d_________________________________________
Write the names of students with the questions they have answered.
1. How do you understand IT attacks?______________________
2. How can we get protected from IT attacks? ____________________
3. How do you understand Intellectual Property? ___________________
4. How can we protect Intellectual Properties? ___________________
5. How do you understand Ideological Pressure? ____________________
6. How can we protect our youth from Ideological Pressures? _________
Reading activity
Task 4
Ex.4 Write definitions to the words given below.
Information society_____________________________
security_______________________________________
compile_______________________________________
disseminate____________________________________
hindering _____________________________________
a release_____________________________________
to evaluate____________________________________
navigation ____________________________________
mediocre _____________________________________
Reading activity
Task 5
Read the text and decide what original words were in the spaces.
INFORMATION AND SECURITY
Information has the power to change our lives. It can increase the quality of human experience, createnew environment to realize our dreams and help us to get beyond problems that trouble our world. Inthe last century Western culture gradually learned to see society as an “(a)____________ society”.
Many are now convinced that we will all benefit from the systematic development of an Informationeconomy*. Information is the currency of today’s world. Those who control information are the mostpowerful people on the planet - and the ones with the most bulging bank accounts.
It is hard to underestimate the added value of recent “Information and CommunicationTechnologies”. Computers, software and the Internet drastically
increased our possibilities to (b) ____________ , select, organize, analyse and (c) ____________information. Intelligent environment and machines can provide automated services that humans wouldbe able to perform timecomsumingly. It is your responsibility as a researcher to findand use the trustworthy sources. There are several ways to investigate your source. It is particularlyimportant for the individual Internet user to evaluate the source or information. Keep in mind that almostanyone can publish anything they wish on the Web. It is often difficult to determine authorship of Websources, and even if the author is listed, he or she may not always represent him or herself honestly, or he or she may represent opinions as fact. Theresponsibility is on the user (d) ____________resources effectively.Respected sources should always list (e) ____________ or last updated date. Poor qualityinformation is for the (f)____________ people, and if you have read this article till here, you are not oneof them! At the end, I will tell you, where you can find this digital mall and start buying products thatreally worth their price! The exact location is http://www.simplyshoparound.com/ The website is really easy to understand and will fit you in just a few minutesafter browsing it. Don’t forget to Bookmark it and use (g )____________ ! Remember, it opens only in Firefox! Today is the time, when you have to start living in a different way! Start filling your mind with the right information and practice it in your life! ... And happy eBook shopping!
Innovation is promoted as a process that goes all the way from information over new technologies tosocial change that improves the daily life of people. (h) ____________ efforts massively compileinformation into ”intelligence systems” in order to protect people against crime and disasters.Data protection and privacy efforts are promoting and enforcing mechanisms to avoid informationreaching society in the wrong way and ultimately (i)____________ people.
Do'stlaringiz bilan baham: |