Lesson 1: Computer threats Task 1: Make up your own sentences with the given words New words Your sentence Hacker


Download 102.81 Kb.
Pdf ko'rish
bet2/5
Sana24.03.2023
Hajmi102.81 Kb.
#1290709
1   2   3   4   5
Bog'liq
Xorijiy til 2 sirtqi 10 ballik vazifa

Your sentence 
Digital certificate 
A Digital Certificate is an electronic file that is tied to a cryptographic key pair 
and authenticates the identity of a website, individual, organization, user, device 
or server. It is also known as a public key certificate or identity certificate. 
Virus 
is a type of computer program that, when executed, replicates itself by modifying 
other computer programs and inserting its own code into those programs. If this 
replication succeeds, the affected areas are then said to be "infected" with a 
computer virus, a metaphor derived from biological viruses. 
Malicious 
software 
refers to any malicious program that causes harm to a computer system or network 
Scanner
is a device that optically scans images, printed text, handwriting or an object and 
converts it to a digital image. Commonly used in offices are variations of the 


desktop flatbed scanner where the document is placed on a glass window for 
scanning 
Malware
is any software intentionally designed to cause disruption to 
a computer, server, client, or computer network, leak private information, gain 
unauthorized access to information or systems, deprive access to information, or 
which unknowingly interferes with the user's computer security and privacy. 
Spyware 
is software with malicious behaviour that aims to gather information about a 
person or organization and send it to another entity in a way that harms the 
user—for example, by violating their privacy or endangering their device's 
security. 
Illegal copying 
is the unauthorized use, copying or distribution of copyrighted software. It may 
take many forms, including: Unauthorized copying of software programs 
purchased legitimately, sometimes known as "end-user" piracy. 
Data install 
InstallData contains current product and article data from participating producers 
in the installation sector. The product data is classified according to ETIM and is 
provided with technical characteristics and digital assets where possible. For all 
parties, daily exchange of data via InstallData is possible according to standards 
so that you always have access to the most complete and up-to-date data. 
Cybershopping 
The elusive female market has been found and they're cybershopping for stuff 
they can hold in their hands. 
Internet crime 
Cybercrime is a type of crime committed in connection with computers and 
networks. A computer acts as a targeted weapon during a crime. Cybercrime is 
committed to harm someone’s security and financial status. 

Download 102.81 Kb.

Do'stlaringiz bilan baham:
1   2   3   4   5




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling