Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Методичка 5курс (1 часть).doc
Скачиваний:
0
Добавлен:
09.11.2019
Размер:
181.25 Кб
Скачать

5. Answer the following questions:

1. What is the most common outside threat to a business's computer network? 2. How many types of computer viruses are there? 3. Who is a "hacker"? 4. How do you defend your computer? 5. What viruses can reformat your hard drive? 6. How do viruses infect your machine? 7. What are macro viruses written to? 8. What can reformat your hard drive? 9. When did the National Computer Security Association estimate that two out of three U.S. companies were affected by computer viruses?

6. Match the first part (1-9) of the sentence with the second part (a-I):

1. Spam is …

2. A computer virus is …

3 Computer fraud is …

4. Cyberstalking is …

5. Malware is …

6. A hard disk drive (HDD) is …

7. A way of representing text or computer processor instructions by the use of …

8. The Internet is …

9. Cyberterrorism is …

a) … a non-volatile, random access device for digital data.

b) … unlawful to varying degrees.

c) …software designed to secretly access a computer system without the owner's informed consent.

d) … any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss.

e) … the binary number system's two-binary digits 0 and 1.

f)… the use of the Internet to stalk or harass an individual or an organization.

g) … a computer program that can copy itself and infect a computer.

h) … a global system of interconnected computer networks that use the standard

Internet Protocol Suite (TCP/IP) to serve billions of users worldwide.

i) … a phrase used to describe the use of Internet based attacks in terrorist activities.

7. Render the text: Computer crime

8. Work in pairs. How do you defend your computer?

9. Read the supplementary text, translate and entitle it:

A computer virus is a computer program that can copy itself and infect a computer. A true virus can spread from one computer to another when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.

As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.

UNIT 6

Pre-text exercises: