1
UNIT 19
Data Security 2
Reading
2
2
Reading 2
1. Use a virus protection programs.
2. Password – protect programs and data with
passwords which cannot easily be cracked.
3. Make a full backups, which copy all files,
periodically.
4. Control access to hardware.
5. Make a full backups, which copy all files,
periodically.
Reading
4
3
Reading 3
1. Incremental backups.
2. Shareware.
3. Uninterruptible.
4. Compromise.
5. Cracked.
6. Encrypt.
7. Firewall.
8. Monitor (verb).
9. Biometric.
10. Periodic.
Language Work
6
What is the relationship between them
1- The scanner finds a match for your fingerprint.
2- the keyboard is unlocked.
3- You can use the PC.
1. The way to link these sentences by :
(Cause to - make - when clause - an if-sentences
- therefore - with the result that )
2. The way to link these sentences by :
(permits – allows)
• The keyboard is unlocked ,which allows
/permits you to use the PC.
OR
• The keyboard is unlocked , allowing /permitting
you to use the PC.
3. The way to link these sentences by :
(prevent – stop )
• The keyboard remains locked , preventing you (
from) using the PC.
OR
• The keyboard remains locked , stopping you (
from) using the PC.
Language Work
10
4
Language Work 4
1. Accessing
2. To have
3. Allowing
4. To buy
5. Coiled
6. Creates
7. Causing
8. To broadcast
9. Allows
10.To withdraw
11.Get
Language Work
12
5
Language Work 5
1. When a user runs anti-virus software, the
software checks files for virus coding. If coding
is matched to a known virus in a virus
database, a message is displayed to the user
that a virus has been found. If the user
removes the virus or deletes the infected file,
the virus is prevented from spreading or
causing further damage.
Language Work 5
2. When you approach a high-security network,
key features of your face are scanned. If the
system matches your features to a database
record of authorised staff, your identity is
verified allowing you to logon. If your identity is
not verified, you are stopped from using the
system.
Language Work 5
3. voice-activated computers without keywords
will become more common .when the user
wants to log on she speaks to the computer
which matches her voice to database of voice
patterns .if the user has a cold or sore throat
she is allowed to use the system because
stress and intonation patterns remain the
same .
Problem Solving
16
6
Problem Solving 6
Eye Scanning:
1. Person looks through eyepiece.
2. Laser scans eye recording microscopic details.
3. Computer translates data into a unique barcode.
Hand scanning:
1. Select the conversation language.
2. Insert the credit card.
3. Insert hand to be scanned. Database checks your
hand print and then checks to make sure your ID
matches that on the credit card.
Specialist Reading
18
Specialist Reading
1. Ecommerce, online-transaction processing,
databases.
2. The amount of information that needs to be
managed or stored on a network.
3. Tape libraries, RAID disks, optical storage
4. Multimedia
5. Distance limitations
6. Ethernet
7. Throughput limitations due to bandwidth, lack of
cohesion among storage devices i.e. managing
the devices can prove challenging.
Specialist Reading
8. Almost any modem server. Most PC midrange and
mainframe platforms.
9. By offloading many storage-related server tasks to
the SAN and by better allocating storage
recourses to servers.
10. Copper cabling or fiber-optic cabe.
Specialist reading (part B):
• 1- line 74
• 2/ a iv, b vi, c I, d ii, e iii, f v
• 3/ a False, b True, c False, d False, e
True, f False

unit-19-data-security-2-model-answers.pptx

  • 1.
  • 2.
  • 3.
    Reading 2 1. Usea virus protection programs. 2. Password – protect programs and data with passwords which cannot easily be cracked. 3. Make a full backups, which copy all files, periodically. 4. Control access to hardware. 5. Make a full backups, which copy all files, periodically.
  • 4.
  • 5.
    Reading 3 1. Incrementalbackups. 2. Shareware. 3. Uninterruptible. 4. Compromise. 5. Cracked. 6. Encrypt. 7. Firewall. 8. Monitor (verb). 9. Biometric. 10. Periodic.
  • 6.
  • 7.
    What is therelationship between them 1- The scanner finds a match for your fingerprint. 2- the keyboard is unlocked. 3- You can use the PC. 1. The way to link these sentences by : (Cause to - make - when clause - an if-sentences - therefore - with the result that )
  • 8.
    2. The wayto link these sentences by : (permits – allows) • The keyboard is unlocked ,which allows /permits you to use the PC. OR • The keyboard is unlocked , allowing /permitting you to use the PC.
  • 9.
    3. The wayto link these sentences by : (prevent – stop ) • The keyboard remains locked , preventing you ( from) using the PC. OR • The keyboard remains locked , stopping you ( from) using the PC.
  • 10.
  • 11.
    Language Work 4 1.Accessing 2. To have 3. Allowing 4. To buy 5. Coiled 6. Creates 7. Causing 8. To broadcast 9. Allows 10.To withdraw 11.Get
  • 12.
  • 13.
    Language Work 5 1.When a user runs anti-virus software, the software checks files for virus coding. If coding is matched to a known virus in a virus database, a message is displayed to the user that a virus has been found. If the user removes the virus or deletes the infected file, the virus is prevented from spreading or causing further damage.
  • 14.
    Language Work 5 2.When you approach a high-security network, key features of your face are scanned. If the system matches your features to a database record of authorised staff, your identity is verified allowing you to logon. If your identity is not verified, you are stopped from using the system.
  • 15.
    Language Work 5 3.voice-activated computers without keywords will become more common .when the user wants to log on she speaks to the computer which matches her voice to database of voice patterns .if the user has a cold or sore throat she is allowed to use the system because stress and intonation patterns remain the same .
  • 16.
  • 17.
    Problem Solving 6 EyeScanning: 1. Person looks through eyepiece. 2. Laser scans eye recording microscopic details. 3. Computer translates data into a unique barcode. Hand scanning: 1. Select the conversation language. 2. Insert the credit card. 3. Insert hand to be scanned. Database checks your hand print and then checks to make sure your ID matches that on the credit card.
  • 18.
  • 19.
    Specialist Reading 1. Ecommerce,online-transaction processing, databases. 2. The amount of information that needs to be managed or stored on a network. 3. Tape libraries, RAID disks, optical storage 4. Multimedia 5. Distance limitations 6. Ethernet 7. Throughput limitations due to bandwidth, lack of cohesion among storage devices i.e. managing the devices can prove challenging.
  • 20.
    Specialist Reading 8. Almostany modem server. Most PC midrange and mainframe platforms. 9. By offloading many storage-related server tasks to the SAN and by better allocating storage recourses to servers. 10. Copper cabling or fiber-optic cabe.
  • 21.
    Specialist reading (partB): • 1- line 74 • 2/ a iv, b vi, c I, d ii, e iii, f v • 3/ a False, b True, c False, d False, e True, f False

Editor's Notes