КАТЕГОРИИ: Архитектура-(3434)Астрономия-(809)Биология-(7483)Биотехнологии-(1457)Военное дело-(14632)Высокие технологии-(1363)География-(913)Геология-(1438)Государство-(451)Демография-(1065)Дом-(47672)Журналистика и СМИ-(912)Изобретательство-(14524)Иностранные языки-(4268)Информатика-(17799)Искусство-(1338)История-(13644)Компьютеры-(11121)Косметика-(55)Кулинария-(373)Культура-(8427)Лингвистика-(374)Литература-(1642)Маркетинг-(23702)Математика-(16968)Машиностроение-(1700)Медицина-(12668)Менеджмент-(24684)Механика-(15423)Науковедение-(506)Образование-(11852)Охрана труда-(3308)Педагогика-(5571)Полиграфия-(1312)Политика-(7869)Право-(5454)Приборостроение-(1369)Программирование-(2801)Производство-(97182)Промышленность-(8706)Психология-(18388)Религия-(3217)Связь-(10668)Сельское хозяйство-(299)Социология-(6455)Спорт-(42831)Строительство-(4793)Торговля-(5050)Транспорт-(2929)Туризм-(1568)Физика-(3942)Философия-(17015)Финансы-(26596)Химия-(22929)Экология-(12095)Экономика-(9961)Электроника-(8441)Электротехника-(4623)Энергетика-(12629)Юриспруденция-(1492)Ядерная техника-(1748) |
The writing Module. VIII. Reading Exercises:
THE SPEAKING MODULE After text activity VIII. Reading Exercises: Exercise 1. Read and memorize using a dictionary:
Exercise 2. Answer the questions: 1) What is a virtual machine? 2) What issue does log-term storage force us to face? 3) What is an authentication mechanism? 4) What are passwords passed through in some systems? 5) Who suggested the idea of a hard-to-invert transformation?
Exercise 4. Match the left part with the right:
II. Speaking Exercises: Exercise 1. Define the terms using the suggested words and expressionsas in example:
EXAMPLE: Information science is a discipline that deals with the processes of storing and transferring information. Exercise 2. Ask questions to the given answers: 1) Question: ___________________________________________? Answer: There are, of course, many possible elaborations and embellishments of this basic strategy.
2) Question: ___________________________________________? Answer: In cases where the typing of the password may be observed, passwords may be good for only one use, and the user carries a list of passwords, crossing each one off the list as he uses it. 3) Question: ___________________________________________? Answer: Passwords may have an expiration date, or usage count, to limit the length of usefulness of a compromised one.
Writing exercises: Exercise 1. Fill in the gaps with the suggested words:
Long-term storage does, however, force us to____ one further issue. Suppose that the virtual machine ________with its user through a typewriter terminal. If a new______ approaches a previously unused terminal and requests to______ a virtual machine, which virtual machine (and, therefore, which set of long-term stored information) should he be______ to use?
Exercise 2. Compose a story on one of the topics (up to 100 words): 1) Passwords and their drawbacks 2) Authentication mechanisms
Lesson 9
Дата добавления: 2015-08-31; Просмотров: 144; Нарушение авторских прав?; Мы поможем в написании вашей работы! Нам важно ваше мнение! Был ли полезен опубликованный материал? Да | Нет |