当前位置:高等教育资讯网  >  中国高校课件下载中心  >  大学文库  >  浏览文档

西安建筑科技大学:《大学英语》课程教学资源(大学体验英语,PPT课件讲稿,第二册)unit08_etpb2u08_a_ri

资源类别:文库,文档格式:PPT,文档页数:8,文件大小:1.2MB,团购合买
点击下载完整版文档(PPT)

Experiencing English 2, Unit 8 Computers and Security Related lnformation Personal Computer The internet Email Computer Virus a Macro Virus Melissa The Love Bug Passage A You are the Weakest Link, Goodbye FRNSWUCG

Experiencing English 2, Unit 8 Computers and Security Passage A You are the Weakest Link, Goodbye Related Information ◼ Personal Computer ◼ The Internet ◼ Email ◼ Computer Virus ◼ Macro Virus ◼ Melissa ◼ The Love Bug

Experiencing English 2, Unit 8 Computers and Security Personal Computer(PC) All computers, from the first room-sized mainframes, to today's powerful desktop, laptop and even hand-held PCs, perform the same general operations on information. What changes over time is the information handled, how it is handled, how much is moved around, and how quickly and efficiently it can be done. http://www.pcguide.com/intro/works/jobs.htm Passage A You are the Weakest Link, Goodbye FRNSWUCG

Experiencing English 2, Unit 8 Computers and Security Passage A You are the Weakest Link, Goodbye Personal Computer (PC) ◼ All computers, from the first room-sized mainframes, to today's powerful desktop, laptop and even hand-held PCs, perform the same general operations on information. What changes over time is the information handled, how it is handled, how much is moved around, and how quickly and efficiently it can be done. http://www.pcguide.com/intro/works/jobs.htm

Experiencing English 2, Unit 8 Computers and Security The Internet YAHoo! search:[ My Yahne My Mad I Dazzling in cannes 天司 国世A oBeka.o Simate puts of Pelion The most popular search engine on the Internet--Yahoo n The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to Internet. It is certain, however. that these number in the millions and are increasing at a rapid rate An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more. Passage A You are the Weakest Link, Goodbye FRNSWUCG

Experiencing English 2, Unit 8 Computers and Security Passage A You are the Weakest Link, Goodbye The Internet ◼ The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions and are increasing at a rapid rate. ◼ An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more. The most popular search engine on the Internet -- Yahoo

Experiencing English 2, Unit 8 Computers and Security Email What is an email address made up of? The @(at)sign divides the username and domain name Type of Institution Junk email slows help@internet 101.org down genuine messages and Username or Domain name. The name de the privacy identification number of the users Internet of email users system or location Junk email Even with the multimedia excitement of the Web, Electronic Mail(email) is the most frequently used application of the Internet. Many people who have access to the Internet at school, home, and work, use the Internet for no other purpose than to send and receive email Email allows computer users locally and worldwide to exchange messages Each user of email has a mail box address to which messages are sent Messages sent through email can arrive within a matter of seconds http://www.internet101.org/email.html Passage A You are the Weakest Link, Goodbye FRNSWUCG

Experiencing English 2, Unit 8 Computers and Security Passage A You are the Weakest Link, Goodbye Email ◼ Even with the multimedia excitement of the Web, Electronic Mail (email) is the most frequently used application of the Internet. Many people who have access to the Internet at school, home, and work, use the Internet for no other purpose than to send and receive email. ◼ Email allows computer users locally and worldwide to exchange messages. Each user of email has a mailbox address to which messages are sent. Messages sent through email can arrive within a matter of seconds. http://www.internet101.org/email.html/ Junk Email What is an email address made up of? Junk email slows down genuine messages and invade the privacy of email users

Experiencing English 2, Unit 8 Computers and Security Computer Virus A computer virus! 金山反病毒资讯网 痫专题 I m gonna eat yer FAT! A computer virus is a program that invades your computer system, hides there, and makes copies of itself. Viruses spread when you launch an infected application or start up your computer from a disk that has infected system files Al computer viruses are manmade. A simple virus that can make a copy of itself dangerous because it will quickly use all available memory and bring th a over and over again is relatively easy to produce. Even such a simple virus is e system to a halt It is highly recommended that you have Virus Protection installed in your computer before you consider downloading anything http://www.internet101.org/virus.html Passage A You are the Weakest Link, Goodbye FRNSWUCG

