Архитектура Аудит Военная наука Иностранные языки Медицина Металлургия Метрология
Образование Политология Производство Психология Стандартизация Технологии


Activity 8. Decode Noam Chomsky’s saying about the Internet and comment on it:



http://puzzlemaker.discoveryeducation.com/code/BuildCryptogram.asp

Activity 9. Explain the difference between the following concepts using the Venn diagram below:

emoticon – meme
blog – site
wikipedia - encyclopedia
log- blog
www – the Internet – cyberspace
avatar – icon

 

 

Activity 10. Say what the following is used for:

1. bookmark
2. FAQ
3. e-mail
4. password
5. status
6. thread
7. account

Activity 11. Outline the major advantages and/or disadvantages of:

Concept Advantages Disadvantages
1. cookie
2. geotagging
3. navigator
4. spam
5. avatar
6. crowdfunding
7. wikipedia

Activity 12. Name at least 3 reasons why people should/shouldn’t have an anonymous avatar.

Activity 13. Say which accounts you have got on the Internet. What is the purpose of each account? How often do you use it?

Activity 14. Add to Wikipedia a page describing national clothes, a national musical instrument or the national cuisine (min. 500 words). Report on your contribution, demonstrate the results.

Activity 15. Do a mini research and prepare a short report about famous blogs/bloggers.

TEST

1 Mark the odd word: a) block b) permit c) give access d) allow
2 Alexandria is _________ by a network of railway and telegraph lines to the other towns of Egypt. a) linked b) linking c) linkage d) links
3 What is the logical relationship between the concepts “virtual – real”: a) general and specific b) cause and effect c) method and purpose d) contrast
4 All of these are synonymous to the word “link” EXCEPT FOR: a) tie b) connection c) cross-reference d) thread
5 E-mail and spam differ mostly by their ___. a) size b) time of delivery c) purpose d) medium of delivery
6 A location connected to the Internet that maintains one or more web pages is known as a ___.      a) blog b) cookie c) site d) link
7 What is the logical relationship between “a blog” and “an online journal”: a) general – specific b) method – purpose c) part – whole d) equivalence
8 What is the logical relationship between “mail” and “postal mail”: a) general – specific b) method – purpose c) part – whole d) equivalence
9 A blog and a forum differ mostly by their: a) purpose b) number of authors c) location d) topic 
10 Everybody can contribute ___ Wikipedia. a) with b) in c) to d) for
11 A movable icon representing a person in cyberspace is known as a(n) ___.   a) avatar b) meme c) emoticon d) smiley
12 Computers account ____ 5% of the country's commercial electricity consumption.  a) with b) in c) for d) on
13 Mark the odd word: a) account b) accountability c) accountant d) accountable
14 _________ TV is gaining more and more popularity. a) stream b) streaming c) streamer d) streamed
15 Which of the following concepts denotes physical connection: a) www b) landline c) the Internet d) cyberspace
16 Maintaining a site with regular entries of commentary, descriptions of events, or other material is called ____.  a) browsing b) blogging c) chatting d) feeding
17 The programmer successfully ____ some of software bugs.   a) traceless b) traced c) tracing d) trace
18 All of these deal with “data rate” EXCEPT FOR: a) bandwidth b) clickbaiting c) throughput d) data transfer capacity
19 All of these collocate with the noun “crowdfunding” EXCEPT FOR: a) succeed in b) allocate c) raise money through d) try
20 All of these collocate with the noun “password” EXCEPT FOR: a) ageing b) stalking c) generation d) authentication


