Заглавная страница Избранные статьи Случайная статья Познавательные статьи Новые добавления Обратная связь FAQ Написать работу КАТЕГОРИИ: АрхеологияБиология Генетика География Информатика История Логика Маркетинг Математика Менеджмент Механика Педагогика Религия Социология Технологии Физика Философия Финансы Химия Экология ТОП 10 на сайте Приготовление дезинфицирующих растворов различной концентрацииТехника нижней прямой подачи мяча. Франко-прусская война (причины и последствия) Организация работы процедурного кабинета Смысловое и механическое запоминание, их место и роль в усвоении знаний Коммуникативные барьеры и пути их преодоления Обработка изделий медицинского назначения многократного применения Образцы текста публицистического стиля Четыре типа изменения баланса Задачи с ответами для Всероссийской олимпиады по праву Мы поможем в написании ваших работ! ЗНАЕТЕ ЛИ ВЫ?
Влияние общества на человека
Приготовление дезинфицирующих растворов различной концентрации Практические работы по географии для 6 класса Организация работы процедурного кабинета Изменения в неживой природе осенью Уборка процедурного кабинета Сольфеджио. Все правила по сольфеджио Балочные системы. Определение реакций опор и моментов защемления |
Before you read the passage, talk about these questions.Содержание книги
Похожие статьи вашей тематики
Поиск на нашем сайте
1 How do people keep their computers safe? 2 Why would a company worry about security? Reading Read the email about safety measures. Then, choose the correct answers. 1 What is the email mainly about? A improving security at the company В detecting keylogger programs С installing a patch on a web browser D punishing employees for violating security protocol 2 The company will monitor employees by... A installing spyware. В performing virus scans. С reviewing the audit logs. D looking for authenticated programs. 3 What can you infer about Harper Company? A They have authenticated the patch. В They already have a virus scan program. С They allow many authenticated programs. D This is their first security breach. Vocabulary Match the words (1-8) with the definitions (A-H). 1 _ popup 2 _bug 3 _security 4 _audit log 5 _ backdoor 6 _patch A set of rules В error in a program С unwanted advertisements on a web browser D someone who accesses a system without permission E safety of a computer system and its data F part of a program giving undesired access G record of who has used a computer and what they've used it for H code to fix errors in a program Fill in the blanks with the correct words from the word bank. Authenticate keylogger attack firewall patch 1 Management has to _______ the program before you download it. 2 A(n) _______ will record your password. 3 Without antivirus software, computers are open to a(n)_________. 4 Put up a(n) __________ hackers out of your computer. 5 Download the _________ to make the program work correctly. 5. Listen and read the email about safety measures again. What should users do when popups appear on a web browser? Listening 6. Listen to a conversation between two employees at Harper Company. Mark the following statements as true (T) or false (F). 1 _The antivirus software is causing the employee's problems. 2 _ The browser cannot access any online information. 3 _ The employee's firewall settings are too strict. 7. Listen again and complete the conversation. None of my programs have online access. What about 1? The browser opens, but I can't access any websites. Most importantly, I can't use the email client. That's a big problem. I know. I think 2 Are you sure? The company's 3 is pretty powerful. I know, and 4 Oh, the firewall. How high are your settings? 5 6 . You need to lower the level if you want your programs to work. Speaking 8. With a partner, act out the roles below based on Task 7. Then, switch roles. USE LANGUAGE SUCH AS: What about your browser? How high are your settings? You need to lower the level if you want your programs to work. Student A: Your computer cannot access the Internet. Talk to Student В about: • the problem • what works on the computer • firewall settings Student B: You are Student A's coworker. Answer his or her questions. Writing 9. You work in an IT department. Using the email and conversation from Task 8, write an email to your co-workers about security (120-150 words). Talk about: • What security measures there are • What threats there are to computers • How the company plans to monitor its employees on the Internet Anti-virus software 1) Web page analysis 2) Quarantine 3) cyber criminal 4) anti-virus software
Web Advisor People who want to protect their children from the dangers of the Internet use WebAdvisor. This software blocks the types of websites that you decide are unsafe. It also provides instant web page analysis, helping you avoid phishing and pharming scams. Anti-Virus Pius «л RapidClean Anti-Virus Plus is an update of our first product, Anti-Virus. This anti-virus software sweeps your computer system to detect viruses. All viruses are then quarantined so they cannot harm your computer. It's the most reliable software on the market, providing fewer false positives and false negatives than any other software. RapidClean is a virus removal software that destroys the malicious software discovered by Anti-Virus Plus. This includes rootkit viruses. These viruses are designed to disguise themselves as a part of your computer's operating system. This makes them very difficult to get rid of. Most security software won't destroy rootkits but, with RapidClean, you can. Defender Defender is the ultimate security software. A combination of both of our software packages, Defender keeps your computer completely safe from cyber criminals. Defender also comes with our computer backup service. This means that the data on your computer's hard drive will be backed up on our company's servers. With Defender, you cannot lose your files. Get ready!
|
||||
Последнее изменение этой страницы: 2021-11-27; просмотров: 1044; Нарушение авторского права страницы; Мы поможем в написании вашей работы! infopedia.su Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Обратная связь - 3.147.82.108 (0.009 с.) |