Activity 12. Name at least 3 reasons why people should/shouldn’t have an anonymous avatar
|
Activity 13. Say which accounts you have got on the Internet. What is the purpose of each account? How often do you use it?
Activity 14. Add to Wikipedia a page describing national clothes, a national musical instrument or the national cuisine (min. 500 words). Report on your contribution, demonstrate the results.
Activity 15. Do a mini research and prepare a short report about famous blogs/bloggers.
TEST
1 | Mark the odd word: a) block b) permit c) give access d) allow |
2 | Alexandria is _________ by a network of railway and telegraph lines to the other towns of Egypt. a) linked b) linking c) linkage d) links |
3 | What is the logical relationship between the concepts “virtual – real”: a) general and specific b) cause and effect c) method and purpose d) contrast |
4 | All of these are synonymous to the word “link” EXCEPT FOR: a) tie b) connection c) cross-reference d) thread |
5 | E-mail and spam differ mostly by their ___. a) size b) time of delivery c) purpose d) medium of delivery |
6 | A location connected to the Internet that maintains one or more web pages is known as a ___. a) blog b) cookie c) site d) link |
7 | What is the logical relationship between “a blog” and “an online journal”: a) general – specific b) method – purpose c) part – whole d) equivalence |
8 | What is the logical relationship between “mail” and “postal mail”: a) general – specific b) method – purpose c) part – whole d) equivalence |
9 | A blog and a forum differ mostly by their: a) purpose b) number of authors c) location d) topic |
10 | Everybody can contribute ___ Wikipedia. a) with b) in c) to d) for |
11 | A movable icon representing a person in cyberspace is known as a(n) ___. a) avatar b) meme c) emoticon d) smiley |
12 | Computers account ____ 5% of the country's commercial electricity consumption. a) with b) in c) for d) on |
13 | Mark the odd word: a) account b) accountability c) accountant d) accountable |
14 | _________ TV is gaining more and more popularity. a) stream b) streaming c) streamer d) streamed |
15 | Which of the following concepts denotes physical connection: a) www b) landline c) the Internet d) cyberspace |
16 | Maintaining a site with regular entries of commentary, descriptions of events, or other material is called ____. a) browsing b) blogging c) chatting d) feeding |
17 | The programmer successfully ____ some of software bugs. a) traceless b) traced c) tracing d) trace |
18 | All of these deal with “data rate” EXCEPT FOR: a) bandwidth b) clickbaiting c) throughput d) data transfer capacity |
19 | All of these collocate with the noun “crowdfunding” EXCEPT FOR: a) succeed in b) allocate c) raise money through d) try |
20 | All of these collocate with the noun “password” EXCEPT FOR: a) ageing b) stalking c) generation d) authentication |
Module 7. CYBER CRIME
№ | Term | Definition | Usage |
1 | Bootlegger (n) | a person engaged in illegal copying of software; an illegally copied software | bootlegging (n); bootlegged (adj); syn. pirate, piracy |
2 | Breach (n) | an act of breaking or failing to observe a law, agreement, or code of conduct; disclosure of sensitive information to an unauthorized outsider | a ~ of law/contract/policy/code of conduct; do sth in ~ of sth; syn. violation, infringement |
3 | Combat (v) | fight against sth; oppose sth vigorously | ~ piracy/computer crime; syn. fight sth, struggle with sth |
4 | Commit (v) | do; perform; dedicate oneself to sth | ~ a(n) crime/murder/error/suicide; ~ oneself to sth; ~ sth to memory/ prison; committed (adj): ~ to a cause/principles/idea/doing sth; a ~ employee/worker; commitment (n): show/demonstrate/make no ~; |
5 | Comply (v) | meet specified standards; act in accordance with a wish or command | ~ with the rules/regulations/law/ standards; (non-)compliance (n); (non-)compliant (adj); syn. conform to/with, abide by |
6 | Copyright (n) | the exclusive right given by law to an author to print, publish, and sell copies of his/her original work | secure/protect/ infringe on/ violate the ~; ~ law/holder; copyrighted (adj), copyrighter (n); copywriting (n) ant. copyleft |
