Студопедия

КАТЕГОРИИ:

АстрономияБиологияГеографияДругие языкиДругоеИнформатикаИсторияКультураЛитератураЛогикаМатематикаМедицинаМеханикаОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРиторикаСоциологияСпортСтроительствоТехнологияФизикаФилософияФинансыХимияЧерчениеЭкологияЭкономикаЭлектроника


Work in groups. Discuss and cross out the collocation in each diagram that is not commonly used when talking about computers.




create
a new password
a new document
a new printer
a
attach
a file
an e-mail
a document
c
text
save
delete
surf
cut and paste
e
upgrade
your software
your hardware
the menu
g
an e-mail
open
forward
delete
post
j
type in
a key word
the keyboard
your password
h
click on
an icon
type
a hyperlink
i
download
hardware
software
a file
f
visit
a chatroom
a website
your mouse
d
print out
a hard copy
a soft copy
a document
b


10. Work in pairs. Student A imagines he/she is someone who knows nothing about computers (e.g. your grandmother) and asks Student B to explain five of the terms in Exercise 9. Student B is expected to use as little jargon as possible. Use the picture if needed.

11. Using the picture describe as precisely as you can the things you always/ usually do when you:

ü start up your computer

ü go on the internet

ü check your e-mail

ü write a document for work or college on a computer

ü shut down your computer .

Are there any other things you often do?

Cyber Crime

Before You Read

12. Codes: Use the key to work out what this number code means.

Key:a=2; m=26; n=l; w = 19; e = 10; l = 24; d = 8; o = 3; y = 25; u = 15; h = 16; v = 17; c = 6; r = 9; k = 22; t = 13; i = 18; s = 11.

 

19, 10, 24, 24 / 8, 3, 1, 10 / 25, 3, 15 / 16, 2, 17, 10 / 6, 9, 2, 6, 22, 10, 8 / 13,16,18, 11 / 6, 3, 8, 10.

 

Make up your own messages using this code and give them to your partner to solve.

 

Discussion

13. Discuss these questions as a class:

  1. Where and when do you use passwords or codes in everyday life? (Make sure you don’t tell anyone your passwords accidentally!)
  2. Why is computer security important?
  3. How could you use a computer to commit a crime?

 


Поделиться:

Дата добавления: 2015-09-13; просмотров: 129; Мы поможем в написании вашей работы!; Нарушение авторских прав





lektsii.com - Лекции.Ком - 2014-2024 год. (0.006 сек.) Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав
Главная страница Случайная страница Контакты