Experiencing English 2, Unit 8 Computers and Security Related lnformation Personal Computer The internet Email Computer Virus a Macro Virus Melissa The Love Bug Passage A You are the Weakest Link, Goodbye FRNSWUCG
Experiencing English 2, Unit 8 Computers and Security Passage A You are the Weakest Link, Goodbye Related Information ◼ Personal Computer ◼ The Internet ◼ Email ◼ Computer Virus ◼ Macro Virus ◼ Melissa ◼ The Love Bug
Experiencing English 2, Unit 8 Computers and Security Personal Computer(PC) All computers, from the first room-sized mainframes, to today's powerful desktop, laptop and even hand-held PCs, perform the same general operations on information. What changes over time is the information handled, how it is handled, how much is moved around, and how quickly and efficiently it can be done. http://www.pcguide.com/intro/works/jobs.htm Passage A You are the Weakest Link, Goodbye FRNSWUCG
Experiencing English 2, Unit 8 Computers and Security Passage A You are the Weakest Link, Goodbye Personal Computer (PC) ◼ All computers, from the first room-sized mainframes, to today's powerful desktop, laptop and even hand-held PCs, perform the same general operations on information. What changes over time is the information handled, how it is handled, how much is moved around, and how quickly and efficiently it can be done. http://www.pcguide.com/intro/works/jobs.htm
Experiencing English 2, Unit 8 Computers and Security The Internet YAHoo! search:[ My Yahne My Mad I Dazzling in cannes 天司 国世A oBeka.o Simate puts of Pelion The most popular search engine on the Internet--Yahoo n The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to Internet. It is certain, however. that these number in the millions and are increasing at a rapid rate An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more. Passage A You are the Weakest Link, Goodbye FRNSWUCG
Experiencing English 2, Unit 8 Computers and Security Passage A You are the Weakest Link, Goodbye The Internet ◼ The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions and are increasing at a rapid rate. ◼ An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more. The most popular search engine on the Internet -- Yahoo
Experiencing English 2, Unit 8 Computers and Security Email What is an email address made up of? The @(at)sign divides the username and domain name Type of Institution Junk email slows help@internet 101.org down genuine messages and Username or Domain name. The name de the privacy identification number of the users Internet of email users system or location Junk email Even with the multimedia excitement of the Web, Electronic Mail(email) is the most frequently used application of the Internet. Many people who have access to the Internet at school, home, and work, use the Internet for no other purpose than to send and receive email Email allows computer users locally and worldwide to exchange messages Each user of email has a mail box address to which messages are sent Messages sent through email can arrive within a matter of seconds http://www.internet101.org/email.html Passage A You are the Weakest Link, Goodbye FRNSWUCG
Experiencing English 2, Unit 8 Computers and Security Passage A You are the Weakest Link, Goodbye Email ◼ Even with the multimedia excitement of the Web, Electronic Mail (email) is the most frequently used application of the Internet. Many people who have access to the Internet at school, home, and work, use the Internet for no other purpose than to send and receive email. ◼ Email allows computer users locally and worldwide to exchange messages. Each user of email has a mailbox address to which messages are sent. Messages sent through email can arrive within a matter of seconds. http://www.internet101.org/email.html/ Junk Email What is an email address made up of? Junk email slows down genuine messages and invade the privacy of email users
Experiencing English 2, Unit 8 Computers and Security Computer Virus A computer virus! 金山反病毒资讯网 痫专题 I m gonna eat yer FAT! A computer virus is a program that invades your computer system, hides there, and makes copies of itself. Viruses spread when you launch an infected application or start up your computer from a disk that has infected system files Al computer viruses are manmade. A simple virus that can make a copy of itself dangerous because it will quickly use all available memory and bring th a over and over again is relatively easy to produce. Even such a simple virus is e system to a halt It is highly recommended that you have Virus Protection installed in your computer before you consider downloading anything http://www.internet101.org/virus.html Passage A You are the Weakest Link, Goodbye FRNSWUCG
Experiencing English 2, Unit 8 Computers and Security Passage A You are the Weakest Link, Goodbye Computer Virus ◼ A computer virus is a program that invades your computer system, hides there, and makes copies of itself. Viruses spread when you launch an infected application or start up your computer from a disk that has infected system files. ◼ All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. ◼ It is highly recommended that you have Virus Protection installed in your computer before you consider downloading anything. http://www.internet101.org/virus.html/