Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

VIII. Insert the proper words (see the words below)

VIII. Insert prepositions | XI. Give English equivalents | XI. Say in one word (see the words below) | X. Give English equivalents | I. Read and translate the information using the vocabulary | VII. Insert the proper words (see the words below) | X. Give English equivalents | IX. Say in one word (see the words below) | X. Give English equivalents | VIII. Give English equivalents |


Читайте также:
  1. A FEW WORDS ABOUT OPERATING A BUSINESS
  2. A syntactic word-group is a combination of words forming one part of the sentence.
  3. A) Before listening, read the definitions of the words and phrases below and understand what they mean.
  4. A) Complete the gaps with the words from the box.
  5. A) Pronunciation drill. Pronounce the words, then look at the given map and fill in the table below.
  6. A) time your reading. It is good if you can read it for four minutes (80 words per minute).
  7. A) two types of combinability with other words
  1. The purpose of having a logon process is to … who you are.
  2. Once the operating system knows who you are, it can grant or … requests for system resources appropriately.
  3. If a bad guy learns your password, he can … on as you.
  4. Or maybe he just wants to do something malicious and … it on you.
  5. Don’t use your dog’s name, your … date, or the name of the local football team.
  6. Pick a password that has a mix of upper- and … letters, number, punctuation marks, and so forth.
  7. Don’t tell anyone what your … is.
  8. Windows 2000, for instance, supports the use of … cards.
  9. You may also want to consider biometric products like fingerprint and … scanners.
  10. A computer is only as secure as the administrator is …
  11. This puts the administrator in a position of … power.
  12. An untrustworthy administrator can … virtually any protective measure in the operating system, because he controls it.
  13. When … a system administrator, recognize the position of trust that administrators occupy, and only hire people who warrant that trust.
  14. Require that your administrators pass a complete … check at hiring time.
  15. Whatever criteria you select, … them across the board.
  16. Don’t give anyone administrative privileges on your network unless they’ve been …
  17. Use sign-in/sign-out sheets to … who’s been in the server room.
  18. Finally, consider taking steps to make it more difficult for a … administrator to cover his tracks.

  1. anniversary
  2. apply
  3. background
  4. blame
  5. deny
  6. establish
  7. hiring
  8. log
  9. lowercase
  10. password
  11. retina
  12. rogue
  13. smart
  14. subvert
  15. track
  16. trustworthy
  17. unequalled
  18. vetted

 

IX. Say in one word (see the words below)

  1. registration and entrance into system
  2. intending to damage equipment, people or their reputation
  3. the date on which an event took place or something was founded in previous years
  4. capital letters as opposed to small letters
  5. a plastic card with a built-in microprocessor, used typically to perform financial transactions
  6. make ineffective and useless
  7. not genuine, true or real
  8. invite people to work for a company
  9. recommendation from a person’s previous employer
  10. all information about a person including his previous work record
  11. inspect and research something or somebody very carefully
  12. improve and make more efficient and modern
  13. a dishonest or unprincipled man who behaves in a criminal way
  14. a special right or advantage that only one person or a group has
  15. a person who always tells the truth and does not try to break the law

  1. anniversary
  2. background
  3. bogus
  4. hire
  5. honest
  6. logon
  7. malicious
  8. negate
  9. privilege
  10. references
  11. rogue
  12. smart card
  13. upgrade
  14. uppercase
  15. vet

 


Дата добавления: 2015-11-14; просмотров: 46 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
X. Give English equivalents| X. Give English equivalents

mybiblioteka.su - 2015-2024 год. (0.006 сек.)