надо сделать это лёгкое задание(недостаток времени)
Use the words and expressions below to complete the sentences. malicious software, denial of service, worm, logon screen, username, password, reconnaissance, payload, hard drive, intruder

1. Windows makes it possible to change the that appears when you start your computer without any third-party software, but this setting is well hidden. 2. A attack is an incident in which a user or organization is deprived of the services of a resource they would normally expect to have. 3. The detection technique tries to identify people behind attacks by analyzing their computational behaviour. 4. Nowadays, it is a common practice for computer systems to hide a as it is typed. 5. Spyware or other is sometimes found embedded in programs supplied officially by companies, e.g., downloadable from websites, that appear useful or attractive, but may have, for example, additional hidden tracking functionality that gathers marketing statistics. 6. In a computer, a is a self-replicating virus that does not alter files but resides in active memory and duplicates itself. 7. Your can be used to create a custom link to your profile that you can give out to people or post on external websites. 8. Active is a type of computer attack in which an intruder engages with the targeted system to gather information about vulnerabilities. 9. In computer security, refers to the part of malware which performs a malicious action. 10. Computers have a and use it to store files for the operating system and software that run on the computer, as well as files created or downloaded to the computer by a user.

киска555555544 киска555555544    3   13.05.2020 15:27    2

Другие вопросы по теме Английский язык