欢迎来到冰点文库! | 帮助中心 分享价值,成长自我!
冰点文库
全部分类
  • 临时分类>
  • IT计算机>
  • 经管营销>
  • 医药卫生>
  • 自然科学>
  • 农林牧渔>
  • 人文社科>
  • 工程科技>
  • PPT模板>
  • 求职职场>
  • 解决方案>
  • 总结汇报>
  • ImageVerifierCode 换一换
    首页 冰点文库 > 资源分类 > DOCX文档下载
    分享到微信 分享到微博 分享到QQ空间

    应用型大学英语视听说教程3unit 5 Cyber Security.docx

    • 资源ID:13362462       资源大小:228.61KB        全文页数:20页
    • 资源格式: DOCX        下载积分:5金币
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    三方登录下载: 微信开放平台登录 QQ登录
    二维码
    微信扫一扫登录
    下载资源需要5金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

    加入VIP,免费下载
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    应用型大学英语视听说教程3unit 5 Cyber Security.docx

    1、应用型大学英语视听说教程3unit 5 Cyber Security5教师用书UnitCyber Security LESSON PLANPeriod One(45 Minutes)Part One:Lead-in10 MinutesPart Two: Communicative Skills20 MinutesPart Three: In-putting & Out-putting15 MinutesPeriod Two(45 Minutes)Part Three: In-putting & Out-putting15 MinutesPart Four: Follow-up Activiti

    2、es15 MinutesPart Five:Entertainment: 10 MinutesReviewChecklist5 MinutesUNIT MAPIn this unit, you have: Part One Lead-in How many types of computer crimeActivity 1: Listening: Internet Scam Hits Emails Activity 2: Viewing: Broken FriendshipActivity 3: Speaking: Pair WorkPart Two: Communicative Skills

    3、Activity 1: Oral Functions: Agreement or DisagreementActivity 2: Oral PracticeTask 1: Listening: Unveiling a DisagreementTask 2: Viewing: Pros and Cons of InternetTask 3: Speaking: Online-chattingPart Three: In-putting & Out-puttingActivity 1: Listening To Learn: How Phishing Scams WorkTask 1: Liste

    4、ning for InformationTask 2: Listening for DetailsTask 3: Oral Practice: Pair WorkActivity 2: Viewing To Learn: Phishing for Personal InformationTask 1: Viewing for InformationTask 2: Viewing for DetailsTask 3: Oral Practice: Tips for Spotting a Fraudulent E-mailPart Four: Follow-up ActivitiesActivit

    5、y 1: Listening to LearnTask 1: Listening for Information: Cyber BullyingTask 2: Oral Practice: A five-minute speechActivity 2: Viewing To Learn Task 1: Viewing for Information: You Cannot Take It BackTask 2: Oral Practice: Pair Work Part Five: Entertainment: Internet Awareness Poster DesignReview Ch

    6、ecklistPart : Lead-in Part One Lead-inHow many types of computer crime? Teaching tips:Teachers are expected to make the students understand the three types of computer crime.Activity 1 Listening Directions: Thousands of Internet users have had their email accounts switched off following huge online

    7、scams. Listen to the news and choose the best answer for each question. Before that, please check () the words and phrases that you know.Teaching tips:Phishing=fishingFish for personal information: to trick people into giving out private informationTapescript:Internet Scam Hits EmailsOver 30,000 pas

    8、swords to email accounts including Hotmail, Google mail and Yahoo were posted on the Internet. Loads of people were tricked into giving out their email addresses and passwords to computer hackers. People whose emails were affected were then locked out of the accounts but can re-register to get back

    9、in to read their mails. This kind of scam is called phishing as it tricks people into giving out private information like passwords on fake websites. The people at internet company say they are aware of the scam and are now doing everything they can to make the accounts that were targeted safe again

    10、. If you are worried about your email account then reset your password and keep it safe. Teaching tips:Teachers let the students check the new words they may not be familiar with. Teachers let the students listen to the news once. To see to what extent the students can answer the reading comprehensi

    11、on questions. Then let the students listen to it again, paragraph by paragraph, and take down the answers to the questions. Check up the answers:1. C. 2. B. 3. D. Activity 2 Viewing Directions: Watch the story of a girl whose best friend gave out her E-mail password to some other girls at school wit

    12、hout her knowledge. Watch the video twice and choose the correct words from the brackets. Video Transcript:Broken FriendshipI used to have a best friend named Katie.We shared everything, even our passwords. When I noticed a bunch of emails from someone whose name I didnt recognize I began to wonder.

