Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
методичка з колонтитулами.doc
Скачиваний:
78
Добавлен:
17.11.2018
Размер:
2.58 Mб
Скачать

X. Fill in the gaps

digital certificate malware virus scanner spyware firewall antivirus

Malicious software ____________ can be avoided by following some basic rules. To prevent crackers from breaking into your internal network and obtaining your data, install a __________. It will protect you from __________.

Internet users who like cyber shopping should get a _________ __________, an electronic identity card.

If you have been hit by a ________, don’t panic! Download a clean-up utility program and always remember to use an ____________ program, for example, a virus _______________.

XI. Make the right choice

1. Internet-based crimes include scam, email fraud _________ money or valuables.

a) to transfer

c) to make

b) to obtain

d) to earn

2. Piracy , the illegal copying and distribution of ________________.

a) self-copying programs

c) malicious software

b) email attachments

d) copyrighted software

3. Viruses are programs that spread by attaching themselves to _______________

a) shareware applications

c) email attachments

b) backup copies

d) executable files or documents

4. When the infected program is run, the virus ___________to other files or programs on the computer

a) includes

c) provides

b) propagates

d) obtains

5. Install a___________, a program designed to prevent spyware from gaining access to the internal network.

a) self-copying programs

c) firewall

b) backup copy

d) shareware application

6. Spyware usually comes hidden in ___________ downloadable from the Internet.

a) fake freeware

c) copyrighted software

b) self-copying programs

d) legitimate software

7. Worms are __________and don't need to be attached to a document or program

a) embedded

c) self-contained

b) hidden

d) downloadable

8. Trojan horses are malicious programs ___________ as innocent-looking files.

a) downloaded

c) embedded

b) disguised

d) included