Inglestrabajo Final 1

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Final Project

Topic: Creativity.
OBJECTIVE

Explain the Brain Sections involved in Creativity. Use the Simple Present,
Present Passive Voice, Technical Vocabulary and time clauses. SCOU-223
Inglés Técnico

SUMMARY

The participant, using audiovisual help (PPT, video, etc.) will be able to identify and
explain the Information Security Policy within a company, using vocabulary
appropriate to the level of learning required in their career (The Simple Present
Tense, Present Passive Voice, Technical Vocabulary, time clauses).

ESCUELA DE TECNOLOGÍAS 1

Trabajo Final del Curso

PREGUNTAS
1. Present Simple
GUÍA
- Information security is a crucial issue in today's business environment.

- The Information Security Policy establishes the guidelines and procedures to guarantee the
confidentiality, integrity and availability of information.

- It is actively implemented in companies to ensure that established procedures are followed and
that data is protected.

- Employees play a key role in implementing these security measures.

2. Present Passive Voice

- The Information Security Policy is actively implemented in companies.

- Encryption techniques are used to protect data.

- Access controls are established to ensure that only authorized people can access sensitive
information.

- Risk assessments are carried out periodically and corrective measures are taken as necessary.

3. Technical Vocabulary

- Information Security Policy.

- Confidentiality, integrity and availability of information.

- Encryption techniques.

- Access controls.

- Risk assessments.
4. Time clauses

- Information security is a crucial issue in today's business environment.

- The Information Security Policy establishes the guidelines and procedures to guarantee the
confidentiality, integrity and availability of information.

- It is actively implemented in companies to ensure that established procedures are followed and
that data is protected.

- Employees play a key role in implementing these security measures.

Tecnologías de la información

You might also like