АвтоАвтоматизацияАрхитектураАстрономияАудитБиологияБухгалтерияВоенное делоГенетикаГеографияГеологияГосударствоДомДругоеЖурналистика и СМИИзобретательствоИностранные языкиИнформатикаИскусствоИсторияКомпьютерыКулинарияКультураЛексикологияЛитератураЛогикаМаркетингМатематикаМашиностроениеМедицинаМенеджментМеталлы и СваркаМеханикаМузыкаНаселениеОбразованиеОхрана безопасности жизниОхрана ТрудаПедагогикаПолитикаПравоПриборостроениеПрограммированиеПроизводствоПромышленностьПсихологияРадиоРегилияСвязьСоциологияСпортСтандартизацияСтроительствоТехнологииТорговляТуризмФизикаФизиологияФилософияФинансыХимияХозяйствоЦеннообразованиеЧерчениеЭкологияЭконометрикаЭкономикаЭлектроникаЮриспунденкция

VII. Answer the following questions

Читайте также:
  1. Answer the following questions.
  2. Answer the following questions.
  3. Answer the question: What is the main task of criminal law?
  4. Answer the questions
  5. Answer the questions in the written form.
  6. Answer the questions to check your reading comprehension.
  7. Answer the questions.
  8. Answer these questions.
  9. Answer these questions.
  10. Answer.
  11. Answer: 38.44
  12. Are the following statements true or false?

1. What does the Internet provide?

2. What are crackers?

3. What do internet-based crimes include?

4. What is piracy?

5. What is malware created to?

6. What are the main types of malware? Give their characteristics.

7. What are the main preventive tips working on the Net?

VIII. Which of the following statements are true and which are false. Give your reason.

 

SENTENCES TRUE FALSE CORRECTION
1. Worms collect information and embedded within legitimate software.      
2. Malware is software created to update the computer data or its operations      
3. Trojan horses are malicious programs disguised to collect information from computers for commercial or criminal purposes.      
4. Piracy, the illegal copying and distribution of copyrighted software.      
5. Spyware usually comes hidden in legitimate software.      
6. Make backupcopies of your files regularly.      
7. Both crimes use emails or websites that look like high-risk sources.      

IX. Match the sentences and find the continuation

 


1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 |

Поиск по сайту:



Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Студалл.Орг (0.003 сек.)