Activity 14. Add to Wikipedia a page describing national clothes, a national musical instrument or the national cuisine (min. 500 words). Report on your contribution, demonstrate the results.
1
| Mark the odd word: a) block b) permit c) give access d) allow
|
2
| Alexandria is _________ by a network of railway and telegraph lines to the other towns of Egypt. a) linked b) linking c) linkage d) links
|
3
| What is the logical relationship between the concepts “virtual – real”:
a) general and specific b) cause and effect c) method and purpose d) contrast
|
4
| All of these are synonymous to the word “link” EXCEPT FOR:
a) tie b) connection c) cross-reference d) thread
|
5
| E-mail and spam differ mostly by their ___.
a) size b) time of delivery c) purpose d) medium of delivery
|
6
| A location connected to the Internet that maintains one or more web pages is known as a ___. a) blog b) cookie c) site d) link
|
7
| What is the logical relationship between “a blog” and “an online journal”:
a) general – specific b) method – purpose c) part – whole d) equivalence
|
8
| What is the logical relationship between “mail” and “postal mail”:
a) general – specific b) method – purpose c) part – whole d) equivalence
|
9
| A blog and a forum differ mostly by their:
a) purpose b) number of authors c) location d) topic
|
10
| Everybody can contribute ___ Wikipedia.
a) with b) in c) to d) for
|
11
| A movable icon representing a person in cyberspace is known as a(n) ___.
a) avatar b) meme c) emoticon d) smiley
|
12
| Computers account ____ 5% of the country's commercial electricity consumption.
a) with b) in c) for d) on
|
13
| Mark the odd word: a) account b) accountability c) accountant d) accountable
|
14
| _________ TV is gaining more and more popularity.
a) stream b) streaming c) streamer d) streamed
|
15
| Which of the following concepts denotes physical connection:
a) www b) landline c) the Internet d) cyberspace
|
16
| Maintaining a site with regular entries of commentary, descriptions of events, or other material is called ____. a) browsing b) blogging c) chatting d) feeding
|
17
| The programmer successfully ____ some of software bugs.
a) traceless b) traced c) tracing d) trace
|
18
| All of these deal with “data rate” EXCEPT FOR:
a) bandwidth b) clickbaiting c) throughput d) data transfer capacity
|
19
| All of these collocate with the noun “crowdfunding” EXCEPT FOR:
a) succeed in b) allocate c) raise money through d) try
|
20
| All of these collocate with the noun “password” EXCEPT FOR:
a) ageing b) stalking c) generation d) authentication
|
№
| Term
| Definition
| Usage
|
1
| Bootlegger (n)
| a person engaged in illegal copying of software; an illegally copied software
| bootlegging (n); bootlegged (adj);
syn. pirate, piracy
|
2
| Breach (n)
| an act of breaking or failing to observe a law, agreement, or code of conduct; disclosure of sensitive information to an unauthorized outsider
| a ~ of law/contract/policy/code of conduct; do sth in ~ of sth;
syn. violation, infringement
|
3
| Combat (v)
| fight against sth; oppose sth vigorously
| ~ piracy/computer crime;
syn. fight sth, struggle with sth
|
4
| Commit (v)
| do; perform; dedicate oneself to sth
| ~ a(n) crime/murder/error/suicide; ~ oneself to sth; ~ sth to memory/ prison; committed (adj): ~ to a cause/principles/idea/doing sth; a ~ employee/worker; commitment (n): show/demonstrate/make no ~;
|
5
| Comply (v)
| meet specified standards; act in accordance with a wish or command
| ~ with the rules/regulations/law/ standards; (non-)compliance (n); (non-)compliant (adj);
syn. conform to/with, abide by
|
6
| Copyright (n)
| the exclusive right given by law to an author to print, publish, and sell copies of his/her original work
| secure/protect/ infringe on/ violate the ~; ~ law/holder; copyrighted (adj), copyrighter (n); copywriting (n)
