Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

Read the following sentences and decide if they are true (T) or false (F).

Memorize the following words and expressions | Information security | Complete the following sentences with the expressions from the box. |


Читайте также:
  1. A Decide which of these statements are true (T) or false (F).
  2. A False Spring
  3. A good thesis sentences will control the entire argument.
  4. A The following are dictionary definitions of different types of markets.
  5. A) Give the Russian equivalents for the following word combinations.
  6. A) Make sentences in bold type less definite and express one's uncertainty of the following.
  7. A) Match the beginnings and endings of the sentences to make a summary of what Carl says.

1. Everyone gets physically hurt in computer crimes.

2. A computer crime doesn’t deserve to be taken seriously.

3. Computer crimes fall into 4 categories.

4. It is easy to prove that programs were stolen.

5. Altering data stored in smb’s computer file is not a crime at all.

6. The Trojan Horse can replicate itself.

7. The victims of ‘Salami shaving’ method of stealing money are always aware of the crime.

8. Software piracy is unauthorised copying of programs.

9. Mail bombing can crash the server.

10. Prosecuting the computer criminals is impossible.

11. Businesses choose not to report about the crime because they are worried about their reputation.

12. The computer criminal being caught never goes to jail.

Read the text again and answer the questions.

1. Why is a computer crime called ‘clean’?

2. How many categories does a computer crime fall into?

3. What is the name of the virus which allows the program to function normally but performs additional illegitimate functions?

4. What does ‘Salami shaving’ mean?

5. Which method is used by hackers to slow down or even crash the server?

6. Why is it difficult to punish computer criminals?

7. Do the banks have to make a report about the crime against them?

8. Why do other businesses prefer not to report about the crime?

9. How are most computer crimes discovered?

10. Why do computer criminals often remain unpunished even if they are detected?

11. What is the percentage of detected crimes which are never reported to the authorities?


Дата добавления: 2015-11-14; просмотров: 89 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
COMPUTER CRIMES| General Assembly

mybiblioteka.su - 2015-2024 год. (0.006 сек.)