![]() |
Главная Случайная страница Контакты | Мы поможем в написании вашей работы! | |
|
1. Attachment 2. Worm 3. Filename 4. Directory 5. Mailbox 6. Victim | is | a) a person whose computer was infected b) the name of the file c) a catalogue which comprises other files or catalogues d) a folder which stores your emails e) a self-replicating program able to propagate itself across a network, typically having a detrimental effect |
Make summary of the text
Semantic groups
Group these terms into the five headings, A to E, below.
A | B | C | D | E |
Viruses and other destructive programs | Data protection | Communica-tion systems | Internet | World Wide Web |
Terms:
anti-virus software backups bandwidth browser domainname encryption firewalls | FTP GPS IRC ISP hyperlink logic bomb pagers | passwords router trigger routine Trojan URL Usenet XML |
Role play
Work in pairs. Together make up your own questions on these prompts. Add your own questions. Then play the parts of the interviewer and a hacker.
· first interested in hacking
· reason for being arrested
· present job
· ways to avoid hackers
· views on Hollywood hackers
· safe ways of paying for Internet shopping
Writing.
Write a news item like the short newspaper texts given in Task 1 about any hacking case known to you.
26. Study this extract from a virus information database. Then make a flowchart to show each step in the method of infection for this virus. Steps 1 and 2 are done for you.
Дата публикования: 2015-03-29; Прочитано: 1023 | Нарушение авторского права страницы | Мы поможем в написании вашей работы!