Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

IX. Insert prepositions

  1. It is suggested that one could commit murder … computer if one hacked … an air-traffic controller’s computer system.

  2. Some specific computer crimes are set … … the Computer Misuse Act.

  3. Such information needs protection … the criminal law.

  4. … contrast information … paper can be kept … a safe or other secure place.

  5. It is not always possible … the owner of the computer to realize that the data have been looked …

  6. The act prohibits “hacking”, i.e. gaining unauthorized access … computer material.

  7. The Act also contains a more serious offence of doing this … the intent to commit another offence.

  8. A defendant who obtained data which he intended to use in the future to commit an offence … obtaining property … deception will still be guilty … the more serious offence.

  9. There is also an offence … modifying computer material … an unauthorized way.

  10. This section is clearly aimed … people who alter computer data … intent to corrupt a program.

  11. The intent does not need to be direct … any particular computer or data.

  12. Modification is defined as including removal … any program or data on a computer and includes adding … the contents or erasing them.

  13. Temporary modification is sending someone a disc … a virus on it that was intended to damage the working of the computer.

  14. It is possible to be guilty … criminal damage …computers.

X. Insert the proper words (see the words below)

  1. Computers can be used to … all kinds of crimes.

  2. Not surprisingly crimes that specifically relate to computers are relatively recent creations of ...

  3. Some specific computer crimes are … in the Computer Misuse Act 1990.

  4. It is designed to … information kept on computers.

  5. It is very hard to … information stored on a computer.

  6. Often the information is intended to be accessed by a number of … people.

  7. By contrast information on paper can be kept in a safe or other … place.

  8. The ease of destroying or … data on a computer means it deserves special protection.

  9. The act prohibits “hacking”, i.e. gaining … access to computer material.

  10. The offence is committed if a … is entering the computer just to see what he can find.

  11. The Act also contains a more serious … of doing this with the intent to commit another offence.

  12. A defendant who obtained data which he intended to use in the future to commit an offence of … property by deception will still be guilty of the more serious offence.

  13. This section is clearly aimed at people who … computer data with intent to corrupt a program.

  14. Modification is defined as including … of any program or data on a computer.

  1. alter

  2. authorized

  3. commit

  4. corrupting

  5. defendant

  6. obtaining

  7. offence

  8. protect

  9. removal

  10. safeguard

  11. secure

  12. set out

  13. statute

  14. unauthorized

XI. Say in one word (see the words below)

  1. deception, theft, misuse

  2. gaining unauthorized access to computer

  3. keep safe from danger

  4. information to be kept secret

  5. the act of taking somebody else’s property secretly, without right, unlawfully

  6. having no legal right to be done

  7. make changes in, make different

  8. law passed by Parliament or other law-making body

  9. person against whom a legal action is brought

  10. use for a wrong purpose in illegal way

  1. confidential

  2. crime

  3. defendant

  4. hacking

  5. misuse

  6. modify

  7. protect

  8. statute

  9. theft

  10. unauthorized

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]