Question order is the same as the information in the text. Always


Download 1.43 Mb.
bet3/36
Sana16.03.2023
Hajmi1.43 Mb.
#1278640
1   2   3   4   5   6   7   8   9   ...   36
Bog'liq
READING QUESTION TYPES (1)

Blombos Cave discovery
Background
• Location: South Africa
• The date digging began: 1 ........................
Previous ancient objects found in this area:
• 2 ........................
• 3 ........................
• 4 ........................
Recent findings
• A mixture containing a substance called 5 .................... (used to provide colour)
• Equipment
• A range of additional 6 ....................... including animal bone and charcoal
Conclusion
• In prehistoric times, humans knew basic 7 ................................
The First Cyber Criminals

‘Cyber crime’ sounds like a very new type of crime. In fact, it has been around since the 1970s – before the personal computer was invented, when computers far less powerful than today’s games consoles filled entire rooms and were monitored by technicians.


The first cyber crimes were carried out across telephone lines, by a group of electronic enthusiasts known as phone phreakers. Having studied the US telephone system, they realised that it used a series of musical tones to connect calls. They found they could imitate those tones, and steal free phone calls, by creating small musical devices called "blue boxes'. One famous 'phreaker', John Draper, even discovered that using a whistle given away inside a cereal box could do the same job as a blue box.
Cyber crime centred on the telephone for many years, until the first computer-to- computer cyber crime took place in the 1980s. 'Hacking', as it has since been referred to, gained new public visibility after the popular 1984 film Wargames, in which a hacker breaks into a US military computer and saves the world. Many hackers later said this was their inspiration.
It was the arrival of the Internet that was eventually to make cyber crime a big issue. When millions of home and business computer users began to visit the Internet in the early to mid 1990s, few were thinking about the dangers of cyber crime or about security and so it seemed only a matter of time before banks became the target for hackers.
In 1994 a group of hackers broke into US bank Citibank's computers and stole $10 million. This was later nearly all recovered. With the rise of the Internet, credit cards became the tools of cyber criminals: Kevin Mitnick was arrested for stealing 20,000 credit card numbers over the net in 1995. This and other credit card crime prompted credit card companies to consider ways they could make cards more secure.


Complete the notes below.
Choose NO MORE THAN TWO WORDS AND/OR A NUMBER from the passage for each answer.
Cyber crime
First cyber criminals: called 1 ....................... (1970s)
Nature of crime: made free class by copying 2 ....................
Computer crime: began in 3 ......................
Crime known as: 4 ........................
Promoted by hit movie: 5 .................. (1984)
Internet crime: initially unexpected, but quickly focused on 6…
Current concern: 7...................... fraud.



Download 1.43 Mb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   ...   36




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling