КАТЕГОРИИ: Архитектура-(3434)Астрономия-(809)Биология-(7483)Биотехнологии-(1457)Военное дело-(14632)Высокие технологии-(1363)География-(913)Геология-(1438)Государство-(451)Демография-(1065)Дом-(47672)Журналистика и СМИ-(912)Изобретательство-(14524)Иностранные языки-(4268)Информатика-(17799)Искусство-(1338)История-(13644)Компьютеры-(11121)Косметика-(55)Кулинария-(373)Культура-(8427)Лингвистика-(374)Литература-(1642)Маркетинг-(23702)Математика-(16968)Машиностроение-(1700)Медицина-(12668)Менеджмент-(24684)Механика-(15423)Науковедение-(506)Образование-(11852)Охрана труда-(3308)Педагогика-(5571)Полиграфия-(1312)Политика-(7869)Право-(5454)Приборостроение-(1369)Программирование-(2801)Производство-(97182)Промышленность-(8706)Психология-(18388)Религия-(3217)Связь-(10668)Сельское хозяйство-(299)Социология-(6455)Спорт-(42831)Строительство-(4793)Торговля-(5050)Транспорт-(2929)Туризм-(1568)Физика-(3942)Философия-(17015)Финансы-(26596)Химия-(22929)Экология-(12095)Экономика-(9961)Электроника-(8441)Электротехника-(4623)Энергетика-(12629)Юриспруденция-(1492)Ядерная техника-(1748) |
The Differences and Features of Hardware
The Reading Module THE WRITING MODULE THE SPEAKING MODULE II. Speaking Exercises: Exercise 1. Define the terms using the suggested words and expressionsas in example:
EXAMPLE: Information science is a discipline that deals with the processes of storing and transferring information. Exercise 2. Ask questions to the given answers: 1) Question: ___________________________________________? Answer: Hardware firewalls can be effective with little or no configuration.
2) Question: ___________________________________________? Answer: A hardware firewall uses packet filtering to examine the header of a packet to determine its source and destination. 3) Question: ___________________________________________? Answer: Most hardware firewalls will have a minimum of four network ports to connect other computers.
III. Writing exercises: Exercise 1. Fill in the gaps with the suggested words:
Firewalls can be _______hardware or software. The ideal firewall configuration will consist of______. In addition to limiting access to your computer and network, a firewall is also______ for allowing remote access ___a private________ through secure authentication certificates and logins.
Exercise 2. Compose a story on one of the topics (up to 100 words): 1) Functions of firewalls 2) Hardware firewall
Lesson 10 Read the text: & Software Firewalls (Part 2)
Software Firewalls Like hardware firewalls there is a vast number of software firewalls to choose from. To get started you may wish to read reviews of software firewalls and search out the product Web site to glean some information first. Because your software firewall will always be running on your computer, you should make note of the system resources it will require to run and any incompatibilities with your operating system. A good software firewall will run in the background on your system and use only a small amount of system resources. It is important to monitor a software firewall once installed and to download any updates available from the developer. The differences between a software and hardware firewall are vast, and the best protection for your computer and network is to use both, as each offers different but much-needed security features and benefits. Updating your firewall and your operating system is essential to maintaining optimal protection, as is testing your firewall to ensure it is connected and working correctly. |
|
|
|
Дата добавления: 2015-08-31; Просмотров: 143; Нарушение авторских прав?; Мы поможем в написании вашей работы!
Нам важно ваше мнение! Был ли полезен опубликованный материал? Да | Нет