____, introducing a series of models of systems as they are, (or could be) built in_____ life.

 

Exercise 2. Compose a story on one of the topics (up to 100 words):

1) The Essentials of Information Protection

2) Technical basis of information protection in modern computer systems

 

 

Lesson 6




Поделиться с друзьями:


Дата добавления: 2015-08-31; Просмотров: 190; Нарушение авторских прав?; Мы поможем в написании вашей работы!


Нам важно ваше мнение! Был ли полезен опубликованный материал? Да | Нет



studopedia.su - Студопедия (2013 - 2024) год. Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав! Последнее добавление




Генерация страницы за: 0.009 сек.