Experiencing English 2 - PowerPoint PPT Presentation

1 / 73
About This Presentation
Title:

Experiencing English 2

Description:

Title: Experiencing English 2 Author: Jia Guodong Last modified by: Created Date: 5/24/2002 3:59:39 PM Document presentation format: – PowerPoint PPT presentation

Number of Views:158
Avg rating:3.0/5.0
Slides: 74
Provided by: JiaGu1
Category:

less

Transcript and Presenter's Notes

Title: Experiencing English 2


1
Experiencing English 2
2
Unit 8Computers and Security
3
Unit 8Computers and Security
In this unit, you will
  • first listen, and then talk about computers and
    security
  • read about computer viruses and the damage they
    may inflict
  • learn new words and expressions
  • write about what should be done to protect
    against computer viruses
  • practice the use of omission and emphasis
  • write an Internet notice check goals
  • visit Culture Salon for an introduction to
    milestones in computer history

4
home
Teaching procedures I. Listen and Talk
Lead in
Dialogue Samples
II. Read and Explore
Passage A
Think About It
Related Information
Words and Expressions
Summary of the Text
Understanding the Text
Notes to the Text
III. Culture Salon
5
Unit 8Computers and Security
Part I
Listen
Talk
6
Unit 8Computers and Security
Directions Listen to the following passage and
try to fill the missing words. Click here to
listen.
Have you ever listed everything the
computer does to enhance modern life? From
finding research to doing research, from 1.
__________ use to home use, from 2. ___________
with friends and family to searching for a job,
computers simplify our lives and allow us to
learn and 3. _________ things with the click of a
mouse. The Internet is like a highway system,
moving bits of information across telephone lines
and cables with such speed that when we 4.
__________ the web address or search for
websites, within seconds the information appears
on the computer screen. The 5. __________ of the
computer and the Internet has revolutionized how
we live and work. How did we ever 6. __________
__________without computers?   There is 7.
___________ in all things and the computer is not
an exception. While it provides us with many good
things at our fingertips, there are those who 8.
__________ programs that infect the computer with
viruses which destroy its 9. __________ and
frustrate the computer owner. Anti-virus
programs, however, are 10. ___________ to combat
the problem. Cybercrime is also rising as
Internet privacy is violated in a variety of
ways, creating the need for better Internet
security systems to be developed.
7
  • Keys
  • 1.Business 2. communicating
  • 3. discover 4. type in
  • 5. invention 6. get along
  • 7. opposition 8. create
  • 9. memory 10. available

8
  • Dialogue Samples
  • Dialogue 1
  • Talking About Computer Security
  • Key words and patterns
  • ?Xiaozhou, I cant believe whats happened. My
    computer wont start.
  • ?I did just download what I thought was a
    really great game.
  • ?unauthorized software
  • ?I just dont see why its such a big deal.
  • ?sure, no problem.

9
  • Dialogue 2
  • Talking About Computer Viruses
  • key words and patterns
  • ?Was there any message in the email?
  • ?an email with an attachment
  • ?How did the virus get my name and email
    address? The email was addressed to me.
  • ?pick up the virus
  • ?Just be on the safe side.
  • ?Ill do that right away.

10
Unit 8Computers and Security
Directions Listen to the following paragraphs
and decide which picture is described in
detail. Click here to listen.
11
Unit 8Computers and Security
  • The photos are all related to Computers and
    Security . Describe them to your classmates with
    the help of the following question.
  • What are the basic skills you need to be
    effective in using computers ?
  • How do you think the Internet can help in our
    modern life? Explain.
  • How can you avoid being a victim of cybercrime?

12
Unit 8Computers and Security
Part II
Read
Explore
13
Passage A
  • You Are the Weakest Link, Goodbye

14
  • New words and phrases
  • 1. adequate a. enough or satisfactory ???
  • eg The citys water supply is no longer
    adequate for its needs.
  • 2. agenda n. a list of the subjects to be dealt
    with or talked about at a meeting ??
  • eg Whats on the agenda for this afternoons
    meeting?
  • 3. Continual a. repeated often and over a long
    time ????????
  • eg He ignores the continual warnings of his
    nurse.

15
  • 4. Document n. a paper or set of papers with
    written or printed information or the same thing
    transmitted electronics by fax or email
  • eg The document has been saved to your
    computer.
  • 5. Guarantee n. a formal declaration or promise
    that something will be done ??
  • eg Wealth is no guarantee of happiness.
  • 6. Harbor v. give protection ??
  • eg Harboring criminals is an offence in law.
  • 7. Infect v. cause illness by the movement of an
    organism into a living thing ??

