Методическое пособие по совершенствованию навыков чтения и говорения на английском языке для студентов фксиС и фитиУ



бет50/55
Дата14.09.2023
өлшемі0,77 Mb.
#181014
түріМетодическое пособие
1   ...   47   48   49   50   51   52   53   54   55
Байланысты:
английский для ИТ 1

Comprehension check. Choose the ending for each sentence from the two versions given.



1. Worm named Code Red was targeted

a) White House;
b) Bank of Scotland.



2. Any program designed to enter a computer and disrupt its normal operations is called



a) malicious code;
b) utility.



3. Many types of malicious codes are created by

a) the computer itself;
b) individuals referred to as “hackers”.



4. A boot sector virus infects the system files your computer uses



a) every time you turn it on;
b) when you are connected to the Internet.



5. A change in the length of a program from one computing session to the next

a) indicated the possible presence of a virus;
b) is a result of operation system work.



6. A checksum is

a) a number calculated by combining the binary values of all bytes in a file;
b) the cost of an antivirus program.





Vocabulary practice


1. Which word does not belong to the group?

a) virus, worm, Trojan horse, bot, file, botnet;


b) distribute, download, automate, infect, view, execute;
c) duplicates, instructions, infects, invades, behaves, spreads;
d) spider, programmer, hacker, user, server, developer;
e) individual, general, normal, personal, analytical, digital.


2. Fill in the blanks choosing from the variants given.

1. Does the term computer virus refer to any malicious code that … (makes up/invades) a computer system?


2. When your computer executes an infected program it … (executes/deletes) the attached virus instructions.
3. A trigger event, such as a specific date, can … (kill/destroy/unleash) some viruses.
4. Love letter is one of the … (slowest/fastest) spreading mass-mailing worms of all time.
5. Hackers created viruses that insert themselves into … (used/unused) portions of a program file without changing its length.


3. Transform the given sentences using the word(s) in brackets without any change in meaning.

1. A computer virus is a set of programs that attaches itself to a file (connecting).


2. If a document contains an infected macro, the macro virus duplicates itself into the general macro pool, where it is picked up by other documents (doubles, selected).
3. A virus might deliver a payload which could be both harmless and devastating (do no harm, corrupt).
4. Software that can automate a task when commanded to do so is called an intelligent agent (is able, is instructed).
5. A trigger event, such as a specific date, can unleash some viruses (particular, release).
6. Trojan horses are notorious for stealing passwords using a keylogger – a type of program that records your key-strokes (known, a sort).


4. Fill in the gaps in the text.

A computer virus is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to the other files. You might encounter several types of viruses. A virus that attaches itself to an application program, such as a game utility, is known as a ___ virus. A boot ___ virus infects the system files your computer uses every time you turn it on. A ___ virus infects a set of instructions that automates document and worksheet production.


A Trojan horse is a computer program that seems to perform one function while actually doing something else. Such programs are notorious for stealing ___, although some delete files and cause other problems.
___ software can help prevent viruses from invading your computer system and can root out viruses that that take up residence. This software typically scans for a virus ___ and is sometimes referred to as virus scanning software.




Достарыңызбен бөлісу:
1   ...   47   48   49   50   51   52   53   54   55




©engime.org 2024
әкімшілігінің қараңыз

    Басты бет