Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
You are
are going
going to
to hear
hear aa radio
radio programme.
programme. Listen
Listen to
to the
the first
first part
part of
of the
the
programme.
programme. According
According
to
to Inspector
Inspector Peters,
Peters, what
what is
is “cyber
“cyber crime”?
crime”? FIRST
FIRST AUDIO
AUDIO
Cyber crime...
Now
Now listen
listen to
to the
the whole
whole programme
programme and
and decide
decide if
if the
the following
following sentences
sentences
are true or false.
are true or false.
Then
Then correct
correct the
the false
false sentences.
sentences. SECOND
SECOND AUDIO
AUDIO
1. According to Inspector Peters, most teenagers use the Internet for cyber bullying. T / F
5. Many schools are trying to deal with the problem of cyber bullying. T / F
Listen
Listen to
to the
the whole
whole programme
programme again
again and
and complete
complete the
the sentences
sentences below.
below.
1. I used to be involved with a special ___________________ of the police that investigates cyber
crime.
2. Bullies put their victim’s photos on the Internet without their _______________________.
3. Do you have any _________________________ for someone who is being cyber bullied?
4. Teenagers can get more advice at ________________________ like www.bullying.co.uk.
Which
Which ofof the
the following
following do
do Complete
Complete these these definitions
definitions withwith thethe correct
correct
you
you word:
word:
think
think it
it is
is used
used toto help
help ________________
________________ means
means sending
sending out-e-mails
out-e-mails from
from false
false
prevent
prevent financial
financial institutions
institutions toto try
try to
to obtain
obtain confidential
confidential details.
details.
cyber
cyber crime?
crime? ______________
______________ is
is aa program
program that
that steals
steals people’s
people’s
firewall
firewall personal information.
personal information.
AA ______________
______________ is is aa program
program that
that protects
protects aa computer
computer
phishing
phishing against
against cybercrime
cybercrime “attacks”.
“attacks”.
spyware
spyware