欢迎来到冰点文库! | 帮助中心 分享价值,成长自我!
冰点文库
全部分类
  • 临时分类>
  • IT计算机>
  • 经管营销>
  • 医药卫生>
  • 自然科学>
  • 农林牧渔>
  • 人文社科>
  • 工程科技>
  • PPT模板>
  • 求职职场>
  • 解决方案>
  • 总结汇报>
  • ImageVerifierCode 换一换
    首页 冰点文库 > 资源分类 > DOCX文档下载
    分享到微信 分享到微博 分享到QQ空间

    体验英语任务型设计 BOOK2 unit 8.docx

    • 资源ID:16814191       资源大小:48.78KB        全文页数:21页
    • 资源格式: DOCX        下载积分:5金币
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    三方登录下载: 微信开放平台登录 QQ登录
    二维码
    微信扫一扫登录
    下载资源需要5金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

    加入VIP,免费下载
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    体验英语任务型设计 BOOK2 unit 8.docx

    1、体验英语任务型设计 BOOK2 unit 8Unit Eight Computers and SecurityTask-based Design for Six Contact Hours Session No.Unit Content InvolvedFocal PointsTask-based activitiesSession 1(90-100 min)1. Listen and TalkLead inPassage listening practiceDialogue SamplesCommunicative Tasks1. Key words and expressions rela

    2、ted to the topic:click; mouse; Internet; web; website; computer screen; infect; virus; destroy; memory; anti-virus program; cyber crime; Internet privacy; Internet security systemExpressions and sentences for talking about Computer Security and Computer Viruses( See Communicative Tasks)The same as t

    3、he above.Talking about the pictures which are all related to Computers and Security given after the passage Role-playing the dialogue samples Doing the communicative tasks according to the situation provided 2. Read and explorePassage AYou Are the Weakest Link, GoodbyeLexical preparationKey words an

    4、d expressionsgood old days; innocent; document; or so; boot; sector; infect; transmit; attachment; clean them up; adequate; update; threat; set in; download; at risk; more often than not; come across as; odd; harbor; as a matter of course Picking out sentences from Passage A containing the key words

    5、 and expressions in the left column and making up new sentences with themSession 2(90-100 minutes)2. Read and explorePassage AYou Are the Weakest Link, GoodbyeReadingPassage understanding on the basis of the analysis of the main idea of the passageSpeakingDiscussion of preventing virusesWritingArgum

    6、entation of viruses prevention1.Analyzing the main idea of the passage2. Picking out the words and expressions related to the unit topicTalking about viruses prevention Writing a paragraph explaining what a company should do to protect personal computers against virusesSession 3(90-100 minutes)2. Re

    7、ad and ExplorePassage BSo Sorry to Bug You3. Write and ProduceGeneral Writing Practical WritingReadingPassage understandingReading Skills Key Word Reading Word consolidation correspond; swear; feverish; dumb; get rid of; queue up; delete; curseOutlining and Summarizing The expressions used for writi

    8、ng an Internet noticeDoing fast reading of Passage B and discussing the questions in Ex. 10 & 11 in groups Discussing the definition of the skill in groupsMaking up sentences with the words on the left column with the help of the related sentences in the passageWriting an omission and emphasis sente

    9、nceWriting an Internet noticeUnit Group project task: Talking about the fiercest virus in the world in 2007 using PPTIII. Suggested teaching procedures and class activitiesSession 1 (90-100 min)Listen and Talk1. Lead inTask1 Listen to the following passage and try to fill the missing words in the bl

    10、anks. Step 1 Lead-in questions1. What do you think the Internet can help us in our modern life? Explain.2. How can you avoid being a victim of cyber crime? Step 2 Listening practice The students listen to the passage for three times and fill in the missing words in the blanks. Teacher: Listen to the

    11、 passage for three times and fill in the missing words in the blanks.Step 3 Word studyThe teacher lays emphasis on the following words and expressions related to the topic: Click; mouse; Internet; web; website; computer screen; infect; virus; destroy; memory; anti-virus program; cyber crime; Interne

    12、t privacy; Internet security systemTeacher: Can you pick up the words and expressions related to the topic? What are they? Task 2 Picture descriptionThe students talk about the pictures provided in the textbook with the words and expressions they have learned from the listening passage in groups. Te

    13、acher: Work in groups to talk about the pictures with the help of the words and expressions youve learned from the listening passage. Five minutes later you will be expected to do class presentation. 2. Dialogue Samples Dialogue 1: Talking About Computer SecurityStep 1 Lead in questions1. Do you kno

    14、w how to start talking about computer security?(I cant believe whats just happened. My computer wont start!Can you help me restart my computer? )2. Are you able to talk about computer security in English? Step 2 Dialogue Samples studyThe students read the first dialogue in pairs and speak out the fo

    15、llowing sentences for talking about Computer Security in the dialogue.Teacher: Please read the first dialogue in pairs and speak out the sentences for talking about computer security. Several minutes later.Teacher: Can you speak out the sentences youve summarized? I cant believe whats just happened.

