Professional Documents
Culture Documents
1. Find synonyms for the following words in paragraphs two and three.
a. doubtful _____________________
b. influence _____________________
c. encourages _____________________
d. carried out _____________________
e. tendency _____________________
2. Say who or what the following words refer to.
a. them (line 5) _____________________
b. it (line 19) _____________________
c. their (line 22) _____________________
d. it (line 30) _____________________
3. Choose the most suitable answer to explain the meaning of these expressions.
3.1 “Drawing on existing knowledge…” (line 17)
a. To use knowledge we will gain from future experiences.
b. To use previous knowledge to help understand something.
3.2 “participants demonstrated greater likelihood to… share fake news articles” (lines 24-25)
a. Participants showed a bigger probability of sharing fake news articles.
b. Participants liked sharing fake news articles.
1.2 When you arrange with a group of people, through social media, to go to a public place at the same
time to sing, dance or give funny performances you are part of
a. a flash mob b. a meme c. a profile d. a digital footprint
1.3 Someone who pretends on social media to be different to trick or attract other people is
a. a hacker b. an avatar c. a troll d. a catfish
1.4 Something that is very popular right now on the internet or on social media is said to be
a. streaming b. livecasting c. trending d. trolling
1.5 The practice of getting online users to financially contribute to a business project or a cause is called
a. crowdsourcing b. catfishing c. crowdfunding d. livecasting
1.7 Someone who will comment on your social media feed, usually in a mean way, to get a response
from you is known as
a. an influencer b. a fan c. a troll d. a hater
1.8 When you want to know someone’s personal interests, work, or relationship status you can find
information on social media by checking his/her
a. profile b. blog c. linkedin d. vlog
1.9 A funny video, picture, or phrase that a lot of people send to each other on the internet for mutual
enjoyment is called
a. flash mob b. meme c. trend d. gif
1.10 When a malicious software program self-replicates by copying itself to another program, it means
that your computer has got
a. spam b. a virus c. a bug d. a firewall
1.12 The result of your online activity, such as the websites you visit, your comments on social media,
your tagged photos, is known as your
a. posts b. cookies c. profile d. digital footprint
CYBERCRIMES
2. Complete the gaps (1 - 12) with the words from the box. Then name the cybercrime referred to (a - f).
intruder tricked intimidate adverts reputation steal false
harassment servers confidential password permission
a. _________________________
This cybercrime occurs when a criminal gains access to a user’s personal information to
1.___________________ funds, or access 2.___________________ information. They can also open an
internet account in your name or use your name to plan a criminal activity.
b. _________________________
This kind of cybercrime involves online 3.___________________ where the user is subjected to a huge
number of online messages and emails. Social media, websites and search engines are used to
4.___________________ a user and instill fear.
c. _________________________
This type of attack involves hackers sending malicious email attachments or URLs to users to gain
access to their accounts or computer. Users are 5.___________________ into emails claiming they
need to change their 6.___________________ or update their billing information, giving criminals
access.
d. _________________________
e. _________________________
It’s a 9.___________________ statement someone makes about you, which they publish as a statement
of fact, and which harms your personal and/or professional 10.___________________. It may also
cause financial loss and emotional distress.
f. _________________________
It is the name given to criminally controlled 11.___________________. A piece of code hidden in the
advert makes your computer go to criminal 12.___________________. These then catalogue details
about your computer, before choosing which piece of malware to send you.
Exercises 1 and 2
You will hear an expert talking about teens on social media. In the first part, he points out the pros.
1.3. Teenagers'self-esteem
a) is freely expressed.
b) reflects their personality.
c) is improved.
Exercise 3
In the second part, he points out the cons.
Exercise 4
You will listen to a report about fake news.
4. Listen to a report about fake news. Say if the sentences are True or False.
a. Americans consider false news a major problem alongside racism and terrorism. T F
b. We read and share fake information mainly because its content is misleading. T F
c. People tend to believe that information shared by family and friends on T F
social media is accurate.
d. The information we read on social media seems as trustworthy as the T F
one given by experts.
e. A media bubble is a set of people who have similar opinions. T F
f. Social media supports a wide range of opinions which help us detect fake news. T F
g. Fake news promotes a simple but sensational narrative about ordinary events. T F
h. Stories covering topics that trigger emotions and feelings are amongst T F
the most popular.