16
  • eg Dont come near me if youve got a cold---I
    dont want to be infected.
  • 8. Inflict v. force (something or someone
    unpleasant or unwanted) on someone ???,???
  • eg Dont inflict your ridiculous ideas on me.
  • 9. Innocent a. knowing nothing of evil or wrong
    ???
  • eg Dont be so innocent as to believe
    everything you hear.
  • 10. Malicious a. ???
  • eg a malicious attack on his reputation.

17
  • 11. Odd a. occasional
  • eg We got the odd complaints but most of our
    customers seem satisfied with our service.
  • 12. Recede v. move back or away ????
  • eg His hair is beginning to recede from
    forehead.
  • 13. Threat n. an expression of an intention to
    hurt, punish, cause pain ??,??an expression of an
    intention to hurt, punish, cause pain ??,??
  • eg The threat of an economic depression hangs
    over the world.

18
  • 14. Update v. make more modern or suitable for
    use now by adding new information or changing its
    design ??
  • eg The date will need updating from time to
    time.
  • 15. Urban a. of or in a city or town ???
  • eg the urban population
  • 16 at risk in danger ????
  • eg The disease is spreading rapidly, and all
    children under ten are at risk.
  • 17. pick up notice ???

19
  • eg We picked up signals for help from the
    burning plane.
  • 18. in pursuit of with the aim of obtaining ??
  • eg We immediately set out in pursuit of the
    enemy.
  • 19. let...down make unsuccessful by failing to
    achieve a good enough standard ???,???????
  • eg We had thought that we could rely on them,
    but they let us down.

20
  • 20. set in (something unhappy) begins and seems
    likely to continue ??
  • eg Before the boat could reach shore, a storm
    had set in.
  • 21. or so about ??
  • eg Mr. Smith will be back in a day or so.

21
Lead-in Pictures
Before reading Passage A, describe the following
pictures .
22
Lead-in Questions
  • 1. Do you often download free software from the
    Internet? Explain.

2. Have you installed anti-virus software on
your computer? What is it?
3. Is it possible for us to find a way to get rid
of computer viruses permanently?
(Click the button below to go to each part.)
23
Notes to the Text
  • Click the following words to listen to the text.

Listen to the whole text.
Listen to paragraph 1.
Listen to paragraph 2.
Listen to paragraph 3.
Listen to paragraph 4.
Listen to paragraph 5.
Listen to paragraph 6.
Listen to paragraph 7.
Listen to paragraph 8.
Listen to paragraph 9.
Listen to paragraph 10.
Listen to paragraph 11.
Listen to paragraph 12.
24
Summary of the Text
  • The weakest link in the protection of a
    company's computers against viruses is the
    individual computer user. There is a strong
    tendency that the employees assume it is the
    company's computer security experts' job to worry
    about the viruses and they can bring the problem
    under control. But everyone must do their share
    to prevent viruses. Any unsolicited email
    attachment or any untested type of software may
    contain a virus.

25
Summary of the Text
  • Even the best anti-virus software is not
    always effective and must be frequently updated.
    Constant education of all employees about viruses
    is the key to virus prevention. No one should
    ever be allowed to relax their defenses, even if
    this means the company must have some rules set
    that employees might not like.

26
Understanding the Text
  • 1. Who do employees turn to for help when their
    computers are affected by a virus?

They turned to the IT staff in their company for
help.
27
Understanding the Text
  • 2. What are the several malicious
  • computer viruses mentioned in the
  • passage?

Viruses such as Melissa, the Love Bug, etc. have
caused great damage to the world.
28
Understanding the Text
  • 3. Are employees always alert to
  • computer viruses? Explain.

No, they aren't. They forget about the harm a
computer virus may bring when that virus is off
news headlines.
29
Understanding the Text
  • 4. What are the cases when employees
  • might put their company at risk?

They are putting their company at risk when they
are opening unsolicited attachments and
downloading unauthorized software.
30
Understanding the Text
  • 5. Do you agree with the author that the
  • human factor is the most important to
  • protect a company against virus attack?
  • Explain.

