Unit 11: Hackers and Malware

It worker suffering data loss
This activity demo would go so much better if you create an account and log in :)
Basic activities (computer-graded)

Multiple Choice Activity

Students will be able to select the best match between unit terms and their definitions.

You must sign in to try this activity.

Login to view the Listening Activity

Listening Comprehension Activity

Students will be able to listen to short audio clips in English and then spell them correctly.

You must sign in to try this activity.

Login to see the Spelling Activity

Spelling and Recognition

Students will be able to identify and spell a vocabulary term correctly given only the definition.

You must sign in to try this activity.

Advanced activities (optionally teacher-graded)
Login to see the Speaking Activity

Speaking Practice Activity

Students will be able to speak and record 5 example sentences from the unit vocabulary and then submit them for grading by the classroom teacher. If no teacher is available or desired, then the students will be shown good examples of other students' work.

US
UK
Before the criminal-minded programmer quit his job at the bank, he programmed a backdoor into the server so he could later install a ransomware virus.
US
UK
White hat hackers always get permission before they start cracking systems, and always report security holes they find along the way.
US
UK
The company newsletter encouraged all employees to remain vigilant and to report all suspicious behavior.
US
UK
Some people consider social media websites such as Facebook, Youtube, and TikTok to be nothing more than a well-engineered combination of spyware and adware.
US
UK
Pop-up blockers are effective at preventing unwanted or dangerous popups, but unfortunately they can also block some useful functionality as well.

You must sign in to try this activity.