ant. copyleft
|
7
| Crack (v)
| break or cause to break sth open or apart; find a solution to sth; decipher or interpret sth; break a security system illegally
| ~ a joke/code/message; a tough nut to ~, ~ down on criminals; crack (n): a ~ dealer/seller; crack (n): a tiny/narrow ~, cracking (n), cracker (n): a black-hat ~;
syn. break, decipher, hack
|
8
| Crime (n)
| illegal activity punishable by law
| commit/prevent/report/fight (a) ~; punish sb for a ~; ~ rate/incidence; a victim of ~; petty/serious/violent/ organized ~; criminal (adj), criminally (adv), criminality (n), incriminate (v), incrimination (n);
syn. felony, wrongdoing
|
9
| Cyberbullying (n)
| repeatedly harming or harassing other people online in a deliberate manner
| be subject to~; fall/become a victim of ~;
syn. cyberstalking, trolling
|
10
| Cybercide (n)
| the deletion of an individual's entire online presences (the removal of all social media profiles, shared photos, blog posts, directory entries and so on)
| be prone to/commit ~; an act of ~;
Cf. suicide, genocide, ecocide
|
11
| Cyberslacking (n)
| using company computer for personal purposes during working hours (playing games, shopping online or using social networking sites)
| indulge in/engage in/combat ~; cyberslacker (n);
syn. cyberloafer, cyberloafing
|
12
| Cybersquatting
(n)
| purchasing a domain name that contains a well-known trademark or commercial name to sell it to the rightful owner for profit
| engage in/be (get) involved in
/combat/eliminate ~
|
13
| Data diddling (n)
| modifying data for fun and profit, e.g. modifying grades, changing credit ratings, fixing salaries, or circumventing book-keeping and audit regulations
| engage in/be (get) caught ~; data diddler (n)
|
14
| Disseminate (n)
| scatter or spread widely, promulgate extensively; broadcast; disperse
| ~ information/viruses/knowledge/ ideas/news; dissemination (n);
syn. spread, propagate, promulgate
|
15
| Filter (v)
| remove undesirable data by sifting
| ~ a list of customers/incoming e-mail/traffic;
syn. sift away
|
16
| Flooding (n)
| an overflow of a large amount of water beyond its normal limits; providing more input than the entity can process properly
| engage in/suspect/combat/protect against ~; flood (v), flooded (adj), flooding (n);
Cf. mailbombing, packet monkey
|
17
| Fraud (n)
| manipulation of data for criminal purposes, e.g. changing banking records to illegally transfer money to an account
| a ~ scheme; control/commit/suspect/ combat/ protect against ~; in case of ~; fraudulence (n), fraudulent (adj), fraudulently (adv), fraudster (n)
syn. cheating, swindling
|
18
| Hacker (n)
| someone who secretly
uses or changes the
information in other
people's computer
systems
| speed/teleport/ethical ~;
hack (v), back-hack (v);
syn. cracker
|
19
| Identity theft (n)
| creating a false identity using sb else’s identifying information to make new credit cards or take loans
| commit an ~; protect from ~;
accuse sb of ~
|
20
| Intruder (n)
| the one who puts oneself deliberately into a place or situation where one is unwelcome or uninvited
| network/computer/impudent ~; attack/alert an ~; intrude (v), (un)intrusive (adj), intrusion (n);
syn. invader, trespasser
|
21
| Jacking (n)
| taking sth in a manner forbidden by law, rules, or custom
| click/hi/page-~;
engage in/be (get) involved in/suspect/combat/protect against ~; create a click-~ site; jack in (v); jacker (n): hi/click/page-~;
syn. stealing
Cf. identity theft
|
22
| Keylogging (n)
| installing a program on a victim's machine that records every keystroke made by a user for stealing login and password details
| suspect/engage in/combat/protect against/suffer from ~; keylogger (n)
|
23
| Mousetrapping (n)
| forcing an Internet user to stay on a particular website by triggering a mouse trap