    13、 The subject was“You Look Hot”. I opened the recent one that said it was from a guy in our school. He was two grades older than me. He said he wanted to have sex.Im embarrassed to even say.These girls in our school, the beautiful people as I call them, convinced Katie to give them my password. She t

    14、hought that if she gave it to them they will like her. I think she was scared,too. These girls do mean things to everyone. Anyway, the girls got into my email and sent emails to all the senior guys making it look like it was from me. In the email, there was a picture of me with no clothes on. They g

    15、ot it from someone elses website and put my face on the body. Then they wrote something like: “I will do everything to make your dreams come true,and signed my name. It seems like it came from my account. Everyone thought that I really sent it. Now I cannot go anywhere in school. The guys look at me

    16、 funny. People whisper and point at me, when they think I cannot see. I dont have any friends and I dont even want to talk to Katie anymore. I feel so alone and I wish I could move somewhere to start over.I thought, it was safe to share my passwords with my best friend. Now, I Know you cannot. I wis

    17、h I could just disappear.Check up the answers:1. convinced 2. scared 3. senior 4. website 5. signed 6. accountActivity 3 Speaking Directions: Work in pairs, discuss the following questions and then share your opinions with the whole class. What do you think the girl in the story gave her password to

    18、 her best friend?“Best friend” is not a good reason. It is not safe to share your password to your best friend.Why it is important to keep online passwords private? Generate a list of reasons to keep your password private.Once her passwords is out, her E-mail accounts can be tampered with; people ca

    19、n assume her identity online; her bank or shopping accounts can be tampered with. Make a list of activities that you use your E-mail account for online shopping, email communication, e-banking,online-chatting, online-games etc.Teaching tips:Remember: keeping your passwords private does not mean that

    20、 you dont trust your friends. It is necessary to “keep your keys” in order to ensure that you are protected online,because “once you put it out there, you can never get it back”.Part : Communication Skills Activity 1 Oral FunctionsAgreement and DisagreementDirections: Read the following sentence pat

    21、terns. Underline those words expressing “agreement and disagreement”.AgreementDisagreementStrongModerateStrongModerateIm in complete agreement.I agree.I disagree completely.I dont agree.I agree completely.Youre right there.Thats out of the question.Thats not how I see it.I quite agree.I think youre

    22、right.On the contrary.I wouldnt say that.I couldnt agree more.Thats true.Of course not!I dont think it will work.Exactly!Thats right.Thats ridiculous.Im sorry, but I have to disagree.Precisely.Im sorry, but I cant agree with that.A valid point.Im sorry, but I cant support that position / idea.I agre

    23、e one hundred percent.Im sorry, but I cant go along with that.I agree wholeheartedly.Activity 2 Oral Practice Task1 Listening Directions: Listen to the conversation and fill in the blanks.Tapescript: Unveiling a DisagreementWomen: John? I have to say I dont agree with the way you handled the meeting

    24、 today.Man: Thats not how I see it. I thought it went fine.Women: I think it would have been better if you had given us more of a chance to give our opinions.Man: Im sorry, but I cant go along with that. I thought we were all pretty much in agreement.Task 2 Viewing Directions: Watch the video Pros a

    25、nd Cons of Internet and then list the expressions to show agreement youve heard.Video Transcript:Pros and Cons of InternetWomen A: The Internet is indeed a wonderful and amazing addition in our lives.Women B: Exactly! The Internet provides many opportunities and can be used for a variety of things.W

    26、omen A: Presently, the Internet is used by everyone to communicate with each other quickly and simply via emails or chat rooms.Women B: Thats true. My kids are also using them to search good articles andSyllabi for their schools. They can learn new things from the Internet.Women A: However, there ar

    27、e also negative uses.Women B: I agree a hundred percent. People may be addicted to online-gamesand online-chatting. They may open some bad sites and they may becheated by some dangerous people they never met before in the chat rooms.Women A: Thats right. We need to learn how to guide our kids to pro

    28、tect themselveson the Internet.Women B:I couldnt agree more. We must monitor them and tell them ways to avoid cyber scams.I heardExactlyThats true.I agree a hundred percent.Thats right.I couldnt agree more.Task 3 Speaking Directions: Group in four. Discuss on the topic Advantages and Disadvantages o

    29、f Online-chatting. Use proper expressions to show your agreement or disagreement.Teaching tips:Search for: “Pros & Cons of Internet Chatting” to get more information to guide students to discuss.Part Three In-putting & Out-puttingActivity 1 Listening to learn In this section, you will hear a descrip

    30、tion of How Phishing Scams Work. Before that, please check () the words and phrases that you know and think about the following four questions:QuestionsYour Answers1. What is phishing?Phishing scams attempt to trick people into providing sensitive personal information.2. What is personal information

    31、?Credit card and banking details;Email account and other account data;Home address and phone number, etc.3What is fraudulent email?A fraudulent email will disguise as an official request for information from a company.4. What will happen if you click an included hyperlink?Clicking this link will cause the fake website to open.Tapescript: How Phishing Scams WorkWhat is Phishing? Phishing scams attempt to tri


    注意事项

    本文(应用型大学英语视听说教程3unit 5 Cyber Security.docx)为本站会员主动上传,冰点文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰点文库(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2023 冰点文库 网站版权所有

    经营许可证编号:鄂ICP备19020893号-2


    收起
    展开