SlideShare a Scribd company logo
1 of 1
“The Internet and Safety”
It's unbelievablehow the Internet has become such an unsafeplace.You are always faced with the possibility of being
hacked or being infected by viruses and all sorts of onlinecontaminants.Whilewe can never be a hundred percent free
from the risks,therearethings we can do to reduce them significantly,and wedon'teven haveto be experts on Internet
security. Just being aware could actually save you a great deal of trouble and, of course, your basic firewall and anti-
virus software will have to be updated properly. Most of the time, we only need to practice some common sense,
disciplineand a littleparanoia.For example,if you receive emails from people you don't know, you’d better suspect the
senders may have maliciousintentions.Mostof these are actually hackers who would try to lead you into clickingon a
certain link.If you click on it, you'll end up in their site, so they could,for example, set off a certain code to remotel y
access and control your computer. That means anyone can steal whatever personal information you have stored in
there -maybe your bank account number, your credit card number, your passwords or usernames. There are also
hackers who'll send you emails pretendingto be an employee of your bank and askingfor your current usernames and
passwords to activate your account. Just remember that established institutions never transact online when it comes
to very sensitiveinformation.Therefore, when you encounter an email likethis,ignore it because itis most certainly a
trick.
I * COMPREHENSION (4 points: questions 1-3, 1 point each; questions 4-5, 0.5 points each) ANSWER
QUESTIONS 1-3 ACCORDING TO THE INFORMATION GIVEN IN THE TEXT. USE YOUR OWN WORDS.
1. Accordingto the text, what can we do to avoid getting infected?
2. What kind of dangers can we face when we click on links in emails fromunknown senders?
3. Which decision should wemake when we receive emails concerningsensitivepersonal
information?
ARE THESE STATEMENTS TRUE OR FALSE? JUSTIFY YOUR ANSWERS WITH THE PRECISE WORDS OR PHRASES
FROM THE TEXT, OR USE YOUR OWN WORDS.
4. If we adopt the rightmeasures we will never get infected by any sortof internet contaminants.
5. Institutions never operate online.
II * USE OF ENGLISH (3 points; questions 6-9, 0.25 points each; questions 10-13,0.5 points each)
6. FIND IN THE TEXT ONE SYNONYM FOR “insecure” (adjective).
7. FIND IN THE TEXT THE WORD WHICH HAS THE FOLLOWING DEFINITION: “to give a false
appearance”(verb).
8. GIVE A NOUN WITH THE SAME ROOT AS “established”(verb).
9. WHICH WORD DOES NOT HAVE THE SAME MEANING? Today / Currently / Nowadays / Actually.
10. TURN THE FOLLOWING SENTENCE INTO REPORTED SPEECH: Experts advised us:“Don’t open
any emails from unknown senders.”
11. GIVE A QUESTION FOR THE UNDERLINED WORDS: “Hackers use computer viruses to steal
millionsof dollarsfrombank accounts.”
12. COMPLETE THE FOLLOWING (CONDITIONAL) SENTENCE: “If my computer got infected by a
virus,…”
13. FILL IN THE GAP WITH THE CORRECT OPTION: You are not allowed . . . in thi s restaurant
(smoking/ to smoke/ smoked/ smoke)
III * PRODUCTION (3 points) 14. WRITE AN OPINION ESSAY OF APPROXIMATELY 120 WORDS FOCUS
STRICTLY ON THE TOPIC:
What would be the worst thing about being stuck somewhere without a phone or internet access?

More Related Content

What's hot

Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saulSaul Vidal Swales
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Online privacy
Online privacyOnline privacy
Online privacyjo-jo23
 
2016 Social Engineering Training
2016 Social Engineering Training2016 Social Engineering Training
2016 Social Engineering TrainingRob Valdez
 
2 cybersecurity best practices
2   cybersecurity best practices 2   cybersecurity best practices
2 cybersecurity best practices mohamad Hamizi
 
E mail essay
E mail essayE mail essay
E mail essaySamoLount
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats mohamad Hamizi
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneLookout
 
Marleah
MarleahMarleah
Marleahmorag
 

What's hot (20)

Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Internet Safety!!
Internet Safety!!Internet Safety!!
Internet Safety!!
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Internet safety at work presentation
Internet safety at work presentationInternet safety at work presentation
Internet safety at work presentation
 
Internet security
Internet securityInternet security
Internet security
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
2016 Social Engineering Training
2016 Social Engineering Training2016 Social Engineering Training
2016 Social Engineering Training
 
2 cybersecurity best practices
2   cybersecurity best practices 2   cybersecurity best practices
2 cybersecurity best practices
 
E mail essay
E mail essayE mail essay
E mail essay
 
Awesome Tips for Data Security
Awesome Tips for Data SecurityAwesome Tips for Data Security
Awesome Tips for Data Security
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Dangers of prism
Dangers of prismDangers of prism
Dangers of prism
 
Spring Cleaning for Your Smartphone
Spring Cleaning for Your SmartphoneSpring Cleaning for Your Smartphone
Spring Cleaning for Your Smartphone
 
Marleah
MarleahMarleah
Marleah
 
VPNs
VPNsVPNs
VPNs
 

Viewers also liked

Present and past tenses
Present and past tensesPresent and past tenses
Present and past tensesPatricia bb
 
Sport and health
Sport and healthSport and health
Sport and healthPatricia bb
 
The first Olympic Games
The first Olympic GamesThe first Olympic Games
The first Olympic GamesPatricia bb
 
Present and past tenses key answers
Present and past tenses key answersPresent and past tenses key answers
Present and past tenses key answersPatricia bb
 
Reported+speech+theory
Reported+speech+theoryReported+speech+theory
Reported+speech+theoryPatricia bb
 
Other+reporting+verbs
Other+reporting+verbsOther+reporting+verbs
Other+reporting+verbsPatricia bb
 
Reported questions
Reported questionsReported questions
Reported questionsPatricia bb
 
Reported questions 2
Reported questions 2Reported questions 2
Reported questions 2Patricia bb
 
Reported speech statements
Reported speech  statementsReported speech  statements
Reported speech statementsPatricia bb
 
Future forms key answers
Future forms key answersFuture forms key answers
Future forms key answersPatricia bb
 
Passives bac1-pra-self-study-ex
Passives bac1-pra-self-study-exPassives bac1-pra-self-study-ex
Passives bac1-pra-self-study-exPatricia bb
 
Oraciones de relativo
Oraciones de relativoOraciones de relativo
Oraciones de relativoPatricia bb
 
149 grammar unit_4_1star
149 grammar unit_4_1star149 grammar unit_4_1star
149 grammar unit_4_1starPatricia bb
 

Viewers also liked (19)

Grammar review
Grammar reviewGrammar review
Grammar review
 
Passive voice
Passive voicePassive voice
Passive voice
 
Present and past tenses
Present and past tensesPresent and past tenses
Present and past tenses
 
Sport and health
Sport and healthSport and health
Sport and health
 
The first Olympic Games
The first Olympic GamesThe first Olympic Games
The first Olympic Games
 
Pau29 b
Pau29 bPau29 b
Pau29 b
 
Present and past tenses key answers
Present and past tenses key answersPresent and past tenses key answers
Present and past tenses key answers
 
Reported speech
Reported speechReported speech
Reported speech
 
Reported+speech+theory
Reported+speech+theoryReported+speech+theory
Reported+speech+theory
 
Other+reporting+verbs
Other+reporting+verbsOther+reporting+verbs
Other+reporting+verbs
 
Workbook.
Workbook.Workbook.
Workbook.
 
Reported questions
Reported questionsReported questions
Reported questions
 
Reported questions 2
Reported questions 2Reported questions 2
Reported questions 2
 
Reported speech statements
Reported speech  statementsReported speech  statements
Reported speech statements
 
Future forms key answers
Future forms key answersFuture forms key answers
Future forms key answers
 
Passives bac1-pra-self-study-ex
Passives bac1-pra-self-study-exPassives bac1-pra-self-study-ex
Passives bac1-pra-self-study-ex
 
Future forms
Future formsFuture forms
Future forms
 
Oraciones de relativo
Oraciones de relativoOraciones de relativo
Oraciones de relativo
 
