Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
методичка 5 курс (правильная).doc
Скачиваний:
9
Добавлен:
11.11.2019
Размер:
304.13 Кб
Скачать

1. Put the words in the right order to make a sentence:

1. The, the, a, most, outside, threat, computer, is, to, common, virus.2 Viruses, to, written, attack a, are, specific, macro, program. 3. Two, there, are, main, viruses, types, computer, of. 4. Hobbyists, was, "hacker", video, who, spare, their, time, spent, creating, games. 5. By, crimes, computer, outsiders, perpetrate. 6. Best, is, way, the, fight, bugs, to, to, avoid, these, them. 7. Binary, your, viruses, actual, designed, are, either, to, attack, programs, data. 8. Viruses, infect, to, by, attaching, programs, themselves, your, machine. 9. Computer, is, stored, with, concerned, information, security, preventing, in. 10. NCSA, computer, estimated, three, two, U.S. companies, were, that, affected, out, of, by, viruses.

2. Fill in the blanks with the following words:

Video, virus, "hackers", viruses, program, to attack, affected, machine, information

1. The most common outside threat to a business's computer network is the ... 2. Macro viruses are written to attack a specific … 3. Binary … can reformat your hard drive. 4. "hackers " are hobbyists who spent their spare time creating … games. 5. Viruses infect your …by attaching themselves to programs. 6. Binary viruses are either actual programs designed … your data. 7. Some security experts believe that the continued threat of outside … is due at least in part to the growing number of employees.8. Computer security is concerned with preventing … stored in or used by computers from being altered, stolen, or used to commit crimes.9. The National Computer Security Association estimated that in 1996, two out of three U.S. companies were … by one or more of the estimated 16,000 computer viruses.

3. Complete the following sentences using active vocabulary:

1. Computer crimes perpetrated by outsiders are … 2. The most common outside threat to … 3. "hackers" were hobbyists who spent their spare time creating …4. Some security experts believe that the continued threat of outside "hackers" is … 5. Viruses infect your machine by… 6. Binary viruses can reformat your …7. Some security experts believe that the continued threat of outside "hackers" is due at least in… 8. The damage wreaked by outside intruders can be … 9. The National Computer Security Association (NCSA) estimated that in 1996, two out of three U.S. companies were affected by …

4. Say if the following statements are true or false:

1. Binary viruses can’t reformat your hard drive. 2. The damage wreaked by outside intruders can be significant and wide-ranging. 3. Viruses infect your video games. 4. Macro viruses are written to attack a specific program. 5. "hacker" is a legal activity. 6. There are three main types of computer viruses. 7. Some security experts believe that the continued threat of outside "hackers" is due at least in part to the growing number of employees. 8. Computer crime, or cybercrime, is only national phenomenon. 9. The National Computer Security Association estimated that in 1996, two out of three U.S. companies were affected by one or more of the estimated 16,000 robots.