Lesson 1: Computer threats


Download 18.62 Kb.
bet1/2
Sana18.06.2023
Hajmi18.62 Kb.
#1592012
  1   2
Bog'liq
Хорижиий тил 1-топширик


Subject: Foreign languages 2
Intermediate control: score -10

Lesson 1: Computer threats
Task 1: Make up your own sentences with the given words

New words

Your sentence

hacker

  1. There are 3 types of hackers (white hacker, grey hacker and black hacker)

ergonomics

The binoculars have a comfortable ergonomic shape

protocol

Protocol is “a system of rules that explain the correct conduct and procedures to be followed in formal situations,”

intruder

The intruder was frightened off by the guard dog

encryption

The software will encrypt the message before it is sent

cookie

A simple example of cookies is when you open up a website and your username and password are auto-filled

freeware

Users should take care when downloading freeware from unknown sites"


Lesson 2: Internet crime
Task 1: Make up your own sentences with the given words

New words

Your sentence

Digital certificate

The system uses a digital certificate along with the user name and password to authenticate a user. You use digital certificates to secure the connection

Virus

A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.

Malicious software

Malicious Software refers to any malicious program that causes harm to a computer system or network. Malicious Malware Software attacks a computer or network in the form of viruses, worms, trojans, spyware, adware or rootkits.

Scanner

The scanner doesn't recognise this barcode

Malware

Malware is a software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

Spyware

Spyware is a software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.

Illegal copying

When you make unauthorized copies of someone's creative work, you are taking something of value from the owner without his or her permission.

Data install

Data Install refers to installing data from the UMD to the Memory Card. If you have the entire game on the card Data Install just takes up more memory.

Cybershopping

Cybershopping is a shopping for goods and services on the internet.

Internet crime

Cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy




Download 18.62 Kb.

Do'stlaringiz bilan baham:
  1   2




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling