Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
методичка-(5курс)1ч.doc
Скачиваний:
0
Добавлен:
01.05.2025
Размер:
359.94 Кб
Скачать

5. Find the answers to the questions that follow:

1. What is the most common outside threat to a business's computer network?

2. How many types of computer viruses are there?

3. Who is a "hacker"?

4. How do you defend your computer?

5. What viruses can reformat your hard drive?

6. How do viruses infect your machine?

7. What are macro viruses written to?

8. What can reformat your hard drive?

9. When did the National Computer Security Association estimate that two out of three U.S. companies were affected by computer viruses?

6. Consider the following statements whether they are true or false. Find the part of the text that gives the correct information.

1. Binary viruses can’t reformat your hard drive.

2. The damage wreaked by outside intruders can be significant and wide-ranging.

3. Viruses infect your video games.

4. Macro viruses are written to attack a specific program.

5. "Hacker" is a legal activity.

6. There are three main types of computer viruses.

7. Some security experts believe that the continued threat of outside "hackers" is due at least in part to the growing number of employees.

8. Computer crime, or cybercrime, is only national phenomenon.

9. The National Computer Security Association estimated that in 1996, two out of three U.S. companies were affected by one or more of the estimated 16,000 robots.

1

2

3

4

5

6

7

8

9

T

T

T

T

T

T

T

T

T

F

F

F

F

F

F

F

F

F

7. Complete the following sentences using the information from the text.

1. Computer crimes perpetrated by outsiders are …

2. The most common outside threat to …

3. "Hackers" were hobbyists who spent their spare time creating …

4. Some security experts believe that the continued threat of outside "hackers" is …

5. Viruses infect your machine by …

6. Binary viruses can reformat your …

7. Some security experts believe that the continued threat of outside "hackers" is due at least in …

8. The damage wreaked by outside intruders can be …

8. Fill in the words from the list below. Use each word only once.

Antivirus, program, computer, address, exploitation, floppy disks, virus, macros, crime, security.

1. Computer crime refers to any crime that involves a … and a network.

2. The computer may have been used in the commission of a …, or it may be the target.

3. Netcrime refers to criminal … of the Internet.

4. Most … software relies on virus signatures.

5. Before computer … became widespread, most viruses spread on removable media, particularly floppy disks.

6. Some old versions of Microsoft Word allow … to replicate themselves with additional blank lines.

7. A virus may also send a web … link as an instant message to all the contacts on an infected machine.

8. Most modern … programs try to find virus-patterns inside ordinary programs by scanning them.

9. The first academic work on the theory of computer … was done in 1949.

10. The actual term "virus" was first used to denote a self-reproducing … in a short story by David Gerrold in Galaxy magazine in 1969.

11. Before computer networks became widespread, most viruses spread on removable media, particularly ...