Изпълнете четирите задачи към текста! Отговорите може и на  blagavesta@abv.bg ,за да отбелязвам кой е работил.


The fear that a virus may infect your computer is a familiar
one for many. Even casual computer users know that
unfamiliar files may host viruses.
While viruses are a well-known threat, many computer users
do not know their enemy. There are many specific types of
viruses that one needs to guard against.
One dangerous type of virus is an overwriting virus. These
viruses not only spread malicious code, they also replace the
information contained in other programs. They erase
important information, sometimes rendering a computer
entirely unusable.
Another common virus is a resident virus. They stay dormant
until a particular event activates them. If your computer
harbors resident viruses, you may not discover them until the
damage is done. These and other viruses often install
themselves in the resident extensions of other programs.
A Trojan horse is another destructive type of program. It’s not
technically a virus, because it doesn’t replicate, but it’s still
dangerous. A Trojan horse looks like an ordinary, useful file or
program. However, it has destructive programming embedded in
it. This programming may also piggyback onto beneficial files.
Lastly, unlike viruses and Trojan horses, a worm does not need to
attach itself to another program. It is particularly troublesome because
it attacks computers directly.

1.Read the passage and answer
these questions.

1 What are some common types of viruses?
2 What are some other
kinds of harmful

2 Read the magazine article. Then, choose
the correct answers.
What is the main purpose of the article?
A to describe the types of viruses and other
harmful programs
B to explain how to avoid viruses
C to stress the importance of having anti-virus
D to alert readers to the existence of a new
virus type
2 Which of the following is NOT a threat to
A a resident virus
B an overwriting virus
C a worm
D a resident extension
3 How is a Trojan horse different from a virus?
A It attaches to another program.
B It is harmful to your computer.
C It does not replicate itself.
D It spreads within a network.

  3. Match the words or phrases (1-7) with the
definitions (A-G).
  1 ___ virus                5 ___ piggyback
  2  ___ host                6 ___ resident extension
   3 ___ embed            7 ___ overwriting virus

   4___ resident virus

A a harmful program that infects a computer
B a virus that erases information by replacing it
C to plant a harmful program within an ordinary
D a computer or program that carries a virus
E a virus that is dormant until activated
F the parts that are active even when a program
is shut down
G to attach to another program for transferrin rm


9  Write an e-mail
to an employee with a computer problem.
Include: possible sources of the problem,
virus types, and safety precautions.