Page 11 - İngilizce 11 | 5. Ünite
P. 11

BACK TO THE PAST                                       B. Access Denied
                                                        THEME 5



             4   &   Read the stories again. Choose the correct options.

                1.  The attacks of hackers are …... .          4.  While the drivers were on the road in San
                     a.  benefcial for people                    Francisco, …... .
                     b.  illegal and end with penalties           a.  they saw an extraordinary road sign
                     c.  monitored by governments                 b.  they saw a Godzilla attack
                2.  Neville Maskelyne set up a plan to …... .     c.  they had serious accidents because of
                                                                      a road sign
                   a.  steal the method of Marconi’s device
                                                               5.  Intelligence service of a country …... .
                   b.  make fun of his rival
                                                                  a.  attacked the computer systems for fun
                   c.  send Marconi to jail
                                                                  b.  changed the system to learn nuclear
                3.  The hackers …... .
                                                                      facilities
                   a.  sold the fast food company to its rival
                                                                  c.  wanted to play rock&roll at night
                   b.  didn’t let the owners take the account
                       back
                   c.  stole the social account of a fast food
                       company although it was one of the
                       biggest ones

             5  Change the words in bold below with their highlighted synonyms in the texts.
                1.  They try to enlarge the company he inherited from his grandfather. ..................................
                2.  Harry’s main goal is to operate computer systems professionally. ..................................
                3.  The layout of my account is a pigeon and an olive branch. ..................................
                4.  Hackers keep an eye on the programme to steal information. ..................................
                5.  Hackers design harmful software to steal the information of the people. ..................................
                6.  Misunderstanding the departure time caused a deep chaos. ..................................



                      C  .................................................................

                      Sometimes cyberattacks affect the whole public.
                      The target of the hackers was once all the roads in
                      San Francisco. But how? In 2014, some hackers
                      sneaked into the electronic signs in the city. They
                      changed the messages on the road signs. When the
                      people driving on these roads came across the sign
                      GODZILLA ATTACK-TURN BACK, they didn’t know
                      what to do or where to drive. This caused lots of
                      confusion. If the drivers hadn’t been careful enough,
                      there would have been many accidents on that day.



                      D  .................................................................
                      Cyberattacks aren’t usually made by ordinary
                      hackers. Most governments have professional
                      systems to monitor the facilities of other countries. In
                      2012, intelligence service of a country sent a worm
                      to the control system of nuclear stations of its rival
                      country. But this time, they just wanted to have a
                      good laugh. The malware turned off the monitoring
                      stations and made the system play rock music at
                      maximum volume during the night. It really panicked
                      the operators until they solved the problem. If this
                      incident hadn’t happened, governments wouldn’t have tried to improve their cyber security.


                                                          71
                                                          71
   6   7   8   9   10   11   12