Open.
31
  • You Are the Weakest Link, Goodbye   
  • Do you remember the good old days? Innocent
    times spent sharing documents and executable
    files without a care in the world. Okay, every
    month or so you might encounter a boot sector
    virus but they were easy to deal with even if
    the anti-virus software didn't pick them up.
  • But those long lazy summers disappeared too
    fast. Macro viruses made Information Technology
    (IT) administrators grow up fast as they realized
    there was a type of virus which could spread very
    quickly throughout an organization. It wasn't
    unusual to find

32
  • hundreds of computers within personal
    company infected by viruses transmitted via email
    attachments. The IT staff were amongst the
    fittest departments in your company, running from
    Personal Computer (PC) to the next cleaning them
    up.
  • There had to be a better way. Companies
    now realize that viruses aren't "urban myths",
    and can have a serious impact on their
    operations. They invest in anti-virus software on
    the desktops, servers and email gateways and even
    put in place procedures to ensure their
    anti-virus is up-to-date with the very latest
    detection routines.

33
  • It sounds like companies have put in place
    adequate defenses to protect against viruses. But
    have they?
  • Anti-virus software detects most of the
    viruses your users are likely to encounter
    often without the user even knowing. However, the
    software must be updated regularly, preferably
    daily in any large company. Even then, a very new
    virus can infect your users. With the rapid
    transmission of files through networks and the
    Internet, a virus can spread a considerable
    distance before it can be identified and
    protected against. Fortunately, only a few
    viruses ever

34
  • do this but the likes of Melissa and the Love
    Bug can inflict serious damage before their
    progress is stopped. Whilst employees become
    suddenly aware during the ensuing media
    excitement, they soon forget about the virus
    threat as the stories disappear from the news
    headlines.

35
  • This is the danger. Complacency can set in
    when there is no perceived "action" on the virus
    front with no global crisis, and the importance
    of being vigilant about viruses recedes in your
    users' minds. They forget what the big deal was
    in the first place after all, the anti-virus
    software deals with the viruses, doesn't it? And
    isn't it the IT department's job to look after
    this sort of thing?

36
  • Before you know it your users are opening
    unsolicited attachments once more, downloading
    unauthorized software, and putting your company's
    data and credibility at risk. All because the
    users think that they are working in a safe
    environment. Employees see anti-virus software,
    firewalls and IT departments as guarantees that
    their computers will work and will be safe. Of
    course, there aren't any guarantees. Anti-virus
    software plays one, albeit important, part in the
    defense of your company from malicious attack but
    the security of your computer system is only as
    strong as the weakest link. And that, more often
    than not, is the human factor .

37
  • No employer wants to come across
    as a killjoy or an ogre. Most will willingly
    accept that the happiest employees are those who
    feel that they are respected and trusted by their
    employer. Many companies accept that employees
    will send and receive a certain amount of
    personal email and make the odd personal
    telephone call. However, the worry comes
    when employees start risking company security in
    pursuit of personal amusement. Funny screensavers
    and games downloaded from the Internet can seem
    harmless enough but they could easily be
    harboring a dangerous virus.

38
  • Software downloaded from the net is often
    unlicensed and unsupported, and may cause
    conflicts with existing software in use at your
    company. Unlicensed, pirated software is an ideal
    vector for a computer virus. Virus writers and
    hackers often use such software as the ideal
    "kick-start" for their virus distribution.

39
  • It is vitally important that employees be
    educated about the virus threat but this cannot
    be a one-off event. The potential threat should
    always be in the back of an employee's mind and
    precautionary measures should be taken as a
    matter of course. There is no harm in reminding
    people about what could happen if they let their
    guard down. In the end, education is the key to a
    virus-free environment and this is a continual
    process. It may not be the most exciting thing on
    the agenda but it works.

40
  • The lesson is simple. You can have the best
    software in the world protecting your company's
    defenses you can even be the biggest IT company
    in the world but without your users practicing
    safe computing they will always be the weakest
    link.

41
Words and Expressions
  • 1.innocent ( of things) harmless, knowing
  • nothing of evil or
    wrong (of
  • people) guiltless

Examples
  • An innocent prank turned into disaster.
  • He was pronounced innocent of the charge.

42
Words and Expressions
  • 2. or so about

Examples
  • There will be twenty or so people at the
  • party.
  • In another year or so, you will have
  • forgotten all about him.

43
Words and Expressions
  • 3. encounter meet or be faced by
  • (something bad, esp. a
    danger
  • or a difficulty) meet
    unexpectedly

Examples
  • The plane encountered a storm over the
  • Rockies.
  • He encountered many interesting people
  • on his travels.

