Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
basic for engeneers Info sec last version.doc
Скачиваний:
7
Добавлен:
01.05.2025
Размер:
1.84 Mб
Скачать

Introduction

You can use the text as a basis for presenting the unit orally or for asking students to read it through themselves.

Presentation

I Ask the students to read through the presentation and explanation of the language area.

II Get them to give you additional examples of the language presented.

Controlled Practice

I Ask students to complete the exercises and then check their answers with the Key.

II Advise on alternative answers or give more practice where necessary.

Transfer

Most of these exercises involve pairwork.

I Divide the class into pairs.

II Assign roles (Student A and Student B). Make sure they only look at their

role/information (Student B's information is always in the Key Section).

III Monitor the pairs while they carry out the transfer activity, prompting the use of practiсed language if necessary.

Word Check

The glossary only provides definitions, since examples would necessarily be too subject specific. Students should be encouraged to provide their own examples from their own fields.

Notes to the Student

WHO IS IT FOR?

This material is for students who have some previous knowledge of English and wish to practice it in a technical context. It can be used by students working alone; as self-study or homework material during a Technical English course; or as follow-up material after a Technical English course.

SELECTION OF MATERIAL

You can work through the material starting at Unit 1. Alternatively, you can choose units on the basis of the topic or language area (see Contents page).

Some Units include Listening tasks and Grammar practice to provide the developing of speaking skills and proper usage of grammar structures.

unit 1 Protecting your Computer System

(obligation and permission - modals)

Introduction

This unit looks at different ways of protecting a computer system. It considers how access can be limited to authorized users, and suggests ways of achieving this.

  1. Listening

You are going to hear a discussion between a data processing manager and a computer consultant. The data processing manager is telling the computer consultant what security requirements his company needs for their computer equipment. The consultant has a checklist which shows different features suitable for a variety of systems. As you listen tick the appropriate column in the checklist. You need to decide whether the security feature is Necessary, Unnecessary, Permitted/Possible or Not Permitted/Impossible for the manager's computer system.

1 Presentation

The table below shows the words used to express what is:

  1. NECESSARY /NOT NECESSARY

  2. POSSIBLE/NOT POSSIBLE

  3. PERMITTED/NOT PERMITTED

NECESSARY NOT NECESSARY

must needn't

need to don't

doesn't

POSSIBLE NOT POSSIBLE

can mustn't

can't

PERMITTED NOT PERMITTED

maу may not

can can't/cannot

mustn't

Notes

need is used both as a modal and a full-verb.

As a modal it is normally used only in the negative and is followed by an infinitive

without to, e.g. We needn't provide total protection for hardware and software.

As a full-verb it is followed by an infinitive with to, e.g. But I need to know more about control of access.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]