Of the Republic o f Uzbekistan State University of World Languages scale up
or witnessed. Discuss them. What were the
Download 4.21 Mb. Pdf ko'rish
|
Scale UP Students book Course 1
- Bu sahifa navigatsiya:
- 7 Fill in the gaps with appropriate adverbs from the box. There are more adverbs than the gaps.
- Fill in the gaps using the words from the box.
or witnessed. Discuss them. What were the
consequences? 51% of Internet traffic is “non-human”. 31% is Г * / made up from hacking programs, spammers and malicious phishing. It would take 1,000,000 human brains to store all of the information that can be found in the Internet. 6 Write adverbs for the given adjectives and make up sentences using them. Adjective Adverb Example Confidential e.g. confidentially The information was used confidentially Dramatic Critical Suspicious Traditional Extreme Artificial naturally hardly rapidly happily ideologically well artificially openly spiritually primarily dramatically completely immediately 7 Fill in the gaps with appropriate adverbs from the box. There are more adverbs than the gaps. 1. 2 . 3. 4. 5. If somewhere there is an ideological gap, it is _____________ ruled over by an alien ideology. We should_______admit that our goal is to win hearts of people,______________of the youth. When ideologists affect nations or peoples mentality in a definite country or region, they may change even behaviors________________ . Certain states and political groups try to influence people_____________________________. Ideological pressure i s __________ recognized while economic and political forces are felt___ 8 Work in pairs. Read the statement and discuss it. I Ideological attack is more powerful than military assault J 9 Read the text, choose and circie the appropriate heading for each paragraph. ЩШ V ■ - : Headings: 1. Dangers of Virtual World/Stealing Information/ Hacking 2. Information for Business/Infringement of Copy right is Illegal/Intellectual Property 3. Ideological Pressure/Ideology is Bad/Ideology is a Set of Ideas 4. Information is Speeding/Difference between At tacks/Introduction a. As there are advantages and disadvantages of every invention, sphere, and revolution, speeding of information also has two sides. When something happens or is discovered or invented in one corner of our planet, the whole world learns about it immediately. But there is a notion of information attack. It can be understood in two ways; the first interpretation is “attack to information” and the second is “attack somebody or something with the help of information”. Both of them are more dangerous showing catastrophic consequences than any type of attack with weapons or tanks. b. Attack to information is penetrating into ones PC and monitoring, snooping, spying, stealing ■ill! information and so on. The worst site is that is easy to hack (steal) your information virtually and even you do not know when, how and who hacked and usually you cannot mind the event or object to. But Spying is sometimes legal, because you click on “I accept” in the licence agreements written in small prints even not reading. c. Information threat in business purposes also exists; it can be understood as attack to intellectual property. What is an intellectual property? Simply, we can say that it is someone else’s intellectual working results such as musical, literary, and artistic works; discoveries and inventions; and words, phrases, symbols (trademarks), and designs. But owners usually suffer from not being able to prove that idea was originally created by them. File swapping with your friend is also against law. d. Attack with the help of information is making someone or group of people accept someone’s ideas, set of beliefs or ideological views; especially it is made with pressure in different ways. Those ways may be encouraging, persuading or even financially supporting. 10 Continue the mind map using the data from the text. 11 Look , 5 t What is the chart about/what does it show?______________ 12 a. Statistics of data loss b. Rate of data loss c. Data breach rates 13 Answer the questions. 1. What type of diagram is it? 2. Which industry suffers most? 3. Which sphere is recorded with the least rate of data breach? 4. Which industry is represented as in the second place by lose? 5. Why do you think government/military sphere has a little breach? 14 Write a description of the chart using the given adverbs. title Introduction The shows Body Compare & Contrast _in percentages. Loss of government profits a n d __ same w ith ________ % and 10.7 %. quite respectively extremely significantly segments are almost the Conclusion 15 Draw a pie chart with imaginative percentage of internet users by age (the elderly aged, middle-aged, adults, teenagers, the young etc) in Uzbekistan. And write an essay within 150 words. Lesson 3 STUDYING WITH MULTIPLE SOURCES 1 Fill in the gaps using the words from the box. contend stumble undoubtedly commonalities conception route 1. Additional readings and alternative sources undoubtedly create a richer understanding. 2. Scientists ____________ that working with a primary source is more effective then with a secondary source. 3. When working with a single source you may upon unclear information. 4. Learners should discern the ________________ between materials. 5. When surfing through different sources, relating materials to the objective, helps to form a clear of idea. 6. Secondary source materials are more indirect _______________to the same information than a primary source. Download 4.21 Mb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling