Book · October 021 citations reads 35,829 authors




Download 3,9 Mb.
Pdf ko'rish
bet41/112
Sana21.05.2024
Hajmi3,9 Mb.
#248349
1   ...   37   38   39   40   41   42   43   44   ...   112
Bog'liq
4 PROFESSIONAL ENGLISH

(1)
________ one area of concern is that people may sometime share details of 
their lives online without thinking about the consequences. 
(2)
________ “The issue now is how 
open one should be with sharing private information since the information could be stolen by 
criminals”. The writer describes a situation in which people were robbed after revealing their 
vacation plans online. 
(3)
__________ how important it is for consumers to protect their personal 
information when they purchase products online. 
(4)
________ most Americans would like to limit 
the extent to which surveillance is carried out. 
(5)
________ despite the concerns about privacy, one 
can still use online services safely by using common sense and privacy controls.
iii
Match the given verbs with their synonyms from the box.
Eavesdrop, decrypt, deliver, snoop, deploy, suggest, gather, watch, track, disseminate, 
search, leak, handle, fix.
decipher offer manipulate assemble convey fasten seek for
escape overhear propagate pursue spy spread out pry 


52 
iv
Fill in gaps 1-15 with a suitable word form. You can use not only one word in each 
gap.
The Snowden Era Challenges 
 
On January 21, 2014 a text message flashed on phones held by the protesters 
1)
_______ (throng) 
Kyiv’s Independence Square. The Ukraine’s ex-president was then still clinging to power and 
2)
_______ (brutalize) opponents. The message – from the number 111 – read: “Dear subscriber, 
you 
3)
_______ (register) as a participant in a mass disturbance”. Widely presumed to 
4)
_______ 
(send) from the president’s security apparatus to all phones in the protest zone, the message was a 
stark 
5)
_______ (remind) of how mobile phones can be used for surveillance. Soon after, a 
Ukrainian man walked into a nondescript office in National Harbor, Maryland, and sought help 
from a man named Zimmermann. 
Phil Zimmermann is a 
6)
_______ (cryptology). His company, 
Silent Circle
, encrypts voice calls, 
text messages, and any file attachments. If you use 
Silent Circle
, your calls to other users are sent 
through the company’s servers and 

Download 3,9 Mb.
1   ...   37   38   39   40   41   42   43   44   ...   112




Download 3,9 Mb.
Pdf ko'rish

Bosh sahifa
Aloqalar

    Bosh sahifa



Book · October 021 citations reads 35,829 authors

Download 3,9 Mb.
Pdf ko'rish