by PushtoLearn
Unit 7
Table of Contents
Unit 7, Business Result Intermediate (2nd) Exercises and Flashcards
Wordlist for Unit 7, Business Result Intermediate (2nd)
Word | Definition | Example |
back up files | to make a copy of information stored on a computer | Don't forget to back up all your files so you have a copy. |
be down | not working | The website was down for nearly a week. |
blacklisted | a person, country, product etc on a blacklist | The organization manages databases of spammers and blacklisted users for business corporations. |
character | a letter, mark, or sign used in writing, printing, or on a computer | To make the password stronger, it has to be eight characters including at least one number and one capital letter. |
compromised | under an agreement in which everyone involved accepts less than what they wanted at first | The servers were compromised and the website is down. |
cover | to include or deal with a particular subject or group of things | Well, I think that covers everything. |
create a new password | to make up a secret group of letters or numbers that you must type into a computer before you can use a system or program | To prevent hackers, create a new password every month. |
cyberattack | the use of the Internet to illegally see or damage the information on someone's computer system | The organization became another victim of a cyberattack. |
cybercrime | criminal activity that involves the use of computers or the Internet | Have you ever been a victim of cybercrime? |
cybercriminal | a person who engages in criminal activity by means of computers or the Internet | Despite our online security, we couldn't prevent cybercriminals hacking the system. |
cybersecurity | things that are done to protect computer information and systems from crime | The company plans to increase spending on cybersecurity. |
encrypt | to protect information by putting it into a special code that only some people can read, especially information that is on a computer | Regularly changing passwords and encrypting files is important for online security. |
encrypt data | to protect information by putting it into a special code that only some people can read, especially information that is on a computer | Businesses need to encrypt sensitive data so no one else can read it. |
excessive | much more than is reasonable or necessary | Employees can use the Internet as long as it is not excessive and during lunchtime or breaks only. |
fingerprint | a mark made by the pattern of lines at the end of a person's finger, which is used by the police to find out who has committed a crime | I want to discuss the new fingerprint technology for company security. |
hacker | someone who secretly uses or changes the information in other people's computer systems | Hackers managed to access our company files. |
invest in | to buy something or spend money or time on something, because it will be useful for you | If you follow basic security procedures, then you might not need to invest in more security. |
log on | to do the necessary actions on a computer system that will allow you to begin using it | Once you have your username and password, you can log on. |
network | a set of computers that are connected to each other so that they can share information | Hackers often access a network without the company realizing there's a problem. |
online security | a branch of computer security that deals specifically with internet-based threats | Spamhaus had a special understanding of online security. |
open attachments | to open a document or file that is sent with an email message | Double-click this icon to open the attachment on your email. |
permission | if you have permission to do something, you are officially allowed to do it | Employees are not allowed to download or upgrade software without permission. |
personal details | details about a person such as their name and address | Enter your personal details on the website. |
personal use | to use sometning for personal needs | Employees mustn't access the Internet for personal use during working hours. |
policy | a way of doing something that has been officially agreed and chosen by a political party, a business, or another organization | I have to change my password every 12 weeks because it's company policy. |
prevent | to stop something from happening, or stop someone from doing something | To prevent hackers, create a new password every month. |
register | an official list of names of people, companies etc, or a book that has this list | Do you know how I can register with this website? |
reliant | dependent on someone or something | Businesses are becoming more reliant on the Internet. |
run scans | to use special computer program to look for computer viruses | Try running a scan to check for a virus. |
share documents | to have or use something with other people | I often open attachments and share documents for my job. |
spammer | e-mail messages or company that a computer user has not asked for and does not want to read, for example messages from advertisers | The attack was especially bad because the organization manages databases of spammers. |
sum up | to give the main information in a report, speech etc in a short statement at the end | I'll sum up the main points in an email. |
target | to aim something at a target | Criminals are targeting businesses, looking to steal data from their servers. |
temporary password | a password continuing for only a limited period of time | This is your temporary password. Log on with it and then you need to choose a new one. |
upgrade software | to make a computer, machine, program etc better and able to do more things | How often do you upgrade your software? |
victim | someone who has been attacked, robbed, or murdered | The new drug might help save the lives of cancer victims. |
vulnerable | a place, thing, or idea that is vulnerable is easy to attack or criticize | All organizations and businesses are vulnerable to cyberattacks. |