Comprehension check. Choose the ending for each sentence from the two versions given.
1. Worm named Code Red was targeted
|
a) White House;
b) Bank of Scotland.
|
2. Any program designed to enter a computer and disrupt its normal operations is called
|
a) malicious code;
b) utility.
|
3. Many types of malicious codes are created by
|
a) the computer itself;
b) individuals referred to as “hackers”.
|
4. A boot sector virus infects the system files your computer uses
|
a) every time you turn it on;
b) when you are connected to the Internet.
|
5. A change in the length of a program from one computing session to the next
|
a) indicated the possible presence of a virus;
b) is a result of operation system work.
|
6. A checksum is
|
a) a number calculated by combining the binary values of all bytes in a file;
b) the cost of an antivirus program.
|
Vocabulary practice
1. Which word does not belong to the group?
a) virus, worm, Trojan horse, bot, file, botnet;
b) distribute, download, automate, infect, view, execute;
c) duplicates, instructions, infects, invades, behaves, spreads;
d) spider, programmer, hacker, user, server, developer;
e) individual, general, normal, personal, analytical, digital.
2. Fill in the blanks choosing from the variants given.
1. Does the term computer virus refer to any malicious code that … (makes up/invades) a computer system?
2. When your computer executes an infected program it … (executes/deletes) the attached virus instructions.
3. A trigger event, such as a specific date, can … (kill/destroy/unleash) some viruses.
4. Love letter is one of the … (slowest/fastest) spreading mass-mailing worms of all time.
5. Hackers created viruses that insert themselves into … (used/unused) portions of a program file without changing its length.
3. Transform the given sentences using the word(s) in brackets without any change in meaning.
1. A computer virus is a set of programs that attaches itself to a file (connecting).
2. If a document contains an infected macro, the macro virus duplicates itself into the general macro pool, where it is picked up by other documents (doubles, selected).
3. A virus might deliver a payload which could be both harmless and devastating (do no harm, corrupt).
4. Software that can automate a task when commanded to do so is called an intelligent agent (is able, is instructed).
5. A trigger event, such as a specific date, can unleash some viruses (particular, release).
6. Trojan horses are notorious for stealing passwords using a keylogger – a type of program that records your key-strokes (known, a sort).
4. Fill in the gaps in the text.
A computer virus is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to the other files. You might encounter several types of viruses. A virus that attaches itself to an application program, such as a game utility, is known as a ___ virus. A boot ___ virus infects the system files your computer uses every time you turn it on. A ___ virus infects a set of instructions that automates document and worksheet production.
A Trojan horse is a computer program that seems to perform one function while actually doing something else. Such programs are notorious for stealing ___, although some delete files and cause other problems.
___ software can help prevent viruses from invading your computer system and can root out viruses that that take up residence. This software typically scans for a virus ___ and is sometimes referred to as virus scanning software.
Достарыңызбен бөлісу: |