Студопедия

КАТЕГОРИИ:


Архитектура-(3434)Астрономия-(809)Биология-(7483)Биотехнологии-(1457)Военное дело-(14632)Высокие технологии-(1363)География-(913)Геология-(1438)Государство-(451)Демография-(1065)Дом-(47672)Журналистика и СМИ-(912)Изобретательство-(14524)Иностранные языки-(4268)Информатика-(17799)Искусство-(1338)История-(13644)Компьютеры-(11121)Косметика-(55)Кулинария-(373)Культура-(8427)Лингвистика-(374)Литература-(1642)Маркетинг-(23702)Математика-(16968)Машиностроение-(1700)Медицина-(12668)Менеджмент-(24684)Механика-(15423)Науковедение-(506)Образование-(11852)Охрана труда-(3308)Педагогика-(5571)Полиграфия-(1312)Политика-(7869)Право-(5454)Приборостроение-(1369)Программирование-(2801)Производство-(97182)Промышленность-(8706)Психология-(18388)Религия-(3217)Связь-(10668)Сельское хозяйство-(299)Социология-(6455)Спорт-(42831)Строительство-(4793)Торговля-(5050)Транспорт-(2929)Туризм-(1568)Физика-(3942)Философия-(17015)Финансы-(26596)Химия-(22929)Экология-(12095)Экономика-(9961)Электроника-(8441)Электротехника-(4623)Энергетика-(12629)Юриспруденция-(1492)Ядерная техника-(1748)

Malfunctions and failures




__________________ Equipment malfunctions and system failures are caused by a number of factors, including natural disasters such as floods or storms, fires, and electrical disturbances such as brownouts or blackouts. Server malfunctions or failures mean users temporarily lose access to network resources, such as printers, drivers, and information.

_______________________Computer hackers and viruses present a great risk to networked environments. Hackers are people who break into computer systems to steal services and information, such as credit card numbers, passwords, personal data, and even national security information. Hackers can also delete data. Other people threaten network and data creating viruses andother types of malicious software, which are particularly dangerous to networked computers because these programs usually are designed to sabotage shared files.

______________________Individual loss of autonomy: Networks can play a part in taking away an individual’s autonomy (independence) by controlling which software programs are accessible, and keeping a record of how the computer is used and what sites are accessed.

- Malicious code: Compared to stand alone computers, networks are more vulnerable to viruses, worms, Trojan horses, e-mail bombs, and spyware.

- Network faults: Networks equipment problems can result in loss of data and resources.

- Setup and management cost: Setting up a network requires an investment in hardware and software; ongoing maintenance and management of the network requires the care and attention of at least one IT professional.

__________________ - Lack of privacy: For example, e-mail is not necessarily private. - Messages travel through a number of systems and networks and provide opportunities for others to intercept or read the messages.- Junk e-mail also can become a problem. - On the other hand, a stand alone system is not vulnerable to many of these risks because it does not share connections with other computers.

V. Fill in the gaps with prepositions via, on, in, of, to, by, with, within, through, for (…) and pronouns all, these, their, other, each other (____)

1. Residences typically employ one LAN and connect … the Internet WAN … an Internet Service Provider (ISP) using a broadband modem.

2. The ISP provides a WAN IP address … the modem, and ________ … the computers … the home network use LAN (so-called private) IP addresses.

3. ________ computers … the home LAN can communicate directly … __________ but must go … a central gateway, typically a broadband router, to reach the ISP.

4. While ________ types … networks are built and maintained … engineers, home networks belong to ordinary homeowners, people often … little or no technical background.

5. Various manufacturers produce broadband router hardware designed … simplification … home network setup.

6. Home broadband routers allow devices … different rooms … efficiently share a broadband Internet connection, enable people … more easily share ___________ files and printers … the network, and help with overall network security.

7. Home networks have increased … capability … each generation … new technology.

8. Years ago, people commonly set up __________ home network just to connect a few PCs, share some documents and perhaps a printer.

9. Now it’s common … households to utilize network game consoles, digital video recorders, and smartphones… streaming sound and video.

10. Home automation systems have also existed … many years, but _________ too have grown … popularity more recently … practical systems … controlling lights, digital thermostats and appliances.




Поделиться с друзьями:


Дата добавления: 2015-03-31; Просмотров: 465; Нарушение авторских прав?; Мы поможем в написании вашей работы!


Нам важно ваше мнение! Был ли полезен опубликованный материал? Да | Нет



studopedia.su - Студопедия (2013 - 2024) год. Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав! Последнее добавление




Генерация страницы за: 0.01 сек.