    16、 My computer wont start!Have you tried disconnecting the power source? Youve got to stop downloading unauthorized software. Unless you have a firewall installed on your machine, a hacker can get access to important information you have on your system.And then the teacher asks the students to give mo

    17、re examples. Teacher: Can you give us some more examples?Can you help me restart my computer? Can you help me out here?My computer is acting very strange/ wont start.My laptop does not work properly/ crashes a lot these days.Step 3 Listening and role-playingThe students listen to the dialogue and th

    18、en role-play in pairs.Dialogue 2: Talking About Computer VirusesStep 1 Lead-in questionTeacher: Do you know how to talk about computer viruses?(Hey, I received a strange email today from a web friend of mine. It was just an email with an attachment. Mike, it was probably a virus.Step 2 Dialogue Samp

    19、les studyThe students read the second dialogue and speak out the following sentences that are used for talking about computer viruses. Teacher: Please read the second dialogue in pairs and speak out the sentences useful for talking about computer viruses in the dialogue.Several minutes later.Teacher

    20、: Now, can you speak out the sentences youve summarized? (Hey, man, my computer is infected by viruses transmitted via email attachment.It was probably a virus.Viruses come in email with an attached file.Viruses usually go into the infected computers Address Book and send a virus email to everyone o

    21、n the list.Thats usually the way a virus works- you dont see it happen.Just to be on the safe side, you ought to delete the email, and the attachment and empty your Recycle Bin.)Step 3 Listening and role-playingThe students listen to the dialogue and then role-play it in pairs.3. Communicative Tasks

    22、Task 1: Talking about computer securityRoles :Victor and XiaohongSituation: Victor likes to download unauthorized software from the Internet, but these days his computer didnt work. Xiaohong, Victors classmate, advised him install anti-virus software to protect his computer.The students are given 5

    23、minutes to work in pairs according to the situation given and then role-play the task. Some students make comments on their performance, which should involve their presentation of the real-life situation and the English they use for talking about computer security.Teacher: Work in pairs to do Task 1

    24、. Five minutes later some pairs of you are expected to role-play the task, and then the others will be invited to make comments on your performance. The comments should involve the presentation of the real-life situation and the English you use for talking about computer security. Task 2: Talking Ab

    25、out Computer Viruses The students do the task after class in pairs. 4. Read and ExploreLexical preparation for Passage AStep 1 Word studyKey words and expressions: innocent; document; or so; boot; sector; infect; transmit; attachment; clean them up; adequate; update; threat; set in; download; at ris

    26、k; more often than not; come across as; odd; harbor; as a matter of course Students are given 7 minutes to pick up the sentences containing the words and expressions from Passage A which are displayed on PPT. The teacher may assign each group two or three words or expressions.Teacher: Please do fast

    27、 reading of Passage A and pick up the sentences containing the words and expressions displayed on PPT. Group 1 are responsible for the first two words, Group 2Sentences to be picked up: 1. Innocent times spent sharing documents and executable files without a care in the world. (Para. 1)2. Okay, ever

    28、y month or so you might encounter a boot sector virusbut they were easy to deal with even if the anti-virus software didnt pick them up. (Para. 1) 3. It wasnt unusual to find hundreds of computers within personal company infected by viruses transmitted via email attachments.( Para. 2)4. It sounds li

    29、ke companies have put in place adequate defenses to protect against viruses. ( Para. 4)5. However, the software must be updated regularly, preferably daily in any large company. (Para. 5) 6. While employees become suddenly aware during the ensuring media excitement, they soon forget about the virus

    30、threat as the stories disappear from the news headlines.(Para. 5)7. Before you know it your users are opening unsolicited attachments once more, downloading unauthorized software, and putting your companys data and credibility at risk. (Para. 7)8. And that, more often than not, is the human factor.

    31、(Para. 7) 9. Many companies accept that employees will send and receive a certain amount of personal email and make the odd personal telephone call. (Para. 8)10. Funny screensavers and games downloaded from the Internet can seem harmless enough but they could easily be harboring a dangerous virus. (

    32、Para. 9)Step 2 Sentence makingThe students make sentences with the following words and expressions in pairs. good old days; or so; clean up; set in; at risk; come across as; as a matter of course Teacher: Lets do more practice. Make sentences with each of the words and expressions displayed on PPT. Thr


    注意事项

    本文(体验英语任务型设计 BOOK2 unit 8.docx)为本站会员主动上传,冰点文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰点文库(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2023 冰点文库 网站版权所有

    经营许可证编号:鄂ICP备19020893号-2


    收起
    展开