Студопедия

КАТЕГОРИИ:

АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатикаИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханикаОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторикаСоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансыХимияЧерчениеЭкологияЭкономикаЭлектроника



VOCABULARY PRACTICE SECTION 2. 1. Match the malware with the damage




Читайте также:
  1. A) Draw a family tree for yourself and using the topical vocabulary explain the relationship between your immediate ancestors and any interesting facts about them.
  2. A. Study the topical vocabulary.
  3. A. Study the vocabulary from Exercises B, E.
  4. ACADEMIC VOCABULARY
  5. ACADEMIC VOCABULARY
  6. Active Vocabulary
  7. Active Vocabulary
  8. Appendix 3 Active vocabulary
  9. B. Draw a parallel between the practice of new product development in different countries. Discuss their advantages and disadvantages.
  10. B. Practice the following conversation with a partner using the substitutions in the box.

1. Match the malware with the damage.

 

1. virus a. collects and sends private information from the infected computer to a third party
2. spyware b. an undesirable program which can replicate itself across a network
3. trojan horse c. allows a hacker to access private information when he/she wishes
4. keystroke logger or keylogger d. a program which adds itself to an executable file, and can cause considerable damage to the data on the infected computer
5. worm e. records characters that are typed into a computer  

 

2. Decide what these kinds of computer crime are and match them to the descriptions which follow.

 


Дата добавления: 2014-11-13; просмотров: 18; Нарушение авторских прав







lektsii.com - Лекции.Ком - 2014-2021 год. (0.006 сек.) Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав
Главная страница Случайная страница Контакты