« IELTS Reading: true, false, not given | Main | New video lesson for writing task 1 »

January 20, 2015

Comments

Feed You can follow this conversation by subscribing to the comment feed for this post.

Hi everyone,

Here is my answers:

1. Username, password
2. Tampered
3. Of course,voice
4. Borders
5. Emerges,protected

1. Username, Password
2. Tampered
3. voice
4. borders
5. emerges
6. protective

1. username/password
2. tampered
3. voice
4. borders
5. emerges/protected

username, password
tempered
voice
borders
emerges
protective

1.Username,password
2.Tampered
3.Voice
4.Borders
5.Emerges,protected

1 - , password
2. tempered
3. voice
4. -
5 emerges protected.

I lost concentration at the beginning of the passage, so i did not capture the first 2 gaps and the fourth gap at the first run of the video
1 ..., username( on second run)
2 password
3.tampered
4.biometric on second run
5. borders
6. emerges
7.protected
Simon, Just when I think I have got a hang of it, then i make such a silly mistake and miss the mark.I have been practicing for weeks and I have my academic exam in 8 days. Am doomed. Please advise on how to avoid these fatal mistakes
hilda

IS ANY ONE DOING THERE ACADEMIC ON 29 JAN 2015 WITH ME OR BEFORE, PLEASE HOLA SO WE CAN HELP EACH OTHER OUT
HILDA KAMPALA

My answers are:
username, password
tempered
voice
borders
emerges, protective

Username, password
Temped
Voice
Borders
Emerges, protected

1- usernames/password

2-tampered

3-voice

4-borders

5- emerges/protected

My answer is:
1. usernames and passwords
2. ?
3. voice
4. borders
5. emerges
6. protected

1-usernames -passwords
2-
3-voice
4-borders
5-emerges-protected

My answers
1. username
2. passwords
3. tempered
4. voice
5. borders
6. emerges
7. protected

1.username password
2.tempered
3.voice
4.-
5.emerges; protected

1. username, password
2.-
3. voice
4. borders
5. emerges; protected

usernames , passwords
tampered
vice
borders
emerges, protected

1. username
2. passwords
3. tempered
4. voices
5. borders
6. emerges
7. protective

1. Username, password
2. Tempered
3. Voice
4. Borders
5. Emerges, protective
MY TAPESCRIPT (HAVEN'T FINISHED) HOPE U ,GUYS, GIVE ME YOURS HAND... TO COMPLETE IT!
In today's society, we use password to access almost critical information for our government or business ... We rely on username and password. To identify people, we give an passport and the picture on it ... Or the driver's license has been tempered with. And that's not good enough anymore in the days that we live in. Yes, fingerprint, facial, iris and of course, voice, that all have biometric patterns to it. For example, the voice has specific point of highs and lows that is unique to you. On your fingerprint, there're several ... points and delta patterns and grooms - they create ID. So when you come back, it can be matched as many. We're identifying people at borders with facial recognition software even some other ... their laptop today come with facial recognition software to allow you access to your laptop. With a swipe of your finger, you can gain access to your PC, gain access to your single sign on your network. So not only it's secure but it's easy as well. Worksheet technology that they're using in Asia with cellphone credentials to ....

1.user name, password
2.tempered
3. voice
4. borders
5. emerges, protected

1-government and business
2-good enough
3-voice
4-boards
5-emerges -predict

1. username - password
2. tampered
3. voice
4. borders
5. emerges - protected

1. user name, password
2. tempered
3. voice
4. borders
5. emerges - proteceted

1. usernames, passwords
2. tampered
3. voice
4. borders
5. emerges, protected

@Ghi Dinh : Thanks you buddy, here it is I continue your transcribing. CMIIW

So not only it's secure but it's easy as well. We’ll see technology that they're using in Asia with cellphone pass in credentials to vending machine for convenience. So, I think as technology emerges our identity should be better protected; it’ll be easier for us give us our identity that says we are who we are versus us just telling we are who we are.

Hey there, anyone wants to practice speaking? I will take the exam at the end of Feb and my target is 7. If you are interested and with the similar level, do not hesitate to contact me by Skype:lotus1520196. Pls mention that you see this msg in Simon's blog. BTW, I base in Shanghai. Thanks.

CORRECT ANSWERS FROM SIMON:

1. usernames, passwords

2. tampered

3. voice

4. borders

5. emerges, protected

A couple of difficult sentences from the listening:

- To identify people we give them a passport and trust that the picture on it is theirs, or the driver's license hasn't been tampered with.

- We'll see technology that they're using in Asia, with cell phones passing credentials to vending machines for convenience.

Note:
"tamper with" = interfere with something, damage or make unauthorised alterations to something

oh.thank you Simon. i missed (S) for username and password. i am going to listen again. one more time.

Username, Password
Tampered
Biometric
Borders
emerges, protected

Username, Password
Tempered
Voice
Borders
Emerges. Protected


1. names
2. passwords
3. tempered
4. voice
5. borders
6. immigrates
7. protected

In today’s society, we use password to access some of most critical information for our gorvenment, our businesses alike. We reply on username and password to indentify people. We give them the passport and trust that the picture on it is theirs, or the driver’s license has been tampered with . That’s not a good anymore in the days that we live in. Yes fingerprint, facial, iris and of course voice, that all have biometrics patterns to it. For example, the voice has specific point of highs and lows that is unique to you. On your fingerprint this several militia points and delta patterns and grooms they create a unique ID so that when you come back it can be matched as many. We’re identifying people at borders with facial recognition sofware even some of the higher laptops taoday come with facial recognition software to allow you access to your laptop. With the swipe of finger, you can gain access to your PC, gain access single sign on your network . So not only is it secure but it’s easy as well. We’ll see technology that they’re using in Asia with cellphones passing credentials to vending machine for convenince. So I think as the technology emergers, our identities will be better protected. It will be easy for us to give our identities that say we are who we are versus us just telling who we are.

1. Username, Password
2. Tampered
3. voice
4. borders
5. emerges
6. protected

username, password
tampered
voice
borders
emerges
protected

username, password
tempered
voice
border
emerges , protected

1. Username, password
2. Tempered
3. Voice
4. Borders
5. Emerges, protected

The comments to this entry are closed.