Кандидат филологических наук, доцент Казну т. Т



бет93/143
Дата15.03.2022
өлшемі2,47 Mb.
#135726
1   ...   89   90   91   92   93   94   95   96   ...   143
Байланысты:
EITS

Il

In

Un










WHILE READING


Activity 8. Read the text and mark the statements true (T), false (F) or not given (NG):
1) The text focuses on significant increase in the number of data-stealing attacks. ___
2) There is no difference between viruses and worms. ___
3) Phishing refers to cyberstalking activities. ___
4) Harassment is the behavior intended to trouble or annoy someone. ___
5) Worm neither deletes nor changes files on the victim's computer. ___
6) Viruses, worms and Trojan horses constitute one group. ___


Activity 9. Which computer crimes are the following characteristics associated with:



1. is done to use sth without paying for it

A. spyware

2. is hidden in fake freeware or shareware

B. scam

3. is a bank fraud

C. Trojan horse

4. is an e-mail fraud

D. cyberstalking

5. is done to threaten, slander, or abuse people

E. virus

6. is attached to executable files

F. worm

7. is self-copying

G. piracy

8. looks innocent

H. phishing



Activity 10. Enumerate:
1) Computer crimes meant to steal information:
2) Computer crimes meant to damage data and equipment:
3) Malicious computer programs:
4) Unauthorized uses of a computer:
5) Computer crime effects:
6) Ways to protect your computer from threats:


Activity 11. Identify the Internet crimes:

1) Crackers try to find a way to copy the latest game or computer program.


2) A study has revealed that half a million people will automatically open an email they believe to be from their bank and send off all their security details.
3) The danger of this software is hidden behind an attractive appearance. That's why it is often wrapped in attractive packages promising photos of celebrities.
4) There is a particular danger in Internet commerce and emails. Many people believe they have been offered a special gift only to find out later they have been deceived.
5) “Nimda” spreads by sending infected emails and is also able to infect websites, so when a user visits a compromised website, the browser can infect the computer.
6) Every day millions of children spend time in Internet chat rooms talking to strangers. But what many of them don't realize is that some of the surfers chatting with them may be sexual predators.


Activity 12. What computer crime above does each advice refer to?
a) Don’t buy cracked software or download music illegally from the Internet.
b) Be suspicious of wonderful offers. Don't buy if you aren't sure.
c) Don’t give personal information to people you contact in chat rooms.
d) Don’t open the attachments from people you don't know even they look attractive.
e) Scan your email and be careful about which websites you visit.
f) Check with your bank before sending information.




Достарыңызбен бөлісу:
1   ...   89   90   91   92   93   94   95   96   ...   143




©engime.org 2024
әкімшілігінің қараңыз

    Басты бет