Студопедия.Орг Главная | Случайная страница | Контакты | Мы поможем в написании вашей работы!  
 

Match the word with its definition



1. Attachment 2. Worm 3. Filename 4. Directory 5. Mailbox 6. Victim is a) a person whose computer was infected b) the name of the file c) a catalogue which comprises other files or catalogues d) a folder which stores your emails e) a self-replicating program able to propagate itself across a network, typically having a detrimental effect

Make summary of the text

Semantic groups

Group these terms into the five headings, A to E, below.

A B C D E
Viruses and other destructive programs Data protection Communica-tion systems Internet World Wide Web
           

Terms:

anti-virus software backups bandwidth browser domainname encryption firewalls FTP GPS IRC ISP hyperlink logic bomb pagers passwords router trigger routine Trojan URL Usenet XML

Role play

Work in pairs. Together make up your own questions on these prompts. Add your own questions. Then play the parts of the interviewer and a hacker.

· first interested in hacking

· reason for being arrested

· present job

· ways to avoid hackers

· views on Hollywood hackers

· safe ways of paying for Internet shopping

Writing.

Write a news item like the short newspaper texts given in Task 1 about any hacking case known to you.

26. Study this extract from a virus information database. Then make a flowchart to show each step in the method of infection for this virus. Steps 1 and 2 are done for you.





Дата публикования: 2015-03-29; Прочитано: 1023 | Нарушение авторского права страницы | Мы поможем в написании вашей работы!



studopedia.org - Студопедия.Орг - 2014-2025 год. Студопедия не является автором материалов, которые размещены. Но предоставляет возможность бесплатного использования (0.412 с)...