Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

I. Repeat the words after the teacher

V. Give Russian equivalents | X. Insert the proper words (see the words below) | Confidentiality | Risk management | VIII. Insert prepositions | XI. Give English equivalents | XI. Say in one word (see the words below) | X. Give English equivalents | I. Read and translate the information using the vocabulary | VII. Insert the proper words (see the words below) |


Читайте также:
  1. A conversation between a TEFL professor and a student after class
  2. A FEW WORDS ABOUT OPERATING A BUSINESS
  3. A new gym Teacher.
  4. A repeated action in the past
  5. A syntactic word-group is a combination of words forming one part of the sentence.
  6. A TEACher of ENGLish
  7. A Teacher’s Lot Is Certainly a Different One

unauthorized, disclosure, perusal, assurance, subtle, methodologies, financial, law suit, bankruptcy, ethical, allied, continuity, science, confidentiality, cipher, B. C., numerous, occurrence, reliability

 

II. Read and translate the information using the vocabulary

 

III. Translate the verbs, give the three forms

mean, protect, use, modify, inspect, record, change, share, approach, concern, print, ensure, store, amass, collect, process, transmit, fall, lead, require, view, apply, grow, evolve, include, test, present, understand, detect, invent, create, prevent, see, encrypt, equip, become, emerge

 

IV. Give Russian equivalents

protecting information, unauthorized access, disclosure and disruption, modification and perusal, share the common goals, availability of information, subtle difference, approach to the subject, ensuring correct operation, information stored or processed, employees and customers, fall into the hands of a competitor, breach of security, law suits, legal requirement, evolved significantly, gain entry, forensics science, detect tampering, is credited with the invention, fall into the wrong hands, rapid advancements, hardware and software, data processing, numerous occurrences, reliability of information

 

V. Give the derivatives of the words, translate them

close, modify, sure, confident, method, employ, require, special, apply, advance, hard, soft, encrypt, net, grow

 

VI. Arrange the following in pairs of synonyms

1. approximately a. advancement

2. area b. appear

3. auditing c. ca.

4. common d. checking

5. create e. core

6. demand f. detect

7. develop g. equipment

8. development h. evolve

9. emerge i. field

10. employee j. gain

11. find k. general

12. grow l. incident

13. hardware m. increase

14. main n. make

15. occurrence o. perusal

16. powerful p. requirement

17. reading q. strong

18. receive r. subtle

19. small s. worker

 

VII. Answer about the article Information security

1. What is information security?

2. What fields share the common goals of protecting information?

3. Where is the difference between them?

4. What is information security concerned with?

5. What is computer security concerned with?

6. What information is now stored on electronic computers?

7. Why shouldn’t confidential information fall into the hands of a competitor?

8. In what fields of information security can a person work?

9. Who was the first to use the cipher to protect the confidentiality of written correspondence?

10. When was the first cipher used?

11. Why was the cipher created?

12. What caused the need for better methods of protecting the computers and information they store?

 


Дата добавления: 2015-11-14; просмотров: 50 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
VIII. Say in one word (see the words below)| IX. Insert the proper words (see the words below)

mybiblioteka.su - 2015-2024 год. (0.006 сек.)