Of the Republic o f Uzbekistan State University of World Languages scale up


or witnessed. Discuss them. What were the


Download 4.21 Mb.
Pdf ko'rish
bet11/82
Sana03.11.2023
Hajmi4.21 Mb.
#1744837
1   ...   7   8   9   10   11   12   13   14   ...   82
Bog'liq
Scale UP Students book Course 1

or witnessed. Discuss them. What were the 
consequences?
51% of Internet traffic is “non-human”. 31% is
Г * /
made up from hacking programs, spammers 
and malicious phishing.
It would take 1,000,000 human brains to store 
all of the information that can be found in the 
Internet.

Write adverbs for the given adjectives and make up sentences using them.
Adjective
Adverb
Example
Confidential
e.g. confidentially
The information was used confidentially
Dramatic
Critical
Suspicious
Traditional
Extreme
Artificial
naturally 
hardly 
rapidly 
happily 
ideologically 
well artificially 
openly 
spiritually 
primarily 
dramatically 
completely 
immediately
7 Fill in the gaps with appropriate adverbs from 
the box. There are more adverbs than the 
gaps.
1.
2
.
3.
4.
5.
If somewhere there is an ideological gap, it is
_____________ ruled over by an alien ideology.
We should_______admit that our goal is to win
hearts of people,______________of the youth.
When ideologists affect nations or peoples 
mentality in a definite country or region, they
may change even behaviors________________ .
Certain states and political groups try to influence
people_____________________________.
Ideological pressure i s __________ recognized
while economic and political forces are felt___


8
Work in pairs. Read the statement and discuss it.
I Ideological attack is more powerful than military assault J
9 Read the text, choose and circie the appropriate heading for each paragraph.
ЩШ
V


:
Headings:
1. Dangers of Virtual World/Stealing Information/ 
Hacking
2. Information for Business/Infringement of Copy­
right is Illegal/Intellectual Property
3. Ideological Pressure/Ideology is Bad/Ideology is 
a Set of Ideas
4. Information is Speeding/Difference between At­
tacks/Introduction
a. As there are advantages and disadvantages of 
every invention, sphere, and revolution, speeding 
of information also has two sides. When something 
happens or is discovered or invented in one corner 
of our planet, the whole world learns about it 
immediately. But there is a notion of information 
attack. It can be understood in two ways; the first 
interpretation is “attack to information” and the 
second is “attack somebody or something with 
the help of information”. Both of them are more 
dangerous showing catastrophic consequences 
than any type of attack with weapons or tanks.
b. Attack to information is penetrating into ones 
PC and monitoring, snooping, spying, stealing
■ill!
information and so on. The worst site is that is 
easy to hack (steal) your information virtually and 
even you do not know when, how and who hacked 
and usually you cannot mind the event or object to. 
But Spying is sometimes legal, because you click 
on “I accept” in the licence agreements written in 
small prints even not reading.
c. Information threat in business purposes also 
exists; it can be understood as attack to intellectual 
property. What is an intellectual property? Simply, 
we can say that it is someone else’s intellectual 
working results such as musical, literary, and 
artistic works; discoveries and inventions; and 
words, phrases, symbols (trademarks), and designs. 
But owners usually suffer from not being able to 
prove that idea was originally created by them. 
File swapping with your friend is also against law.
d. Attack with the help of information is making 
someone or group of people accept someone’s 
ideas, set of beliefs or ideological views; especially 
it is made with pressure in different ways. Those 
ways may be encouraging, persuading or even 
financially supporting.
10 Continue the mind map using the data from the text.


11 Look 

5
t
What is the chart about/what does it show?______________
12
a. 
Statistics of data loss
b. 
Rate of data loss
c. 
Data breach rates
13 Answer the questions.
1. What type of diagram is it?
2. Which industry suffers most?
3. Which sphere is recorded with the least rate of data breach?
4. Which industry is represented as in the second place by lose?
5. Why do you think government/military sphere has a little breach?
14 Write a description of the chart using the given adverbs.
title
Introduction
The
shows
Body
Compare & 
Contrast
_in percentages.
Loss of government profits a n d __
same w ith ________ % and 10.7 %.
quite
respectively
extremely
significantly
segments are almost the
Conclusion
15 Draw a pie chart with imaginative percentage of internet users by 
age (the elderly aged, middle-aged, adults, teenagers, the young 
etc) in Uzbekistan. And write an essay within 150 words.


Lesson 3
STUDYING WITH MULTIPLE SOURCES
1 Fill in the gaps using the words from the box.
contend stumble undoubtedly commonalities 
conception route
1. Additional readings and alternative sources 
undoubtedly 
create a richer understanding.
2. Scientists ____________ that working with a
primary source is more effective then with a 
secondary source.
3. When working with a single source you may 
upon unclear information.
4. Learners should discern the ________________
between materials.
5. When surfing through different sources, relating 
materials to the objective, helps to form a clear 
of idea.
6. Secondary source materials are more indirect
_______________to the same information than a
primary source.

Download 4.21 Mb.

Do'stlaringiz bilan baham:
1   ...   7   8   9   10   11   12   13   14   ...   82




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling