Английский язык для студентов технического вуза: Средства массовой информации. Мир продвинутых технологий. Рабочая тетрадь для студентов среднего уровня. Ковалева Ю.Ю - 58 стр.

UptoLike

58
2 Participating companies and the FBI would use encrypted e-mail and a ____ to
warn each other about new ___ attempts, ___ and other Internet-based criminal
activity.
3 In addition to using the national ____, Infra Guard companies can organise local
activities such as seminars and workshops to better educate themselves about
Internet security.
4 The Infra Guard system was used last fall to alert companies to the existence of
"zombies", or hostile ____ , on their servers.
5 Zombies are used to launch denial-of-service attacks such as the one that
swamped Yahoo! and other Web sites with massive amounts of ____ last
February.
14 Complete the sentences and write the words in the puzzle.
1 Users have to enter a ______ to gain access to a network.
2 You can download a lot of _____ or public domain programs from the net.
3 Hundreds of ____ break into computer systems every year.
4 A computer ____ can infect your files and corrupt your hard disk.
5 The process of encoding data so that unauthorized users can't read the data is
known as _____
6 A _____ is a device which allows limited access to an internal network from the
Internet.
7 You can include an ______ as part of your e-mail message.
8 This company uses ______ techniques to decode (or decipher) secret data.
1.
2.
3.
4.
5.
6.
7.
8.