



全文预览已结束
下载本文档
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Dictation Scripts: Unit 3 Computer SecurityPart 1: Listening1. Choose the Proper Words or ExpressionsListen to a short passage. Pick out the underlined words or expressions which are the closest to what you have heard.Lets face the facts here, people. The world has become a pretty scary place. In the salad days of your youth, all you had to worry about was the health, well-being of your family and locking your doors at night. Not anymore. Today, you need to worry about security in a whole different arena: Your PC. Spy-ware, adware, viruses and Trojans are lurking online, waiting to infest your computer. All could easily cripple your PC if youre not careful. Worse yet, hackers could steal important personal information. If thats not enough to send you hiding under the covers, you also have to find a way to keep your kids safe online. Scary? You bet. Unmanageable? Not at all. Pull the covers off you head and listen to us. Our super security guide will help you wise up and stay safe.2. Answer the QuestionsListen to a short passage. Try your best to understand the lines and answer the following questions.A computer virus is a computer program that can copy itself and infect a computer. The original may modify the copies or the copies may modify themselves. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable medium such as a floppy disk, CD, USB drive or by the Internet. Viruses are sometimes confused with computer worms and Trojan horses. A worm, however, can spread itself to other computers without needing to be transferred as part of a host. A Trojan horse is a file that appears harmless until executed. In contrast to viruses, Trojan horses do not insert their code into other computer files.Many personal computers are now connected to the Internet and to local area networks, facilitating the spread of malicious code. Todays viruses may also take advantage of network services such as the World Wide Web, e-mail, and file sharing systems to spread, blurring the line between viruses and worms.Questions:1 What is a computer virus?2 How does a computer virus spread?3 Please list the removable media that can carry computer viruses.4 What are the differences between a computer virus, a worm and a Trojan?3 DictationListen to the following two short passages and fill in the blanks with the words you have heard.3.1 How to choose a secure password? Choosing a secure password is a matter of creating unlikely letter and number combinations. The more obscure your password, the tougher it will be to crack. Many passwords nowadays are being hacked usually due to inability of its owners to create them properly. If you will responsibly create your password and follow a few simple tips, the chances that it will be cracked will drop dramatically. Here are a few tips on how to create a password that will be a lot harder to crack: Avoid first names and surnames. Avoid things that might be easily associated with you like your hobbies, phone numbers etc. Avoid common words in any language whether it be English or Chinese. Use a combination of letters and numbers. Try to mix them. Create a password that you can remember so that you will not have to write it anywhere. Make your password long. The longer, the better. Do not use keyboard sequences like “qwertyu” for example. Plan on changing your password from time to time.Do not use the same password for everything. If someone finds this password, they would have access to everything. At the very least, make at least one password for sensitive things (i.e. online banking, etc.) and one for everything else (AIM, email, etc.).3.2 Gmails antivirus scanningGmail automatically scans every attachment when its delivered to your account, and again each time you open a message. Attachments you send are also scanned. Checking attachments for viruses protects our users and their information, and prevents the spread of viruses. If a virus is found in an attachment youve received, the system will attempt to clean the file, so you can still access the information it contains. If the virus cant be removed from the file, you wont be able to download it. If the system is unable to scan certain files, youll see an error message. Youll have the option to try again later or to download at your own risk. Please note that if your mail account cant scan the contents of the file, we cant guarantee that its safe to view. If an attachment youre trying to send is infected with a virus, your mail account will display an error message to tell you, but it wont clean the file. To send the message without that attachment, click the link in that error message that says Remove attachment and send.If your mail account detects that youre trying to send an infected attachment, we suggest running your anti-virus software in case your hard drive is infected. If you dont have anti-virus software, you might consider purchasing and installing one of the popular applications so you can protect your computer and information from viruses.4 Operate and RetellListen to the following instructions on How to schedule Automatic Updates to Virus Definitions in Symantec Antivirus and do the operations on your own computer according to what youve heard. Try to retell the whole process after the operation.Symantec AntiVirus can protect your computer from destructive programs known as viruses and Trojan horses, and can also protect against malicious software. The following steps will schedule Automatic Updates to Virus Definitions:1) Click on Start Programs Symantec Client Security Symantec AntiVirus. (Or, right click the gold shield in the system tray and click Open Sym
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025年教师资格证考试试题及答案解析
- 2025年计算机应用技术工程师资格考试试题及答案解析
- 2025年机械工程师技能认证考试试卷及答案解析
- 2025年国家自然博物馆招聘笔试模拟题库
- 2025年化妆品生产与营销管理岗位专业技能考核试题及答案解析
- 2025年国际商务谈判师综合能力考核试题及答案解析
- 2025年泵站招聘水管员模拟题集
- 课件中Flash尺寸调整
- 2025年实验室信息安全基础测试题集
- 2025年安全培训体系构建题集
- 秋季疾病预防与健康生活指南
- 湖北校服采购管理制度
- 2025-2030年中国CRISPR和CRISPR相关基因行业市场现状供需分析及投资评估规划分析研究报告
- 疲劳恢复物理手段-洞察及研究
- 学校动火作业管理制度
- 2025乡村医生考试试题及答案
- 法人更换免责协议书
- 2025至2030年中国程控线路板市场分析及竞争策略研究报告
- 高三化学家长会课件
- 光伏电站安全培训要点
- 分包安全管理
评论
0/150
提交评论