|
ListeningDate: 2015-10-07; view: 509. Introduction Unit 1 Protecting your Computer System SELECTION OF MATERIAL You can work through the material starting at Unit 1. Alternatively, you can choose units on the basis of the topic or language area (see Contents page).
Some Units include Listening tasks and Grammar practice to provide the developing of speaking skills and proper usage of grammar structures.
(obligation and permission - modals)
This unit looks at different ways of protecting a computer system. It considers how access can be limited to authorized users, and suggests ways of achieving this.
You are going to hear a discussion between a data processing manager and a computer consultant. The data processing manager is telling the computer consultant what security requirements his company needs for their computer equipment. The consultant has a checklist which shows different features suitable for a variety of systems. As you listen tick the appropriate column in the checklist. You need to decide whether the security feature is Necessary, Unnecessary, Permitted/Possible or Not Permitted/Impossible for the manager's computer system.
|