1. Before reading the text watch a video Read the text and do exercises a lans (Local Area Networks) Networking



Download 3,29 Mb.
bet41/52
Sana14.08.2021
Hajmi3,29 Mb.
#147722
1   ...   37   38   39   40   41   42   43   44   ...   52
Bog'liq
TASKS ON UNIT 4(1)

c. Preventative tips


  • Don’t open email attachments from unknown people; always take note of the file extension.

  • Run and update antivirus programs, e.g. scanners.

  • Install a firewall, a program designed to prevent spyware from gaining access to the international network.

  • Make backup copies of your files regularly.

  • Don’t accept files from high-risk sources.

  • Use a digital certificate, an electronic way of providing your identity, when you are doing business on the Internet. Avoid giving credit card numbers.

  • Don’t believe everything you read on the Net. Have a suspicious attitude toward its contents.


APPENDIX 5. LISTENING.

Listen to an interview with Diana Wilson, a member of the Internet Safety Foundation. Which answers (a or b) best describe what she says.
Safety online for children
1.Parents should make children aware of

a.the benefits and risks of the Internet b. The risks of the Internet

2. A web filter program can be used to

a.prevent access to sites with unapropriate content

b.rate web content with labels (similar to the way movies are rated)

3.If kids spend too much time online or suffer from Internet addiction, parents should

a. stop them using the Internet b. Look for help from specialist
Listen again and complete the interviews notes.

Risks Solutions

Manipulation of children There are websites (4)___________of children.

Invasions of (1)________________ Internet (5)___________________programs let

Distribution of indecent or (2)_____ parents block objectionable websites.

_________________material. Websites should (6)_______________ their content

Violence and racist (3)____________ with a label, from child-friendly to over 18 only.

APPENDIX 6. POST –PRACTICE ACTIVITY
Fill in the gaps in these security tips with words from the box.

1.Malicious software (1)_________________ can be evolved by following some basic rules.

2. Internet users who like cybershopping should get a (2)______________________, an electronic identity card.

3. To prevent crackers from breaking into your internal network and obtaining your data, install a (3)___________________. It will protect you from (4)________________________________.

4. If you have been hit by a (5)___________________________ don’t panic! Download a clean-up utility and always remember to use an (6) _________________________ program, for example, a virus (7)__________________________________________________.

APPENDIX 7. HOME TASK
Read the text and speak about Internet Etiquette.


Download 3,29 Mb.

Do'stlaringiz bilan baham:
1   ...   37   38   39   40   41   42   43   44   ...   52




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish