Part3 Practice on Text Task 1: Listening training Dictation of some key words Directions: You will hear some key words twice, most of which are taken from the Word Study. Then finish the Crossword Puzzle. ( See you book p. 2. Dictation of some key expressions Directions: You will hear some key expressions twice, most of which are taken from this text. Then you are asked to complete the missing words 1)making backup_copies 4) in the event of catastrophe 2)protecting software and data 5)in remote_locations 3)ceiling sprinkler _ systems 6) international the key escrow chip 2021/2/20 P.6
2021/2/20 P.6 Task 1: Listening training Dictation of some key words Directions: You will hear some key words twice, most of which are taken from the Word Study. Then finish the Crossword Puzzle. (See you book p. ) 2. Dictation of some key expressions Directions: You will hear some key expressions twice, most of which are taken from this text. Then you are asked to complete the missing words. @ Part3 Practice on Text 1) making ______________copies 2) protecting__________________ 3) ___________________systems 4) in the event of_______________ 5) __________________locations 6) international__________________ backup software and data ceiling sprinkler catastrophe in remote the key escrow chip
Task 2. Read. Write and Translate Read and Reply Directions: Students are required to read aloud the whole text after the teacher. Then give short answers to the following questions a) What does security measures consist of? Security measures consist ofencryption, restricting access, anticipating disasters, and making backup copies b) What plan do most large companies have to prepare for disasters? Most large organizations have a disaster recovery plan describing ways to continue operating until normal computer operations can be restored. c)Why do some federal agencies suggested that a standard encryption procedure be used ? Because businesses have been encrypting, or coding, messages for years. They have become so good at it that some law enforcement agencies are unable to"wiretap" messages from suspected criminals 2021/2/20 P7
2021/2/20 P.7 Read and Reply Directions:Students are required to read aloud the whole text after the teacher. Then give short answers to the following questions: Task 2: Read, Write and Translate Security measures consist of encryption, restricting access, anticipating disasters, and making backup copies. Most large organizations have a disaster recovery plan describing ways to continue operating until normal computer operations can be restored. Because businesses have been encrypting, or coding, messages for years. They have become so good at it that some law enforcement agencies are unable to “wiretap” messages from suspected criminals. c) Why do some federal agencies suggested that a standard encryption procedure be used? a) What does security measures consist of? b) What plan do most large companies have to prepare for disasters?