Module 7. CYBER CRIME

Term Definition Usage
1 Bootlegger (n) a person engaged in illegal copying of software; an illegally copied software bootlegging (n); bootlegged (adj); syn. pirate, piracy
2 Breach (n) an act of breaking or failing to observe a law, agreement, or code of conduct; disclosure of sensitive information to an unauthorized outsider a ~ of law/contract/policy/code of conduct; do sth in ~ of sth; syn. violation, infringement  
3 Combat (v) fight against sth; oppose sth vigorously ~ piracy/computer crime; syn. fight sth, struggle with sth
4 Commit (v) do; perform; dedicate oneself to sth   ~ a(n) crime/murder/error/suicide; ~ oneself to sth; ~ sth to memory/ prison; committed (adj): ~ to a cause/principles/idea/doing sth; a ~ employee/worker; commitment (n): show/demonstrate/make no ~;
5 Comply (v) meet specified standards; act in accordance with a wish or command ~ with the rules/regulations/law/ standards; (non-)compliance (n); (non-)compliant (adj); syn. conform to/with, abide by
6 Copyright (n) the exclusive right given by law to an author to print, publish, and sell copies of his/her original work secure/protect/ infringe on/ violate the ~; ~ law/holder; copyrighted (adj), copyrighter (n); copywriting (n) ant. copyleft
7 Crack (v) break or cause to break sth open or apart; find a solution to sth; decipher or interpret sth; break a security system illegally ~ a joke/code/message; a tough nut to ~, ~ down on criminals; crack (n): a ~ dealer/seller; crack (n): a tiny/narrow ~, cracking (n), cracker (n): a black-hat ~; syn. break, decipher, hack
8 Crime (n) illegal activity punishable by law commit/prevent/report/fight (a) ~; punish sb for a ~; ~ rate/incidence; a victim of ~; petty/serious/violent/ organized ~; criminal (adj), criminally (adv), criminality (n), incriminate (v), incrimination (n); syn. felony, wrongdoing
9 Cyberbullying (n) repeatedly harming or harassing other people online in a deliberate manner be subject to~; fall/become a victim of ~; syn. cyberstalking, trolling
10 Cybercide (n) the deletion of an individual's entire online presences (the removal of all social media profiles, shared photos, blog posts, directory entries and so on) be prone to/commit ~; an act of ~; Cf. suicide, genocide, ecocide
11 Cyberslacking (n)  using company computer for personal purposes during working hours (playing games, shopping online or using social networking sites) indulge in/engage in/combat ~; cyberslacker (n); syn. cyberloafer, cyberloafing
12 Cybersquatting (n) purchasing a domain name that contains a well-known trademark or commercial name to sell it to the rightful owner for profit engage in/be (get) involved in /combat/eliminate ~
13 Data diddling (n) modifying data for fun and profit, e.g. modifying grades, changing credit ratings, fixing salaries, or circumventing book-keeping and audit regulations engage in/be (get) caught ~; data diddler (n)
14 Disseminate (n) scatter or spread widely, promulgate extensively; broadcast; disperse ~ information/viruses/knowledge/ ideas/news; dissemination (n); syn. spread, propagate, promulgate
15 Filter (v) remove undesirable data by sifting  ~ a list of customers/incoming e-mail/traffic; syn. sift away
16 Flooding (n) an overflow of a large amount of water beyond its normal limits; providing more input than the entity can process properly engage in/suspect/combat/protect against ~; flood (v), flooded (adj), flooding (n); Cf. mailbombing, packet monkey
17 Fraud (n) manipulation of data for criminal purposes, e.g. changing banking records to illegally transfer money to an account a ~ scheme; control/commit/suspect/ combat/ protect against ~; in case of ~; fraudulence (n), fraudulent (adj), fraudulently (adv), fraudster (n) syn. cheating, swindling
18  Hacker (n) someone who secretly uses or changes the information in other people's computer systems speed/teleport/ethical ~; hack (v), back-hack (v); syn. cracker  
19 Identity theft (n) creating a false identity using sb else’s identifying information to make new credit cards or take loans commit an ~; protect from ~; accuse sb of ~ 
20 Intruder (n) the one who puts oneself deliberately into a place or situation where one is unwelcome or uninvited network/computer/impudent ~; attack/alert an ~; intrude (v), (un)intrusive (adj), intrusion (n); syn. invader, trespasser
21 Jacking (n) taking sth in a manner forbidden by law, rules, or custom click/hi/page-~; engage in/be (get) involved in/suspect/combat/protect against ~; create a click-~ site; jack in (v); jacker (n): hi/click/page-~; syn. stealing Cf. identity theft
22  Keylogging (n)  installing a program on a victim's machine that records every keystroke made by a user for stealing login and password details  suspect/engage in/combat/protect against/suffer from ~; keylogger (n)  
23  Mousetrapping (n) forcing an Internet user to stay on a particular website by triggering a mouse trap engage in/suspect/combat/protect against ~  
24  Packet monkey (n)  sb who intentionally floods a network server or router with data packets in order to make it unreachable by others Cf. flooding
25 Phracking (n) a combination of phreaking with computer hacking engage in/suspect/combat/protect against ~; phracker (n)
26 Phreaking (n)  hacking telephone systems, usually for the purpose of making free phone calls  engage in/suspect of /combat/protect against ~; freaker (n)
27 Piggybacking (n) gaining unauthorized access to a computer system via another user's legitimate connection engage in/be (get) involved in/be caught ~; a piggyback  
28 Piracy (n)  the act of illegally copying software, music, or movies that are copyright-protected computer/software ~; act of ~; engage in/suspect/combat/commit/ protect against ~; anti-piracy (n): ~ law/measures; pirate (n), pirated (adj); syn. bootlegging
29  Pharming (n) misdirecting traffic from one website to a website controlled by a criminal hacker by altering the domain name system or configuration files on a victim’s computer   engage in/be (get) involved in/ suspect/combat/commit/protect against ~; pharmer (n)
30  Phishing (n) sending e-mails or creating web pages that are designed to collect confidential information for penetration, financial fraud or identity theft engage in/be involved in/be caught ~; phisher (n)  
31 Repudiation (n) rejection of a proposal or idea; refusal to fulfill or discharge an agreement, obligation, or debt ~ of a law/contract/policy/idea/ principle; (n); repudiate (v); syn. reject, renounce ant. non-repudiation
32 Salami theft /slicing (n) stealing tiny amounts of money from each transaction engage in/be (get) involved in/be (get) caught (in) ~  
33  Scavenging (n) looking through discarded listings, tapes, or other information storage media for useful information such as access codes, passwords, or sensitive data    engage in/be (get) involved in/be (get) caught ~; syn. dumpster diving  
34 Spoofing (n) deceiving a system into thinking you are someone you really are not to bypass security measures IP ~; engage in/be (get) involved in/be (get) caught ~; spoofer (n)
35 Steal (v) take sb’s property without permission or legal right and without intending to return it ~ sth from sb; stolen (adj), stealth (n), stealthy (adj), stealthily (adv); syn. theft (n) Cf. thief
36  Trojan Horse (n) an innocent-looking program that has undocumented harmful functions download/detect/neutralize a ~; Cf. Easter egg, time bomb, zombie
37  Trolling (n) an anti-social act of causing an interpersonal conflict and controversy online, purposely sowing hatred, bigotry, racism, etc. go ~; engage in/prevent/tackle/stop (an act of)/suffer from/reduce the risk of ~; troll (v); syn. cyberbullying  
38  Virus (n) a computer program designed to replicate and spread itself from one machine to another by human action download/detect/neutralize/spread/disseminate a ~; Cf. bot, zombie
39  Wiretapping (n) the interception of electronic communications in order to access information engage in/detect/be (get) caught/protect against/from ~
40  Worm (n) a program which spreads through a computer system or network by replicating itself without human action(like a virus) but without integrating itself into its executable code   install/download/detect/neutralize/ spread/disseminate a ~

