Insert the necessary words in the gaps
accuracy
camera
distance
length
recognition
taxing
database
features
unobtrusive
recognize
Biometric security technology operates on the basis that we all have unique measurable 1 such as fingerprints. A computer system can 2 and verify these. There are two techniques used in face
3. The first compares the size and arrangement of facial features - for example, the 4 of your nose and the 5 between your eyes. The other matches the most significant feature of your face, such as your nose, with a 6 record. The cost is quite high, as you need a 7 for each computer. In addition, it is difficult to set up the camera to photograph all the features needed to make the procedure work. Video images are also 8 on processing power. However, there is a high level of 9. The system can still recognize you even if you change your hairstyle. In addition, the system is 10. It photographs the face of the operator without any special action from them.
Study this diagram. It shows how face recognition can protect your computer system. Fill in the gaps in the text, using the information in the diagram and the words in the list.
Face recognition
Relatively expensive
Unobtrusive
Face recognition requires no special action from the person using it.
High accuracy
Face recognition is accurate, and the software provides an audit trail - with time, date, and face - of anyone trying to break into your PC.
Difficult setup
Video cameras make face recognition more difficult to set up than fingerprinting.
Taxing
Full-motion video uses a lot of computing power.
Language work: Revision
Put the verbs in brackets into the correct tense.
Bill (work) for the company for the last twenty-five years.
He (graduate) in business studies and (take) a job in London.
He (train) as a systems analyst while he (work) in London.
Now he (look after) all the systems used by the Technical Services Division.
At the moment he (develop) a system for handling repairs.
When something (go) wrong in a pub, a service engineer (send) to fix it.
Details of every repair (download) to the company ‘s mainframe each night.
No changes can (make) until the system (test).
10. Bill thinks that communications (get) faster and faster in the future.
11.He thinks that a paper-free office (not happen).
Fill in the gaps with the correct form of an appropriate verb from this list.
May
Might
Must
Should
Will
Technicians — have normal colour vision to follow
colour-coding of wires.
you try to remove a floppy disk when the drive is running.
Biological computers replace electronic computers in the
future.
you — update your webpage regularly.
You have pages with dead-ends on your website.
You know your password to gain access to the network.
Computers get cheaper and more powerful.
10. You back up your files regularly
Rewrite this advice using must or mustn’t.
Keep your network password secret.
Don’t try to access other people’s data.
Always make a backup copy of all your important files.
Never use commercial software without a licence.
Check your email regularly.
Never install software before it is virus-checked.
Don’t reuse Web images from pages which have a copyright symbol.
Never change other people’s data without permission.
Don’t believe every email message that warns you about viruses.
10 Always virus-check an email attachment before opening it.
Write two rules about each of these topics.
passwords
backups
working conditions
viruses
CD-ROM care