7 | Crack (v) | break or cause to break sth open or apart; find a solution to sth; decipher or interpret sth; break a security system illegally | ~ a joke/code/message; a tough nut to ~, ~ down on criminals; crack (n): a ~ dealer/seller; crack (n): a tiny/narrow ~, cracking (n), cracker (n): a black-hat ~; syn. break, decipher, hack |
8 | Crime (n) | illegal activity punishable by law | commit/prevent/report/fight (a) ~; punish sb for a ~; ~ rate/incidence; a victim of ~; petty/serious/violent/ organized ~; criminal (adj), criminally (adv), criminality (n), incriminate (v), incrimination (n); syn. felony, wrongdoing |
9 | Cyberbullying (n) | repeatedly harming or harassing other people online in a deliberate manner | be subject to~; fall/become a victim of ~; syn. cyberstalking, trolling |
10 | Cybercide (n) | the deletion of an individual's entire online presences (the removal of all social media profiles, shared photos, blog posts, directory entries and so on) | be prone to/commit ~; an act of ~; Cf. suicide, genocide, ecocide |
11 | Cyberslacking (n) | using company computer for personal purposes during working hours (playing games, shopping online or using social networking sites) | indulge in/engage in/combat ~; cyberslacker (n); syn. cyberloafer, cyberloafing |
12 | Cybersquatting (n) | ![]() | engage in/be (get) involved in /combat/eliminate ~ |
13 | Data diddling (n) | modifying data for fun and profit, e.g. modifying grades, changing credit ratings, fixing salaries, or circumventing book-keeping and audit regulations | engage in/be (get) caught ~; data diddler (n) |
14 | Disseminate (n) | scatter or spread widely, promulgate extensively; broadcast; disperse | ~ information/viruses/knowledge/ ideas/news; dissemination (n); syn. spread, propagate, promulgate |
15 | Filter (v) | remove undesirable data by sifting | ~ a list of customers/incoming e-mail/traffic; syn. sift away |
16 | Flooding (n) | an overflow of a large amount of water beyond its normal limits; providing more input than the entity can process properly | engage in/suspect/combat/protect against ~; flood (v), flooded (adj), flooding (n); Cf. mailbombing, packet monkey |
17 | Fraud (n) | manipulation of data for criminal purposes, e.g. changing banking records to illegally transfer money to an account | a ~ scheme; control/commit/suspect/ combat/ protect against ~; in case of ~; fraudulence (n), fraudulent (adj), fraudulently (adv), fraudster (n) syn. cheating, swindling |
18 | Hacker (n) | someone who secretly uses or changes the information in other people's computer systems | speed/teleport/ethical ~;
hack (v), back-hack (v);
syn. cracker
![]() |
19 | Identity theft (n) | creating a false identity using sb else’s identifying information to make new credit cards or take loans | commit an ~; protect from ~; accuse sb of ~ |
20 | Intruder (n) | the one who puts oneself deliberately into a place or situation where one is unwelcome or uninvited | network/computer/impudent ~; attack/alert an ~; intrude (v), (un)intrusive (adj), intrusion (n); syn. invader, trespasser |
21 | Jacking (n) | taking sth in a manner forbidden by law, rules, or custom | click/hi/page-~; engage in/be (get) involved in/suspect/combat/protect against ~; create a click-~ site; jack in (v); jacker (n): hi/click/page-~; syn. stealing Cf. identity theft |
22 | Keylogging (n) | installing a program on a victim's machine that records every keystroke made by a user for stealing login and password details | suspect/engage in/combat/protect against/suffer from ~; keylogger (n) |
23 | Mousetrapping (n) | forcing an Internet user to stay on a particular website by triggering a mouse trap | engage in/suspect/combat/protect against ~ |
24 | Packet monkey (n) | sb who intentionally floods a network server or router with data packets in order to make it unreachable by others | Cf. flooding |
25 | Phracking (n) | a combination of phreaking with computer hacking | engage in/suspect/combat/protect against ~; phracker (n) |
26 | Phreaking (n) | hacking telephone systems, usually for the purpose of making free phone calls | engage in/suspect of /combat/protect against ~; freaker (n) |
27 | Piggybacking (n) | gaining unauthorized access to a computer system via another user's legitimate connection | engage in/be (get) involved in/be caught ~; a piggyback |
