Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
методичка-(5курс)1ч.doc
Скачиваний:
0
Добавлен:
01.05.2025
Размер:
359.94 Кб
Скачать

9. Put these words in the right order to make sentences.

1. The / the / a / most / outside / threat / computer / is / to / common / virus /.

2. Viruses / to / written / attack / a / are / specific / macro / program /.

3. Two / there / are / main / viruses / types / computer, of /.

4. Hobbyists / was / "hacker" / video / who / spare / their / time / spent / creating / games /.

5. By / crimes / computer / outsiders / perpetrate /.

6. Best / is / way / the / fight / bugs / to / to / avoid / these / them /.

7. Binary / your / viruses / actual / designed / are / either / to / attack / programs / data /.

8. Viruses / infect / to / by / attaching / programs / themselves / your / machine /.

10. Match the first part (1-9) of the sentence with the second one (a-I).

1. Spam is …

2. Computer virus is …

3. Computer fraud is …

4. Cyberstalking is …

5. Malware is …

6. Hard disk drive is …

7. Binary code …

8. Internet is …

9. Cyberterrorism is …

a) … a non-volatile, random access device for digital data.

b) … unlawful to varying degrees.

c) … software designed to secretly access a computer system without the owner's informed consent.

d) … any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss.

e) … is a way of representing text or computer processor instructions by the use of the binary number system's two-binary digits 0 and 1.

f) … the use of the Internet to stalk or harass an individual or an organization.

g) … a computer program that can copy itself and infect a computer.

h) … a global system of interconnected computer networks that use the standard

Internet Protocol Suite (TCP/IP) to serve billions of users worldwide.

i) … a phrase used to describe the use of Internet based attacks in terrorist activities.

11. Read the text “Computer virus”. Choose the word that best fits each space. Put the correct letter (a, b, c or d) for each sentence.

A computer virus is a computer 0- … that can copy itself and infect a computer. A true virus can spread from one 1- … to another when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting 2- … on a network file system or a file system that is accessed by another computer.

The term "computer virus" is sometimes used as a catch-all phrase to include all 3- … of malware, even those that do not have the reproductive ability. Malware includes computer 4- …, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan 5- …, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through 6- … A Trojan horse is a 7- … that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's 8- … or performance. Some viruses and other malware have 9- … noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some 10- … do nothing beyond reproducing themselves.

0. a) program b) file c) type d) virus

1. a) program b) file c) type d) computer

2. a) symptoms b) files c) types d) viruses

3. a) files b) symptoms c) types d) viruses

4. a) symptoms b) types c) viruses d) files

5. a) horses b) cats c) birds d) dogs

6. a) networks b) systems c) chains d) programs

7. a) system b) type c) program d) file

8. a) file b) figure c) evidence d) data

9. a) file b) symptoms c) virus d) data

10. a) symptoms b) files c) records d) viruses