Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Posibnik_dlya_2_KURSU1docx.docx
Скачиваний:
0
Добавлен:
01.07.2025
Размер:
3.7 Mб
Скачать
  1. Fill in the gaps with appropriate words from the list below.

Connection, apply, advantage, deal with, engines, online, reasons

Cyberstalking and harassment or “cyber bullying” involve the use of 1) _online_ communications and facilities (such as instant messaging, chat rooms, e-mail, or Web sites) to stalk, harass, or otherwise abuse a person or group. These activities may be carried on entirely online or in 2) _connection_with physical stalking or harassment.

Stalking and threatening a person has been a crime in the physical world for some time, and similar principles 3) _apply_ to online stalking. Generally, to be guilty of stalking, a person must repeatedly harass or threaten the victim, often following him or her and intruding or violating privacy.

Cyberstalkers take 4) _advantage_ of the fact that there is a great deal of information about many people online. (Indeed, the popularity of sites such as MySpace means that many users can unwittingly provide that information in well-organized, easy-to-access form.) The stalker can also use search 5) _engines_ to find e-mail or even physical addresses and phone numbers, or can join chat rooms used by the prospective victim.

Motives for stalking can range from obsession to anger at some real or imagined slight, to more idiosyncratic 6) _reasons__. As with physical stalking in an earlier generation, law enforcement agencies were often slow to acknowledge the potential seriousness of the crime or to develop effective ways to 7) _deal with_ it.

  1. Fill the cells in the table with the words derived from the given ones.

    Verb

    Noun

    Adjective

    Adverb

    …install..

    installation, …installment…

    …installed, installable…

    _______

    …convert…..

    convert, convertion., …converter..

    converted, conberting.

    _______

    _______

    vulnerability

    vulnerable, …………

    vulnerably

    globalize.

    globalist, globalization, globalism.

    global.

    globally.

    To transform..

    transform, transformation, …transformer,

    transformed, transformable.

    _______

    connect

    connectivity, connection

    Connective

    _______

    armor..

    armor,armature, …armour.

    …armored.

    _______

  2. Fill in the word derived from the word in bold.

Anonymity, or the ability to communicate without disclosing a verifiable identity, is a consequence of the way most Internet-based e-mail, chat, or news services were 1) _designed_ (design). This does not mean that messages do not have names 2) _attached_ (attach). Rather, the names can be arbitrarily chosen or pseudonymous, whether 3) __reflected_ (reflect) development of an online persona or the desire to avoid having to take responsibility for unwanted 4) __communications_ (communicate).

Pseudonymity (the ability to choose names separate from one’s primary identity) in such venues as chat rooms or online games can also allow people to experiment with different identities or roles, perhaps getting a taste of how members of a different gender or ethnic group are 5) __percieved__ (perceive).

The principal problem with anonymity is that it can allow the user to engage in 6) ___socially__ (social) undesirable or even criminal activity with less fear of being held accountable. The combination of anonymity (or the use of a pseudonym) and the lack of physical presence seems to embolden some people to engage in insult or “flaming,” where they might be inhibited in an ordinary social setting. A few services (notably The WELL) insist that the real identity of all 7) _partisipation_ (participate) be available even if postings use a pseudonym.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]