计算机专业英语课件E1_Unit 10
37页1、ContentsPart 1 Reading and TranslatingSection A:Ways to Protect Your Personal Information Online Section B:Using Computer Forensics against CybercrimePart 2 Simulated Writing:Writing for Employment(II)Part 3 Listening and SpeakingDialogue:Using Antivirus SoftwareListening Comprehension:Hacker and CrackerDictation:Trojan Horses1.1 Section A:Ways to Protect Your Personal Information Online Wordsunprecedentednpresidentid adj.前所未有的,空前的,没有先例的engagingineidi adj.有趣的,令人愉快的,迷人的scourskau(r)v.(彻底地)搜寻,搜查per
2、kpk n.(工资之外的)补贴,津贴,额外待遇Words hackhk v.非法侵入(他人计算机系统)mixmiks n.混乱,迷惑starterstt(r)n.起始者,初学者signifysignifai v.表示,说明1.1 Section A:Ways to Protect Your Personal Information OnlinePhrasessign up 注册without you knowing 在不了解你的情况下just the same 仍然,依然,照样in question 被提及的,讨论中的,相关的protect against 保护,保卫in regard to 在方面,就而论big name 成功人士,知名人士1.1 Section A:Ways to Protect Your Personal Information OnlineExercisesI.Read the following statements carefully,and decide whether they are true(T)or false(F)according to the
3、 text._1.Identity and money theft risks are one of the biggest threats we face online._2.Many of websites are either malicious or simply not safe._3.If you are surfing the Web,it is not necessary to have some protection._4.The two-step authentication process makes it harder or nearly impossible for hackers to access your information as the password alone is not alone._5.Phishing is a method that can be used by hackers who access private data of individual users.1.1 Section A:Ways to Protect Your
4、 Personal Information OnlineII.Choose the best answer to each of the following questions according to the text.1.How many ways are mentioned to protect your personal and banking info?A.One B.ThreeC.FiveD.Seven2.Which of the following is right?A.The two-step authentication process makes it harder or nearly impossible for hackers to access your information as the password alone is not alone.B.Phishing is a method that can be used by hackers who access private data of individual users.C.Identity an
5、d money theft risks are one of the biggest threats we face online.D.All of the above1.1 Section A:Ways to Protect Your Personal Information Online3.Which of the following is needed to create a password?A.Social network B.Email C.Banking account D.All of the above1.1 Section A:Ways to Protect Your Personal Information Online.Identify the letter of the choice that best matches the phrase or definition.a.disaster recovery planb.presence technologyc.surge suppressor d.system failuree.uninterruptible
《计算机专业英语课件E1_Unit 10》由会员小萌新****ao分享,可在线阅读,更多相关《计算机专业英语课件E1_Unit 10》请在金锄头文库上搜索。
软件需求工程04
商务谈判与礼仪课件第三章 商务谈判心理、思维和动机
《复变函数与积分变换》1.3 复变函数
SQL Server数据库第4章 表数据操作
理财规划原理-课件第二章 宏观经济基础
《数据库原理与应用》PPT1第1章 数据库概述和SQL 2017开发环境
《软件工程与项目管理》1-3-软件工程概述(3)
商务智能(第5版)课件第2章 商务智能系统架构
《软件工程与项目管理》3-3-软件策划与项目计划(3)
《数据库原理与应用》PPT1第5章 数据库编程技术基础
《面向对象程序设计》实验指导书-
基础会计购买固定资产业务核算1
《软件项目管理与案例分析》课件第2章
《软件工程与项目管理》2-2-软件过程(2)
软件需求工程05
Access数据库创建、使用与管理从新手到高手课件第12章
《现代检测技术及仪表》课件第8章 机械量检测及仪表
Access数据库创建、使用与管理从新手到高手课件第5章
《面向对象程序设计C++》课件1第3章 类和对象-动态内存与智能指针
会计基础项目八20
2023-11-14 9页
2023-11-14 28页
2023-11-15 26页
2023-11-15 32页
2023-11-15 44页
2023-11-15 40页
2023-11-14 32页
2023-11-15 45页
2023-11-14 38页