44
Words and Expressions
  • 4. infect fill with disease, germs, give
  • disease to (a person)

Examples
  • This meat is infected because of the hot
  • weather.
  • The flu virus infected almost the entire
  • class.

45
Words and Expressions
  • 5. transmit send or pass from one person,
  • place or thing to another

Examples
  • The material was transmitted by satellite
  • throughout the world.
  • This kind of disease sometimes transmits
  • to humans.

46
Words and Expressions
  • 6. in place in the right or proper place

Examples
  • He nodded approvingly, his wide grin still
  • in place.
  • The books were in place on the shelves.

47
Words and Expressions
  • 7. adequate enough for the purpose

Examples
  • What should be done to assure adequate
  • supplies of energy?
  • There was adequate rain and snow last
  • winter.

48
Words and Expressions
  • 8. update make more modern or up-to-date

Examples
  • The information will need updating from
  • time to time.
  • The speech had been corrected and
  • updated after the last-minute reports from
  • abroad.

49
Words and Expressions
  • 9. identify prove or show who or what
  • somebody is or something is

Examples
  • Could you identify your umbrella among a
  • hundred others?
  • The light was too dim for me to identify her.

50
Words and Expressions
  • 10. set in begin and (probably) continue

Examples
  • Fortunately the wound was treated before
  • infection could set in.
  • I must try and get my garden tidied up before
  • the bad weather sets in.

51
Words and Expressions
  • 11. in the first place at an earlier, more
  • appropriate
    time

Examples
  • Why didn't you tell us that in the first place?
  • Nobody can remember what was agreed in
  • the first place.

52
Words and Expressions
  • 12. at risk in danger

Examples
  • The disease is spreading, and all children
  • under 5 are at risk.
  • The economy sill fall further, putting more
  • jobs at risk.

53
Words and Expressions
  • 13. come across as seem to be (judging
  • from behavior
    or
  • actions)

Examples
  • He came across (to me) as (being) quite a
  • nice person.
  • He came across to voters as (being) honest,
  • sincere and hard-working.

54
Words and Expressions
  • 14. conflict disagreement , opposition

Examples
  • They tried to stir up conflicts between us.
  • No one expected this to be the last conflict
  • between the two countries.

55
Notes to the Text
  • 1. But those long lazy summers disappeared too
    fast. (para. 2)

That summer doesn't last as long as we would like
it to last.
???????,????,????????
56
Notes to the Text
  • 2. It wasn't unusual to find hundreds of
    computers within one company infected by viruses
    transmitted via email attachments. (para. 2)

It was often the case that in the same company
hundreds of computers would have viruses because
the employees had opened email attachments
containing these viruses.
???????????????????????????,?????????
57
Notes to the Text
  • 3. Companies now realize that viruses aren't
    "urban myths", and can have a serious impact on
    their operations. (para. 3)

Companies now understand that viruses are not
modern made-up stories , and they can do great
harm to a company's operations.
???????????????????,???????????????
58
Notes to the Text
  • 4. With the rapid transmission of files through
    networks and the Internet, a virus can spread a
    considerable distance before it can be identified
    and protected against. (para. 5)

With the fast spread of information through
networked computers and the Internet, a virus can
reach many computers before anything can be done
about it.
????????,?????????,????????????????,??????????????
??
59
Notes to the Text
  • 5. Complacency can set in when there is no
    perceived "action" on the virus front and no
    global crisis and the importance of being
    vigilant about viruses recedes in your users'
    minds.(para. 6)

People may ignore viruses and stop worrying about
them when no major worldwide viruses have been
reported recently, and the need to be very on
guard against viruses is easily forgotten..
???????????????,?????????,??????????,???????????
?????????????????
60
Notes to the Text
  • 6. but the security of your computer system is
    only as strong as the weakest link.(para. 5)

But the security of your computer system against
viruses rests with its user who is actually the
weakest point.
????????????????????????? .
61
Notes to the Text
  • 7. However, the worry comes when employees start
    risking company security in pursuit of personal
    amusement.(para. 9)

But the worry arises when employees start
breaking the company security rules in order to
amuse or entertain themselves by doing personal
downloading from the Internet.
??,?????????????????????,???????
62
Notes to the Text
  • 8. Virus writers and hackers often use such
    software as the ideal "kick-start" for their
    virus distribution.(para. 10)

Virus writers and people who break into other
people's computer files often use such software
as the best means to get their viruses to start
spreading.
??????????????????????????????
63
Notes to the Text
  • 9. The potential threat should always be in the
    back of an employee's mind and precautionary
    measures should be taken as a matter of
    course.(para. 11)

