全文预览已结束
下载本文档
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Dictation Scripts: Unit 3 Computer SecurityPart 1: Listening1. Choose the Proper Words or ExpressionsListen to a short passage. Pick out the underlined words or expressions which are the closest to what you have heard.Lets face the facts here, people. The world has become a pretty scary place. In the salad days of your youth, all you had to worry about was the health, well-being of your family and locking your doors at night. Not anymore. Today, you need to worry about security in a whole different arena: Your PC. Spy-ware, adware, viruses and Trojans are lurking online, waiting to infest your computer. All could easily cripple your PC if youre not careful. Worse yet, hackers could steal important personal information. If thats not enough to send you hiding under the covers, you also have to find a way to keep your kids safe online. Scary? You bet. Unmanageable? Not at all. Pull the covers off you head and listen to us. Our super security guide will help you wise up and stay safe.2. Answer the QuestionsListen to a short passage. Try your best to understand the lines and answer the following questions.A computer virus is a computer program that can copy itself and infect a computer. The original may modify the copies or the copies may modify themselves. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable medium such as a floppy disk, CD, USB drive or by the Internet. Viruses are sometimes confused with computer worms and Trojan horses. A worm, however, can spread itself to other computers without needing to be transferred as part of a host. A Trojan horse is a file that appears harmless until executed. In contrast to viruses, Trojan horses do not insert their code into other computer files.Many personal computers are now connected to the Internet and to local area networks, facilitating the spread of malicious code. Todays viruses may also take advantage of network services such as the World Wide Web, e-mail, and file sharing systems to spread, blurring the line between viruses and worms.Questions:1 What is a computer virus?2 How does a computer virus spread?3 Please list the removable media that can carry computer viruses.4 What are the differences between a computer virus, a worm and a Trojan?3 DictationListen to the following two short passages and fill in the blanks with the words you have heard.3.1 How to choose a secure password? Choosing a secure password is a matter of creating unlikely letter and number combinations. The more obscure your password, the tougher it will be to crack. Many passwords nowadays are being hacked usually due to inability of its owners to create them properly. If you will responsibly create your password and follow a few simple tips, the chances that it will be cracked will drop dramatically. Here are a few tips on how to create a password that will be a lot harder to crack: Avoid first names and surnames. Avoid things that might be easily associated with you like your hobbies, phone numbers etc. Avoid common words in any language whether it be English or Chinese. Use a combination of letters and numbers. Try to mix them. Create a password that you can remember so that you will not have to write it anywhere. Make your password long. The longer, the better. Do not use keyboard sequences like “qwertyu” for example. Plan on changing your password from time to time.Do not use the same password for everything. If someone finds this password, they would have access to everything. At the very least, make at least one password for sensitive things (i.e. online banking, etc.) and one for everything else (AIM, email, etc.).3.2 Gmails antivirus scanningGmail automatically scans every attachment when its delivered to your account, and again each time you open a message. Attachments you send are also scanned. Checking attachments for viruses protects our users and their information, and prevents the spread of viruses. If a virus is found in an attachment youve received, the system will attempt to clean the file, so you can still access the information it contains. If the virus cant be removed from the file, you wont be able to download it. If the system is unable to scan certain files, youll see an error message. Youll have the option to try again later or to download at your own risk. Please note that if your mail account cant scan the contents of the file, we cant guarantee that its safe to view. If an attachment youre trying to send is infected with a virus, your mail account will display an error message to tell you, but it wont clean the file. To send the message without that attachment, click the link in that error message that says Remove attachment and send.If your mail account detects that youre trying to send an infected attachment, we suggest running your anti-virus software in case your hard drive is infected. If you dont have anti-virus software, you might consider purchasing and installing one of the popular applications so you can protect your computer and information from viruses.4 Operate and RetellListen to the following instructions on How to schedule Automatic Updates to Virus Definitions in Symantec Antivirus and do the operations on your own computer according to what youve heard. Try to retell the whole process after the operation.Symantec AntiVirus can protect your computer from destructive programs known as viruses and Trojan horses, and can also protect against malicious software. The following steps will schedule Automatic Updates to Virus Definitions:1) Click on Start Programs Symantec Client Security Symantec AntiVirus. (Or, right click the gold shield in the system tray and click Open Sym
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 涂料调配工安全生产规范强化考核试卷含答案
- 蔬菜栽培工岗前激励考核试卷含答案
- 快递报价合同范本
- 加工植绒合同范本
- 公司安全合同协议
- 摊位发包合同范本
- 车间买卖合同范本
- 钢筋正规合同范本
- 部门责任合同范本
- 分批结账合同范本
- 焦虑症心理课件
- 青花瓷的美课件
- 第21课 人民解放战争的胜利(课件)-【课堂无忧】新课标同步核心素养课堂
- 2026四川农商银行校园招聘1065人考试历年真题汇编附答案解析
- 培训学校招生话术
- 人工智能大语言模型应用教程 课件 模块8 大模型Chat应用
- 2026年山西工程职业学院单招职业技能考试题库及答案解析(名师系列)
- GB/T 46749-2025城市轨道交通站台屏蔽门系统
- (八年级上册)【历史核心要点复习提纲】
- 2026年水利部黄河水利委员会事业单位公开招聘高校毕业生(265人)历年真题汇编及答案解析(夺冠)
- 支付行业发展趋势
评论
0/150
提交评论