149 grammar unit_4_1star
149 grammar unit_4_1star149 grammar unit_4_1star
149 grammar unit_4_1star
 

Similar to The internet and safety

Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptxAljunMisa
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptJOHN BABATUNDE LEE
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHabFg
 
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014John Bambenek
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanMegan Bell
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesCatherine MacAllister
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafeCheapSSLsecurity
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Ayush Chopra
 

Similar to The internet and safety (20)

Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
 
Security Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 VirusesSecurity Awareness 9 10 09 V4 Viruses
Security Awareness 9 10 09 V4 Viruses
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Guide to pc_security
Guide to pc_securityGuide to pc_security
Guide to pc_security
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
Students, the internet and COVID-19 by Ayush Chopra | MAY 2020 | Issue 1
 
IT Security
IT SecurityIT Security
IT Security
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 

The internet and safety

  • 1. “The Internet and Safety” It's unbelievablehow the Internet has become such an unsafeplace.You are always faced with the possibility of being hacked or being infected by viruses and all sorts of onlinecontaminants.Whilewe can never be a hundred percent free from the risks,therearethings we can do to reduce them significantly,and wedon'teven haveto be experts on Internet security. Just being aware could actually save you a great deal of trouble and, of course, your basic firewall and anti- virus software will have to be updated properly. Most of the time, we only need to practice some common sense, disciplineand a littleparanoia.For example,if you receive emails from people you don't know, you’d better suspect the senders may have maliciousintentions.Mostof these are actually hackers who would try to lead you into clickingon a certain link.If you click on it, you'll end up in their site, so they could,for example, set off a certain code to remotel y access and control your computer. That means anyone can steal whatever personal information you have stored in there -maybe your bank account number, your credit card number, your passwords or usernames. There are also hackers who'll send you emails pretendingto be an employee of your bank and askingfor your current usernames and passwords to activate your account. Just remember that established institutions never transact online when it comes to very sensitiveinformation.Therefore, when you encounter an email likethis,ignore it because itis most certainly a trick. I * COMPREHENSION (4 points: questions 1-3, 1 point each; questions 4-5, 0.5 points each) ANSWER QUESTIONS 1-3 ACCORDING TO THE INFORMATION GIVEN IN THE TEXT. USE YOUR OWN WORDS. 1. Accordingto the text, what can we do to avoid getting infected? 2. What kind of dangers can we face when we click on links in emails fromunknown senders? 3. Which decision should wemake when we receive emails concerningsensitivepersonal information? ARE THESE STATEMENTS TRUE OR FALSE? JUSTIFY YOUR ANSWERS WITH THE PRECISE WORDS OR PHRASES FROM THE TEXT, OR USE YOUR OWN WORDS. 4. If we adopt the rightmeasures we will never get infected by any sortof internet contaminants. 5. Institutions never operate online. II * USE OF ENGLISH (3 points; questions 6-9, 0.25 points each; questions 10-13,0.5 points each) 6. FIND IN THE TEXT ONE SYNONYM FOR “insecure” (adjective). 7. FIND IN THE TEXT THE WORD WHICH HAS THE FOLLOWING DEFINITION: “to give a false appearance”(verb). 8. GIVE A NOUN WITH THE SAME ROOT AS “established”(verb). 9. WHICH WORD DOES NOT HAVE THE SAME MEANING? Today / Currently / Nowadays / Actually. 10. TURN THE FOLLOWING SENTENCE INTO REPORTED SPEECH: Experts advised us:“Don’t open any emails from unknown senders.” 11. GIVE A QUESTION FOR THE UNDERLINED WORDS: “Hackers use computer viruses to steal millionsof dollarsfrombank accounts.” 12. COMPLETE THE FOLLOWING (CONDITIONAL) SENTENCE: “If my computer got infected by a virus,…” 13. FILL IN THE GAP WITH THE CORRECT OPTION: You are not allowed . . . in thi s restaurant (smoking/ to smoke/ smoked/ smoke) III * PRODUCTION (3 points) 14. WRITE AN OPINION ESSAY OF APPROXIMATELY 120 WORDS FOCUS STRICTLY ON THE TOPIC: What would be the worst thing about being stuck somewhere without a phone or internet access?