КАТЕГОРИИ: Архитектура-(3434)Астрономия-(809)Биология-(7483)Биотехнологии-(1457)Военное дело-(14632)Высокие технологии-(1363)География-(913)Геология-(1438)Государство-(451)Демография-(1065)Дом-(47672)Журналистика и СМИ-(912)Изобретательство-(14524)Иностранные языки-(4268)Информатика-(17799)Искусство-(1338)История-(13644)Компьютеры-(11121)Косметика-(55)Кулинария-(373)Культура-(8427)Лингвистика-(374)Литература-(1642)Маркетинг-(23702)Математика-(16968)Машиностроение-(1700)Медицина-(12668)Менеджмент-(24684)Механика-(15423)Науковедение-(506)Образование-(11852)Охрана труда-(3308)Педагогика-(5571)Полиграфия-(1312)Политика-(7869)Право-(5454)Приборостроение-(1369)Программирование-(2801)Производство-(97182)Промышленность-(8706)Психология-(18388)Религия-(3217)Связь-(10668)Сельское хозяйство-(299)Социология-(6455)Спорт-(42831)Строительство-(4793)Торговля-(5050)Транспорт-(2929)Туризм-(1568)Физика-(3942)Философия-(17015)Финансы-(26596)Химия-(22929)Экология-(12095)Экономика-(9961)Электроника-(8441)Электротехника-(4623)Энергетика-(12629)Юриспруденция-(1492)Ядерная техника-(1748) |
Issues in computing
Read the text Words to know Unit 26
Because faults can develop in computer systems, it is important to keep copies of valuable data using a backup system. This is especially important in a network where many users are storing vast amounts of data. Networks also require security systems to control access. Login names and passwords are often used, but these may be combined with the use of plastic swipe cards containing a user identification number. Some computer systems use recognition systems that scan and identify characteristics of the user such as their fingerprints, facial features, voice, or eyes. Computer crimes include: 1. hacking – unauthorized access to computer systems and tampering with other users’ data. 2. pirating, i.e. illegally copying and selling programs. 3. intentionally attempting to spread viruses. Viruses are programs that have been written to make a computer behave in an unexpected and undesired way. Although they are often relatively harmless, they sometimes cause a lot of damage. They are usually designed to remain hidden and dormant until a particular time, or until the user performs a particular action, such as pressing a particular combination of keys. They can replicate themselves, and often attach themselves to other programs. It is common for a user to have a virus program on their disk without being aware of it. Viruses can be found and removed by anti-virus programs, which scan disks and files looking for programming code that is known to belong to particular virus programs. When a piece of virus code is found, the virus can be identified, and an appropriate program run to delete the virus code from the disk or file. Plane text email messages cannot contain a virus, but viruses can be carried in email attachments, i.e. files attached to email messages. Some viruses are much more common than others and are often unknowingly downloaded from a network system such as the Internet. Care should be taken to check for viruses when using removable disks or when transferring files. 3 Answer the following questions: 1I s it important to keep copies of valuable data using a backup system? Why? 2 Do networks require security systems to control access? 3 What computer crimes do you know? 4 What are viruses written for? 5What is the principle of operation ofanti-virus programs? 6 Can plane text email message contain a virus?
Дата добавления: 2014-12-23; Просмотров: 751; Нарушение авторских прав?; Мы поможем в написании вашей работы! Нам важно ваше мнение! Был ли полезен опубликованный материал? Да | Нет |