28 | Piracy (n) | the act of illegally copying software, music, or movies that are copyright-protected | computer/software ~; act of ~; engage in/suspect/combat/commit/ protect against ~; anti-piracy (n): ~ law/measures; pirate (n), pirated (adj); syn. bootlegging |
29 | Pharming (n) | misdirecting traffic from one website to a website controlled by a criminal hacker by altering the domain name system or configuration files on a victim’s computer | engage in/be (get) involved in/ suspect/combat/commit/protect against ~; pharmer (n) |
30 | Phishing (n) | sending e-mails or creating web pages that are designed to collect confidential information for penetration, financial fraud or identity theft | engage in/be involved in/be caught ~; phisher (n) |
31 | Repudiation (n) | rejection of a proposal or idea; refusal to fulfill or discharge an agreement, obligation, or debt | ~ of a law/contract/policy/idea/ principle; (n); repudiate (v); syn. reject, renounce ant. non-repudiation |
32 | Salami theft /slicing (n) | stealing tiny amounts of money from each transaction | engage in/be (get) involved in/be (get) caught (in) ~ |
33 | Scavenging (n) | looking through discarded listings, tapes, or other information storage media for useful information such as access codes, passwords, or sensitive data | engage in/be (get) involved in/be (get) caught ~; syn. dumpster diving |
34 | Spoofing (n) | deceiving a system into thinking you are someone you really are not to bypass security measures | IP ~; engage in/be (get) involved in/be (get) caught ~; spoofer (n) |
35 | Steal (v) | take sb’s property without permission or legal right and without intending to return it | ~ sth from sb; stolen (adj), stealth (n), stealthy (adj), stealthily (adv); syn. theft (n) Cf. thief |
36 | Trojan Horse (n) | an innocent-looking program that has undocumented harmful functions | download/detect/neutralize a ~; Cf. Easter egg, time bomb, zombie |
37 | Trolling (n) | an anti-social act of causing an interpersonal conflict and controversy online, purposely sowing hatred, bigotry, racism, etc. | go ~; engage in/prevent/tackle/stop (an act of)/suffer from/reduce the risk of ~; troll (v); syn. cyberbullying |
38 | Virus (n) | a computer program designed to replicate and spread itself from one machine to another by human action | download/detect/neutralize/spread/disseminate a ~; Cf. bot, zombie |
39 | Wiretapping (n) | the interception of electronic communications in order to access information | engage in/detect/be (get) caught/protect against/from ~ |
40 | Worm (n) | a program which spreads through a computer system or network by replicating itself without human action(like a virus) but without integrating itself into its executable code | install/download/detect/neutralize/ spread/disseminate a ~ |
1. Kabay M. E., Glossary of computer crime terms. [Online]. Available: http://www.mekabay.com/overviews/glossary.pdf [Accessed: 13 Oct. 2015]
2. Ward M., Hi-tech crime: A glossary. BBC news. [Online]. Available: http://news.bbc.co.uk/2/hi/uk/5400052.stm [Accessed: Oct. 14, 2015]
3. The Dictionary. Netlingo. [Online]. Available: http://www.netlingo.com [Accessed: 15 Oct. 2015]
ACTIVITIES
Activity 1. Give synonyms:
1. bootlegger | |
2. combat | |
3. committed to sth | |
4. breach | |
5. stealth | |
6. cyberslacking | |
7. filter |
Activity 2. Give antonyms:
1. compliant | |
2. repudiation | |
3. violation | |
4.conformity | |
5. copyright | |
6. piracy | |
7. black-hat cracker |
Activity 3. Word family. Fill in the missing words of the same root where possible:
Noun | Verb | Adjective | Adverb |
commit | |||
Intruder | |||
criminal | |||
steal | |||
fraudulently | |||
Flood | |||
(non-) compliant |
Activity 4. Complete the tables with words that form strong partnerships with the target vocabulary units:
Verb | Target vocabulary unit |
fraud | |
Verb | Target vocabulary unit |
a worm/virus | |
Target vocabulary unit | Noun |
commit a(n)
| |
Verb | Target vocabulary unit |
spoofing | |
Target vocabulary unit | Noun |
comply with a
| |
Activity 5. Match the given terms with their definitions:
Дата добавления: 2018-02-28; просмотров: 1062;