3FL 2nd Test

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Elhadi Khediri High School, Tebessa 2022/2023

Third year classes : foreign languages Teacher : Kadjouh .I


Student’s name : …………………………………..

Read the text, then do the following activities :

Cyber crime is broadly defined as any illegal activity that involves a computer, another digital device or
a computer network. Cyber crime includes common cybersecurity threats like social engineering, software
vulnerability exploits and network attacks. But it also includes criminal acts like hacktivist protests,
harassment and extortion, money laundering, and more.

Cyber crime targets both individuals and companies. Typically, attackers target businesses for direct
financial gain or to sabotage or disrupt operations. They target individuals as part of large-scale scams, or to
compromise their devices and use them as a platform for nefarious activity.

One major example of cybercrime was in 2013-2016, Yahoo experienced a data breach which resulted in
the theft of 3 billion user accounts. For some of these accounts, the attackers got hold of private information
and passwords, which could be used to access user accounts in other online services.

www.exabeam.com
1. Write the letter that best completes the sentence :(2.25)
1- Cybercriminality ………… many other crimes. a-interferes with b-disrupts c-ends
2- Businesses and individuals are targeted by cybercrimes for………. reasons a- security b-
money c-communication
3- Cybercriminals infringed Yahoo ‘s data , many of them were used in………a-helping users to
log in b- breaching their online accounts c- creating other accounts

2. Answer the following questions according to the text : (03)


a. what security threats does cybercriminality include ?
…………………………………………

b. Why do attackers target individuals ?


……………………………………………….

3. Find what or who the underlined words refer to in the text :(1.5)


a-that(§1)→………. They(§2)→………… which (§3)→………….

4. Give a title to the text . …………………….(01.25)

5. Find in the text words or phrases that are close in meaning to the following : (1.5)
a- Menaces (§1)=………. b-corrupt (§2)=……………. c-obtained (§3)=………………

6. Divide the following words into roots and affixes : (02


a-invulnerability b- laundering c-harassment

Prefix Root Suffix


..

..

7. Link the following pairs using the connectors provided : (03.5)


1- a-Cybercrimes breach some individuals’devices . They use them in large scale scams.
(provided)
…………………..
2- a-Cybercriminality is fought by intelligence and security networks .b-It still poses a threat for
kids .( despite )
………………………………
3- a-Businesses are much threatened by cybercrimes. B-they hire hackers to protect their data basis.
(so……..that)
………………………………………………………………………………..

Writing :
One of your friends has been a victim of cyberbullying. He told you the story and you decided to
write about it in your school magazine to help other kids from this dangerous silent crime .
Write a short article to explain to your mates the causes and consequences of the online crimes.
Illustrate using concrete examples .

…………………………………………………………………………………………………
………………………………………………………………………………………..
……………………………………………………………………………………..
……………………………………………………………………………………………..
……………………………………………………………………………………….
…………………………………………………………………………………….
…………………………………………………………………

You might also like