Experiencing English 2, Unit 8 Computers and Security Passage A You are the Weakest Link, Goodbye Computer Virus ◼ A computer virus is a program that invades your computer system, hides there, and makes copies of itself. Viruses spread when you launch an infected application or start up your computer from a disk that has infected system files. ◼ All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. ◼ It is highly recommended that you have Virus Protection installed in your computer before you consider downloading anything. http://www.internet101.org/virus.html/

Experiencing English 2, Unit 8 Computers and Security Macro viruses The rise and fall of a macro virus 1. EvilMacro, a macro virus program, is macro code and recognizes the guage. Its mission: to feed false data 82 Sub Evil Macro() Sub Evilla Change data Sub GoodMacro( 3. Both of these macros are Call evilmacro added to an innocuous Excel ca11Ev⊥ Macro document, which is sent to nd Sub document and enables the nove the virus code 2. A line of code is inserted into a dl from within the macro ich changes data i urning: Evil Macro does the dirty work.) Voila, clean file! Macro viruses are computer viruses that use an application,s own macro programming language to distribute themselves. These macros have the potential to inflict damage to the document or to other computer software The infecting files can be modified or deleted and may not be recoverable http://support.microsoftcom/default.aspx?scid=kb;eN-uS;q187243 Passage A You are the Weakest Link, Goodbye FRNSWUCG

Experiencing English 2, Unit 8 Computers and Security Passage A You are the Weakest Link, Goodbye Macro Viruses Macro viruses are computer viruses that use an application's own macro programming language to distribute themselves. These macros have the potential to inflict damage to the document or to other computer software. The infecting files can be modified or deleted and may not be recoverable. http://support.microsoft.com/default.aspx?scid=kb;EN-US;q187243

Experiencing English 2, Unit 8 Computers and Security Melissa Melissa virus at a glance What is it? Rapidly spreading macro virus Spreads through MS Word files MS Outlook e-mail Subject: Important Message From [name] What to do? IMPORTANT MEISS Don't open e-mail attachments Melissa MESSAGE. When prompted, dont run macro Update your anti-virus software Irus Melissa affects Word documents If launched, the macro virus will attempt to start Microsoft Outlook to send copies of the infected document via email to up to 50 people in Outlook's address book as an attachment The email subject line reads "Important Message from [the name of someone], "and the message reads"Here is that document you asked for.don't show anyone else http://www.melissavirus.com/ Passage A You are the Weakest Link, Goodbye FRNSWUCG

Experiencing English 2, Unit 8 Computers and Security Passage A You are the Weakest Link, Goodbye Melissa ◼ Melissa affects Word documents. If launched, the macro virus will attempt to start Microsoft Outlook to send copies of the infected document via email to up to 50 people in Outlook’s address book as an attachment. ◼ The email subject line reads "Important Message from [the name of someone]," and the message reads "Here is that document you asked for...don't show anyone else ;-)". http://www.melissavirus.com/

Experiencing English 2, Unit 8 Computers and Security The Love Bug The Love Bug virus is also called the Loveletter Virus, or simply I Love You The virus is circulating through email and affecting many customers. If run. the virus could overwrite jpg, mp3, and other file types, and attempt to send a IUE copy of itself to everyone in the recipient's address book LOVE YOU The e-mail containing the virus typically carries a subject line of " ILOVEYOU". Inside the mail is a short message saying "Kindly check the attached LOVELETTER coming from me"and an attachment RESEH named LOVE-LETTER-FOR-YOU txt vbs http://www.microsoft.com/misc/data/lovelettervirus.htm Passage A You are the Weakest Link, Goodbye FRNSWUCG

Experiencing English 2, Unit 8 Computers and Security Passage A You are the Weakest Link, Goodbye The Love Bug ◼ The virus is circulating through email and affecting many customers. If run, the virus could overwrite .jpg, .mp3, and other file types, and attempt to send a copy of itself to everyone in the recipient's address book. http://www.microsoft.com/misc/data/lovelettervirus.htm The e-mail containing the virus typically carries a subject line of "ILOVEYOU". Inside the mail is a short message saying "Kindly check the attached LOVELETTER coming from me" and an attachment named LOVE-LETTER-FOR-YOU.txt.vbs. The Love Bug virus is also called the Loveletter Virus, or simply I Love You

点击下载完整版文档(PPT)VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
已到末页,全文结束
相关文档

关于我们|帮助中心|下载说明|相关软件|意见反馈|联系我们

Copyright © 2008-现在 cucdc.com 高等教育资讯网 版权所有