Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
info_safe.doc
Скачиваний:
4
Добавлен:
13.11.2018
Размер:
240.13 Кб
Скачать
  1. Reading Exercises:

Exercise 1. Read and memorize using a dictionary:

authority, key concern, simultaneous, application, multiple use, to implement, to withhold, to preserve, privacy, security, to restrict the access, processing systems, provision, to denote, to encounter

Exercise 2. Answer the questions:

  1. What do many of new applications involve?

  2. What examples of protection of information are there in the text?

  3. What do all these examples have in common?

  4. What words are frequently used in connection with information-storing systems?

  5. What does the term “privacy” denote?

Exercise 4. Match the left part with the right:

1 The words "privacy," "security," and "protection" are frequently

a) a socially defined ability of an individual (or organization) to determine whether, when, and to whom personal (or organizational) information is to be released.

2. The term "privacy" denotes

b) definitions commonly encountered in computer science literature.

3. This paper uses

c) used in connection with information-storing systems.

4. Not all authors use these terms

d) in the same way.

THE SPEAKING MODULE

II. Speaking Exercises:

Exercise 1. Define the terms using the suggested words and expressions as in example:

Information science

Privacy

Application

Information

discipline, deals with, processes, storing,transferring, information

denote, socially, defined, ability, individual, organization. Determine, whether, when, whom, information, to be, released.

piece, software, designed, to carry out, particular task

data, processed, stored, transmitted, by, computer

EXAMPLE: Information science is a discipline that deals with the processes of storing and transferring information.

Exercise 2. Ask questions to the given answers:

1)Question: ___________________________________________ ?

Answer: Of course, in some applications no special provisions in the computer system are necessary.

2) Question: ___________________________________________ ?

Answer: An externally administered code of ethics or a lack of knowledge about computers adequately protects the stored information.

3)Question: ___________________________________________ ?

Answer: Although there are situations in which the computer need provide no aids to ensure protection of information, often it is appropriate to have the computer enforce a desired authority structure.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]