Page 8 - English12 | Activity Book 3-4
P. 8

Gap Filling




            2.  Fill in the blanks with the given words.






                    maze          unlock         anti-spyware         identity       access




                    password      virtual        invasions            phishing       backup






             1.   Some researchers believe that online internet __________________________ is a human right in today’s technology


                 age and it should be available everywhere.


             2.   A system __________________________ and recovery disk is a must to restore your system when it goes down if you

                 work on a personal computer and have crucial files.


             3.   If someone is using your personal information to open accounts, file taxes, or make purchases, it means your

                 __________________________ is hacked, so you should urgently report it to the authorities.


             4.   __________________________ reality is the use of computer modelling and simulation that enables a person to


                 interact with an artificial three-dimensional (3D) visual or other sensory environments.

             5.   With the use of __________________________ e-mails, attackers can reach millions of users directly and install


                 malware, sabotage systems, or steal intellectual property and money.


             6.   Today, there are many cyber games requiring little gamers to help characters get out of a colorful

                 __________________________ finding bonus items and overcoming obstacles to find letters and reach the next


                 level of the game.


             7.   To prevent and detect unwanted spyware and, as a result, remove them, __________________________ software

                 is used as it performs routine checks on your computer to ensure your system is safe and protected 24/7


                 from any possible __________________________.

             8.   Due to modern technology, typing your __________________________ while accessing your secure personal


                 computer has become a traditional way because many devices have been equipped with the option to


                 __________________________ your computer with a fingerprint scan.



                                            ORTAÖĞRETİM     8 ENGLISH-12
                                        GENEL MÜDÜRLÜĞÜ
   3   4   5   6   7   8   9   10   11   12   13