ТОР 5 статей: Методические подходы к анализу финансового состояния предприятия Проблема периодизации русской литературы ХХ века. Краткая характеристика второй половины ХХ века Характеристика шлифовальных кругов и ее маркировка Служебные части речи. Предлог. Союз. Частицы КАТЕГОРИИ:
|
Hacker causes chaos in city hospitalComputer fraud on the increase Speaking Task 9 In pairs, try to answer these questions: j 1 Who or what is a 'hacker'? 2 How many ways can you think of to make the data in a computer secure? Listening Task 10 ISI Listen to Steve, a computer technician, and Richard, the office manager at language institute, talking about computer security. As you listen to the conversation, answer the following questions. 1 What is the problem with the computer system at the language institute? 2 What would someone need to connect his/her PC to the office network? 3 What are the disadvantages of security passwords, according to Steve and 4 How does the 'smart' card work? Is it safe? 5 How much do you think Steve and Richard know about security systems? Speaking Task 11 Steve and Richard must decide what to do. What advice would you give them? In groups or pairs, note down the advantages and disadvantages of the possible solutions. Think about safety, cost, and ease of use. Try to decide on the best solution. Reading Task 12 Ite combined threat of viruses wreaking havoc on your PC and probing meddles gaining access to sensitive data can strike fear into the hearts of even the most mild-mannered PC managers. Relax... XTree Company has the ultimate in PC protection. AllSafe teams superior virus prevention with access control and security reporting. Andvrtutenwstantwrusrjioduc&sirnprysc signatures, ADSafe actually looks lor foe signs of viruses attempting to repficate Once a virus is spotted, ABSafe isolates it, preventing the virus from infecting your PC If the virus is known, AHSate quddy removes it Even if the virus is unknown, ABSate studies it and learns its signature immediately, letting you atiomatkalty update the virus signature database. Then you can use AllSafe to scan other disks or systems right away before an infection can spread, without waiting for a new signature from the software publisher So, if you use a standalone PC fear nod it's over for the evil virus. Just as scary as the viruses are those characters that attempt to invade your computer files without authorization. AllSafe's flexible password options let you share or limit access to as much of your hard disk as you wish. AllSafe keeps out the evil invades! When you need a complete solution - protection against both viruses and unauthorized entry - choose AllSafe And lie all CTree Company products, they're easy to install and use. For more information or to find out where you can buy AllSafe, caD one of our distributors: Не нашли, что искали? Воспользуйтесь поиском:
|