D) Look over the data commentary and answer the questions.
1. Where does the data commentary actually start? 2. What are the purposes of sentences one and two? 3. Which sentence contains the author’s key point? 4. What are the purposes of this data commentary? 5. What is the passage’s structure? Find sentences which contain: - location elements or/and summary statements; - highlighting statements; - discussions of implications, problems. 6. The author has chosen only to comment on percentages greater than 11. Do you think this is enough? If not, what would be a suitable additional sentence?
A computer virus is a program designed to attack a computer system. Increasing dependence on computers has made businesses concerned about viruses. Table 5 shows the most common modes of infection for U.S. businesses. As can be seen, in the majority of cases the source of viral infection can be detected, with disks brought to the workplace from home being the most significant (49%). However, it is alarming to note that the source of nearly 30% of viral infections cannot be determined. While it may be possible to eliminate home-to-workplace infection by requiring users to run antiviral software on diskettes brought from home, businesses are still vulnerable to major data loss, especially from unidentifiable source of infection.
TABLE 5. Means of PC Virus Infection in U.S. Businesses
http://www.engga.uwo.ca/people/cmiller/effectivewriting/Grad%20Engineering%20-%20Strengthening%20Claims.pdf
|