Employees should always be aware of the
possibility of a virus infection and they should
take protective measures as their daily routine.
??????????????????,?????????????
64
Personal Computer (PC)
  • All computers, from the first room-sized
    mainframes, to today's powerful desktop, laptop
    and even hand-held PCs, perform the same general
    operations on information. What changes over time
    is the information handled, how it is handled,
    how much is moved around, and how quickly and
    efficiently it can be done.

http//www.pcguide.com/intro/works/jobs.htm
65
The Internet
The most popular search engine on the Internet --
Yahoo
  • The Internet is a computer network made up of
    thousands of networks worldwide. No one knows
    exactly how many computers are connected to the
    Internet. It is certain, however, that these
    number in the millions and are increasing at a
    rapid rate.
  • An Internet user has access to a wide variety of
    services electronic mail, file transfer, vast
    information resources, interest group membership,
    interactive collaboration, multimedia displays,
    real-time broadcasting, shopping opportunities,
    breaking news, and much more.

66
Email
What is an email address made up of?
Junk email slows down genuine messages and invade
the privacy of email users.
Junk Email
  • Even with the multimedia excitement of the Web,
    Electronic Mail (email) is the most frequently
    used application of the Internet. Many people who
    have access to the Internet at school, home, and
    work, use the Internet for no other purpose than
    to send and receive email.
  • Email allows computer users locally and worldwide
    to exchange messages. Each user of email has a
    mailbox address to which messages are sent.
    Messages sent through email can arrive within a
    matter of seconds.

http//www.internet101.org/email.html/
67
Computer Virus
  • A computer virus is a program that invades your
    computer system, hides there, and makes copies of
    itself. Viruses spread when you launch an
    infected application or start up your computer
    from a disk that has infected system files.
  • All computer viruses are manmade. A simple virus
    that can make a copy of itself over and over
    again is relatively easy to produce. Even such a
    simple virus is dangerous because it will quickly
    use all available memory and bring the system to
    a halt.
  • It is highly recommended that you have Virus
    Protection installed in your computer before you
    consider downloading anything.

http//www.internet101.org/virus.html/
68
Macro Viruses
  • Macro viruses are computer viruses that use
    an application's own macro programming language
    to distribute themselves. These macros have the
    potential to inflict damage to the document or to
    other computer software. The infecting files can
    be modified or deleted and may not be recoverable.

http//support.microsoft.com/default.aspx?scidkb
EN-USq187243
69
Melissa
  • Melissa affects Word documents. If launched, the
    macro virus will attempt to start Microsoft
    Outlook to send copies of the infected document
    via email to up to 50 people in Outlooks address
    book as an attachment.
  • The email subject line reads "Important Message
    from the name of someone," and the message
    reads "Here is that document you asked
    for...don't show anyone else -)".

http//www.melissavirus.com/
70
The Love Bug
The Love Bug virus is also called the Loveletter
Virus, or simply I Love You.
  • The virus is circulating through email and
    affecting many customers. If run, the virus could
    overwrite .jpg, .mp3, and other file types, and
    attempt to send a copy of itself to everyone in
    the recipient's address book.

The e-mail containing the virus typically carries
a subject line of "ILOVEYOU". Inside the mail is
a short message saying "Kindly check the attached
LOVELETTER coming from me" and an attachment
named LOVE-LETTER-FOR-YOU.txt.vbs.
http//www.microsoft.com/misc/data/lovelettervirus
.htm
71
Culture Salon
  • Milestones in Computer History 1992-2001

72
Goal Checking
  • On a scale of A to E, where A stands for very
    well, B for well, C for moderately well, D
    for not very well, and E for not at all, rate
    how well you have achieved the goals set at the
    beginning of this unit.
  • A B C D E talk about computers and security
  • A B C D E understand the two reading passages
  • A B C D E use the new words and expressions
  • A B C D E explain what should be done to protect
    against computer viruses
  • A B C D E use omission and emphasis
  • A B C D E write Internet notice
  • A B C D E understand the introduction to the
    milestones in computer history
  • If you have given yourself a C or lower rating on
    any of these goals, please
  • visit the Experiencing English website for
    additional help.
  • review the section that you found difficult.
  • ask your teacher for extra help.
  • work with a peer or form a study group to
    reinforce your progress.-

73
Thank You!
Write a Comment
User Comments (0)
About PowerShow.com