Lesson 1: Computer threats Task 1: Make up your own sentences with the given words New words Your sentence Hacker
Download 102.81 Kb. Pdf ko'rish
|
Xorijiy til 2 sirtqi 10 ballik vazifa
Your sentence
Digital certificate A Digital Certificate is an electronic file that is tied to a cryptographic key pair and authenticates the identity of a website, individual, organization, user, device or server. It is also known as a public key certificate or identity certificate. Virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses. Malicious software refers to any malicious program that causes harm to a computer system or network Scanner is a device that optically scans images, printed text, handwriting or an object and converts it to a digital image. Commonly used in offices are variations of the desktop flatbed scanner where the document is placed on a glass window for scanning Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Spyware is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privacy or endangering their device's security. Illegal copying is the unauthorized use, copying or distribution of copyrighted software. It may take many forms, including: Unauthorized copying of software programs purchased legitimately, sometimes known as "end-user" piracy. Data install InstallData contains current product and article data from participating producers in the installation sector. The product data is classified according to ETIM and is provided with technical characteristics and digital assets where possible. For all parties, daily exchange of data via InstallData is possible according to standards so that you always have access to the most complete and up-to-date data. Cybershopping The elusive female market has been found and they're cybershopping for stuff they can hold in their hands. Internet crime Cybercrime is a type of crime committed in connection with computers and networks. A computer acts as a targeted weapon during a crime. Cybercrime is committed to harm someone’s security and financial status. Download 102.81 Kb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling