2024-12-28
2024-12-28 | 2:48a.m.
Trial Exercise (Level 1)
Hacking alert as theft incidents rocket
Samson Lee
Comprehension
How much of the news story did you understand?
1.
Concerning the hacking incidents last year, what else are the culprits likely to have done?
A.
Damaged computer hardware.
B.
Stolen personal information.
C.
Released malware.
2.
According to Ko, how do the hackers steal personal information?
A.
They spread viruses to destroy computers.
B.
They install harmful hidden programs on users' computers.
C.
They destroy users' computers.
3.
Why may the wide use of smart phones be harmful to members of the public?
A.
Smart phones may leak personal data.
B.
Smart phones may steal sensitive information.
C.
Smart phones may spread viruses.
4.
How can we protect our personal information?
A.
By installing security software.
B.
By installing a phishing attack.
C.
By increasing dependency on smart phones.
Vocabulary
Please fill in the blanks below with the appropriate words which you have learnt in this lesson. Hints: dependent, hackers, functional, spread, culprits, fraudulent, hacked, harmful
1.
The real
in the smuggling activities have already been identified.
2.
He designed a
set of furniture for the disabled.
3.
He
into his friend's computer in order to find out some top-secret information.
4.
The criminal earned his money from a
business.
Terms of Use
|
Private Statement
|
Disclaimer
|
Contact Us
Copyright @ 2024 Sing Tao Publishing Limited. All rights reserved