Кандидат филологических наук, доцент Казну т. Т



бет97/143
Дата15.03.2022
өлшемі2,47 Mb.
#135726
1   ...   93   94   95   96   97   98   99   100   ...   143
Байланысты:
EITS

GRAMMAR FOCUS


Activity 6. Fill in the blanks with appropriate article if necessary:
1) Cookies are used by e-commerce websites to store _____ user's preferences.
2) Strong antivirus software is one of _____ best ways to protect your computer.
3) There is _____ large number of information security measures.
4) You can download freeware from _____ Net.
5) Mozilla Firefox displays _____ lock when _____ website is secure.
6) _____ virus can enter _____ PC via _____ Internet.
7) SSL provides secure transactions on _____ Web.
8) Firewall is _____ computer program that automatically prevents _____ unauthorized access to ___ Internet.
9) Digital certificates are like _____ ID cards that identify users and web servers.


Activity 7. Find among the italicized words below those with:
1) negative prefix(es):
2) prefix(es) which mean “to cause to be sth”:
3) prefix(es) which mean “the opposite of an action”:
4) prefix(es) which mean “electronic”:
5) suffix(es) which mean “a person”:
6) suffix(es) which mean “activity, state”:
7) suffix(es) which refer to computer products and programs of the same type:
malware, unauthorized, availability, encrypt, conversion, communication, user, hardware, encode, decrypt, e-business, intruder, protection, confidentiality, integrity, update, security, encryption, attacker, decryption, e-commerce, transaction, software, hacker.


Activity 8. Fill in the gaps with against, into, to (2), with, from (2).
1) There are a lot of methods to protect your computer _____ cybercrimes.
2) Digital certificates are similar _____ an ID card.
3) Hackers try to gain an illegal or an unauthorized access _____ a computer system.
4) To convert encrypted data back _____ its original form means to decrypt it.
5) Someone tampered _____ IBM systems by planting a bug to wipe out whole data.
6) This toolkit is used as a defense _____ Trojan horses, worms, viruses and weak passwords.
7) There is a large number of measures to prevent unauthorized users _____ accessing any part of the computer system.




Достарыңызбен бөлісу:
1   ...   93   94   95   96   97   98   99   100   ...   143




©engime.org 2024
әкімшілігінің қараңыз

    Басты бет