Security and privacy on the internet
Download 83.02 Kb.
|
Qilichbek
- Bu sahifa navigatsiya:
- What is Internet crime
Lesson 4. Internet crime
Task 1. Correct right answer. 1. .... are computer criminals who use technology to perform a variety of crimes : virus, propogation, fraud, intellectual property ,theft, etc. A. Cracker B. Intruder C. Developer D. Teacher 2. A worm is a ----------- A. self – copying program that spreads through email attachments B. is disguised as a useful program C. is included with ‘free ‘downloads. D. research and business reports 3. .... is software created to damage or alter the computer data or its operations. These are the main types. A. Malware B. Hardware C. Spyware D. Internet 4. You .... open email attachments from unknown people. Always take care of the file extension. A. must B. should C. should’t D. need 5. ..... is a software designed to collect information both computers for commercial or criminal purposes , is another example of maliciuos software. It usually comes hidden in fake freeware or shareware applications downloadable from the internet. A. Malware B. Hardware C. Spyware D. Internet 6. If you can’t find information at the library, try … on the Internet. A. looking B. looked C. to look D. have looked 7. She studied medicine at university and went on ... a surgeon. A. to become B. became C. - D. becoming 8. What is Internet crime ? A. The internet provides a wide variety of opportunities for communication and development, but unfortunately it also has its dark side. B. The software created to damage or alter the computer data or its operations. These are the main types. C. The malicious program disguised as innocent looking files or embedded within legitimate software. Once they are activated, they may effect the computer in a variety of : Some are just annoying , others are more ominous, creating a backdoor to the computer which can be used to collect stored data. They don’t copy themselves or reproduce by infecting other files. D. Self-copying programs that have capacity to move from one computer to another without human help, by exploiting security flaws in computer networks. Worms are self-contained and do not need to be attached to a document or program the way viruses do. Download 83.02 Kb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling