Information and Security
Download 1.31 Mb. Pdf ko'rish
|
Information and security
- Bu sahifa navigatsiya:
- Vocabulary
Grammar Adjectives and Adverbs formation Vocabulary Using Adjectives and Adverbs
Talking about copyright
Chart Description
Survey Interview
Information Attack
What is the message of the picture? Is there any relationship between humanity and information?
3 Work in pairs and discuss the following questions: What other ways of treatments or preventions do you know? Which of the given pictures best describes the concept of “ Copyright Infringement” ? Why?
4 (T2) Listen to the survey interview. Decide which University students have been interviewed and list them down. ____________________________________ ____________________________________ ____________________________________ 5 Write the names of students with the questions
they have answered. 1. How do you understand IT attacks? 2. How can we get protected from IT attacks? 3. How do you understand Intellectual Property? 4. How can we protect Intellectual Properties? 5. How do you understand Ideological Pressure? 6. How can we protect our youth from Ideological Pressures?
6 Work in groups of 3 or 4. Give examples of a Copyright Infringement which you have heard
or witnessed. Discuss them. What were the consequences?
7 Write adverbs for the given adjectives and make up sentences using them. Confidential Dramatic Critical Suspicious Artificial
8 Read the text, choose and circle the appropriate heading for each paragraph Headings: 1 Dangers of Virtual World/Stealing Information/ Hacking 2 Information for Business/Infringement of Copyright is Illegal/Intellectual Property 3 Ideological Pressure/Ideology is Bad/Ideology is a Set of Ideas 4 Information is Speeding/Difference between Attacks/Introduction
51% of Internet traffic is “ non
- human”. 31% is made up from hacking programs, spammers and malicious phishing. It would take 1 , 000 , 000 human brains to store all of the information that can be found in the Internet.
9 Look at the following chart and answer the question.
What is the chart about/what does it show?
Choose one of the alternatives for the title.
a. Statistics of data loss b. Rate of data loss
c. Data breach rates Answer the questions.
What type of diagram is it? Which industry suffers most? Which sphere is recorded with the least rate of data breach? Which industry is represented as in the second place by lose? Why do you think government/military sphere has a little breach?
10 Write a description of the chart using the given adverbs.
11 Draw a pie chart with imaginative percentage of Internet users by
age (the elderly aged, middle-aged, adults, teenagers, the young
etc) in Uzbekistan. And write an essay within 150 words.
REFERENCES 1. J.Hughes, K.Wood.” Navigate” Elementary A2 Coursebook. © Oxford University Press, 2015. 2. C.Tabor.” Navigate” Elementary A2 Workbook. © Oxford University Press, 2015. 3. N.Qambarov, E.Muratova. “Scale Up” Student’s Book, course 1. © G.G’ulom Publishing House. Tashkent 2015 Download 1.31 Mb. Do'stlaringiz bilan baham: |
ma'muriyatiga murojaat qiling