|
|||||||
АвтоАвтоматизацияАрхитектураАстрономияАудитБиологияБухгалтерияВоенное делоГенетикаГеографияГеологияГосударствоДомДругоеЖурналистика и СМИИзобретательствоИностранные языкиИнформатикаИскусствоИсторияКомпьютерыКулинарияКультураЛексикологияЛитератураЛогикаМаркетингМатематикаМашиностроениеМедицинаМенеджментМеталлы и СваркаМеханикаМузыкаНаселениеОбразованиеОхрана безопасности жизниОхрана ТрудаПедагогикаПолитикаПравоПриборостроениеПрограммированиеПроизводствоПромышленностьПсихологияРадиоРегилияСвязьСоциологияСпортСтандартизацияСтроительствоТехнологииТорговляТуризмФизикаФизиологияФилософияФинансыХимияХозяйствоЦеннообразованиеЧерчениеЭкологияЭконометрикаЭкономикаЭлектроникаЮриспунденкция |
Vocabulary practice. 1. Which word does not belong to the group?1. Which word does not belong to the group? a) virus, worm, Trojan horse, bot, file, botnet; b) distribute, download, automate, infect, view, execute; c) duplicates, instructions, infects, invades, behaves, spreads; d) spider, programmer, hacker, user, server, developer; e) individual, general, normal, personal, analytical, digital.
2. Fill in the blanks choosing from the variants given. 1. Does the term computer virus refer to any malicious code that … (makes up/invades) a computer system? 2. When your computer executes an infected program it … (executes / deletes) the attached virus instructions. 3. A trigger event, such as a specific date, can … (kill/destroy/unleash) some viruses. 4. Love letter is one of the … (slowest/fastest) spreading mass-mailing worms of all time. 5. Hackers created viruses that insert themselves into … (used/unused) portions of a program file without changing its length.
3. Transform the given sentences using the word(s) in brackets without any change in meaning. 1. A computer virus is a set of programs that attaches itself to a file (connecting). 2. If a document contains an infected macro, the macro virus duplicates itself into the general macro pool, where it is picked up by other documents (doubles, selected). 3. A virus might deliver a payload which could be both harmless and devastating (do no harm, corrupt). 4. Software that can automate a task when commanded to do so is called an intelligent agent (is able, is instructed). 5. A trigger event, such as a specific date, can unleash some viruses (particular, release). 6. Trojan horses are notorious for stealing passwords using a keylogger – a type of program that records your key-strokes (known, a sort).
4. Fill in the gaps in the text.
A computer virus is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to the other files. You might encounter several types of viruses. A virus that attaches itself to an application program, such as a game utility, is known as a _1_ virus. A boot _ 2_ virus infects the system files your computer uses every time you turn it on. A _ 3 _ virus infects a set of instructions that automates document and worksheet production. A Trojan horse is a computer program that seems to perform one function while actually doing something else. Such programs are notorious for stealing _ 4_, although some delete files and cause other problems. _5_ software can help prevent viruses from invading your computer system and can root out viruses that that take up residence. This software typically scans for a virus _ 6 _ and is sometimes referred to as virus scanning software.
Speaking. Discuss the following questions. 1. What is a computer virus? 2. How do viruses spread? 3. Are there different kinds of viruses? 4. What is a Trojan horse? What is a bot? 5. What is a botnet? 6. How can you avoid viruses and worms? 7. What is antivirus software? How does it work?
Text D Reading. Read the text and try to guess the meaning of the words in bold. Check your variants in the dictionary. Поиск по сайту: |
Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Студалл.Орг (0.003 сек.) |