1、体验英语任务型设计 BOOK2 unit 8Unit Eight Computers and SecurityTask-based Design for Six Contact Hours Session No.Unit Content InvolvedFocal PointsTask-based activitiesSession 1(90-100 min)1. Listen and TalkLead inPassage listening practiceDialogue SamplesCommunicative Tasks1. Key words and expressions rela
2、ted to the topic:click; mouse; Internet; web; website; computer screen; infect; virus; destroy; memory; anti-virus program; cyber crime; Internet privacy; Internet security systemExpressions and sentences for talking about Computer Security and Computer Viruses( See Communicative Tasks)The same as t
3、he above.Talking about the pictures which are all related to Computers and Security given after the passage Role-playing the dialogue samples Doing the communicative tasks according to the situation provided 2. Read and explorePassage AYou Are the Weakest Link, GoodbyeLexical preparationKey words an
4、d expressionsgood old days; innocent; document; or so; boot; sector; infect; transmit; attachment; clean them up; adequate; update; threat; set in; download; at risk; more often than not; come across as; odd; harbor; as a matter of course Picking out sentences from Passage A containing the key words
5、 and expressions in the left column and making up new sentences with themSession 2(90-100 minutes)2. Read and explorePassage AYou Are the Weakest Link, GoodbyeReadingPassage understanding on the basis of the analysis of the main idea of the passageSpeakingDiscussion of preventing virusesWritingArgum
6、entation of viruses prevention1.Analyzing the main idea of the passage2. Picking out the words and expressions related to the unit topicTalking about viruses prevention Writing a paragraph explaining what a company should do to protect personal computers against virusesSession 3(90-100 minutes)2. Re
7、ad and ExplorePassage BSo Sorry to Bug You3. Write and ProduceGeneral Writing Practical WritingReadingPassage understandingReading Skills Key Word Reading Word consolidation correspond; swear; feverish; dumb; get rid of; queue up; delete; curseOutlining and Summarizing The expressions used for writi
8、ng an Internet noticeDoing fast reading of Passage B and discussing the questions in Ex. 10 & 11 in groups Discussing the definition of the skill in groupsMaking up sentences with the words on the left column with the help of the related sentences in the passageWriting an omission and emphasis sente
9、nceWriting an Internet noticeUnit Group project task: Talking about the fiercest virus in the world in 2007 using PPTIII. Suggested teaching procedures and class activitiesSession 1 (90-100 min)Listen and Talk1. Lead inTask1 Listen to the following passage and try to fill the missing words in the bl
10、anks. Step 1 Lead-in questions1. What do you think the Internet can help us in our modern life? Explain.2. How can you avoid being a victim of cyber crime? Step 2 Listening practice The students listen to the passage for three times and fill in the missing words in the blanks. Teacher: Listen to the
11、 passage for three times and fill in the missing words in the blanks.Step 3 Word studyThe teacher lays emphasis on the following words and expressions related to the topic: Click; mouse; Internet; web; website; computer screen; infect; virus; destroy; memory; anti-virus program; cyber crime; Interne
12、t privacy; Internet security systemTeacher: Can you pick up the words and expressions related to the topic? What are they? Task 2 Picture descriptionThe students talk about the pictures provided in the textbook with the words and expressions they have learned from the listening passage in groups. Te
13、acher: Work in groups to talk about the pictures with the help of the words and expressions youve learned from the listening passage. Five minutes later you will be expected to do class presentation. 2. Dialogue Samples Dialogue 1: Talking About Computer SecurityStep 1 Lead in questions1. Do you kno
14、w how to start talking about computer security?(I cant believe whats just happened. My computer wont start!Can you help me restart my computer? )2. Are you able to talk about computer security in English? Step 2 Dialogue Samples studyThe students read the first dialogue in pairs and speak out the fo
15、llowing sentences for talking about Computer Security in the dialogue.Teacher: Please read the first dialogue in pairs and speak out the sentences for talking about computer security. Several minutes later.Teacher: Can you speak out the sentences youve summarized? I cant believe whats just happened.
