计算机专业英语Unit-10-课件1

上传人:夏** 文档编号:573083520 上传时间:2024-08-14 格式:PPT 页数:13 大小:120KB
返回 下载 相关 举报
计算机专业英语Unit-10-课件1_第1页
第1页 / 共13页
计算机专业英语Unit-10-课件1_第2页
第2页 / 共13页
计算机专业英语Unit-10-课件1_第3页
第3页 / 共13页
计算机专业英语Unit-10-课件1_第4页
第4页 / 共13页
计算机专业英语Unit-10-课件1_第5页
第5页 / 共13页
点击查看更多>>
资源描述

《计算机专业英语Unit-10-课件1》由会员分享,可在线阅读,更多相关《计算机专业英语Unit-10-课件1(13页珍藏版)》请在金锄头文库上搜索。

1、计算机专业计算机专业英语英语 教学教学课件课件Unit 10 Computer Security and PrivacyContentsPart 1 Listening and SpeakingDialogue: Using Antivirus SoftwareListening Comprehension: Hacker and CrackerDictation: Trojan HorsesPart 2 Reading and TranslatingSection A: Protecting Your Information OnlineSection B: Security Attacks

2、Part 3 Simulated Writing: Writing Professional Letters (II)1.1 Dialogue: Using Antivirus SoftwareExercises: Work in a group, and make up a similar conversation by replacing the statements with other expressions on the right side.1.2 Listening Comprehension: Hacker and CrackerListen to the passage an

3、d the following 3 questions based on it. After you hear a question, there will be a break of 15 seconds. During the break, you will decide which one is the best answer among the four choices marked (A), (B), (C) and (D).Questions1Which term was originally a positive title?2Why has the popular defini

4、tion of hacker been changed?3Which of the following behavior(s) is (are) illegitimate?1.3 Dictation: Trojan HorsesThis article will be played three times. Listen carefully, and fill in the numbered spaces with the appropriate words you have heard. 2.1 Section A: Protecting Your Information OnlineExe

5、rcisesI. Read the following statements carefully, and decide whether they are true (T) or false (F) according to the text._1. When it comes to posting online information, you can take it back._2. All websites and online organizations are created equal._3. Sparing no efforts to investigate the securi

6、ty practices of the site is often well worth. _4. Compared with face-to-face conversations, online communication has some limitations._5. Many users often use privacy controls, or even know about them.2.1 Section A: Protecting Your Information OnlineII. Choose the best answer to each of the followin

7、g questions.1. How many percent of social media users post their full birthday online, opening themselves up to identity theft, according to Consumer Reports Magazines State of the Net 2010 analysis?(A) 10% (B) 20%(C) 30%(D) 40%2. Which of the following is not the reason people make mistakes when it

8、 comes to keeping online information secure? (A)People dont think about the ramifications of sharing particular information in particular ways.(B) The Internet can create a false sense of anonymity.(C) Internet users dont make certain information available online.(D) People make assumptions about ho

9、w securely their information is being treated.3. Which of the following is a direct competitor to Facebook?(A) IBM (B) Google+ (C) Microsoft (D) Apple 2.1 Section A: Protecting Your Information Online. Match each numbered item with the most closely related lettered item. Write your answers in the sp

10、aces provided.a.accuracyb.biometricc.cookiesd.encryptione.information brokers_1. Individuals who collect and sell personal data._2. Small data files deposited on your hard disk from websites you have visited._3. Privacy concern that relates to the responsibility to ensure correct data collection._4.

11、 A type of scanning device such as fingerprint and iris (eye) scanner._5. Process of coding information to make it unreadable except to those who have a key.2.2 Section B: Security AttacksExercisesI. Read the following statements carefully, and decide whether they are true (T) or false (F) according

12、 to the text._1Man-in-the-middle attack is network-based security problem_2A denial of service attack directly corrupts data or gives inappropriate access_3Phishing is an attack that allows one user to masquerade as another _4A system crash could occur if a program attempts to store more information

13、 than a buffer can accommodate_5DoS is a technique that uses a web page that looks like an official part of some trusted environment2.2 Section B: Security AttacksII. Choose the best answer to each of the following questions.1Which of the following is not a security attack?ADoS attackBBack doorCPhis

14、hing DThread2Which of the following is a technique that uses a web page that looks like an official part of some trusted environment?ADoS attackBPhishing CBack doorDMan-in-the-middle attack3Which of the following is right?ADoS attack is network-basedBMan-in-the-middle attack is network-basedCSpoofin

15、g is an attack that allows one user to disguise as another.DAll of the above2.2 Section B: Security Attacks. Match each numbered item with the most closely related lettered item. Write your answers in the spaces provided.a.malwareb.phishingc.plagiarismd.spywaree.zombies_1. An ethical issue relating

16、to using another persons work and ideas as your own without giving credit to the original source. _2. Used by scammers to trick Internet users with official-looking websites._3. Infected computers that can be remotely controlled. _4. Malicious programs that damage or disrupt a computer system. _5. Wide range of programs that secretly record and report an individuals activities on the Internet.3. Simulated Writing: Writing Professional Letters (II)3. 结束商业信函结束商业信函4日常信函撰写日常信函撰写3称呼语的使用称呼语的使用

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 建筑/环境 > 施工组织

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号