Top Banner
1 UNIT 19 Data Security 2
21

1 UNIT 19 Data Security 2. Reading 2 2 Reading 2 1.Use a virus protection programs. 2.Password – protect programs and data with passwords which cannot.

Dec 14, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 UNIT 19 Data Security 2. Reading 2 2 Reading 2 1.Use a virus protection programs. 2.Password – protect programs and data with passwords which cannot.

1

UNIT 19

Data Security 2

Page 2: 1 UNIT 19 Data Security 2. Reading 2 2 Reading 2 1.Use a virus protection programs. 2.Password – protect programs and data with passwords which cannot.

2

Reading2

Page 3: 1 UNIT 19 Data Security 2. Reading 2 2 Reading 2 1.Use a virus protection programs. 2.Password – protect programs and data with passwords which cannot.

Reading 2

1. Use a virus protection programs. 2. Password – protect programs and data with

passwords which cannot easily be cracked.3. Make a full backups, which copy all files,

periodically.4. Control access to hardware.5. Make a full backups, which copy all files,

periodically.

Page 4: 1 UNIT 19 Data Security 2. Reading 2 2 Reading 2 1.Use a virus protection programs. 2.Password – protect programs and data with passwords which cannot.

4

Reading3

Page 5: 1 UNIT 19 Data Security 2. Reading 2 2 Reading 2 1.Use a virus protection programs. 2.Password – protect programs and data with passwords which cannot.

Reading 31. Incremental backups.2. Shareware.3. Uninterruptible.4. Compromise.5. Cracked.6. Encrypt.7. Firewall.8. Monitor (verb).9. Biometric.10. Periodic.

Page 6: 1 UNIT 19 Data Security 2. Reading 2 2 Reading 2 1.Use a virus protection programs. 2.Password – protect programs and data with passwords which cannot.

6

Language Work

Page 7: 1 UNIT 19 Data Security 2. Reading 2 2 Reading 2 1.Use a virus protection programs. 2.Password – protect programs and data with passwords which cannot.

What is the relationship between them

1- The scanner finds a match for your fingerprint.

2- the keyboard is unlocked.3- You can use the PC.

1. The way to link these sentences by :(Cause to - make - when clause - an if-

sentences - therefore - with the result that )

Page 8: 1 UNIT 19 Data Security 2. Reading 2 2 Reading 2 1.Use a virus protection programs. 2.Password – protect programs and data with passwords which cannot.

2. The way to link these sentences by :

(permits – allows)

• The keyboard is unlocked ,which allows /permits you to use the PC.

OR• The keyboard is unlocked , allowing

/permitting you to use the PC.

Page 9: 1 UNIT 19 Data Security 2. Reading 2 2 Reading 2 1.Use a virus protection programs. 2.Password – protect programs and data with passwords which cannot.

3. The way to link these sentences by :

(prevent – stop )

• The keyboard remains locked , preventing you ( from) using the PC.

OR• The keyboard remains locked , stopping

you ( from) using the PC.

Page 10: 1 UNIT 19 Data Security 2. Reading 2 2 Reading 2 1.Use a virus protection programs. 2.Password – protect programs and data with passwords which cannot.

10

Language Work4

Page 11: 1 UNIT 19 Data Security 2. Reading 2 2 Reading 2 1.Use a virus protection programs. 2.Password – protect programs and data with passwords which cannot.

Language Work 4

1. Accessing2. To have3. Allowing4. To buy5. Coiled6. Creates7. Causing8. To broadcast9. Allows10.To withdraw11.Get

Page 12: 1 UNIT 19 Data Security 2. Reading 2 2 Reading 2 1.Use a virus protection programs. 2.Password – protect programs and data with passwords which cannot.

12

Language Work5

Page 13: 1 UNIT 19 Data Security 2. Reading 2 2 Reading 2 1.Use a virus protection programs. 2.Password – protect programs and data with passwords which cannot.

Language Work 51. When a user runs anti-virus software, the

software checks files for virus coding. If coding is matched to a known virus in a virus database, a message is displayed to the user that a virus has been found. If the user removes the virus or deletes the infected file, the virus is prevented from spreading or causing further damage.

Page 14: 1 UNIT 19 Data Security 2. Reading 2 2 Reading 2 1.Use a virus protection programs. 2.Password – protect programs and data with passwords which cannot.

Language Work 52. When you approach a high-security

network, key features of your face are scanned. If the system matches your features to a database record of authorised staff, your identity is verified allowing you to logon. If your identity is not verified, you are stopped from using the system.

Page 15: 1 UNIT 19 Data Security 2. Reading 2 2 Reading 2 1.Use a virus protection programs. 2.Password – protect programs and data with passwords which cannot.

Language Work 53. voice-activated computers without

keywords will become more common .when the user wants to log on she speaks to the computer which matches her voice to database of voice patterns .if the user has a cold or sore throat she is allowed to use the system because stress and intonation patterns remain the same .

Page 16: 1 UNIT 19 Data Security 2. Reading 2 2 Reading 2 1.Use a virus protection programs. 2.Password – protect programs and data with passwords which cannot.

16

Problem Solving6

Page 17: 1 UNIT 19 Data Security 2. Reading 2 2 Reading 2 1.Use a virus protection programs. 2.Password – protect programs and data with passwords which cannot.

Problem Solving 6

Eye Scanning:1. Person looks through eyepiece.2. Laser scans eye recording microscopic details.3. Computer translates data into a unique

barcode.

Hand scanning:4. Select the conversation language.5. Insert the credit card.6. Insert hand to be scanned. Database checks

your hand print and then checks to make sure your ID matches that on the credit card.

Page 18: 1 UNIT 19 Data Security 2. Reading 2 2 Reading 2 1.Use a virus protection programs. 2.Password – protect programs and data with passwords which cannot.

18

Specialist Reading

Page 19: 1 UNIT 19 Data Security 2. Reading 2 2 Reading 2 1.Use a virus protection programs. 2.Password – protect programs and data with passwords which cannot.

Specialist Reading

1. Ecommerce, online-transaction processing, databases.

2. The amount of information that needs to be managed or stored on a network.

3. Tape libraries, RAID disks, optical storage 4. Multimedia5. Distance limitations6. Ethernet7. Throughput limitations due to bandwidth, lack of

cohesion among storage devices i.e. managing the devices can prove challenging.

Page 20: 1 UNIT 19 Data Security 2. Reading 2 2 Reading 2 1.Use a virus protection programs. 2.Password – protect programs and data with passwords which cannot.

Specialist Reading8. Almost any modem server. Most PC

midrange and mainframe platforms.9. By offloading many storage-related server

tasks to the SAN and by better allocating storage recourses to servers.

10.Copper cabling or fiber-optic cabe.

Page 21: 1 UNIT 19 Data Security 2. Reading 2 2 Reading 2 1.Use a virus protection programs. 2.Password – protect programs and data with passwords which cannot.

Specialist reading (part B) :

•1- line 74•2/ a iv, b vi, c I, d ii, e iii, f v •3/ a False, b True, c False, d False, e True, f False