Activit Listening task What makes communication easier? a


INFORMATION AND TECHNOLOGY Activity 1



Yüklə 36,93 Kb.
səhifə4/5
tarix25.06.2023
ölçüsü36,93 Kb.
#134987
1   2   3   4   5
Ubiquity of English Activities

2. INFORMATION AND TECHNOLOGY Activity 1


Match the following words and their definitions.

  1. Attack a. Criminal activities carried out by means of computers or the Internet.

  2. Breach b. Act against (someone or something) aggressively in an attempt to injure or kill.

  3. Cybercrime c. A part of a computer system or network which is designed to block

  4. Hacker d. A person who uses computers to gain unauthorized access to data.

  5. Security e. Procedures followed or measures taken to ensure being free from danger or

  6. Confidential f. Make a gap in and break through by attacking.

  7. Firewall threat. g- The possibility of trouble, danger, or ruin.

  8. Threat h. Facts and statistics collected together for reference or analysis.

  9. Data i. Intended to be kept secret

meeting idea social is people of networking face to face and talking to them.
Answers

1

2

3

4

5

6

7

8

9

B

H

A

D

C

J

J

G

F

Activity 2


Write definitions to the words given below, Information society security compile disseminate hindering a release
to evaluate navigation mediocre
Read the text and decide what original words were in the spaces.


INFORMATION AND SECURITY


Information has the power to change our lives. It can increase the quality of human experience, create new environment to realize our dreams and help us to get beyond problems that trouble our world. In the last century Western culture gradually learned to see society as an “(a) society”. Many are now convinced that we will all benefit from the systematic development of an Information economy*. Information is the currency of today’s world. Those who control information are the most powerful people on the planet - and the ones with
the most bulging bank accounts. It is hard to underestimate the added value
of recent ≪Information and Communication Technologies≫. Computers, software and the Internet drastically increased our possibilities to (b) ,
select, organize, analyze and (c) information. Intelligent environment and machines can provide automated services that humans would
be able to perform timecomsumingly. It is your responsibility as a researcher to find and use the trustworthy sources. There are several ways to investigate your source. It is particularly important for the individual Internet user to evaluate
the source or information. Keep in mind that almost anyone can publish anything they wish on the Web.

3. STUDYING WITH MULTIPLE SOURCES




contend stumble undoubtedly commonalities conception route Fill in the gaps using the words from the box

  1. Additional readings and alternative sources create a richer understanding.

  2. Scientists that working with a primary source is more effective then with a secondary source.

  3. When working with a single source you may upon unclear information.

  4. Learners should discern the between materials.

  5. When surfing through different sources, relating materials to the objective, helps to form a clear of idea.

  6. Secondary source materials are more indirect to the same information than a primary source.

Answers

1

2

3

4

5

6

undoubtedly

contend

stumble

commonalities

conception

route


Yüklə 36,93 Kb.

Dostları ilə paylaş:
1   2   3   4   5




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin