Кандидат филологических наук, доцент Казну т. Т


~ with sth; tampering (n): computer ~; tampered (adj): ~ access



бет86/143
Дата15.03.2022
өлшемі2,47 Mb.
#135726
1   ...   82   83   84   85   86   87   88   89   ...   143
Байланысты:
EITS

~ with sth; tampering (n): computer ~; tampered (adj): ~ access


Victim (n)

someone who has been attacked, robbed, or murdered

fall ~ to sth; be the ~ of sth (joke, epidemic, attack); earthquake/accident ~; victimize (v): ~ sb for doing sth

Worm (n)

a self-replicating computer virus that penetrates an operating system with the intent of spreading malicious code

computer ~; wormy (adj)

TARGET VOCABULARY QUIZ


Choose the correct answer:
1. A type of software that collects information from your computer without your consent is called _____.
a) spyware b) adware c) malware d) freeware
2. _____ is the virtual world of computer and the Internet.
a) Site b) Chat room c) Forum d) Cyberspace
3. The process of saving and transmitting data into a secret code is called _____.
a) decoding b) decryption c) encryption d) conversion
4. Software, created to damage computer data is called _____.
a) adware b) malware c) spyware d) freeware
5. Internet-based conflict involving politically motivated attacks on information and information systems is called cyber_____.
a) warfare b) crime c) hacking d) attack
6. _____ is an illegal way of getting money via e-mail by promising profits from investing in a business activity which does not really exist.
a) Piracy b) Scam c) Phishing d) Skimming
7. All of these are synonyms EXCEPT for:
a) encode b) encrypt c) code d) decipher
8. _____ is a self-replicating computer virus that penetrates an operating system with the intent of spreading malicious code.
a) Virus b) Trojan horse c) Worm d) Logic bomb
9. All of these are synonyms EXCEPT for:
a) intruder b) invader c) hacker d) cracker
10. _____ is someone who invades a network’s privacy.
a) Hacker b) Invader c) Cybersquatter d) User
11. A _____ is a software and/or hardware device that allows limited access to an internal network from the net. a) protocol b) cookie c) firewall d) firework
12. Digital _____ is a file that identifies a user or a web server.
a) document b) certificate c) card d) signature
13. All of these are computer crimes EXCEPT for:
a) scam b) phishing c) piracy d) cyber warfare
14. Cyber_____ is the illegal use of the Internet, email, or other electronic communication systems to follow or threaten someone.
a) stalking b) surfing c) slacking d) loafing


Достарыңызбен бөлісу:
1   ...   82   83   84   85   86   87   88   89   ...   143




©engime.org 2024
әкімшілігінің қараңыз

    Басты бет