| engage in/suspect/combat/protect against ~
|
24
| Packet monkey (n)
| sb who intentionally floods a network server or router with data packets in order to make it unreachable by others
| Cf. flooding
|
25
| Phracking (n)
| a combination of phreaking with computer hacking
| engage in/suspect/combat/protect against ~; phracker (n)
|
26
| Phreaking (n)
| hacking telephone systems, usually for the purpose of making free phone calls
| engage in/suspect of /combat/protect against ~; freaker (n)
|
27
| Piggybacking (n)
| gaining unauthorized access to a computer system via another user's legitimate connection
| engage in/be (get) involved in/be caught ~; a piggyback
|
28
| Piracy (n)
| the act of illegally copying software, music, or movies that are copyright-protected
| computer/software ~; act of ~;
engage in/suspect/combat/commit/ protect against ~; anti-piracy (n): ~ law/measures; pirate (n), pirated (adj);
syn. bootlegging
|
29
| Pharming (n)
| misdirecting traffic from one website to a website controlled by a criminal hacker by altering the domain name system or configuration files on a victim’s computer
|
engage in/be (get) involved in/ suspect/combat/commit/protect against ~; pharmer (n)
|
30
| Phishing (n)
| sending e-mails or creating web pages that are designed to collect confidential information for penetration, financial fraud or identity theft
| engage in/be involved in/be caught ~; phisher (n)
|
31
| Repudiation (n)
| rejection of a proposal or idea; refusal to fulfill or discharge an agreement,
obligation, or debt
| ~ of a law/contract/policy/idea/ principle; (n); repudiate (v);
syn. reject, renounce
ant. non-repudiation
|
32
| Salami theft
/slicing (n)
| stealing tiny amounts of money from each transaction
| engage in/be (get) involved in/be (get) caught (in) ~
|
33
| Scavenging (n)
| looking through discarded listings, tapes, or other information storage media for useful information such as access codes, passwords, or sensitive data
| engage in/be (get) involved in/be (get) caught ~;
syn. dumpster diving
|
34
| Spoofing (n)
| deceiving a system into thinking you are someone you really are not to bypass security measures
| IP ~; engage in/be (get) involved in/be (get) caught ~; spoofer (n)
|
35
| Steal (v)
| take sb’s property without permission or legal right and without intending to return it
| ~ sth from sb; stolen (adj), stealth (n), stealthy (adj), stealthily (adv);
syn. theft (n)
Cf. thief
|
36
| Trojan Horse (n)
| an innocent-looking program that has undocumented harmful functions
| download/detect/neutralize a ~;
Cf. Easter egg, time bomb, zombie
|
37
| Trolling (n)
| an anti-social act of
causing an interpersonal
conflict and controversy
online, purposely sowing
hatred, bigotry, racism, etc.
| go ~; engage in/prevent/tackle/stop (an act of)/suffer from/reduce the risk of ~; troll (v);
syn. cyberbullying
|
38
| Virus (n)
| a computer program designed to replicate and spread itself from one machine to another by human action
| download/detect/neutralize/spread/disseminate a ~;
Cf. bot, zombie
|
39
| Wiretapping (n)
| the interception of electronic communications in order to access information
| engage in/detect/be (get) caught/protect against/from ~
|
40
| Worm (n)
| a program which spreads through a computer system or network by replicating itself without human action(like a virus) but without integrating itself into its executable code
|
install/download/detect/neutralize/ spread/disseminate a ~
|
1. Kabay M. E., Glossary of computer crime terms. [Online]. Available: http://www.mekabay.com/overviews/glossary.pdf [Accessed: 13 Oct. 2015]
2. Ward M., Hi-tech crime: A glossary. BBC news. [Online]. Available: http://news.bbc.co.uk/2/hi/uk/5400052.stm [Accessed: Oct. 14, 2015]
3. The Dictionary. Netlingo. [Online]. Available: http://www.netlingo.com [Accessed: 15 Oct. 2015]