Hemis tasks tasks 4: score -5 unit 8: security and safety lesson 21. Computer threats. It security and safety. Task 1



Yüklə 381,5 Kb.
səhifə3/7
tarix02.06.2022
ölçüsü381,5 Kb.
#60438
1   2   3   4   5   6   7
Qahhorov Temurbek 630 -21

LESSON 24: Security solutions.

Task 1. Choose the appropriate form.
1. He__ be able to help you.
A)may B)must C)should D)will
2. She __have to sell her car and other belongings to pay her debts.
A)will B)will probably C)might D)would
3. Where is Anna? – I don't know. She ___be at the swimming pool or in the park.
A)could B)should C)must D)has to
4. It ___be as easy as you think.
A)can't B)couldn't C)might not D)must not
5. Don't ring the doorbell when you get there. Maria's little baby ____sleeping.
A)must be B)should be C)maybe D)may not be


LESSON 25: Antiviruses.
HOMETASK.
APPENDIX 1. VIDEOS.
Watch the videos.
Task 1. Divide the evolution of the viruses by decades.

  • 1970’s : The first story written about a computer virus is The Scarred Man by Gregory Benford

  • 1980’s: A program called Elk Cloner, written for Apple II systems, was created by high school student Richard Skrenta, originally as a prank.

  • 1990’s : Mark Washburn, working on an analysis of the Vienna and Cascade viruses with Ralf Burger, develops the first family of polymorphic viruses, the Chameleon family. Chameleon series debuted with the release of 1260.

  • 2000’s : May 5: The ILOVEYOU worm (also known as the Love Letter, VBS, or Love Bug worm), a computer worm written in VBScript and using social engineering techniques, infected millions of Windows computers worldwide within a few hours of its release.

  • 2010’s : January: The Waledac botnet sent spam emails. In February 2010, an international group of security researchers and Microsoft took Waledac down.

APPENDIX 2. READING.

Yüklə 381,5 Kb.

Dostları ilə paylaş:
1   2   3   4   5   6   7




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin