Добавил:
ivanov666
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз:
Предмет:
Файл:English for professional communication in information technology.pdf
X
- •Desktop
- •LISTENING
- •SETTING THE CONTEXT
- •1. Why are programs saved in a different format than the human readable programming languages that they are written in?
- •2. What are some of the programs that your computer is running even when you’re not touching it?
- •8. In an ERD (Entity Relationship Diagram) ___
- •Types of Algorithm
- •1. Do you think a computer can detect images as well as a person can?
- •2. Why should we use image detection and recognition?
- •1. What is image recognition?
- •2. How does image recognition work?
- •3. How image recognition is used in business?
- •4. What are the benefits of image recognition?
- •Image Recognition
- •Manual vs. automated testing
- •Integration tests
- •Functional tests
- •End-to-end tests
- •Acceptance testing
- •Performance testing
- •Smoke testing
- •How to automate your tests?
- •Exploratory testing
- •Exercise 2
- •To err is human, but ...
- •1. Why is cybersecurity important? Try to name as many reasons as possible.
- •2. Did you know that there is a hacker attack every 39 seconds? Does this information make you feel scared?
- •3. Read the following brainy quote. How do you understand it? Express your views on it.
- •1. Cybersecurity investigations are of a great importance because ___
- •2. What has happened to many unmanned aerial drones in the last few years? They have been ___
- •3. What are the people committing cybercrimes like?
|
|
|
|
4. |
uploading photos |
careful, dangerous |
be |
|
and videos of |
|
|
|
yourself |
|
|
|
|
|
|
5. |
you/ people |
rude |
(not) be |
|
|
|
|
6. |
friends |
online |
(not) make |
|
|
|
|
7. |
what you |
careful |
be, (not) open, |
|
download, |
|
|
|
attachment form a |
|
|
|
stranger |
|
|
8. |
information on the |
false |
Be, (not) believe |
|
internet, |
|
|
|
everything |
|
|
|
|
|
|
WRITING
Write down the rules you have just worked out for a Safety Rules on Using Websites manual. You can add some more.
LISTENING
SETTING THE CONTEXT
1.Why is cybersecurity important? Try to name as many reasons as possible.
2.Did you know that there is a hacker attack every 39 seconds? Does this information make you feel scared?
3.Read the following brainy quote. How do you understand it? Express your views on it.
ACTIVATING VOCABULARY
135
Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]
