Task II. Read and translate the text. Does it have answers to the questions discussed? Have you ever had to give a presentation? What tool did you use? Perhaps it was Microsoft PowerPoint? If you did, you weren't alone. Around 30 million presentations are created each day using it. But who invented this program and what is its future?
PowerPoint was originally called Presenter and it was the creation of Robert Gaskins and Dennis Austin. In 1987, when it first became available, only Apple Macintosh users had access to it. The program was bought by the Microsoft Corporation in July of the same year. When PowerPoint was developed, it was created for people in business. Since then it has been used in schools, universities, hospitals, offices and conferences. It is used not only to give presentations, it is also used to present data, analyze information, edit photos and do sums. It is a versatile tool that allows users to present images, texts and graphs. The information can be made more entertaining by adding sounds or visual effects, e.g. the text can appear word by word or from the side. What made PowerPoint so successful? The first thing is that it was easy to use. It's clear icons on buttons and dialogue boxes, the screens and slide designs. Individual slides meant that each one could project a different idea. In addition, the fact that each slide could contain images and texts made it a very powerful tool. Microsoft continues to improve PowerPoint, and some of the features from the 2019 version include inserting a 3D model which can be rotated 360º; easily removing the background from photos, recording video or audio and some special effects. The most interesting tools are the improved AI (artificial intelligence) features: PowerPoint Coach and PowerPoint Designer. The coach gives suggestions while the user practises his or her presentation in front of the computer. PowerPoint Designer helps generate slides and ideas. It helps to create layouts that are well designed. With new apps and programs being invented every day, it will be interesting to see what PowerPoint will be like in the future. Will people continue to use it, or will there be a better presentation tool on the market?
Task IV. Match the words in bold (1-6) with their definitions (a-f). Write the words in bold next to the definitions. (Written form)
1 Sometimes I feel stupid when I can’t remember something easily. 2. It is important to have a good memory when you are learning a new language. That way you don’t forget the new words that you learn. 3. Students in upper high school science courses often do research to learn new things about the subject. 4. Some students think that learning English is difficult, but others think that maths is harder. 5. Sometimes it’s hard to remember where you put your things. It’s easy to forget the location. 6. The file was damaged, and I could not open my essay anymore. I should have made a copy.
a _ (n) detailed study of a something to learn more about it
b_ (adj) silly or not intelligent
c __ (adj) not easy; needing skill or effort to do or understand
d __ (n) a collection of information stored in one place on a computer
e __ (n) a place or position
f __ (n) your ability to remember information.
1. Carefully control your behavior on social networks. Virtuoso scammers are very adept at using personal information with which they can easily crack security codes and gain access to other accounts. Over the past few years, this method of cyberattack has become one of the most common.
2. For the safety of your accounts, restrict access to the inner circle of friends and relatives. Never share personal information with new online friends. Try not to advertise data containing birth dates, email addresses or pet names that can be used as passwords. All this information can be very useful for a professional hacker.
3. Do not use debit cards online. Unauthorized debit card payments are withdrawn directly from your bank account, and even if you report a violation immediately, it will take more than one week to restore the previous balance. In the case of a credit card in a similar situation, when contesting suspicious payments, the client has access to his accounts. Both types of cards have notification functions either by e-mail or in the form of SMS text, which makes it possible to quickly interrupt unauthorized actions. Visa is a leader in security solutions for its credit cards.
4. Beware of messages of this kind: “Attention! Your account has been hacked. You must call to verify your account. Send us a message and we will call you back. ”
5. Do not become a victim of Clickjacking. This type of attack is fraught with hyperlinks under what, at first glance, looks like harmless content. However, clicking the link opens a channel for malware that can invade your computer or transfer your personal information.
6. Do not be reckless in using any Wi-Fi connection. Wi-Fi hotspots are most often unsafe because they do not encode information transmitted on the Internet. Moreover, the tools used by hackers allow them to “peek” over your shoulder and fetch usernames, passwords or other information that provides access to financial accounts. Cellular network in this regard is more secure.
7. In the email messages and on the website, look carefully at the URLs, even if they contain the names of the reputable financial institutions you deal with. The most common catch is a combination of a legitimate website name and fake. These addresses very often lead to mime sites, which under the appearance of a legitimate guise hide affiliation with hacking activities. Sometimes the URL may be genuine, but when you click on the link, it takes you to another site.
8. Never click on messages sent by e-mail and offering to update personal data. In most cases, such requests are triggered after you enter your account via a non-email address.
9. Do not use the same password for different accounts. Choose unusual characters, numbers, and spaces for passwords. As an added precaution, fill out security questions with fictitious, easy-to-remember answers, rather than facts that might reveal your personal information.
10. Install antivirus and antispyware software on your computer. Make sure that these programs work and are updated automatically.
Объяснение:
ответ:Число киберпреступлений увеличилось на 36% — более 4500 новых атак каждый день. Целями мошенников являются не только персональные данные, но также денежные средства. Предотвращение преступлений, предварительная защита, а также результативное расследование является основной целью специалистов в области безопасности электронных денежных потоков.
21 марта 2013 года в Москве состоится Международный Деловой Форум «Киберпреступления. Предотвращение. Защита. Расследование».
Программа мероприятия разбита на несколько блоков:
— Электронная коммерция в России. Безопасность сегодня
— Предотвращение и защита от киберпреступлений. Современная практика защиты и расследования
— SECURITI & RISK-MANAGEMENT: внутренняя безопасность компаний
— Киберпреступления. Правовые противодействия
— Безопасность клиентов
— Workshop: технические решения защиты от киберпреступлений
На Международном Деловом Форуме эксперты поднимут на обсуждение во несовершенство судебной системы; как обезопасить свой бизнес от вредоносных программ, несанкционированных взломов платежных систем; технология хищений и расследований; защита конфиденциальной информации и данных; мошенничество с кредитными картами и меры предосторожности и защиты от фишинга и др. видов киберфрода.