![]() |
Главная Случайная страница Контакты | Мы поможем в написании вашей работы! | |
|
1. What type of crime is more dangerous?
2. What measures can be taken by governments against computer crime?
3. Personal information - address, salary, civil and criminal records - is usually kept or sold by governments and industries in electronic databases. Is personal privacy in danger?
4. Is it right to put restrictions on the contents of the Internet?
· Write a summary of the discussion. Then present your view to the rest of the class.
· Write a report “The best protection of information system”, using the connectors given below.
UNIT 20
Data Backup and restore procedures
Vocabulary Bank Unit 20
Task 1. Read, write the translation and learn the basic vocabulary terms:
1. arson
2. barebones
3. bothersome
4. bot-infected
5. content
6. copy routines
7. cur
8. dishonest adware
9. distribution
10. end-user license
11. failures
12. feasible
13. fit
14. flood
15. fritz
16. fuss
17. harsh
18. high-tech twist
19. hostile intent
20. innocuous
21. intrusions
22. law maker
23. non-shared folder
24. off-site terminal
25. perspective
26. prank
27. pre-disaster state
28. registry
29. repel
30. responsible
31. restitution
32. restore procedures
33. rightful owner
34. root directory
35. rootkit
36. schedule backup
37. security breach
38. simplified
39. spyware
40. startup disk
41. stiff penalty
42. subfolders
43. threat
44. to be accused
45. to be tolerated
46. to bind together
47. to bother
48. to combat
49. to defend
50. to justify
51. to mastermind
52. to reproduce itself
53. to vilify
54. unwanted
55. unattended
56. virus trigger
Text 20A. DATA BACKUP AND RESTORE PROCEDURES
Дата публикования: 2015-09-17; Прочитано: 844 | Нарушение авторского права страницы | Мы поможем в написании вашей работы!