Заглавная страница Избранные статьи Случайная статья Познавательные статьи Новые добавления Обратная связь FAQ Написать работу КАТЕГОРИИ: АрхеологияБиология Генетика География Информатика История Логика Маркетинг Математика Менеджмент Механика Педагогика Религия Социология Технологии Физика Философия Финансы Химия Экология ТОП 10 на сайте Приготовление дезинфицирующих растворов различной концентрацииТехника нижней прямой подачи мяча. Франко-прусская война (причины и последствия) Организация работы процедурного кабинета Смысловое и механическое запоминание, их место и роль в усвоении знаний Коммуникативные барьеры и пути их преодоления Обработка изделий медицинского назначения многократного применения Образцы текста публицистического стиля Четыре типа изменения баланса Задачи с ответами для Всероссийской олимпиады по праву Мы поможем в написании ваших работ! ЗНАЕТЕ ЛИ ВЫ?
Влияние общества на человека
Приготовление дезинфицирующих растворов различной концентрации Практические работы по географии для 6 класса Организация работы процедурного кабинета Изменения в неживой природе осенью Уборка процедурного кабинета Сольфеджио. Все правила по сольфеджио Балочные системы. Определение реакций опор и моментов защемления |
Read the newspaper article Then, choose the right answers.Содержание книги
Похожие статьи вашей тематики
Поиск на нашем сайте
1 What is the article mainly about? A new types of computer virus В a man who is investigating viruses С the capture of a man who used viruses D a way to protect computers from viruses 2 Which type of virus was the most harmful? A overwriting viruses В anti-antivirus viruses С resident extensions D resident viruses 3 What can be inferred about resident viruses? A They can disable firewalls. В They aid hackers with piggybacking. С They do less damage than anti-antivirus viruses. D They do not always include resident extensions. Vocabulary Match the words (1-7) with the definitions (A-G). 1_ piggyback 5_ anti-antivirus vim 2_ hacker 6_resident extensic 3_host 7 _ virus 4_overwriting virus A a virus that attacks anti-virus software В a program file that installs itself without С an add-on that makes a computer virus the host computer's operating system D a virus that copies its code over and d?the files of the original data E to gain unauthorized access to a comp system by using the owner's connection F a computer system that has a virus attached to it G a person who illegally exploits computer hardware and software Write a word that is similar in meaning to the underlined part. 1 Email is used to contaminate computers with viruses. I_ _ _с _ 2 Enter identification that allows one to use a computer first. I_ _ _n 3 Some viruses can make copies of themselves. R_ _ _ i_ _t _ 4 If the virus becomes a part of something else, it will be hard to delete. _ m_ _ _s 5 Viruses that become part of files but do nothing until activated can go unnoticed for months. R_ _ _d_ _t _ _r_ _с_ _ Listen and read the newspaper article again. How did Greene gain unauthorized access to other people's computers? Listening Listen to a conversation between an employee and his manager. Mark the following statements as true (T) or false (F). 1 _ The manager read the newspaper article. 2 _Overwriting viruses destroyed the manager's files. 3 _ The manager decides to purchase new anti-virus software. 7. Listen again and complete the conversation. Speaking With a partner, act out the roles below based on Task 7. Then, switch roles. USE LANGUAGE SUCH AS: Have you seen this article in today's paper? How much damage are we talking about? Something like that would ruin the company. Student A: You are talking to a concerned employee. Ask Student В about: • viruses • potential damage Student B: You are a concerned employee. Answer Student A's questions. Writing 9. You are worried about computer security at work. Use the article and the conversation from Task 8 to write an email to your manager about (120-150 words). Talk about: · Why you are concerned about computer viruses · Which types of computer viruses are most dangerous · How computer viruses could harm the company
Identity theft 1) Cyber theif 2) Identity theft 3) Scanner 4) Pharming 5) Pretexting 6) Card scanning LINCONSHIRE BANK Dear Valued Customer, Recently, a series of identity thefts has affected our customers. Unfortunately, this led to several instances of fraud occurring at our bank. The best way to avoid these events is to be informed. Please take a moment to familiarize yourself with some common ways that criminals steal personal information. Card scanning is one simple form of identity theft. This is when someone uses a card scanner to record the information stored on credit or debit cards. Card scanning can be used to collect passport information as well. Email also presents opportunities for cyber thieves. Spam, or unsolicited emails, can contain malware. This malicious software includes spyware, Trojan horses, and worms that can infect one's computer and steal information. Phishing is also conducted over email. This occurs when thieves trick people into giving them information by pretending to represent a legitimate business. Pretexting is similar to phishing but is often done over the phone. Pharming occurs when a hacker redirects someone to a site operated by them. The site looks legitimate and tricks people into giving away personal information. T If you believe you may be the victim of identity theft, contact us immediately. We will take steps to ensure that your assets are safe. Get ready!
|
||||
Последнее изменение этой страницы: 2021-11-27; просмотров: 1221; Нарушение авторского права страницы; Мы поможем в написании вашей работы! infopedia.su Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Обратная связь - 3.15.10.139 (0.008 с.) |