АвтоАвтоматизацияАрхитектураАстрономияАудитБиологияБухгалтерияВоенное делоГенетикаГеографияГеологияГосударствоДомДругоеЖурналистика и СМИИзобретательствоИностранные языкиИнформатикаИскусствоИсторияКомпьютерыКулинарияКультураЛексикологияЛитератураЛогикаМаркетингМатематикаМашиностроениеМедицинаМенеджментМеталлы и СваркаМеханикаМузыкаНаселениеОбразованиеОхрана безопасности жизниОхрана ТрудаПедагогикаПолитикаПравоПриборостроениеПрограммированиеПроизводствоПромышленностьПсихологияРадиоРегилияСвязьСоциологияСпортСтандартизацияСтроительствоТехнологииТорговляТуризмФизикаФизиологияФилософияФинансыХимияХозяйствоЦеннообразованиеЧерчениеЭкологияЭконометрикаЭкономикаЭлектроникаЮриспунденкция

D. Harassment

Читайте также:
  1. CHAPTER 6
  2. Chapter Eighteen
  3. Euphemisms
  4. I. Read and translate the text
  5. БИБЛИОГРАФИЯ АРМЯНСКОГО ТЕРРОРИЗМА
  6. Мнение народа о водных родах.
  7. Терапия
  8. Ценности и данные
  9. Частная жизнь

CODE GREEN FINAL TEST

Name: ______________ Date: ______________

 

Class: ______________ Mark: ____ / 100

 

Reading

Read the text. Then do Exercise 1.

 

When most people think of the word ‘crime’ they think of tough criminals that are either stealing from or harming other people. There is, however, another category of criminals called cyber-criminals. Computer crime, or ‘cyber-crime’, can be a very serious offence and it seems to be growing each year.

There are many different types of cyber-crime, some more serious than others. There are two basic categories of cyber-crime. The first are crimes that directly target computers and devices and the latter are crimes done with computers which target people. For example, in the first case, as a consequence of the crime, your computer may have a problem working. Whereas, in the second case, someone using a computer may trick you into losing lots of money. What follow are some examples of cyber-crime.

A. Spam

Spam refers to the flooding of un-asked-for emails to computer users with messages and advertisements. People’s emails are stolen from the Internet and are then used to mail unwanted emails. The majority of spam sent is illegal and anti-spam laws have been put into effect.

B. Fraud

Computer fraud is when one user uses lies and misrepresentation to trick another user into losing their money. There are two basic ways in which this is done. One way is to be approached by email and tricked into paying for something that is not true. For example, you may receive an email telling you about a great opportunity to buy a digital camera but, after you pay for it, you don’t get the camera. Another type of fraud is when someone hacks into your computer and steals information about you, like your address, birthday and credit card number. They then use all this information to buy things with your money.

C. Obscene or offensive content

There are millions and millions of websites on the Internet. There are many that we like to visit and others which we choose not to; it’s a matter of personal taste. There are, however, some which are downright obscene and offensive. Some websites may have racist messages which influence people to commit violent crimes, for example. Others may be blasphemous in that they incite hate against certain religions. Illegal pornography is also a big problem. Different countries have different laws against obscene or offensive content on websites.

D. Harassment

There are cases when one computer user specifically targets another user and harasses them with hateful mail and chat messages. They may do this because they do not like the other person’s race, religion, nationality or gender. People are usually targeted after they have expressed something about themselves or an opinion that someone else doesn’t like on a public forum, like a chat room.


1 | 2 | 3 |

Поиск по сайту:



Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Студалл.Орг (0.004 сек.)