Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
компьютеры учебник 2016.doc
Скачиваний:
12
Добавлен:
11.02.2016
Размер:
629.76 Кб
Скачать

Insert the necessary words in the gaps

accuracy

camera

distance

length

recognition

taxing

database

features

unobtrusive

recognize

Biometric security technology operates on the basis that we all have unique measurable 1 such as fingerprints. A computer system can 2 and verify these. There are two techniques used in face 3. The first compares the size and arrangement of facial features - for example, the 4 of your nose and the 5 between your eyes. The other matches the most significant feature of your face, such as your nose, with a 6 record. The cost is quite high, as you need a 7 for each computer. In addition, it is difficult to set up the camera to photograph all the features needed to make the procedure work. Video images are also 8 on processing power. However, there is a high level of 9. The system can still recognize you even if you change your hairstyle. In addition, the system is 10. It photographs the face of the operator without any special action from them.

Study this diagram. It shows how face recognition can protect your computer system. Fill in the gaps in the text, using the information in the diagram and the words in the list.

Face recognition

Relatively expensive

Although the software alone is not expensive, you need to buy a video camera for every area you want to protect

Unobtrusive

Face recognition requires no special action from the person using it.

High accuracy

Face recognition is accurate, and the software provides an audit trail - with time, date, and face - of anyone trying to break into your PC.

Difficult setup

Video cameras make face recognition more difficult to set up than fingerprinting.

Taxing

Full-motion video uses a lot of computing power.

Language work: Revision

Put the verbs in brackets into the correct tense.

  1. Bill (work) for the company for the last twenty-five years.

  2. He (graduate) in business studies and (take) a job in London.

  3. He (train) as a systems analyst while he (work) in London.

  4. Now he (look after) all the systems used by the Technical Services Division.

  5. At the moment he (develop) a system for handling repairs.

  6. When something (go) wrong in a pub, a service engineer (send) to fix it.

  7. Details of every repair (download) to the company ‘s mainframe each night.

  8. No changes can (make) until the system (test).

10. Bill thinks that communications (get) faster and faster in the future.

11.He thinks that a paper-free office (not happen).

Fill in the gaps with the correct form of an appropriate verb from this list.

May

Might

Must

Should

Will

  1. Technicians — have normal colour vision to follow

  2. colour-coding of wires.

  3. you try to remove a floppy disk when the drive is running.

  4. Biological computers replace electronic computers in the

  5. future.

  6. you — update your webpage regularly.

  7. You have pages with dead-ends on your website.

  8. You know your password to gain access to the network.

  9. Computers get cheaper and more powerful.

10. You back up your files regularly

Rewrite this advice using must or mustn’t.

  1. Keep your network password secret.

  2. Don’t try to access other people’s data.

  3. Always make a backup copy of all your important files.

  4. Never use commercial software without a licence.

  5. Check your email regularly.

  6. Never install software before it is virus-checked.

  7. Don’t reuse Web images from pages which have a copyright symbol.

  8. Never change other people’s data without permission.

  9. Don’t believe every email message that warns you about viruses.

10 Always virus-check an email attachment before opening it.

Write two rules about each of these topics.

  1. passwords

  2. backups

  3. working conditions

  4. viruses

  5. CD-ROM care