Tuzuvchi: A. E. Tadjibaeva. Tatu ff, Horijiy tillar kafedrasi o’qituvchisi Taqrizchilar



Download 3,63 Mb.
bet20/29
Sana29.03.2022
Hajmi3,63 Mb.
#516233
1   ...   16   17   18   19   20   21   22   23   ...   29
Bog'liq
2 5222410456450208311

Task 3: Do tests



  1. Choose the correct answer.




  1. I’m a data _____ . I process data.

a. architect b. analyst c. developer d. supporter
2 Hello, I’m Kamal. _____ to meet you.
a. Pleased b. Please c. OK d. Thanks
3 Video and graphic cards are examples of _____ cards.
a. insertion b. translation c. extension d. processing
4 Have you _____ the CD into the correct drive?
a. run b. burnt c. set up d.inserted
5. Who _____ you work for?
a. do b. does c. are d. is
6. I _____ a software engineer. What about you?
a. do b. be c. am d. work
7. The new computer is _____ than my old one.
a. fastest b. faster c. fast d. fastest
more fast
8. This is _____ fault due to which they have had a problem with the system.
a. him b. hers c. my d. our
9. I am a network a network administrator. I ______ .
a. create user names and passwords c. solve computer problems
b. play computer d. develop software
10. Ahmed is a software developer. ______ designs and develops programs.
a. she b. it c. we d. he
11. Latika and Ahmed are system analysts. ______ _______computer problems.
a. He/ solve b.They/ solves c. We/ is solving d. They/ solve
12. _______ team is very friendly.
a. our b. we c. ours d. mine


15. INTERNET CRIME: MALWARE,VIRUSES, TROJANS AND SPYWARE


Task 1: Prepare a PPT (PowerPoint presentation) either using the given material or additional sources


Internet crime
I nternet crime - The internet provides a wide variety of opportunities for communication and development, but unfortunately it also has its dark side.
Crackers or black–hat hackers , are computer criminals who use technology to perform a variety of crimes : virus, propogation, fraud, intellectual property ,theft, etc.
Internet based crimes include scam , email-fraud to obtain money or valuables , and phishing, bank fraud, to get banking information such as passwords of internet bank accounts or credit card details. Both crimes use emails or websites that look like those of real organizations.
Due to its anonymity, the Internet also provides the right environment for cyberstalking online harassment or abuse, mainly in chat rooms or newsgroups.
Piracy, the illegal copying and distribution of copyrighted software, information music and video files is widespread.
But by far the most common type of crime involves malware.
Malware: viruses, worms, Trojans and spyware

Download 3,63 Mb.

Do'stlaringiz bilan baham:
1   ...   16   17   18   19   20   21   22   23   ...   29




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish