workbook

DOCX 118 pages 22.4 MB Free download

Page preview (5 pages)

Scroll down 👇
1 / 118
fergana branch of tashkent university of information technologies named after al-khwarizmi faculty: computer engineering direction: __________________________ ______________________________________ group: _______________________________ name: ________________________________ workbook fergana 2023 lesson 1. theme: computer threats date:_________________________________ appendix 1: glossary new words definition hacker 1. a person who has a high level of skill in computer technology or programming; a computer expert or enthusiast; a person who circumvents security and breaks into a network, computer, file, etc., often, but not always, with malicious intent ergonomics human engineering protocol the customs and regulations dealing with diplomatic formality, precedence, and etiquette. an original draft, minute, or record from which a document, especially a treaty, is prepared. intruder a person who enters a building, grounds, etc, without permission encryption the process of encoding a message so that it can be read only by the sender and the intended recipient. encryption systems often use two keys, a public key, available to …
2 / 118
t the bottom of the screen. 2. you have to type your user name and password to access a locked computer system. 3. this program displays a message when it detects spyware and other unwanted software that may compromise your privacy or damage your computer. 4. private networks use a software and/or hardware mechanism called a firewall to block unauthorized traffic from the internet. appendix 4. reading. task1. read the text carefully and answer these questions. 1. why is security so important on the internet? _______________________________________________________________ 2. what security features are offered by mozilla firefox? _______________________________________________________________ 3. what security protocol is used by banks to make online transactions secure? _______________________________________________________________ 4. how can we protect our email and keep it private? _______________________________________________________________ 5. what methods are used by companies to make internal networks secure? _______________________________________________________________ 6. in what ways can a virus enter a computer system? _______________________________________________________________ 7. how does …
3 / 118
credit card number into an order form which passes from computer to computer on its way to the online bookstore. if one of the intemediary computers is infiltrated by hackers, your data can be copied. to avoid risks, you should set all security alerts to high on your web browser. mozilla firefox displays a lock when the website is secure and allows you to desable or delete cookies – small fies placed on your hard driver by web servers so that they can recognize your pc when you return to their site. if you use online banking services, make sure the use digitial certifucate - files that are like digital identification cards and that identify users and web servers.also be sure to use browser that is compliant with ssl ( secure sockets layer), a protocole which providers secure transactions. email privacy similarly, as your email travels across the net, it …
4 / 118
- if you insert an infected disk - or via the internet. a worm is a self – copying program that spreads through email attachments; it replicates itself and sends a cpoy to everyone in an adress book. a trojan horce is disguised as a useful program; it may affect data security. spyware collects information fromyour pc without your consent. most spyware and adware ( software that allows pop-ups- that is, advertisements that suddenly appear on your screen) is included with ‘free ‘downloads. if you want to protect your pc, don’t open email attachments from strangers and take care when doneloading files from the web. remember to update your anti- virus software as often as possible, since new viruses are being created all the time. note: originally, all computer enthusiasts and skilled programmers were known as hackers, but during the 1990s , the term hacker became synonyms with cracker- a …
5 / 118
onable websites. violence and racist (3)_________ websites should (6)________ their content with a label, from children friendly to over 18 only. appendix 5: language synonyms and antonyms synonyms and antonyms – meanings before learning various words of synonyms and antonyms, let us first understand the meaning of both the words. what is a synonym? a synonym is a word/phrase, the meaning of which is the same or nearly the same as another word or phrase. words that are synonyms are described as synonymous. synonym examples: · artful – crafty · ballot – poll · chorus – refrain · deceptive – misleading · enormous – immense · what is an antonym? an antonym is a word/phrase that means the opposite of another word or phrase. check the examples. antonym examples: · admire – detest · bravery – cowardice · crooked – straight · dainty – clumsy · economise – waste task …

Want to read more?

Download all 118 pages for free via Telegram.

Download full file

About "workbook"

fergana branch of tashkent university of information technologies named after al-khwarizmi faculty: computer engineering direction: __________________________ ______________________________________ group: _______________________________ name: ________________________________ workbook fergana 2023 lesson 1. theme: computer threats date:_________________________________ appendix 1: glossary new words definition hacker 1. a person who has a high level of skill in computer technology or programming; a computer expert or enthusiast; a person who circumvents security and breaks into a network, computer, file, etc., often, but not always, with malicious intent ergonomics human engineering protocol the customs and regulations dealing with diplomatic formality, precedence, and etiquette. an origina...

This file contains 118 pages in DOCX format (22.4 MB). To download "workbook", click the Telegram button on the left.

Tags: workbook DOCX 118 pages Free download Telegram