Sei sulla pagina 1di 2

You

You are
are going
going to
to hear
hear aa radio
radio programme.
programme. Listen
Listen to
to the
the first
first part
part of
of the
the
programme.
programme. According
According
to
to Inspector
Inspector Peters,
Peters, what
what is
is “cyber
“cyber crime”?
crime”? FIRST
FIRST AUDIO
AUDIO
Cyber crime...

Now
Now listen
listen to
to the
the whole
whole programme
programme and
and decide
decide if
if the
the following
following sentences
sentences
are true or false.
are true or false.
Then
Then correct
correct the
the false
false sentences.
sentences. SECOND
SECOND AUDIO
AUDIO
1. According to Inspector Peters, most teenagers use the Internet for cyber bullying. T / F

2. Sending someone a threatening text message is an example of cyber bullying. T / F

3. Cyber bullies are never punished. T / F

4. Inspector Peters believes people shouldn’t take cyber bullying seriously. T / F

5. Many schools are trying to deal with the problem of cyber bullying. T / F

Listen
Listen to
to the
the whole
whole programme
programme again
again and
and complete
complete the
the sentences
sentences below.
below.

1. I used to be involved with a special ___________________ of the police that investigates cyber
crime.
2. Bullies put their victim’s photos on the Internet without their _______________________.
3. Do you have any _________________________ for someone who is being cyber bullied?
4. Teenagers can get more advice at ________________________ like www.bullying.co.uk.

Which
Which ofof the
the following
following do
do Complete
Complete these these definitions
definitions withwith thethe correct
correct
you
you word:
word:
think
think it
it is
is used
used toto help
help ________________
________________ means
means sending
sending out-e-mails
out-e-mails from
from false
false
prevent
prevent financial
financial institutions
institutions toto try
try to
to obtain
obtain confidential
confidential details.
details.
cyber
cyber crime?
crime? ______________
______________ is
is aa program
program that
that steals
steals people’s
people’s
firewall
firewall personal information.
personal information.
AA ______________
______________ is is aa program
program that
that protects
protects aa computer
computer
phishing
phishing against
against cybercrime
cybercrime “attacks”.
“attacks”.
spyware
spyware

To download the FIRST audio file copy and


paste this audio file link or scan the QR
code:
https://drive.google.com/file/d/1kU1SJkyHiRd
2FRhkSp0lxE3wzvhIfYJO/view?usp=sharing
To download the SECOND audio file copy
and paste this audio file link or scan the QR
code:
https://drive.google.com/file/d/1yobOPT4po
Db9jrlK2B_rG0UzSgW3lgqB/view?

Potrebbero piacerti anche