В
Все
М
Математика
А
Английский язык
Х
Химия
Э
Экономика
П
Право
И
Информатика
У
Українська мова
Қ
Қазақ тiлi
О
ОБЖ
Н
Немецкий язык
Б
Беларуская мова
У
Українська література
М
Музыка
П
Психология
А
Алгебра
Л
Литература
Б
Биология
М
МХК
О
Окружающий мир
О
Обществознание
И
История
Г
Геометрия
Ф
Французский язык
Ф
Физика
Д
Другие предметы
Р
Русский язык
Г
География

9.3.1.(??) Match the terms and their definitions. Соедините термины и их определения.
(~) cybercrime ~ process of encoding information in such a way that only authorized parties can access it
(~) evolve ~ collection of software utilities that protect a user's computer from viruses
(~) precaution ~ catch something or someone before that thing or person is able to reach a particular place
(~) malware ~ powerful effect that something has on a situation or person
(~) exploit ~ develop gradually
(~) encryption ~ any software intentionally designed to cause damage
(~) intercept ~ any incident that results in unauthorized access of data
(~) security suite ~ a crime committed on-line
(~) impact ~ an attack on a computer system, especially one that takes advantage of a particular vulnerability
(~) security breach ~ something that is done to avoid danger

9.3.2. (??) Complete the sentences with the words given below. Подставьте слова в предложения.
(~) Statistics show that millions of people are victims of ……. each year.
(~) A ……. can damage an organization’s reputation and finances.
(~) Our Internet ……. is automatically updated to keep the user protected from new threats online.
(~) Data ……. translates data into another form, or code, so that only people with access to a secret key or password can read it.
(~) Many business owners have embraced computers as tools in doing business so early that at present, in many places, hardware and ……. both are becoming old.
(~) A German company ……. with a Swiss firm to develop the product.
(~) The tighter security ……. include video cameras in the city center.
(~) The committee pressed him to ……. more information.
(~) This decision will have a disastrous ……. on foreign policy.
(~) Hackers gained complete ……. to the company files.
Reveal, encryption, security suite, precautions, applications, security breach, identity theft, access, impact, collaborated

Показать ответ
Ответ:

оо́

0,0(0 оценок)
Популярные вопросы: Английский язык
Полный доступ
Позволит учиться лучше и быстрее. Неограниченный доступ к базе и ответам от экспертов и ai-bota Оформи подписку
logo
Начни делиться знаниями
Вход Регистрация
Что ты хочешь узнать?
Спроси ai-бота