 

1. Kabay M. E., Glossary of computer crime terms. [Online]. Available: http://www.mekabay.com/overviews/glossary.pdf [Accessed: 13 Oct. 2015]

2. Ward M., Hi-tech crime: A glossary. BBC news. [Online]. Available: http://news.bbc.co.uk/2/hi/uk/5400052.stm [Accessed: Oct. 14, 2015]

3. The Dictionary. Netlingo. [Online]. Available: http://www.netlingo.com [Accessed: 15 Oct. 2015]

ACTIVITIES

Activity 1. Give synonyms:

1. bootlegger  
2. combat  
3. committed to sth  
4. breach  
5. stealth  
6. cyberslacking  
7. filter  

Activity 2. Give antonyms:

1. compliant  
2. repudiation  
3. violation  
4.conformity  
5. copyright  
6. piracy  
7. black-hat cracker  

Activity 3. Word family. Fill in the missing words of the same root where possible:

Noun Verb Adjective Adverb
  commit    
Intruder      
    criminal  
  steal    
      fraudulently
Flood      
    (non-) compliant  

Activity 4. Complete the tables with words that form strong partnerships with the target vocabulary units:

Verb Target vocabulary unit

 

 

fraud

Verb Target vocabulary unit

 

 

a worm/virus

Target vocabulary unit Noun

 

 

commit a(n)

 

 

Verb Target vocabulary unit

 

 

spoofing

Target vocabulary unit Noun

 

 

comply with a

 

 

Activity 5. Match the given terms with their definitions:


Поделиться:



Последнее изменение этой страницы: 2019-04-19; Просмотров: 469; Нарушение авторского права страницы


lektsia.com 2007 - 2024 год. Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав! (0.026 с.)
Главная | Случайная страница | Обратная связь