16、 My computer wont start!Have you tried disconnecting the power source? Youve got to stop downloading unauthorized software. Unless you have a firewall installed on your machine, a hacker can get access to important information you have on your system.And then the teacher asks the students to give mo
17、re examples. Teacher: Can you give us some more examples?Can you help me restart my computer? Can you help me out here?My computer is acting very strange/ wont start.My laptop does not work properly/ crashes a lot these days.Step 3 Listening and role-playingThe students listen to the dialogue and th
18、en role-play in pairs.Dialogue 2: Talking About Computer VirusesStep 1 Lead-in questionTeacher: Do you know how to talk about computer viruses?(Hey, I received a strange email today from a web friend of mine. It was just an email with an attachment. Mike, it was probably a virus.Step 2 Dialogue Samp
19、les studyThe students read the second dialogue and speak out the following sentences that are used for talking about computer viruses. Teacher: Please read the second dialogue in pairs and speak out the sentences useful for talking about computer viruses in the dialogue.Several minutes later.Teacher
20、: Now, can you speak out the sentences youve summarized? (Hey, man, my computer is infected by viruses transmitted via email attachment.It was probably a virus.Viruses come in email with an attached file.Viruses usually go into the infected computers Address Book and send a virus email to everyone o
21、n the list.Thats usually the way a virus works- you dont see it happen.Just to be on the safe side, you ought to delete the email, and the attachment and empty your Recycle Bin.)Step 3 Listening and role-playingThe students listen to the dialogue and then role-play it in pairs.3. Communicative Tasks
22、Task 1: Talking about computer securityRoles :Victor and XiaohongSituation: Victor likes to download unauthorized software from the Internet, but these days his computer didnt work. Xiaohong, Victors classmate, advised him install anti-virus software to protect his computer.The students are given 5
23、minutes to work in pairs according to the situation given and then role-play the task. Some students make comments on their performance, which should involve their presentation of the real-life situation and the English they use for talking about computer security.Teacher: Work in pairs to do Task 1
24、. Five minutes later some pairs of you are expected to role-play the task, and then the others will be invited to make comments on your performance. The comments should involve the presentation of the real-life situation and the English you use for talking about computer security. Task 2: Talking Ab
25、out Computer Viruses The students do the task after class in pairs. 4. Read and ExploreLexical preparation for Passage AStep 1 Word studyKey words and expressions: innocent; document; or so; boot; sector; infect; transmit; attachment; clean them up; adequate; update; threat; set in; download; at ris
26、k; more often than not; come across as; odd; harbor; as a matter of course Students are given 7 minutes to pick up the sentences containing the words and expressions from Passage A which are displayed on PPT. The teacher may assign each group two or three words or expressions.Teacher: Please do fast
27、 reading of Passage A and pick up the sentences containing the words and expressions displayed on PPT. Group 1 are responsible for the first two words, Group 2Sentences to be picked up: 1. Innocent times spent sharing documents and executable files without a care in the world. (Para. 1)2. Okay, ever
28、y month or so you might encounter a boot sector virusbut they were easy to deal with even if the anti-virus software didnt pick them up. (Para. 1) 3. It wasnt unusual to find hundreds of computers within personal company infected by viruses transmitted via email attachments.( Para. 2)4. It sounds li
29、ke companies have put in place adequate defenses to protect against viruses. ( Para. 4)5. However, the software must be updated regularly, preferably daily in any large company. (Para. 5) 6. While employees become suddenly aware during the ensuring media excitement, they soon forget about the virus
30、threat as the stories disappear from the news headlines.(Para. 5)7. Before you know it your users are opening unsolicited attachments once more, downloading unauthorized software, and putting your companys data and credibility at risk. (Para. 7)8. And that, more often than not, is the human factor.
31、(Para. 7) 9. Many companies accept that employees will send and receive a certain amount of personal email and make the odd personal telephone call. (Para. 8)10. Funny screensavers and games downloaded from the Internet can seem harmless enough but they could easily be harboring a dangerous virus. (
32、Para. 9)Step 2 Sentence makingThe students make sentences with the following words and expressions in pairs. good old days; or so; clean up; set in; at risk; come across as; as a matter of course Teacher: Lets do more practice. Make sentences with each of the words and expressions displayed on PPT. Thr