Студопедия
rus | ua | other

Home Random lecture






Listening


Date: 2015-10-07; view: 509.


Introduction

Unit 1 Protecting your Computer System

SELECTION OF MATERIAL

You can work through the material starting at Unit 1. Alternatively, you can choose units on the basis of the topic or language area (see Contents page).

 

 

Some Units include Listening tasks and Grammar practice to provide the developing of speaking skills and proper usage of grammar structures.

 

 

(obligation and permission - modals)

 

This unit looks at different ways of protecting a computer system. It considers how access can be limited to authorized users, and suggests ways of achieving this.

 

You are going to hear a discussion between a data processing manager and a computer consultant. The data processing manager is telling the computer consultant what security requirements his company needs for their computer equipment. The consultant has a checklist which shows different features suitable for a variety of systems. As you listen tick the appropriate column in the checklist. You need to decide whether the security feature is Necessary, Unnecessary, Permitted/Possible or Not Permitted/Impossible for the manager's computer system.

 

 


<== previous lecture | next lecture ==>
WHO IS IT FOR? | Controlled Practice
lektsiopedia.org - 2013 год. | Page generation: 0.626 s.