好文档就是一把金锄头!
欢迎来到金锄头文库![会员中心]
电子文档交易市场
安卓APP | ios版本
电子文档交易市场
安卓APP | ios版本

计算机专业英语Unit10课件1.ppt

13页
  • 卖家[上传人]:大米
  • 文档编号:573244359
  • 上传时间:2024-08-14
  • 文档格式:PPT
  • 文档大小:120KB
  • / 13 举报 版权申诉 马上下载
  • 文本预览
  • 下载提示
  • 常见问题
    • 计算机专业计算机专业英语英语 教学教学课件课件 Unit 10 Computer Security and Privacy Contents•Part 1 Listening and Speaking–Dialogue: Using Antivirus Software–Listening Comprehension: Hacker and Cracker–Dictation: Trojan Horses•Part 2 Reading and Translating–Section A: Protecting Your Information Online–Section B: Security Attacks•Part 3 Simulated Writing: Writing Professional Letters (II) 1.1 Dialogue: Using Antivirus Software•Exercises: Work in a group, and make up a similar conversation by replacing the statements with other expressions on the right side. 1.2 Listening Comprehension: Hacker and Cracker•Listen to the passage and the following 3 questions based on it. After you hear a question, there will be a break of 15 seconds. During the break, you will decide which one is the best answer among the four choices marked (A), (B), (C) and (D).•Questions–1.Which term was originally a positive title?–2.Why has the popular definition of hacker been changed?–3.Which of the following behavior(s) is (are) illegitimate? 1.3 Dictation: Trojan Horses•This article will be played three times. Listen carefully, and fill in the numbered spaces with the appropriate words you have heard. 2.1 Section A: Protecting Your Information Online•Exercises•I. Read the following statements carefully, and decide whether they are true (T) or false (F) according to the text.___1. When it comes to posting online information, you can take it back.___2. All websites and online organizations are created equal.___3. Sparing no efforts to investigate the security practices of the site is often well worth. ___4. Compared with face-to-face conversations, online communication has some limitations.___5. Many users often use privacy controls, or even know about them. 2.1 Section A: Protecting Your Information Online•II. Choose the best answer to each of the following questions.1. How many percent of social media users post their full birthday online, opening themselves up to identity theft, according to Consumer Reports Magazine’s State of the Net 2010 analysis?(A) 10% (B) 20%(C) 30%(D) 40%2. Which of the following is not the reason people make mistakes when it comes to keeping online information secure? (A)People don’t think about the ramifications of sharing particular information in particular ways.(B) The Internet can create a false sense of anonymity.(C) Internet users don’t make certain information available online.(D) People make assumptions about how securely their information is being treated.3. Which of the following is a direct competitor to Facebook?(A) IBM (B) Google+ (C) Microsoft (D) Apple 2.1 Section A: Protecting Your Information Online•ⅢⅢ. Match each numbered item with the most closely related lettered item. Write your answers in the spaces provided.a.accuracyb.biometricc.cookiesd.encryptione.information brokers______1. Individuals who collect and sell personal data.______2. Small data files deposited on your hard disk from websites you have visited.______3. Privacy concern that relates to the responsibility to ensure correct data collection.______4. A type of scanning device such as fingerprint and iris (eye) scanner.______5. Process of coding information to make it unreadable except to those who have a key. 2.2 Section B: Security Attacks•Exercises•I. Read the following statements carefully, and decide whether they are true (T) or false (F) according to the text.___1.Man-in-the-middle attack is network-based security problem___2.A denial of service attack directly corrupts data or gives inappropriate access___3.Phishing is an attack that allows one user to masquerade as another ___4.A system crash could occur if a program attempts to store more information than a buffer can accommodate___5.DoS is a technique that uses a web page that looks like an official part of some trusted environment 2.2 Section B: Security Attacks•II. Choose the best answer to each of the following questions.1.Which of the following is not a security attack?A.DoS attackB.Back doorC.Phishing D.Thread2.Which of the following is a technique that uses a web page that looks like an official part of some trusted environment?A.DoS attackB.Phishing C.Back doorD.Man-in-the-middle attack3.Which of the following is right?A.DoS attack is network-basedB.Man-in-the-middle attack is network-basedC.Spoofing is an attack that allows one user to disguise as another.D.All of the above 2.2 Section B: Security Attacks•ⅢⅢ. Match each numbered item with the most closely related lettered item. Write your answers in the spaces provided.a.malwareb.phishingc.plagiarismd.spywaree.zombies______1. An ethical issue relating to using another person's work and ideas as your own without giving credit to the original source. ______2. Used by scammers to trick Internet users with official-looking websites.______3. Infected computers that can be remotely controlled. ______4. Malicious programs that damage or disrupt a computer system. ______5. Wide range of programs that secretly record and report an individual's activities on the Internet. 3. Simulated Writing: Writing Professional Letters (II)•3. 结束商业信函结束商业信函•4.日常信函撰写.日常信函撰写•3.称呼语的使用.称呼语的使用 。

      点击阅读更多内容
      相关文档
      2025国开山东开大《土质学与土力学》形成性考核123答案+终结性考核答案.docx 中学综合素质知识点梳理【中学教师资格证】.docx 2025国开山东开大《特许经营概论》形成性考核123答案+终结性考核答案.doc 2025年高考英语全国一卷真题(含答案).docx 2025国开山东《农民专业合作社创建与管理》形成性考核123答案+终结性考核答案.docx 2025国开山东开大《自然现象探秘》形成性考核123答案+终结性考核答案.docx 2025国开山东《消费心理学》形成性考核123答案+终结性考核答案.doc 2025国开山东《小微企业管理》形成性考核123答案+终结性考核答案.doc 2025国开山东开大《资本经营》形成性考核123答案+终结性考试答案.docx 2025国开山东《小学生心理健康教育》形考123答案+终结性考试答案.docx 2025国开《视频策划与制作》形考任务1-4答案.docx 2025国开《亲子关系与亲子沟通》形考任务234答案+期末大作业答案.docx 2025国开电大《煤矿地质》形成性考核123答案.docx 2025国开电大《冶金原理》形考任务1234答案.docx 2025国开《在线学习项目运营与管理》形考任务1234答案.doc 2025国开电大《在线教育的理论与实践》阶段测验1-4答案.docx 2024 年注册环保工程师《专业基础考试》真题及答案解析【完整版】.docx 环保工程师---2023 年注册环保工程师《专业基础考试》真题及答案解析【完整版】.docx 2025国开《液压与气压传动》形考任务一参考答案.docx 2025年春江苏开放大学教育研究方法060616计分:形成性作业2、3答案.docx
      关于金锄头网 - 版权申诉 - 免责声明 - 诚邀英才 - 联系我们
      手机版 | 川公网安备 51140202000112号 | 经营许可证(蜀ICP备13022795号)
      ©2008-2016 by Sichuan Goldhoe Inc. All Rights Reserved.